/*-
* Copyright (c) 2002-2018 The UbixOS Project.
* All rights reserved.
*
* This was developed by Christopher W. Olsen for the UbixOS Project.
*
* Redistribution and use in source and binary forms, with or without modification, are permitted
* provided that the following conditions are met:
*
* 1) Redistributions of source code must retain the above copyright notice, this list of
* conditions, the following disclaimer and the list of authors.
* 2) Redistributions in binary form must reproduce the above copyright notice, this list of
* conditions, the following disclaimer and the list of authors in the documentation and/or
* other materials provided with the distribution.
* 3) Neither the name of the UbixOS Project nor the names of its contributors may be used to
* endorse or promote products derived from this software without specific prior written
* permission.
*
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED
* WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
* FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS
* BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
* (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA,
* OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
* CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
* OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
*/
#include <sys/types.h>
#include <sys/elf.h>
#include <sys/gdt.h>
#include <ubixos/exec.h>
#include <ubixos/ld.h>
#include <ubixos/kpanic.h>
#include <ubixos/endtask.h>
#include <vmm/vmm.h>
#include <lib/kmalloc.h>
#include <lib/kprintf.h>
#include <vfs/file.h>
#include <assert.h>
#include <string.h>
#include <sys/descrip.h>
#define ENVP_PAGE 0x100
#define ARGV_PAGE 0x100
#define ELF_AUX 0x100
#define STACK_PAD 0x1000
#define ENOEXEC -1
#define AT_NULL 0 /* Terminates the vector. */
#define AT_IGNORE 1 /* Ignored entry. */
#define AT_EXECFD 2 /* File descriptor of program to load. */
#define AT_PHDR 3 /* Program header of program already loaded. */
#define AT_PHENT 4 /* Size of each program header entry. */
#define AT_PHNUM 5 /* Number of program header entries. */
#define AT_PAGESZ 6 /* Page size in bytes. */
#define AT_BASE 7 /* Interpreter's base address. */
#define AT_FLAGS 8 /* Flags (unused for i386). */
#define AT_ENTRY 9 /* Where interpreter should transfer control. */
#define AUXARGS_ENTRY(pos, id, val) {*pos = id;pos++; *pos = val;pos++;}
static int argv_count(char **argv) {
int i = 0;
while (*argv++ != 0x0)
i++;
return (i);
}
static int envp_count(char **envp) {
int i = 0;
while (*envp++ != 0x0)
i++;
return (i);
}
static int args_copyin(char **argv_in, char **argv_out, char **args_out) {
int argc = argv_count(argv_in);
uint32_t *argv_tmp = (uint32_t *) kmalloc(sizeof(char *) * (argc + 2)); // + 1 For ARGC + 1 For NULL TERM
char *args_tmp = (char *) kmalloc(ARGV_PAGE);
argv_tmp[0] = argc;
uint32_t sp = 0x0;
int i = 0x0;
for (i = 1; i <= argc; i++) {
argv_tmp[i] = (uint32_t)(args_tmp + sp);
strcpy((char *)argv_tmp[i], argv_in[i - 1]);
sp += strlen(argv_in[i - 1]) + 1;
}
argv_tmp[i++] = 0x0;
*argv_out = (char *)argv_tmp;
*args_out = args_tmp;
return (0);
}
static int envs_copyin(char **envp_in, char **envp_out, char **envs_out) {
int envc = envp_count(envp_in);
uint32_t *envp_tmp = (uint32_t *) kmalloc(sizeof(char *) * (envc + 1)); // + 1 For NULL TERM
char *envs_tmp = (char *) kmalloc(ENVP_PAGE);
uint32_t sp = 0x0;
int i = 0x0;
for (i = 0; i < envc; i++) {
envp_tmp[i] = (uint32_t)(envs_tmp + sp);
strcpy((char *)envp_tmp[i], envp_in[i]);
sp += strlen(envp_in[i]) + 1;
