Newer
Older
UbixOS / sys / i386 / i386_exec.c
/*-
 * Copyright (c) 2002-2018 The UbixOS Project.
 * All rights reserved.
 *
 * This was developed by Christopher W. Olsen for the UbixOS Project.
 *
 * Redistribution and use in source and binary forms, with or without modification, are permitted
 * provided that the following conditions are met:
 *
 * 1) Redistributions of source code must retain the above copyright notice, this list of
 *    conditions, the following disclaimer and the list of authors.
 * 2) Redistributions in binary form must reproduce the above copyright notice, this list of
 *    conditions, the following disclaimer and the list of authors in the documentation and/or
 *    other materials provided with the distribution.
 * 3) Neither the name of the UbixOS Project nor the names of its contributors may be used to
 *    endorse or promote products derived from this software without specific prior written
 *    permission.
 *
 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED
 * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS
 * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
 * (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA,
 * OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
 * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
 */

#include <sys/types.h>
#include <sys/elf.h>
#include <sys/gdt.h>
#include <ubixos/exec.h>
#include <ubixos/ld.h>
#include <ubixos/kpanic.h>
#include <ubixos/endtask.h>
#include <vmm/vmm.h>
#include <lib/kmalloc.h>
#include <lib/kprintf.h>
#include <lib/string.h>
#include <vfs/file.h>
#include <assert.h>
#include <string.h>

#define ENVP_PAGE 0x100
#define ARGV_PAGE 0x100
#define ELF_AUX 0x100
#define STACK_PAD 16

#define ENOEXEC -1

#define AT_NULL         0       /* Terminates the vector. */
#define AT_IGNORE       1       /* Ignored entry. */
#define AT_EXECFD       2       /* File descriptor of program to load. */
#define AT_PHDR         3       /* Program header of program already loaded. */
#define AT_PHENT        4       /* Size of each program header entry. */
#define AT_PHNUM        5       /* Number of program header entries. */
#define AT_PAGESZ       6       /* Page size in bytes. */
#define AT_BASE         7       /* Interpreter's base address. */
#define AT_FLAGS        8       /* Flags (unused for i386). */
#define AT_ENTRY        9       /* Where interpreter should transfer control. */

#define AUXARGS_ENTRY(pos, id, val) {*pos = id;pos++; *pos = val;pos++;}

static int argv_count(char **argv) {
  int i = 0;

  while (*argv++ != 0x0)
    i++;

  return (i);
}

static int envp_count(char **envp) {
  int i = 0;

  while (*envp++ != 0x0)
    i++;

  return (i);
}

static int args_copyin(char **argv_in, char **argv_out, char **args_out) {

  int argc = argv_count(argv_in);

  uint32_t *argv_tmp = (uint32_t *) kmalloc(sizeof(char *) * (argc + 2)); // + 1 For ARGC + 1 For NULL TERM

  char *args_tmp = (char *) kmalloc(ARGV_PAGE);

  argv_tmp[0] = argc;

  uint32_t sp = 0x0;

  int i = 0x0;

  for (i = 1; i <= argc; i++) {
    argv_tmp[i] = args_tmp + sp;
    strcpy(argv_tmp[i], argv_in[i - 1]);
    sp += strlen(argv_in[i - 1]) + 1;
  }

  argv_tmp[i++] = 0x0;

  *argv_out = argv_tmp;
  *args_out = args_tmp;

  return (0);

}

static int envs_copyin(char **envp_in, char **envp_out, char **envs_out) {

  int envc = envp_count(envp_in);

  uint32_t *envp_tmp = (uint32_t *) kmalloc(sizeof(char *) * (envc + 1)); // + 1 For NULL TERM

  char *envs_tmp = (char *) kmalloc(ENVP_PAGE);

  uint32_t sp = 0x0;

  int i = 0x0;

  for (i = 0; i < envc; i++) {
    envp_tmp[i] = envs_tmp + sp;
    strcpy(envp_tmp[i], envp_in[i]);
    sp += strlen(envp_in[i]) + 1;
  }
  envp_tmp[i++] = 0x0;

  *envp_out = envp_tmp;
  *envs_out = envs_tmp;
  return (0);
}

static int elf_parse_dynamic(elf_file_t ef);

/*****************************************************************************************

 Function:   execThread(void (*)(void),int,char *);
 Description: This function will create a thread from code in the current memory space

