aboutsummaryrefslogtreecommitdiff
path: root/kernel/features/load.c
blob: fd9883aa463f2f7672780a943e910bf2a3216b6c (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
// MIT License, Copyright (c) 2020 Marvin Borner

#include <assert.h>
#include <cpu.h>
#include <def.h>
#include <fs.h>
#include <load.h>
#include <mem.h>
#include <proc.h>
#include <str.h>

void bin_load(char *path, struct proc *proc)
{
	char *data = read_file(path);
	u32 stack = (u32)malloc(0x1000) + 0x1000;

	proc->regs.ebp = (u32)stack;
	proc->regs.esp = (u32)stack;
	proc->regs.useresp = (u32)stack;
	proc->regs.eip = (u32)data;
	strcpy(proc->name, path + 1);
}

int elf_verify(struct elf_header *h)
{
	return h->ident[0] == ELF_MAG && (strncmp((char *)&h->ident[1], "ELF", 3) == 0) &&
	       h->ident[4] == ELF_32 && h->ident[5] == ELF_LITTLE && h->ident[6] == ELF_CURRENT &&
	       h->machine == ELF_386 && (h->type == ET_REL || h->type == ET_EXEC);
}

void elf_load(char *path, struct proc *proc)
{
	char *data = read_file(path);
	struct elf_header *h = (struct elf_header *)data;

	assert(elf_verify(h));

	printf("%d", h->type);
	switch (h->type) {
	case ET_EXEC:
		return;
	case ET_REL:
		return;
	}

	loop();
	u32 stack = (u32)malloc(0x1000) + 0x1000;
	proc->regs.ebp = (u32)stack;
	proc->regs.esp = (u32)stack;
	proc->regs.useresp = (u32)stack;
	proc->regs.eip = (u32)h->entry;
	strcpy(proc->name, path + 1);
}