}
envp_tmp[i++] = 0x0;
*envp_out = (char *)envp_tmp;
*envs_out = envs_tmp;
return (0);
}
static int elf_parse_dynamic(elf_file_t ef);
/*****************************************************************************************
Function: execThread(void (*)(void),int,char *);
Description: This function will create a thread from code in the current memory space
Notes:
05/19/04 - This does not work the way I want it to it still makes a copy of kernel space
so do not use out side of kernel space
*****************************************************************************************/
uint32_t execThread(void (*tproc)(void), uint32_t stack, char *arg) {
kTask_t * newProcess = 0x0;
uint32_t stackAddr = 0x0;
/* Find A New Thread */
newProcess = schedNewTask();
assert(newProcess);
stackAddr = vmm_getFreeKernelPage(newProcess->id, stack / PAGE_SIZE);
/* Set All The Correct Thread Attributes */
newProcess->tss.back_link = 0x0;
newProcess->tss.esp0 = 0x0;
newProcess->tss.ss0 = 0x0;
newProcess->tss.esp1 = 0x0;
newProcess->tss.ss1 = 0x0;
newProcess->tss.esp2 = 0x0;
newProcess->tss.ss2 = 0x0;
newProcess->tss.cr3 = (unsigned int) kernelPageDirectory;
newProcess->tss.eip = (unsigned int) tproc;
newProcess->tss.eflags = 0x206;
newProcess->tss.esp = stackAddr + (stack - 0x4); //stack;
newProcess->tss.ebp = 0x0;//stack;
newProcess->tss.esi = 0x0;
newProcess->tss.edi = 0x0;
/* Ring 3 Selectors */
/*
newProcess->tss.es = 0x30+3;
newProcess->tss.cs = 0x28+3;
newProcess->tss.ss = 0x30+3;
newProcess->tss.ds = 0x30+3;
newProcess->tss.fs = 0x30+3;
newProcess->tss.gs = 0x30+3;
*/
/* Ring 0 Selectors */
newProcess->tss.es = 0x10;
newProcess->tss.cs = 0x08;
newProcess->tss.ss = 0x10;
newProcess->tss.ds = 0x10;
newProcess->tss.fs = 0x10;
newProcess->tss.gs = 0x10;
newProcess->tss.ldt = 0x18;
newProcess->tss.trace_bitmap = 0x0000;
newProcess->tss.io_map = 0x8000;
newProcess->oInfo.vmStart = 0x6400000;
if (newProcess->files[0] != 0x0)
kpanic("Problem With File Descriptors");
newProcess->files[0] = 0x0;
//kprintf("EIP: 0x%X(%i)", tproc, newProcess->id);
/* Set up default stack for thread here filled with arg list 3 times */
asm volatile(
"pusha \n"
"movl %%esp,%%ecx \n"
"movl %1,%%eax \n"
"movl %%eax,%%esp \n"
"pushl %%ebx \n"
"pushl %%ebx \n"
"pushl %%ebx \n"
"movl %%esp,%%eax \n"
"movl %%eax,%1 \n"
"movl %%ecx,%%esp \n"
"popa \n"
:
: "b" (arg),"m" (newProcess->tss.esp)
);
/* Put new thread into the READY state */
sched_setStatus(newProcess->id, READY);
/* Return with the new process ID */
return ((uint32_t) newProcess);
}
/*****************************************************************************************
Function: void execFile(char *file);
Description: This Function Executes A Kile Into A New VM Space With Out
Having To Fork
Notes:
07/30/02 - I Have Made Some Heavy Changes To This As Well As Fixed A Few
Memory Leaks The Memory Allocated To Load The Binary Into Is
Now Unmapped So It Can Be Used Again And Not Held Onto Until
The Program Exits
07/30/02 - Now I Have To Make A Better Memory Allocator So We Can Set Up
The Freshly Allocated Pages With The Correct Permissions
*****************************************************************************************/
void execFile(char *file, char **argv, char **envp, int console) {
kTask_t *newProcess = 0x0;
int i = 0x0;
int x = 0x0;
uint32_t *tmp = 0x0;
Elf_Ehdr *binaryHeader = 0x0;
Elf_Phdr *programHeader = 0x0;
int argc = argv_count(argv);
int envc = envp_count(envp);
/* Get A New Task For This Proccess */
newProcess = schedNewTask();