 Notes:

 05/19/04 - This does not work the way I want it to it still makes a copy of kernel space
 so do not use out side of kernel space

 *****************************************************************************************/
uint32_t execThread(void (*tproc)(void), uint32_t stack, char *arg) {

  kTask_t * newProcess = 0x0;

  /* Find A New Thread */
  newProcess = schedNewTask();
  assert(newProcess);

  if (stack < 0x100000)
    kpanic("exec: stack not in valid area: [0x%X]\n", stack);

  /* Set All The Correct Thread Attributes */
  newProcess->tss.back_link = 0x0;
  newProcess->tss.esp0 = 0x0;
  newProcess->tss.ss0 = 0x0;
  newProcess->tss.esp1 = 0x0;
  newProcess->tss.ss1 = 0x0;
  newProcess->tss.esp2 = 0x0;
  newProcess->tss.ss2 = 0x0;
  newProcess->tss.cr3 = (unsigned int) kernelPageDirectory;
  newProcess->tss.eip = (unsigned int) tproc;
  newProcess->tss.eflags = 0x206;
  newProcess->tss.esp = stack;
  newProcess->tss.ebp = stack;
  newProcess->tss.esi = 0x0;
  newProcess->tss.edi = 0x0;

  /* Ring 3 Selectors */
  /*
   newProcess->tss.es           = 0x30+3;
   newProcess->tss.cs           = 0x28+3;
   newProcess->tss.ss           = 0x30+3;
   newProcess->tss.ds           = 0x30+3;
   newProcess->tss.fs           = 0x30+3;
   newProcess->tss.gs           = 0x30+3;
   */

  /* Ring 0 Selectors */
  newProcess->tss.es = 0x10;
  newProcess->tss.cs = 0x08;
  newProcess->tss.ss = 0x10;
  newProcess->tss.ds = 0x10;
  newProcess->tss.fs = 0x10;
  newProcess->tss.gs = 0x10;

  newProcess->tss.ldt = 0x18;
  newProcess->tss.trace_bitmap = 0x0000;
  newProcess->tss.io_map = 0x8000;
  newProcess->oInfo.vmStart = 0x6400000;

  if (newProcess->files[0] != 0x0)
    kpanic("Problem With File Descriptors");

  newProcess->files[0] = 0x0;

  /* Set up default stack for thread here filled with arg list 3 times */
  asm volatile(
    "pusha               \n"
    "movl   %%esp,%%ecx  \n"
    "movl   %1,%%eax     \n"
    "movl   %%eax,%%esp  \n"
    "pushl  %%ebx        \n"
    "pushl  %%ebx        \n"
    "pushl  %%ebx        \n"
    "movl   %%esp,%%eax  \n"
    "movl   %%eax,%1     \n"
    "movl   %%ecx,%%esp  \n"
    "popa                \n"
    :
    : "b" (arg),"m" (newProcess->tss.esp)
  );

  /* Put new thread into the READY state */
  sched_setStatus(newProcess->id, READY);

  /* Return with the new process ID */
  return ((uint32_t) newProcess);
}

/*****************************************************************************************

 Function: void execFile(char *file);
 Description: This Function Executes A Kile Into A New VM Space With Out
 Having To Fork
 Notes:

 07/30/02 - I Have Made Some Heavy Changes To This As Well As Fixed A Few
 Memory Leaks The Memory Allocated To Load The Binary Into Is
 Now Unmapped So It Can Be Used Again And Not Held Onto Until
 The Program Exits

 07/30/02 - Now I Have To Make A Better Memory Allocator So We Can Set Up
 The Freshly Allocated Pages With The Correct Permissions

 *****************************************************************************************/
void execFile(char *file, char **argv, char **envp, int console) {

  kTask_t *newProcess = 0x0;

  int i = 0x0;
  int x = 0x0;

  uint32_t *tmp = 0x0;

  Elf_Ehdr *binaryHeader = 0x0;

  Elf_Phdr *programHeader = 0x0;

  int argc = argv_count(argv);
  int envc = envp_count(envp);

  /* Get A New Task For This Proccess */
  newProcess = schedNewTask();
  assert(newProcess);

  newProcess->gid = 0x0;
  newProcess->uid = 0x0;
  newProcess->term = tty_find(console);

  if (newProcess->term == 0x0)
    kprintf("Error: invalid console\n");

