1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
|
/* -------------------------------------------
Copyright (C) 2024-2025, Amlal El Mahrouss, all rights reserved.
------------------------------------------- */
#include <KernelKit/DebugOutput.h>
#include <KernelKit/MemoryMgr.h>
#include <KernelKit/PEFCodeMgr.h>
#include <KernelKit/ProcessScheduler.h>
#include <NewKit/Defines.h>
#include <NewKit/KString.h>
#include <NewKit/KernelPanic.h>
#include <NewKit/OwnPtr.h>
/// @brief PEF stack size symbol.
#define kPefStackSizeSymbol "__PEFSizeOfReserveStack"
#define kPefHeapSizeSymbol "__PEFSizeOfReserveHeap"
#define kPefNameSymbol "__PEFProgramName"
namespace Kernel {
namespace Detail {
/***********************************************************************************/
/// @brief Get the PEF platform signature according to the compiled architecture.
/***********************************************************************************/
UInt32 ldr_get_platform(void) noexcept {
#if defined(__NE_32X0__)
return kPefArch32x0;
#elif defined(__NE_64X0__)
return kPefArch64x0;
#elif defined(__NE_AMD64__)
return kPefArchAMD64;
#elif defined(__NE_PPC64__)
return kPefArchPowerPC;
#elif defined(__NE_ARM64__)
return kPefArchARM64;
#else
return kPefArchInvalid;
#endif // __32x0__ || __64x0__ || __x86_64__
}
} // namespace Detail
/***********************************************************************************/
/// @brief PEF loader constructor w/ blob.
/// @param blob file blob.
/***********************************************************************************/
PEFLoader::PEFLoader(const VoidPtr blob) : fCachedBlob(blob) {
MUST_PASS(fCachedBlob);
fBad = false;
}
/***********************************************************************************/
/// @brief PEF loader constructor.
/// @param path the filesystem path.
/***********************************************************************************/
PEFLoader::PEFLoader(const Char* path) : fCachedBlob(nullptr), fFatBinary(false), fBad(false) {
fFile.New(const_cast<Char*>(path), kRestrictRB);
fPath = KStringBuilder::Construct(path).Leak();
auto kPefHeader = "PEF_CONTAINER";
fCachedBlob = fFile->Read(kPefHeader, mib_cast(16));
PEFContainer* container = reinterpret_cast<PEFContainer*>(fCachedBlob);
if (container->Cpu == Detail::ldr_get_platform() && container->Magic[0] == kPefMagic[0] &&
container->Magic[1] == kPefMagic[1] && container->Magic[2] == kPefMagic[2] &&
container->Magic[3] == kPefMagic[3] && container->Magic[4] == kPefMagic[4] &&
container->Abi == kPefAbi) {
return;
} else if (container->Magic[4] == kPefMagic[0] && container->Magic[3] == kPefMagic[1] &&
container->Magic[2] == kPefMagic[2] && container->Magic[1] == kPefMagic[3] &&
container->Magic[0] == kPefMagic[4] && container->Abi == kPefAbi) {
/// This is a fat binary.
this->fFatBinary = true;
return;
}
fBad = true;
if (fCachedBlob) mm_delete_heap(fCachedBlob);
kout << "PEFLoader: warn: Executable format error!\r";
fCachedBlob = nullptr;
}
/***********************************************************************************/
/// @brief PEF destructor.
/***********************************************************************************/
PEFLoader::~PEFLoader() {
if (fCachedBlob) mm_delete_heap(fCachedBlob);
fFile.Delete();
}
/***********************************************************************************/
/// @brief Finds the symbol according to it's name.
/// @param name name of symbol.
/// @param kind kind of symbol we want.