assert(newProcess);
newProcess->gid = 0x0;
newProcess->uid = 0x0;
newProcess->pgrp = newProcess->id;
newProcess->term = tty_find(console);
if (newProcess->term == 0x0)
kprintf("Error: invalid console\n");
/* Set tty ownership */
newProcess->term->owner = newProcess->id;
/* Now We Must Create A Virtual Space For This Proccess To Run In */
newProcess->tss.cr3 = (uint32_t) vmm_createVirtualSpace(newProcess->id);
/* To Better Load This Application We Will Switch Over To Its VM Space */
asm volatile(
"movl %0,%%eax \n"
"movl %%eax,%%cr3 \n"
: : "d" ((uint32_t *)(newProcess->tss.cr3))
);
/* Lets Find The File */
if (newProcess->files[0] != 0x0)
kpanic("Problem With File Descriptors");
newProcess->files[0] = fopen(file, "r");
/* If We Dont Find the File Return */
if (newProcess->files[0] == 0x0) {
kprintf("Exec Format Error: Binary File Not Executable.\n");
fclose(newProcess->files[0]);
return;
}
if (newProcess->files[0]->perms == 0x0) {
kprintf("Exec Format Error: Binary File Not Executable.\n");
fclose(newProcess->files[0]);
return;
}
/* Load ELF Header */
binaryHeader = (Elf_Ehdr *) kmalloc(sizeof(Elf_Ehdr));
fread(binaryHeader, sizeof(Elf_Ehdr), 1, newProcess->files[0]);
/* Check If App Is A Real Application */
if ((binaryHeader->e_ident[1] != 'E') && (binaryHeader->e_ident[2] != 'L') && (binaryHeader->e_ident[3] != 'F')) {
kprintf("Exec Format Error: Binary File Not Executable.\n");
kfree(binaryHeader);
fclose(newProcess->files[0]);
return;
}
else if (binaryHeader->e_type != 2) {
kprintf("Exec Format Error: Binary File Not Executable.\n");
kfree(binaryHeader);
fclose(newProcess->files[0]);
return;
}
else if (binaryHeader->e_entry == 0x300000) {
kprintf("Exec Format Error: Binary File Not Executable.\n");
kfree(binaryHeader);
fclose(newProcess->files[0]);
return;
}
newProcess->td.abi = binaryHeader->e_ident[EI_OSABI];
/* Load The Program Header(s) */
programHeader = (Elf_Phdr *) kmalloc(sizeof(Elf_Phdr) * binaryHeader->e_phnum);
fseek(newProcess->files[0], binaryHeader->e_phoff, 0);
fread(programHeader, (sizeof(Elf_Phdr) * binaryHeader->e_phnum), 1, newProcess->files[0]);
/* Loop Through The Header And Load Sections Which Need To Be Loaded */
for (i = 0; i < binaryHeader->e_phnum; i++) {
if (programHeader[i].p_type == 1) {
/*
Allocate Memory Im Going To Have To Make This Load Memory With Correct
Settings so it helps us in the future
*/
for (x = 0x0; x < (programHeader[i].p_memsz); x += 0x1000) {
/* Make readonly and read/write !!! */
if (vmm_remapPage(vmm_findFreePage(newProcess->id), ((programHeader[i].p_vaddr & 0xFFFFF000) + x), PAGE_DEFAULT, newProcess->id, 0) == 0x0)
K_PANIC("Remap Page Failed");
memset((void *) ((programHeader[i].p_vaddr & 0xFFFFF000) + x), 0x0, 0x1000);
}
/* Now Load Section To Memory */
fseek(newProcess->files[0], programHeader[i].p_offset, 0);
fread((void *) programHeader[i].p_vaddr, programHeader[i].p_filesz, 1, newProcess->files[0]);
if ((programHeader[i].p_flags & 0x2) != 0x2) {
for (x = 0x0; x < (programHeader[i].p_memsz); x += 0x1000) {
if ((vmm_setPageAttributes((programHeader[i].p_vaddr & 0xFFFFF000) + x, PAGE_PRESENT | PAGE_USER)) != 0x0)
kpanic("Error: vmm_setPageAttributes failed, File: %s, Line: %i\n", __FILE__, __LINE__);
}
}
}
}
/* Set Virtual Memory Start */
newProcess->oInfo.vmStart = 0x80000000;
newProcess->td.vm_daddr = (u_long) (programHeader[i].p_vaddr & 0xFFFFF000);
/* Set Up Stack Space */
//MrOlsen (2016-01-14) FIX: is the stack start supposed to be addressable xhcnage x= 1 to x=0
//x = 0 because GS= stack address not address -1 fix!