  /* Set tty ownership */
  newProcess->term->owner = newProcess->id;

  /* Now We Must Create A Virtual Space For This Proccess To Run In */
  newProcess->tss.cr3 = (uint32_t) vmm_createVirtualSpace(newProcess->id);

  /* To Better Load This Application We Will Switch Over To Its VM Space */
  asm volatile(
    "movl %0,%%eax          \n"
    "movl %%eax,%%cr3       \n"
    : : "d" ((uint32_t *)(newProcess->tss.cr3))
  );

  /* Lets Find The File */
  if (newProcess->files[0] != 0x0)
    kpanic("Problem With File Descriptors");
  newProcess->files[0] = fopen(file, "r");

  /* If We Dont Find the File Return */
  if (newProcess->files[0] == 0x0) {
    kprintf("Exec Format Error: Binary File Not Executable.\n");
    fclose(newProcess->files[0]);
    return;
  }

  if (newProcess->files[0]->perms == 0x0) {
    kprintf("Exec Format Error: Binary File Not Executable.\n");
    fclose(newProcess->files[0]);
    return;
  }

  /* Load ELF Header */
  binaryHeader = (Elf_Ehdr *) kmalloc(sizeof(Elf_Ehdr));

  fread(binaryHeader, sizeof(Elf_Ehdr), 1, newProcess->files[0]);

  /* Check If App Is A Real Application */
  if ((binaryHeader->e_ident[1] != 'E') && (binaryHeader->e_ident[2] != 'L') && (binaryHeader->e_ident[3] != 'F')) {
    kprintf("Exec Format Error: Binary File Not Executable.\n");
    kfree(binaryHeader);
    fclose(newProcess->files[0]);
    return;
  }
  else if (binaryHeader->e_type != 2) {
    kprintf("Exec Format Error: Binary File Not Executable.\n");
    kfree(binaryHeader);
    fclose(newProcess->files[0]);
    return;
  }
  else if (binaryHeader->e_entry == 0x300000) {
    kprintf("Exec Format Error: Binary File Not Executable.\n");
    kfree(binaryHeader);
    fclose(newProcess->files[0]);
    return;
  }

  newProcess->td.abi = binaryHeader->e_ident[EI_OSABI];

  /* Load The Program Header(s) */
  programHeader = (Elf_Phdr *) kmalloc(sizeof(Elf_Phdr) * binaryHeader->e_phnum);
  fseek(newProcess->files[0], binaryHeader->e_phoff, 0);

  fread(programHeader, (sizeof(Elf_Phdr) * binaryHeader->e_phnum), 1, newProcess->files[0]);

  /* Loop Through The Header And Load Sections Which Need To Be Loaded */
  for (i = 0; i < binaryHeader->e_phnum; i++) {
    if (programHeader[i].p_type == 1) {
      /*
       Allocate Memory Im Going To Have To Make This Load Memory With Correct
       Settings so it helps us in the future
       */
      for (x = 0x0; x < (programHeader[i].p_memsz); x += 0x1000) {
        /* Make readonly and read/write !!! */
        if (vmm_remapPage(vmm_findFreePage(newProcess->id), ((programHeader[i].p_vaddr & 0xFFFFF000) + x), PAGE_DEFAULT, newProcess->id) == 0x0)
          K_PANIC("Remap Page Failed");

        memset((void *) ((programHeader[i].p_vaddr & 0xFFFFF000) + x), 0x0, 0x1000);

      }

      /* Now Load Section To Memory */
      fseek(newProcess->files[0], programHeader[i].p_offset, 0);

      fread((void *) programHeader[i].p_vaddr, programHeader[i].p_filesz, 1, newProcess->files[0]);

      if ((programHeader[i].p_flags & 0x2) != 0x2) {
        for (x = 0x0; x < (programHeader[i].p_memsz); x += 0x1000) {
          if ((vmm_setPageAttributes((programHeader[i].p_vaddr & 0xFFFFF000) + x, PAGE_PRESENT | PAGE_USER)) != 0x0)
            kpanic("Error: vmm_setPageAttributes failed, File: %s, Line: %i\n", __FILE__, __LINE__);
        }
      }
    }
  }