/***********************************************************************************/
VoidPtr PEFLoader::FindSymbol(const Char* name, Int32 kind) {
if (!fCachedBlob || fBad || !name) return nullptr;
PEFContainer* container = reinterpret_cast<PEFContainer*>(fCachedBlob);
auto blob = fFile->Read(name, mib_cast(16));
PEFCommandHeader* container_header = reinterpret_cast<PEFCommandHeader*>(blob);
constexpr auto cMangleCharacter = '$';
const Char* cContainerKinds[] = {".code64", ".data64", ".zero64", nullptr};
ErrorOr<KString> error_or_symbol;
switch (kind) {
case kPefCode: {
error_or_symbol = KStringBuilder::Construct(cContainerKinds[0]); // code symbol.
break;
}
case kPefData: {
error_or_symbol = KStringBuilder::Construct(cContainerKinds[1]); // data symbol.
break;
}
case kPefZero: {
error_or_symbol = KStringBuilder::Construct(cContainerKinds[2]); // block starting symbol.
break;
}
default:
return nullptr; // prevent that from the kernel's mode perspective, let that happen if it
// were a user process.
}
Char* unconst_symbol = const_cast<Char*>(name);
for (SizeT i = 0UL; i < rt_string_len(unconst_symbol, kPefNameLen); ++i) {
if (unconst_symbol[i] == ' ') {
unconst_symbol[i] = cMangleCharacter;
}
}
error_or_symbol.Leak().Leak() += name;
for (SizeT index = 0; index < container->Count; ++index) {
if (KStringBuilder::Equals(container_header->Name, error_or_symbol.Leak().Leak().CData())) {
if (container_header->Kind == kind) {
if (container_header->Cpu != Detail::ldr_get_platform()) {
if (!this->fFatBinary) {
mm_delete_heap(blob);
return nullptr;
}
}
Char* container_blob_value = new Char[container_header->Size];
rt_copy_memory((VoidPtr) ((Char*) blob + sizeof(PEFCommandHeader)), container_blob_value,
container_header->Size);
mm_delete_heap(blob);
kout << "PEFLoader: INFO: Load stub: " << container_header->Name << "!\r";
return container_blob_value;
}
}
}
mm_delete_heap(blob);
return nullptr;
}
/// @brief Finds the executable entrypoint.
/// @return
ErrorOr<VoidPtr> PEFLoader::FindStart() {
if (auto sym = this->FindSymbol(kPefStart, kPefCode); sym) return ErrorOr<VoidPtr>(sym);
return ErrorOr<VoidPtr>(kErrorExecutable);
}
/// @brief Tells if the executable is loaded or not.
/// @return
bool PEFLoader::IsLoaded() noexcept {
return !fBad && fCachedBlob;
}
const Char* PEFLoader::Path() {
return fPath.Leak().CData();
}
const Char* PEFLoader::AsString() {
#ifdef __32x0__
return "32x0 PEF executable.";
#elif defined(__64x0__)
return "64x0 PEF executable.";
#elif defined(__x86_64__)
return "x86_64 PEF executable.";
#elif defined(__aarch64__)
return "AARCH64 PEF executable.";
#elif defined(__powerpc64__)
return "POWER64 PEF executable.";
#else
return "???? PEF executable.";
#endif // __32x0__ || __64x0__ || __x86_64__ || __powerpc64__
}
const Char* PEFLoader::MIME() {
return kPefApplicationMime;
}
ErrorOr<VoidPtr> PEFLoader::GetBlob() {
return ErrorOr<VoidPtr>{this->fCachedBlob};
}
namespace Utils {
ProcessID rtl_create_user_process(PEFLoader& exec, const Int32& process_kind) noexcept {
auto errOrStart = exec.FindStart();
if (errOrStart.Error() != kErrorSuccess) return kSchedInvalidPID;
auto id = UserProcessScheduler::The().Spawn(
reinterpret_cast<const Char*>(exec.FindSymbol(kPefNameSymbol, kPefData)),
errOrStart.Leak().Leak(), exec.GetBlob().Leak().Leak());
if (id != kSchedInvalidPID) {
UserProcessScheduler::The().CurrentTeam().AsArray()[id].Kind = process_kind;
UserProcessScheduler::The().CurrentTeam().AsArray()[id].StackSize =
*(UIntPtr*) exec.FindSymbol(kPefStackSizeSymbol, kPefData);
UserProcessScheduler::The().CurrentTeam().AsArray()[id].MemoryLimit =
*(UIntPtr*) exec.FindSymbol(kPefHeapSizeSymbol, kPefData);
}
return id;
}
} // namespace Utils
} // namespace Kernel
|