for (x = 1; x <= 100; x++) {
vmm_remapPage(vmm_findFreePage(newProcess->id), (STACK_ADDR+1) - (x * PAGE_SIZE), PAGE_DEFAULT | PAGE_STACK, newProcess->id, 0);
bzero((void *)((STACK_ADDR+1) - (x * PAGE_SIZE)), PAGE_SIZE);
}
/* Kernel Stack 0x2000 bytes long */
//vmm_remapPage(vmm_findFreePage(newProcess->id), 0x5BC000, KERNEL_PAGE_DEFAULT | PAGE_STACK, newProcess->id);
//vmm_remapPage(vmm_findFreePage(newProcess->id), 0x5BB000, KERNEL_PAGE_DEFAULT | PAGE_STACK, newProcess->id);
/*
for (x = 0; x < 2; x++)
vmm_remapPage(vmm_findFreePage(newProcess->id), 0xFFFFF000 - (PAGE_SIZE * x), KERNEL_PAGE_DEFAULT | PAGE_STACK, newProcess->id, 0);
*/
/* Set All The Proper Information For The Task */
newProcess->tss.back_link = 0x0;
newProcess->tss.esp0 = 0xFFFFFFFF; //0x5BC000;
newProcess->tss.ss0 = 0x10;
newProcess->tss.esp1 = 0x0;
newProcess->tss.ss1 = 0x0;
newProcess->tss.esp2 = 0x0;
newProcess->tss.ss2 = 0x0;
newProcess->tss.eip = (long) binaryHeader->e_entry;
newProcess->tss.eflags = 0x206;
newProcess->tss.esp = STACK_ADDR;
newProcess->tss.ebp = 0x0;//STACK_ADDR;
newProcess->tss.esi = 0x0;
newProcess->tss.edi = 0x0;
/* Set these up to be ring 3 tasks */
newProcess->tss.es = 0x30 + 3;
newProcess->tss.cs = 0x28 + 3;
newProcess->tss.ss = 0x30 + 3;
newProcess->tss.ds = 0x30 + 3;
newProcess->tss.fs = 0x30 + 3;
newProcess->tss.gs = 0x8 + 3 + 4;//0x50 + 3; //0x30 + 3;
newProcess->tss.ldt = 0x18;
newProcess->tss.trace_bitmap = 0x0000;
newProcess->tss.io_map = 0x8000;
//sched_setStatus(newProcess->id, READY);
kfree(binaryHeader);
kfree(programHeader);
fclose(newProcess->files[0]);
newProcess->files[0] = 0x0;
tmp = (uint32_t *) newProcess->tss.esp0 - 5;
tmp[0] = binaryHeader->e_entry;
tmp[3] = STACK_ADDR - 12;
newProcess->tss.esp = STACK_ADDR - ARGV_PAGE - ENVP_PAGE - ELF_AUX - (argc + 1) - (envc + 1) - STACK_PAD;
tmp = (uint32_t *) newProcess->tss.esp;
tmp[0] = argc;
uint32_t sp = 0x0;
for (i = 1; i <= argc; i++) {
tmp[i] = STACK_ADDR - ARGV_PAGE + sp;
strcpy((char *) tmp[i], argv[i - 1]);
sp += strlen(argv[i - 1]) + 1;
}
tmp[i++] = 0x0;
sp = 0;
for (int x = 0; x < envc; x++) {
tmp[x + i] = STACK_ADDR - ARGV_PAGE - ENVP_PAGE + sp;
strcpy((char *) tmp[x + i], envp[x]);
sp += strlen(envp[x]) + 1;
}
tmp[i + x] = 0x0;
/* Build LDT For GS and FS */
vmm_unmapPage(VMM_USER_LDT, 1);
if (vmm_remapPage(vmm_findFreePage(newProcess->id), VMM_USER_LDT, PAGE_DEFAULT, newProcess->id, 0) == 0x0) {
K_PANIC("Error: Remap Page Failed");
}
struct gdtDescriptor *taskLDT = 0x0;
taskLDT = (struct gdtDescriptor *)(VMM_USER_LDT + sizeof(struct gdtDescriptor));
uint32_t data_addr = 0x0;
taskLDT->limitLow = (0xFFFFF & 0xFFFF);
taskLDT->baseLow = (data_addr & 0xFFFF);
taskLDT->baseMed = ((data_addr >> 16) & 0xFF);
taskLDT->access = ((dData + dWrite + dBig + dBiglim + dDpl3) + dPresent) >> 8;
taskLDT->limitHigh = (0xFFFFF >> 16);
taskLDT->granularity = ((dData + dWrite + dBig + dBiglim + dDpl3) & 0xFF) >> 4;
taskLDT->baseHigh = data_addr >> 24;
/* Switch Back To The Kernels VM Space */
asm volatile(
"movl %0,%%eax \n"
"movl %%eax,%%cr3 \n"
: : "d" ((uint32_t *)(kernelPageDirectory))
);
sprintf(newProcess->oInfo.cwd, "/");
//MrOlsen 2018 kprintf("execFile Return: 0x%X - %i\n", newProcess->tss.eip, newProcess->id);
/* Put new thread into the READY state */