  /* Set Virtual Memory Start */
  newProcess->oInfo.vmStart = 0x80000000;
  newProcess->td.vm_daddr = (u_long) (programHeader[i].p_vaddr & 0xFFFFF000);

  /* Set Up Stack Space */
  //MrOlsen (2016-01-14) FIX: is the stack start supposed to be addressable xhcnage x= 1 to x=0
  for (x = 0; x < 100; x++) {
    vmm_remapPage(vmm_findFreePage(newProcess->id), STACK_ADDR - (x * 0x1000), PAGE_DEFAULT | PAGE_STACK, newProcess->id);
  }

  /* Kernel Stack 0x2000 bytes long */

  vmm_remapPage(vmm_findFreePage(newProcess->id), 0x5BC000, KERNEL_PAGE_DEFAULT | PAGE_STACK, newProcess->id);
  vmm_remapPage(vmm_findFreePage(newProcess->id), 0x5BB000, KERNEL_PAGE_DEFAULT | PAGE_STACK, newProcess->id);

  /* Set All The Proper Information For The Task */
  newProcess->tss.back_link = 0x0;
  newProcess->tss.esp0 = 0x5BC000;
  newProcess->tss.ss0 = 0x10;
  newProcess->tss.esp1 = 0x0;
  newProcess->tss.ss1 = 0x0;
  newProcess->tss.esp2 = 0x0;
  newProcess->tss.ss2 = 0x0;
  newProcess->tss.eip = (long) binaryHeader->e_entry;
  newProcess->tss.eflags = 0x206;
  newProcess->tss.esp = STACK_ADDR - 16;
  newProcess->tss.ebp = STACK_ADDR;
  newProcess->tss.esi = 0x0;
  newProcess->tss.edi = 0x0;

  /* Set these up to be ring 3 tasks */
  newProcess->tss.es = 0x30 + 3;
  newProcess->tss.cs = 0x28 + 3;
  newProcess->tss.ss = 0x30 + 3;
  newProcess->tss.ds = 0x30 + 3;
  newProcess->tss.fs = 0x30 + 3;
  newProcess->tss.gs = 0x50 + 3; //0x30 + 3;

  newProcess->tss.ldt = 0x18;
  newProcess->tss.trace_bitmap = 0x0000;
  newProcess->tss.io_map = 0x8000;

  sched_setStatus(newProcess->id, READY);

  kfree(binaryHeader);
  kfree(programHeader);
  fclose(newProcess->files[0]);

  tmp = (uInt32 *) newProcess->tss.esp0 - 5;

  tmp[0] = binaryHeader->e_entry;
  tmp[3] = STACK_ADDR - 12;

  newProcess->tss.esp = STACK_ADDR - ARGV_PAGE - ENVP_PAGE - ELF_AUX - (argc + 1) - (envc + 1) - STACK_PAD;

  tmp = (uint32_t *) newProcess->tss.esp;

  tmp[0] = argc;

  uint32_t sp = 0x0;

  for (i = 1; i <= argc; i++) {
    tmp[i] = STACK_ADDR - ARGV_PAGE + sp;
    strcpy((char *) tmp[i], argv[i - 1]);
    sp += strlen(argv[i - 1]) + 1;
  }
  tmp[i++] = 0x0;

  sp = 0;
  for (int x = 0; x < envc; x++) {
    tmp[x + i] = STACK_ADDR - ARGV_PAGE - ENVP_PAGE + sp;
    strcpy((char *) tmp[x + i], envp[x]);
    sp += strlen(envp[x]) + 1;
  }
  tmp[i + x] = 0x0;

  //*tmp++ = 0x1; // ARGC
  //*tmp++ = 0x100; // ARGV
  //*tmp++ = 0x0; // ARGV TERM
  //*tmp++ = 0x0; // ENV
  //*tmp++ = 0x0; // ENV TERM
  /*
   *tmp++ = 0xDEAD; // AUX 1.A
   *tmp++ = 0xBEEF; // AUX 1.B
   *tmp++ = 0x0; // AUX TERM
   *tmp++ = 0x0; // AUX TERM
   *tmp++ = 0x1; // TERM
   */

  /* Switch Back To The Kernels VM Space */
  asm volatile(
    "movl %0,%%eax          \n"
    "movl %%eax,%%cr3       \n"
    : : "d" ((uint32_t *)(kernelPageDirectory))
  );

  kprintf("execFile Return: %i\n", newProcess->id);

