summaryrefslogtreecommitdiffhomepage
path: root/dev/ZKA/KernelKit/PEFCodeManager.hxx
blob: 2935f709f7f8c844b722448744371f450b0e3c2a (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
/* -------------------------------------------

	Copyright ZKA Technologies.

------------------------------------------- */

#ifndef _INC_CODE_MANAGER_PEF_HXX_
#define _INC_CODE_MANAGER_PEF_HXX_

#include <KernelKit/PEF.hxx>
#include <NewKit/ErrorOr.hxx>
#include <NewKit/String.hxx>
#include <KernelKit/FileManager.hxx>

#define kPefApplicationMime "application/x-newos-exec"

namespace Kernel
{
	///
	/// \name PEFLoader
	/// \brief PEF loader class.
	///
	class PEFLoader : public LoaderInterface
	{
	private:
		explicit PEFLoader() = delete;

	public:
		explicit PEFLoader(const VoidPtr blob);
		explicit PEFLoader(const Char* path);
		~PEFLoader() override;

	public:
		ZKA_COPY_DEFAULT(PEFLoader);

	public:
		const Char* Path() override;
		const Char* AsString() override;
		const Char* MIME() override;

	public:
		ErrorOr<VoidPtr> FindStart() override;
		VoidPtr			 FindSymbol(const Char* name, Int32 kind) override;

	public:
		bool IsLoaded() noexcept;

	private:
		OwnPtr<FileStream<Char>> fFile;
		Ref<StringView>			 fPath;
		VoidPtr					 fCachedBlob;
		bool					 fFatBinary;
		bool					 fBad;
	};

	namespace Utils
	{
		bool execute_from_image(PEFLoader& exec, const Int32& procKind) noexcept;
	} // namespace Utils
} // namespace Kernel

#endif // ifndef _INC_CODE_MANAGER_PEF_HXX_