sched_setStatus(newProcess->id, READY);
//_current = newProcess;
/* Finally Return */
return;
}
int sys_exec(struct thread *td, char *file, char **argv, char **envp) {
int i = 0x0;
int x = 0x0;
int argc = argv_count(argv);
int envc = envp_count(envp);
uint32_t cr3 = 0x0;
uint32_t *tmp = 0x0;
uInt32 seg_size = 0x0;
uInt32 seg_addr = 0x0;
char *interp = 0x0;
uint32_t ldAddr = 0x0;
fileDescriptor_t *fd = 0x0;
Elf_Ehdr *binaryHeader = 0x0;
Elf_Phdr *programHeader = 0x0;
Elf_Shdr *sectionHeader = 0x0;
elf_file_t ef = 0x0;
u_long text_addr = 0, text_size = 0;
u_long data_addr = 0, data_size = 0;
struct i386_frame *iFrame = 0x0;
asm("movl %%cr3, %0;" : "=r" (cr3));
fd = fopen(file, "r");
if (fd == 0x0) {
td->td_retval[0] = 2;
return (-1);
}
/* Test If Executable */
if (fd->perms == 0) {
kprintf("Exec Format Error: Binary File Not Executable.\n");
fclose(fd);
return (-1);
}
/* Set Threads FD to open FD */
_current->files[0] = fd;
/* Copy In ARGS & ENVS Before Cleaning Virtual Space */
uint32_t *argv_out = 0x0;
char *args_out = 0x0;
args_copyin(argv, (char **)&argv_out, &args_out);
uint32_t *envp_out = 0x0;
char *envs_out = 0x0;
envs_copyin(envp, (char **)&envp_out, &envs_out);
//! Clean the virtual of COW pages left over from the fork
//vmm_cleanVirtualSpace( (uint32_t) _current->td.vm_daddr + (_current->td.vm_dsize << PAGE_SHIFT) );
//MrOlsen 2017-12-15 - FIX! - This should be done before it was causing a lot of problems why did I free space after loading binary????
//vmm_cleanVirtualSpace((uint32_t) 0x8048000);
vmm_cleanVirtualSpace((uint32_t) VMM_USER_START);
/* Clear Stack */
//bzero(STACK_ADDR - (100 * PAGE_SIZE), (PAGE_SIZE * 100));
for (x = 1; x <= 100; x++) {
vmm_remapPage(vmm_findFreePage(_current->id), (STACK_ADDR+1) - (x * 0x1000), PAGE_DEFAULT | PAGE_STACK, _current->id, 0);
bzero((void *)((STACK_ADDR+1) - (x * 0x1000)), 0x1000);
}
/* Load ELF Header */
if ((binaryHeader = (Elf_Ehdr *) kmalloc(sizeof(Elf_Ehdr))) == 0x0)
K_PANIC("MALLOC FAILED");
fread(binaryHeader, sizeof(Elf_Ehdr), 1, fd);
/* Done Loading ELF Header */
/* Check If App Is A Real Application */
if ((binaryHeader->e_ident[1] != 'E') && (binaryHeader->e_ident[2] != 'L') && (binaryHeader->e_ident[3] != 'F')) {
kprintf("Exec Format Error: Binary File Not Executable.\n");
kfree(binaryHeader);
fclose(fd);
return (-1);
}
else if (binaryHeader->e_type != ET_EXEC) {
kprintf("Exec Format Error: Binary File Not Executable.\n");
kfree(binaryHeader);
fclose(fd);
return (-1);
}
else if (binaryHeader->e_entry == 0x300000) {
kprintf("Exec Format Error: Binary File Not Executable.\n");
kfree(binaryHeader);
fclose(fd);
return (-1);
}
/* Set Thread ABI */
td->abi = binaryHeader->e_ident[EI_OSABI];
/* Load The Program Header(s) */
if ((programHeader = (Elf_Phdr *) kmalloc(sizeof(Elf_Phdr) * binaryHeader->e_phnum)) == 0x0)
K_PANIC("MALLOC FAILED");
assert(programHeader);
fseek(fd, binaryHeader->e_phoff, 0);
fread(programHeader, (sizeof(Elf_Phdr) * binaryHeader->e_phnum), 1, fd);
/* Done Loading Program Header(s) */
/* Load The Section Header(s) */
if ((sectionHeader = (Elf_Shdr *) kmalloc(sizeof(Elf_Shdr) * binaryHeader->e_shnum)) == 0x0)
K_PANIC("MALLOC FAILED");
assert(sectionHeader);
fseek(fd, binaryHeader->e_shoff, 0);
fread(sectionHeader, sizeof(Elf_Shdr) * binaryHeader->e_shnum, 1, fd);