  /* Put new thread into the READY state */
  sched_setStatus(newProcess->id, READY);

  _current = newProcess;

  /* Finally Return */
  return;
}

int sys_exec(struct thread *td, char *file, char **argv, char **envp) {

  int i = 0x0;
  int x = 0x0;

  int argc = argv_count(argv);
  int envc = envp_count(envp);

  uint32_t cr3 = 0x0;

  uint32_t *tmp = 0x0;

  uInt32 seg_size = 0x0;
  uInt32 seg_addr = 0x0;

  char *interp = 0x0;
  uint32_t ldAddr = 0x0;

  fileDescriptor *fd = 0x0;

  Elf_Ehdr *binaryHeader = 0x0;
  Elf_Phdr *programHeader = 0x0;
  Elf_Shdr *sectionHeader = 0x0;

  elf_file_t ef = 0x0;

  u_long text_addr = 0, text_size = 0;
  u_long data_addr = 0, data_size = 0;

  struct i386_frame *iFrame = 0x0;

  asm("movl %%cr3, %0;" : "=r" (cr3));

  fd = fopen(file, "r");

  if (fd == 0x0)
    return (-1);

  /* Test If Executable */
  if (fd->perms == 0) {
    kprintf("Exec Format Error: Binary File Not Executable.\n");
    fclose(fd);
    return (-1);
  }

  /* Set Threads FD to open FD */
  _current->files[0] = fd;

  /* Copy In ARGS & ENVS Before Cleaning Virtual Space */
  uint32_t *argv_out = 0x0;
  char *args_out = 0x0;

  kprintf("ARGV: 0x%X\n", &argv_out);

  args_copyin(argv, &argv_out, &args_out);

  uint32_t *envp_out = 0x0;
  char *envs_out = 0x0;

  envs_copyin(envp, &envp_out, &envs_out);

  //! Clean the virtual of COW pages left over from the fork
  //vmm_cleanVirtualSpace( (uint32_t) _current->td.vm_daddr + (_current->td.vm_dsize << PAGE_SHIFT) );
  //MrOlsen 2017-12-15 - FIX! - This should be done before it was causing a lot of problems why did I free space after loading binary????
  vmm_cleanVirtualSpace((uint32_t) 0x8048000);

  /* Load ELF Header */
  if ((binaryHeader = (Elf_Ehdr *) kmalloc(sizeof(Elf_Ehdr))) == 0x0)
    K_PANIC("MALLOC FAILED");

  fread(binaryHeader, sizeof(Elf_Ehdr), 1, fd);
  /* Done Loading ELF Header */

  /* Check If App Is A Real Application */
  if ((binaryHeader->e_ident[1] != 'E') && (binaryHeader->e_ident[2] != 'L') && (binaryHeader->e_ident[3] != 'F')) {
    kprintf("Exec Format Error: Binary File Not Executable.\n");
    kfree(binaryHeader);
    fclose(fd);
    return (-1);
  }
  else if (binaryHeader->e_type != ET_EXEC) {
    kprintf("Exec Format Error: Binary File Not Executable.\n");
    kfree(binaryHeader);
    fclose(fd);
    return (-1);
  }
  else if (binaryHeader->e_entry == 0x300000) {
    kprintf("Exec Format Error: Binary File Not Executable.\n");
    kfree(binaryHeader);
    fclose(fd);
    return (-1);
  }

  /* Set Thread ABI */
  td->abi = binaryHeader->e_ident[EI_OSABI];

  /* Load The Program Header(s) */
  if ((programHeader = (Elf_Phdr *) kmalloc(sizeof(Elf_Phdr) * binaryHeader->e_phnum)) == 0x0)
    K_PANIC("MALLOC FAILED");

  assert(programHeader);

  fseek(fd, binaryHeader->e_phoff, 0);
  fread(programHeader, (sizeof(Elf_Phdr) * binaryHeader->e_phnum), 1, fd);
  /* Done Loading Program Header(s) */

  /* Load The Section Header(s) */
  if ((sectionHeader = (Elf_Shdr *) kmalloc(sizeof(Elf_Shdr) * binaryHeader->e_shnum)) == 0x0)
    K_PANIC("MALLOC FAILED");

  assert(sectionHeader);
  fseek(fd, binaryHeader->e_shoff, 0);
  fread(sectionHeader, sizeof(Elf_Shdr) * binaryHeader->e_shnum, 1, fd);
  /* Done Loading Section Header(s) */

  ef = kmalloc(sizeof(struct elf_file));
  memset(ef, 0x0, sizeof(struct elf_file));

