exec.c 2.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104
  1. #include "types.h"
  2. #include "param.h"
  3. #include "memlayout.h"
  4. #include "mmu.h"
  5. #include "proc.h"
  6. #include "defs.h"
  7. #include "arm.h"
  8. #include "elf.h"
  9. int
  10. exec(char *path, char **argv)
  11. {
  12. char *last;
  13. int i, off;
  14. uint argc, sz, sp, ustack[3+MAXARG+1];
  15. struct elfhdr elf;
  16. struct inode *ip;
  17. struct proghdr ph;
  18. pde_t *pgdir, *oldpgdir;
  19. if((ip = namei(path)) == 0)
  20. return -1;
  21. ilock(ip);
  22. pgdir = 0;
  23. // Check ELF header
  24. if(readi(ip, (char*)&elf, 0, sizeof(elf)) < sizeof(elf))
  25. goto bad;
  26. if(elf.magic != ELF_MAGIC)
  27. goto bad;
  28. if((pgdir = setupkvm()) == 0)
  29. goto bad;
  30. // Load program into memory.
  31. sz = 0;
  32. for(i=0, off=elf.phoff; i<elf.phnum; i++, off+=sizeof(ph)){
  33. if(readi(ip, (char*)&ph, off, sizeof(ph)) != sizeof(ph))
  34. goto bad;
  35. if(ph.type != ELF_PROG_LOAD)
  36. continue;
  37. if(ph.memsz < ph.filesz)
  38. goto bad;
  39. if((sz = allocuvm(pgdir, sz, ph.vaddr + ph.memsz)) == 0)
  40. goto bad;
  41. if(loaduvm(pgdir, (char*)ph.vaddr, ip, ph.off, ph.filesz) < 0)
  42. goto bad;
  43. }
  44. iunlockput(ip);
  45. ip = 0;
  46. // Allocate two pages at the next page boundary.
  47. // Make the first inaccessible. Use the second as the user stack.
  48. sz = PGROUNDUP(sz);
  49. if((sz = allocuvm(pgdir, sz, sz + 2*PGSIZE)) == 0)
  50. goto bad;
  51. clearpteu(pgdir, (char*)(sz - 2*PGSIZE));
  52. sp = sz;
  53. // Push argument strings, prepare rest of stack in ustack.
  54. for(argc = 0; argv[argc]; argc++) {
  55. if(argc >= MAXARG)
  56. goto bad;
  57. sp = (sp - (strlen(argv[argc]) + 1)) & ~3;
  58. if(copyout(pgdir, sp, argv[argc], strlen(argv[argc]) + 1) < 0)
  59. goto bad;
  60. ustack[3+argc] = sp;
  61. }
  62. ustack[3+argc] = 0;
  63. //cprintf("Exec is called argc=%d sz=%x\n", argc, sz);
  64. ustack[0] = 0xffffffff; // fake return PC
  65. ustack[1] = argc;
  66. ustack[2] = sp - (argc+1)*4; // argv pointer
  67. sp -= (3+argc+1) * 4;
  68. if(copyout(pgdir, sp, ustack, (3+argc+1)*4) < 0)
  69. goto bad;
  70. // Save program name for debugging.
  71. /* for(last=s=path; *s; s++)
  72. if(*s == '/')
  73. last = s+1;*/
  74. last = argv[0];
  75. safestrcpy(curr_proc->name, last, sizeof(curr_proc->name));
  76. // Commit to the user image.
  77. oldpgdir = curr_proc->pgdir;
  78. curr_proc->pgdir = pgdir;
  79. curr_proc->sz = sz;
  80. curr_proc->tf->pc = elf.entry; // main
  81. curr_proc->tf->sp = sp;
  82. curr_proc->tf->r0 = ustack[1];
  83. curr_proc->tf->r1 = ustack[2];
  84. switchuvm(curr_proc);
  85. freevm(oldpgdir);
  86. return 0;
  87. bad:
  88. if(pgdir)
  89. freevm(pgdir);
  90. if(ip)
  91. iunlockput(ip);
  92. return -1;
  93. }