/* Done Loading Section Header(s) */
ef = kmalloc(sizeof(struct elf_file));
memset(ef, 0x0, sizeof(struct elf_file));
/* Loop Through The Header And Load Sections Which Need To Be Loaded */
for (i = 0; i < binaryHeader->e_phnum; i++) {
switch (programHeader[i].p_type) {
case PT_LOAD:
if (programHeader[i].p_memsz == 0x0)
break;
seg_addr = trunc_page(programHeader[i].p_vaddr);
seg_size = round_page(programHeader[i].p_memsz + programHeader[i].p_vaddr - seg_addr);
/*
Allocate Memory Im Going To Have To Make This Load Memory With Correct
Settings so it helps us in the future
*/
for (x = 0x0; x < (round_page(programHeader[i].p_memsz)); x += 0x1000) {
/* Make readonly and read/write !!! */
if (vmm_remapPage(vmm_findFreePage(_current->id), ((programHeader[i].p_vaddr & 0xFFFFF000) + x), PAGE_DEFAULT, _current->id, 0) == 0x0) {
K_PANIC("Error: Remap Page Failed");
}
else {
//MrOlsen 2018-01-15 kprintf("rP[0x%X]", (programHeader[i].p_vaddr & 0xFFFFF000) + x);
}
memset((void *) ((programHeader[i].p_vaddr & 0xFFFFF000) + x), 0x0, 0x1000);
}
/* Now Load Section To Memory */
fseek(fd, programHeader[i].p_offset, 0);
fread((void *) programHeader[i].p_vaddr, programHeader[i].p_filesz, 1, fd);
if ((programHeader[i].p_flags & 0x2) != 0x2) {
for (x = 0x0; x < (round_page(programHeader[i].p_memsz)); x += 0x1000) {
if ((vmm_setPageAttributes((programHeader[i].p_vaddr & 0xFFFFF000) + x, PAGE_PRESENT | PAGE_USER)) != 0x0)
kpanic("Error: vmm_setPageAttributes failed, File: %s,Line: %i\n", __FILE__, __LINE__);
}
}
if ((programHeader[i].p_flags & PF_X) && text_size < seg_size) {
//MrOlsen 2018kprintf("setting text: 0x%X - 0x%X\n", seg_addr, seg_size);
text_size = seg_size;
text_addr = seg_addr;
}
else {
//MrOlsen 2018kprintf("setting data: 0x%X - 0x%X\n", seg_addr, seg_size);
data_size = seg_size;
data_addr = seg_addr;
/*
_current->td.vm_dsize = seg_size >> PAGE_SHIFT;
_current->td.vm_daddr = (char *) seg_addr;
kprintf( "setting daddr: 0x%X, dsiize: 0x%X\n", _current->td.vm_daddr, _current->td.vm_dsize );
*/
}
/*
* MrOlsen (2016-01-19) NOTE: Note Sure, I should Do This Later
* Thjis is for stack space
*/
_current->oInfo.vmStart = ((programHeader[i].p_vaddr & 0xFFFFF000) + 0xA900000);
break;
case PT_DYNAMIC:
//newLoc = (char *)programHeader[i].phVaddr;
//elfDynamicS = (elfDynamic *) programHeader[i].p_vaddr;
ef->dynamic = (Elf_Dyn *) programHeader[i].p_vaddr;
//fseek( fd, programHeader[i].phOffset, 0 );
//fread( (void *) programHeader[i].phVaddr, programHeader[i].phFilesz, 1, fd );
break;
case PT_INTERP:
#ifdef DEBUG_EXEC
kprintf("%s:%i>Malloc: %i\n", _FILE_,_LINE_,programHeader[i].p_filesz);
#endif
interp = (char *) kmalloc(programHeader[i].p_filesz);
fseek(fd, programHeader[i].p_offset, 0);
fread((void *) interp, programHeader[i].p_filesz, 1, fd);
#ifdef DEBUG_EXEC
kprintf("Interp: [%s]\n", interp);
#endif
ldAddr = ldEnable(interp);
//ef->ld_addr = ldEnable();
break;
case PT_GNU_STACK:
asm("nop");
break;
default:
break;
}
}
_current->td.vm_tsize = text_size >> PAGE_SHIFT;
_current->td.vm_taddr = text_addr;
_current->td.vm_dsize = data_size >> PAGE_SHIFT;
_current->td.vm_daddr = data_addr;
//MrOlsen 2018kprintf("Done Looping\n");
ef->preloaded = 1;
ef->address = 0x0;
elf_parse_dynamic(ef);
//asm("cld");