  /* Loop Through The Header And Load Sections Which Need To Be Loaded */
  for (i = 0; i < binaryHeader->e_phnum; i++) {
    switch (programHeader[i].p_type) {
      case PT_LOAD:
        if (programHeader[i].p_memsz == 0x0)
          break;

        seg_addr = trunc_page(programHeader[i].p_vaddr);
        seg_size = round_page(programHeader[i].p_memsz + programHeader[i].p_vaddr - seg_addr);

        /*
         Allocate Memory Im Going To Have To Make This Load Memory With Correct
         Settings so it helps us in the future
         */
        for (x = 0x0; x < (round_page(programHeader[i].p_memsz)); x += 0x1000) {
          /* Make readonly and read/write !!! */
          if (vmm_remapPage(vmm_findFreePage(_current->id), ((programHeader[i].p_vaddr & 0xFFFFF000) + x), PAGE_DEFAULT, _current->id) == 0x0) {
            K_PANIC("Error: Remap Page Failed");
          } /*
           else {
           kprintf("rP[0x%X]", (programHeader[i].phVaddr & 0xFFFFF000) + x);
           } */

          memset((void *) ((programHeader[i].p_vaddr & 0xFFFFF000) + x), 0x0, 0x1000);

        }

        /* Now Load Section To Memory */
        fseek(fd, programHeader[i].p_offset, 0);
        fread((void *) programHeader[i].p_vaddr, programHeader[i].p_filesz, 1, fd);

        if ((programHeader[i].p_flags & 0x2) != 0x2) {
          for (x = 0x0; x < (round_page(programHeader[i].p_memsz)); x += 0x1000) {
            if ((vmm_setPageAttributes((programHeader[i].p_vaddr & 0xFFFFF000) + x, PAGE_PRESENT | PAGE_USER)) != 0x0)
              kpanic("Error: vmm_setPageAttributes failed, File: %s,Line: %i\n", __FILE__, __LINE__);
          }
        }

        if ((programHeader[i].p_flags & PF_X) && text_size < seg_size) {
          kprintf("setting text: 0x%X - 0x%X\n", seg_addr, seg_size);
          text_size = seg_size;
          text_addr = seg_addr;
        }
        else {
          kprintf("setting data: 0x%X - 0x%X\n", seg_addr, seg_size);
          data_size = seg_size;
          data_addr = seg_addr;
          /*
           _current->td.vm_dsize = seg_size >> PAGE_SHIFT;
           _current->td.vm_daddr = (char *) seg_addr;
           kprintf( "setting daddr: 0x%X, dsiize: 0x%X\n", _current->td.vm_daddr, _current->td.vm_dsize );
           */
        }

        /*
         *  MrOlsen (2016-01-19) NOTE: Note Sure, I should Do This Later
         * Thjis is for stack space
         */
        _current->oInfo.vmStart = ((programHeader[i].p_vaddr & 0xFFFFF000) + 0xA900000);
      break;
      case PT_DYNAMIC:
        //newLoc = (char *)programHeader[i].phVaddr;
        //elfDynamicS = (elfDynamic *) programHeader[i].p_vaddr;
        ef->dynamic = (Elf_Dyn *) programHeader[i].p_vaddr;
        //fseek( fd, programHeader[i].phOffset, 0 );
        //fread( (void *) programHeader[i].phVaddr, programHeader[i].phFilesz, 1, fd );
      break;
      case PT_INTERP:
        kprintf("Malloc: %i\n", programHeader[i].p_filesz);
        interp = (char *) kmalloc(programHeader[i].p_filesz);
        fseek(fd, programHeader[i].p_offset, 0);
        fread((void *) interp, programHeader[i].p_filesz, 1, fd);
        kprintf("Interp: [%s]\n", interp);
        ldAddr = ldEnable();
        //ef->ld_addr = ldEnable();
      break;
      case PT_GNU_STACK:
        asm("nop");
      break;
      default:
      break;
    }
  }

