diff options
author | Marvin Borner | 2021-04-02 23:26:28 +0200 |
---|---|---|
committer | Marvin Borner | 2021-04-02 23:26:28 +0200 |
commit | ce98400f8a9ebd4e62e76b9e292b7598d0d66cc0 (patch) | |
tree | 823f06c2c325ead611863eeb3ac974c1ae562878 /kernel/features/proc.c | |
parent | fe468b476d567b6aa0695a030c408ccf46278c7d (diff) |
Added kernel section clear/protect after init
This is a huge security improvement as it prevents potential exploits
of using or modifying internal kernel functions or data.
Diffstat (limited to 'kernel/features/proc.c')
-rw-r--r-- | kernel/features/proc.c | 14 |
1 files changed, 8 insertions, 6 deletions
diff --git a/kernel/features/proc.c b/kernel/features/proc.c index 8625e7d..6d07945 100644 --- a/kernel/features/proc.c +++ b/kernel/features/proc.c @@ -18,12 +18,12 @@ static u32 locked = 0; static u32 current_pid = 0; -static struct node *idle_proc = NULL; static struct node *current = NULL; +PROTECTED static struct node *idle_proc = NULL; -static struct list *proc_list_running = NULL; -static struct list *proc_list_blocked = NULL; -static struct list *proc_list_idle = NULL; +PROTECTED static struct list *proc_list_running = NULL; +PROTECTED static struct list *proc_list_blocked = NULL; +PROTECTED static struct list *proc_list_idle = NULL; // TODO: Use less memcpy and only copy relevant registers // TODO: 20 priority queues (https://www.kernel.org/doc/html/latest/scheduler/sched-nice-design.html) @@ -111,7 +111,7 @@ struct proc *proc_from_pid(u32 pid) return NULL; } -void proc_set_quantum(struct proc *proc, u32 value) +CLEAR void proc_set_quantum(struct proc *proc, u32 value) { proc->quantum.val = value; } @@ -552,8 +552,10 @@ NORETURN void proc_init(void) _eip = init->regs.eip; _esp = init->regs.useresp; - memory_switch_dir(init->page_dir); + // We'll shortly jump to usermode. Clear and protect every secret! + memory_user_hook(); + memory_switch_dir(init->page_dir); printf("Jumping to userspace!\n"); // You're waiting for a train. A train that will take you far away... |