//irqDisable(0);
iFrame = (struct i386_frame *) (_current->tss.esp0 - sizeof(struct i386_frame));
//iFrame->ebp = 0x0;
if (ldAddr != 0x0) {
iFrame->eip = ldAddr;
}
else {
iFrame->eip = binaryHeader->e_entry;
}
//iFrame->edx = 0x0;
iFrame->user_esp = (uint32_t) (STACK_ADDR - ARGV_PAGE - ENVP_PAGE - ELF_AUX - (argc + 1) - (envc + 1) - STACK_PAD) & 0xFFFFF000;
tmp = (uint32_t *) iFrame->user_esp;
// memset((char *) tmp, 0x0, ARGV_PAGE + ENVP_PAGE + ELF_AUX + (argc + 1) + (envc + 1) + STACK_PAD);
tmp[0] = argc;
uint32_t sp = 0x0;
char *EXECP = 0x0;
for (i = 1; i <= argc; i++) {
tmp[i] = (uint32_t) STACK_ADDR - ARGV_PAGE + sp;
if (i == 1) {
EXECP = (char *)tmp[i];
}
strcpy((char *)tmp[i], (const char *)argv_out[i]);
#ifdef EXEC_DEBUG
kprintf("argv[%i]:%s",i, (const char *)argv_out[i]);
#endif
sp += strlen((const char *)argv_out[i]) + 1;
}
tmp[i++] = 0x0;
kfree(argv_out);
kfree(args_out);
sp = 0;
x = 0;
for (x = 0; x < envc; x++) {
tmp[x + i] = (uint32_t) STACK_ADDR - ARGV_PAGE - ENVP_PAGE + sp;
strcpy((char *) tmp[x + i], (const char *)envp_out[x]);
sp += strlen((const char *)envp_out[x]) + 1;
}
tmp[i + x] = 0x0;
kfree(envp_out);
kfree(envs_out);
i = i + x + 1;
struct file *tFP = 0x0;
int tFD = 0x0;
fseek(_current->files[0], 0x0, 0x0); // Reset File Position
falloc(&_current->td, &tFP, &tFD);
tFP->fd = _current->files[0];
tmp[i++] = 2;
tmp[i++] = -1;// tFD; // _current->imageFd;
_current->td.o_files[4] = _current->files[0];
//MrOlsen 2018kprintf("AT_EXECFD: [%i:%i]", tmp[i - 1], tFD);
tmp[i++] = 3;
tmp[i++] = binaryHeader->e_phoff + 0x08048000;
//MrOlsen 2018kprintf("AT_PHDR: [0x%X]", tmp[i - 1]);
tmp[i++] = 4;
tmp[i++] = binaryHeader->e_phentsize;
//MrOlsen 2018kprintf("AT_PHENT: [0x%X]", tmp[i - 1]);
tmp[i++] = 5;
tmp[i++] = binaryHeader->e_phnum;
//MrOlsen 2018kprintf("AT_PHNUM: [0x%X]", tmp[i - 1]);
tmp[i++] = 6;
tmp[i++] = 0x1000;
tmp[i++] = 7;
tmp[i++] = LD_START;
//MrOlsen 2018kprintf("AT_BASE: [0x%X]", tmp[i - 1]);
tmp[i++] = 8;
tmp[i++] = 0x0;
tmp[i++] = 9;
tmp[i++] = binaryHeader->e_entry;
tmp[i++] = 11;
tmp[i++] = 0x0;
tmp[i++] = 12;
tmp[i++] = 0x0;
tmp[i++] = 13;
tmp[i++] = 0x0;
tmp[i++] = 14;
tmp[i++] = 0x0;
tmp[i++] = 15; //EXEC PATH
tmp[i++] = (uint32_t)EXECP;
tmp[i++] = 19; //NCPUS
tmp[i++] = 0x1;
tmp[i++] = 23; //STACKPROT
tmp[i++] = 0x3;
tmp[i++] = 0;
tmp[i++] = 0;
/* Now That We Relocated The Binary We Can Unmap And Free Header Info */
kfree(binaryHeader);
kfree(programHeader);
//irqEnable(0);
//asm("sti");
/*
_current->tss.es = 0x30 + 3;
_current->tss.cs = 0x28 + 3;
_current->tss.ss = 0x30 + 3;
_current->tss.ds = 0x30 + 3;
_current->tss.fs = 0x30 + 3;
_current->tss.gs = 0x50 + 3; //0x30 + 3;
_current->tss.ldt = 0x18;
_current->tss.trace_bitmap = 0x0000;
_current->tss.io_map = 0x8000;
*/
/*
kfree (iFrameNew);
memAddr = (uint32_t) & (_current->tss);
ubixGDT[4].descriptor.baseLow = (memAddr & 0xFFFF);
ubixGDT[4].descriptor.baseMed = ((memAddr >> 16) & 0xFF);
ubixGDT[4].descriptor.baseHigh = (memAddr >> 24);
ubixGDT[4].descriptor.access = '\x89';
ubixGDT[10].descriptor.baseLow = (STACK_ADDR & 0xFFFF);
ubixGDT[10].descriptor.baseMed = ((STACK_ADDR >> 16) & 0xFF);
ubixGDT[10].descriptor.baseHigh = (STACK_ADDR >> 24);
*/
/* Build LDT For GS and FS */
vmm_unmapPage(VMM_USER_LDT, 1); // Can I Free This?