  _current->td.vm_tsize = text_size >> PAGE_SHIFT;
  _current->td.vm_taddr = text_addr;
  _current->td.vm_dsize = data_size >> PAGE_SHIFT;
  _current->td.vm_daddr = data_addr;

  kprintf("Done Looping\n");

  ef->preloaded = 1;
  ef->address = 0x0;
  elf_parse_dynamic(ef);

  //asm("cld");
  //irqDisable(0);
  iFrame = (struct i386_frame *) (_current->tss.esp0 - sizeof(struct i386_frame));

  //iFrame->ebp = 0x0;

  if (ldAddr != 0x0) {
    iFrame->eip = ldAddr;
    kprintf("DYN");
  }
  else {
    iFrame->eip = binaryHeader->e_entry;
    kprintf("STATIC");
  }

  //iFrame->edx = 0x0;

  iFrame->user_esp = (uint32_t) STACK_ADDR - ARGV_PAGE - ENVP_PAGE - ELF_AUX - (argc + 1) - (envc + 1) - STACK_PAD;

  tmp = (uint32_t *) iFrame->user_esp;

  memset((char *) tmp, 0x0, ARGV_PAGE + ENVP_PAGE + ELF_AUX + (argc + 1) + (envc + 1) + STACK_PAD);

  tmp[0] = argc;

  uint32_t sp = 0x0;

  for (i = 1; i <= argc; i++) {
    tmp[i] = (uint32_t) STACK_ADDR - ARGV_PAGE + sp;
    strcpy((char *) tmp[i], (char *) argv_out[i]);
    sp += strlen(argv_out[i]) + 1;
  }

  tmp[i++] = (char *) 0x0;

  kfree(argv_out);
  kfree(args_out);

  sp = 0;

  x = 0;

  for (x = 0; x < envc; x++) {
    tmp[x + i] = (uint32_t) STACK_ADDR - ARGV_PAGE - ENVP_PAGE + sp;
    strcpy((char *) tmp[x + i], (char *) envp_out[x]);
    sp += strlen(envp_out[x]) + 1;
  }

  tmp[i + x] = (char *) 0x0;

  kfree(envp_out);
  kfree(envs_out);

  i = i + x + 1;

  tmp[i++] = 2;
  tmp[i++] = -1;  // _current->imageFd;
  kprintf("AT_EXECFD: [%i]", tmp[i - 1]);

  tmp[i++] = 3;
  tmp[i++] = binaryHeader->e_phoff + 0x08048000;
  kprintf("AT_PHDR: [0x%X]", tmp[i - 1]);

  tmp[i++] = 4;
  tmp[i++] = binaryHeader->e_phentsize;
  kprintf("AT_PHENT: [0x%X]", tmp[i - 1]);

  tmp[i++] = 5;
  tmp[i++] = binaryHeader->e_phnum;
  kprintf("AT_PHNUM: [0x%X]", tmp[i - 1]);

  tmp[i++] = 6;
  tmp[i++] = 0x1000;

  tmp[i++] = 7;
  tmp[i++] = 0x0;  //LD_START;
  kprintf("AT_BASE: [0x%X]", tmp[i - 1]);

  tmp[i++] = 8;
  tmp[i++] = 0x0;

  tmp[i++] = 9;
  tmp[i++] = binaryHeader->e_entry;

  tmp[i++] = 11;
  tmp[i++] = 0x0;

  tmp[i++] = 12;
  tmp[i++] = 0x0;

  tmp[i++] = 13;
  tmp[i++] = 0x0;

  tmp[i++] = 14;
  tmp[i++] = 0x0;

  tmp[i++] = 0;
  tmp[i++] = 0;

  /* Now That We Relocated The Binary We Can Unmap And Free Header Info */
  kfree(binaryHeader);
  kfree(programHeader);
  //irqEnable(0);
  //asm("sti");

  /*
   _current->tss.es = 0x30 + 3;
   _current->tss.cs = 0x28 + 3;
   _current->tss.ss = 0x30 + 3;
   _current->tss.ds = 0x30 + 3;
   _current->tss.fs = 0x30 + 3;
   _current->tss.gs = 0x50 + 3; //0x30 + 3;

   _current->tss.ldt = 0x18;
   _current->tss.trace_bitmap = 0x0000;
   _current->tss.io_map = 0x8000;
   */

