aboutsummaryrefslogtreecommitdiff
path: root/kernel/features/load.c
blob: b3d58285c89e59476cab93e231fc66871b7da0b3 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
// MIT License, Copyright (c) 2020 Marvin Borner

#include <assert.h>
#include <cpu.h>
#include <def.h>
#include <fs.h>
#include <load.h>
#include <mem.h>
#include <proc.h>
#include <str.h>

int bin_load(char *path, struct proc *proc)
{
	char *data = vfs_read(path);

	u32 stack = (u32)malloc(0x2000) + 0x1000;

	proc->regs.ebp = (u32)stack;
	proc->regs.useresp = (u32)stack;
	proc->regs.eip = (u32)data;
	strcpy(proc->name, path + 1);

	return data ? 0 : 1;
}

int elf_verify(struct elf_header *h)
{
	return h->ident[0] == ELF_MAG && (strncmp((char *)&h->ident[1], "ELF", 3) == 0) &&
	       h->ident[4] == ELF_32 && h->ident[5] == ELF_LITTLE && h->ident[6] == ELF_CURRENT &&
	       h->machine == ELF_386 && (h->type == ET_REL || h->type == ET_EXEC);
}

// TODO: Fix elf loading
void elf_load(char *path, struct proc *proc)
{
	char *data = vfs_read(path);
	struct elf_header *h = (struct elf_header *)data;

	if (!elf_verify(h)) {
		printf("File is not elf");
		return;
	}

	if (h->type != ET_REL)
		return;

	struct elf_program_header *phdrs = (struct elf_program_header *)((u32 *)h + h->phoff);

	for (int i = 0; i < h->phnum; i++) {
		struct elf_program_header *phdr = &phdrs[i];
		if (phdr->type != PT_LOAD)
			continue;
		memcpy((void *)phdr->vaddr, h + phdr->offset, phdr->filesz);
		memset((void *)(phdr->vaddr + phdr->filesz), 0, phdr->memsz - phdr->filesz);
	}

	u32 stack = (u32)malloc(0x1000) + 0x1000;
	proc->regs.ebp = (u32)stack;
	proc->regs.esp = (u32)stack;
	proc->regs.useresp = (u32)stack;
	proc->regs.eip = (u32)h->entry;
	strcpy(proc->name, path + 1);
}