if (vmm_remapPage(vmm_findFreePage(_current->id), VMM_USER_LDT, PAGE_DEFAULT, _current->id, 0) == 0x0) {
K_PANIC("Error: Remap Page Failed");
}
struct gdtDescriptor *taskLDT = 0x0;
taskLDT = (struct gdtDescriptor *)(VMM_USER_LDT + sizeof(struct gdtDescriptor));
//data_addr = 0x0; //TEMP
taskLDT->limitLow = (0xFFFFF & 0xFFFF);
taskLDT->baseLow = (data_addr & 0xFFFF);
taskLDT->baseMed = ((data_addr >> 16) & 0xFF);
taskLDT->access = ((dData + dWrite + dBig + dBiglim + dDpl3) + dPresent) >> 8;
taskLDT->limitHigh = (0xFFFFF >> 16);
taskLDT->granularity = ((dData + dWrite + dBig + dBiglim + dDpl3) & 0xFF) >> 4;
taskLDT->baseHigh = data_addr >> 24;
_current->tss.gs = 0xF; //Select 0x8 + Ring 3 + LDT
_current->pgrp = _current->id;
return (0x0);
}
static int elf_parse_dynamic(elf_file_t ef) {
Elf32_Dyn *dynp;
int plttype = DT_REL;
for (dynp = ef->dynamic; dynp->d_tag != 0x0; dynp++) {
switch (dynp->d_tag) {
case DT_NEEDED:
asm("nop");
break;
case DT_INIT:
asm("nop");
break;
case DT_FINI:
asm("nop");
break;
case DT_HASH:
asm("nop");
/* From src/libexec/rtld-elf/rtld.c */
const Elf_Hashelt *hashtab = (const Elf_Hashelt *) (ef->address + dynp->d_un.d_ptr);
ef->nbuckets = hashtab[0];
ef->nchains = hashtab[1];
ef->buckets = hashtab + 2;
ef->chains = ef->buckets + ef->nbuckets;
break;
case DT_STRTAB:
ef->strtab = (caddr_t) (ef->address + dynp->d_un.d_ptr);
break;
case DT_STRSZ:
ef->strsz = dynp->d_un.d_val;
break;
case DT_SYMTAB:
ef->symtab = (Elf_Sym *) (ef->address + dynp->d_un.d_ptr);
break;
case DT_SYMENT:
if (dynp->d_un.d_val != sizeof(Elf32_Sym))
return (ENOEXEC);
break;
case DT_REL:
ef->rel = (const Elf_Rel *) (ef->address + dynp->d_un.d_ptr);
break;
case DT_RELSZ:
ef->relsize = dynp->d_un.d_val;
break;
case DT_RELENT:
if (dynp->d_un.d_val != sizeof(Elf_Rel))
return (ENOEXEC);
break;
case DT_JMPREL:
ef->pltrel = (const Elf_Rel *) (ef->address + dynp->d_un.d_ptr);
break;
case DT_PLTRELSZ:
ef->pltrelsize = dynp->d_un.d_val;
break;
case DT_RELA:
ef->rela = (const Elf_Rela *) (ef->address + dynp->d_un.d_ptr);
break;
case DT_RELASZ:
ef->relasize = dynp->d_un.d_val;
break;
case DT_RELAENT:
if (dynp->d_un.d_val != sizeof(Elf_Rela))
return (ENOEXEC);
break;
case DT_PLTREL:
plttype = dynp->d_un.d_val;
if (plttype != DT_REL && plttype != DT_RELA)
return (ENOEXEC);
break;
case DT_PLTGOT:
ef->got = (Elf_Addr *) (ef->address + dynp->d_un.d_ptr);
/*
tmp = (void *) dynp->d_un.d_ptr; //elfDynamicS[i].dynPtr;
tmp[2] = (uInt32) ef->ld_addr;
tmp[1] = (uInt32) ef; //0x0;//0xBEEFEAD;//STACK_ADDR - 128;//_current->imageFd;//0xBEEFDEAD;//ef;
*/
break;
default:
asm("nop");
//kprintf("t_tag: 0x%X>", dynp->d_tag);
break;
}
}
if (plttype == DT_RELA) {
ef->pltrela = (const Elf_Rela *) ef->pltrel;
ef->pltrel = NULL;
ef->pltrelasize = ef->pltrelsize;
ef->pltrelsize = 0;
}
ef->ddbsymtab = ef->symtab;
ef->ddbsymcnt = ef->nchains;
ef->ddbstrtab = ef->strtab;
ef->ddbstrcnt = ef->strsz;
return (0);
}