  /*
   kfree (iFrameNew);

   memAddr = (uint32_t) & (_current->tss);
   ubixGDT[4].descriptor.baseLow = (memAddr & 0xFFFF);
   ubixGDT[4].descriptor.baseMed = ((memAddr >> 16) & 0xFF);
   ubixGDT[4].descriptor.baseHigh = (memAddr >> 24);
   ubixGDT[4].descriptor.access = '\x89';

   ubixGDT[10].descriptor.baseLow = (STACK_ADDR & 0xFFFF);
   ubixGDT[10].descriptor.baseMed = ((STACK_ADDR >> 16) & 0xFF);
   ubixGDT[10].descriptor.baseHigh = (STACK_ADDR >> 24);

   */

  return (0x0);
}

static int elf_parse_dynamic(elf_file_t ef) {
  Elf32_Dyn *dynp;
  int plttype = DT_REL;
  uint32_t *tmp;

  for (dynp = ef->dynamic; dynp->d_tag != 0x0; dynp++) {
    switch (dynp->d_tag) {
      case DT_NEEDED:
        asm("nop");
      break;
      case DT_INIT:
        asm("nop");
      break;
      case DT_FINI:
        asm("nop");
      break;
      case DT_HASH:
        asm("nop");
        /* From src/libexec/rtld-elf/rtld.c */
        const Elf_Hashelt *hashtab = (const Elf_Hashelt *) (ef->address + dynp->d_un.d_ptr);
        ef->nbuckets = hashtab[0];
        ef->nchains = hashtab[1];
        ef->buckets = hashtab + 2;
        ef->chains = ef->buckets + ef->nbuckets;
      break;
      case DT_STRTAB:
        ef->strtab = (caddr_t) (ef->address + dynp->d_un.d_ptr);
      break;
      case DT_STRSZ:
        ef->strsz = dynp->d_un.d_val;
      break;
      case DT_SYMTAB:
        ef->symtab = (Elf_Sym *) (ef->address + dynp->d_un.d_ptr);
      break;
      case DT_SYMENT:
        if (dynp->d_un.d_val != sizeof(Elf32_Sym))
          return (ENOEXEC);
      break;
      case DT_REL:
        ef->rel = (const Elf_Rel *) (ef->address + dynp->d_un.d_ptr);
      break;
      case DT_RELSZ:
        ef->relsize = dynp->d_un.d_val;
      break;
      case DT_RELENT:
        if (dynp->d_un.d_val != sizeof(Elf_Rel))
          return (ENOEXEC);
      break;
      case DT_JMPREL:
        ef->pltrel = (const Elf_Rel *) (ef->address + dynp->d_un.d_ptr);
      break;
      case DT_PLTRELSZ:
        ef->pltrelsize = dynp->d_un.d_val;
      break;
      case DT_RELA:
        ef->rela = (const Elf_Rela *) (ef->address + dynp->d_un.d_ptr);
      break;
      case DT_RELASZ:
        ef->relasize = dynp->d_un.d_val;
      break;
      case DT_RELAENT:
        if (dynp->d_un.d_val != sizeof(Elf_Rela))
          return (ENOEXEC);
      break;
      case DT_PLTREL:
        plttype = dynp->d_un.d_val;
        if (plttype != DT_REL && plttype != DT_RELA)
          return (ENOEXEC);
      break;
      case DT_PLTGOT:
        ef->got = (Elf_Addr *) (ef->address + dynp->d_un.d_ptr);
        /*
         tmp = (void *) dynp->d_un.d_ptr; //elfDynamicS[i].dynPtr;
         tmp[2] = (uInt32) ef->ld_addr;
         tmp[1] = (uInt32) ef; //0x0;//0xBEEFEAD;//STACK_ADDR - 128;//_current->imageFd;//0xBEEFDEAD;//ef;
         */
      break;
      default:
        asm("nop");
        //kprintf("t_tag: 0x%X>", dynp->d_tag);
      break;
    }
  }

  if (plttype == DT_RELA) {
    ef->pltrela = (const Elf_Rela *) ef->pltrel;
    ef->pltrel = NULL;
    ef->pltrelasize = ef->pltrelsize;
    ef->pltrelsize = 0;
  }

  ef->ddbsymtab = ef->symtab;
  ef->ddbsymcnt = ef->nchains;
  ef->ddbstrtab = ef->strtab;
  ef->ddbstrcnt = ef->strsz;
  return (0);
}