aboutsummaryrefslogtreecommitdiff
path: root/kernel
diff options
context:
space:
mode:
Diffstat (limited to 'kernel')
-rw-r--r--kernel/features/load.c29
-rw-r--r--kernel/features/mm.c11
-rw-r--r--kernel/features/proc.c4
-rw-r--r--kernel/features/syscall.c2
-rw-r--r--kernel/main.c2
5 files changed, 28 insertions, 20 deletions
diff --git a/kernel/features/load.c b/kernel/features/load.c
index 7d0c3c0..079cbbe 100644
--- a/kernel/features/load.c
+++ b/kernel/features/load.c
@@ -13,6 +13,10 @@
s32 bin_load(const char *path, struct proc *proc)
{
+ UNUSED(path);
+ UNUSED(proc);
+ panic("Deprecated!\n");
+#if 0
if (!path || !memory_valid(path) || !proc)
return -EFAULT;
@@ -48,6 +52,7 @@ s32 bin_load(const char *path, struct proc *proc)
memory_switch_dir(prev);
return 0;
+#endif
}
s32 elf_load(const char *path, struct proc *proc)
@@ -56,14 +61,10 @@ s32 elf_load(const char *path, struct proc *proc)
return -EFAULT;
struct stat s = { 0 };
- memory_bypass_enable();
s32 stat = vfs_stat(path, &s);
- memory_bypass_disable();
if (stat != 0)
return stat;
- strcpy(proc->name, path);
-
struct elf_header header = { 0 };
s32 read = vfs_read(path, &header, 0, sizeof(header));
if (read < 0)
@@ -71,6 +72,8 @@ s32 elf_load(const char *path, struct proc *proc)
if (read != sizeof(header))
return -ENOEXEC;
+ strcpy(proc->name, path);
+
// Valid?
u8 *magic = header.ident;
u8 valid_magic = magic[ELF_IDENT_MAG0] == ELF_MAG0 && magic[ELF_IDENT_MAG1] == ELF_MAG1 &&
@@ -81,9 +84,6 @@ s32 elf_load(const char *path, struct proc *proc)
header.version != 1 || header.machine != ELF_MACHINE_386)
return -ENOEXEC;
- // I need to implement ext2 offset reading first
- panic("TUDU, Marvin!\n");
-
for (u32 i = 0; i < header.phnum; i++) {
struct elf_program program = { 0 };
if (vfs_read(path, &program, header.phoff + header.phentsize * i,
@@ -100,12 +100,13 @@ s32 elf_load(const char *path, struct proc *proc)
memory_backup_dir(&prev);
memory_switch_dir(proc->page_dir);
- struct memory_range range = memory_range_around(program.vaddr, program.memsz);
- struct memory_range prange = physical_alloc(range.size);
- virtual_map(proc->page_dir, prange, range.base, MEMORY_CLEAR | MEMORY_USER);
+ struct memory_range vrange = memory_range_around(program.vaddr, program.memsz);
+ struct memory_range prange = physical_alloc(vrange.size);
+ virtual_map(proc->page_dir, prange, vrange.base, MEMORY_CLEAR | MEMORY_USER);
- if ((u32)vfs_read(proc->name, (void *)program.vaddr, program.offset,
- program.filesz) != program.filesz) {
+ if ((u32)vfs_read(path, (void *)program.vaddr, program.offset, program.filesz) !=
+ program.filesz) {
+ print("OH NOSE!\n");
memory_switch_dir(prev);
return -ENOEXEC;
}
@@ -118,8 +119,8 @@ s32 elf_load(const char *path, struct proc *proc)
memory_switch_dir(proc->page_dir);
u32 stack = (u32)memory_alloc(proc->page_dir, PROC_STACK_SIZE, MEMORY_USER | MEMORY_CLEAR);
- proc->regs.ebp = stack;
- proc->regs.useresp = stack;
+ proc->regs.ebp = stack + PROC_STACK_SIZE - 1;
+ proc->regs.useresp = stack + PROC_STACK_SIZE - 1;
proc->regs.eip = header.entry;
proc->entry = header.entry;
diff --git a/kernel/features/mm.c b/kernel/features/mm.c
index d007039..af5e070 100644
--- a/kernel/features/mm.c
+++ b/kernel/features/mm.c
@@ -208,11 +208,15 @@ void virtual_map(struct page_dir *dir, struct memory_range prange, u32 vaddr, u3
struct page_table *table =
(struct page_table *)(dir_entry->bits.address * PAGE_SIZE);
- if (!dir_entry->bits.present) {
+ if (dir_entry->bits.present) {
+ // TODO: Is this a security risk?
+ if (flags & MEMORY_USER)
+ dir_entry->bits.user = 1;
+ } else {
table = memory_alloc_identity(dir, MEMORY_CLEAR);
dir_entry->bits.present = 1;
dir_entry->bits.writable = 1;
- dir_entry->bits.user = 1;
+ dir_entry->bits.user = flags & MEMORY_USER;
dir_entry->bits.address = (u32)(table) >> 12;
}
@@ -424,8 +428,9 @@ void memory_bypass_disable(void)
// TODO: Limit by proc stack and data range
u8 memory_valid(const void *addr)
{
+ /* return ((u32)addr) / PAGE_SIZE / PAGE_COUNT >= PAGE_KERNEL_COUNT; */
if (proc_current() && !memory_bypass_validity)
- return ((u32)addr) / PAGE_SIZE / PAGE_COUNT >= PAGE_KERNEL_COUNT;
+ return (u32)addr >= 0x100000;
else
return 1;
}
diff --git a/kernel/features/proc.c b/kernel/features/proc.c
index cd0fc8d..5c38fff 100644
--- a/kernel/features/proc.c
+++ b/kernel/features/proc.c
@@ -497,13 +497,13 @@ void proc_init(void)
// Idle proc
struct proc *kernel_proc = proc_make(PROC_PRIV_NONE);
- assert(bin_load("/bin/idle", kernel_proc) == 0);
+ assert(elf_load("/bin/idle", kernel_proc) == 0);
kernel_proc->state = PROC_SLEEPING;
idle_proc = list_add(proc_list, kernel_proc);
// Init proc (root)
struct node *new = list_add(proc_list, proc_make(PROC_PRIV_ROOT));
- assert(bin_load("/bin/init", new->data) == 0);
+ assert(elf_load("/bin/init", new->data) == 0);
current = new;
proc_stack_push(new->data, 0);
diff --git a/kernel/features/syscall.c b/kernel/features/syscall.c
index b0b37ac..2796372 100644
--- a/kernel/features/syscall.c
+++ b/kernel/features/syscall.c
@@ -72,7 +72,7 @@ static void syscall_handler(struct regs *r)
case SYS_EXEC: {
char *path = (char *)r->ebx;
struct proc *proc = proc_make(PROC_PRIV_NONE);
- r->eax = (u32)bin_load(path, proc);
+ r->eax = (u32)elf_load(path, proc);
if (r->eax != 0)
proc_exit(proc, -r->eax);
// TODO: Reimplement argc,argv
diff --git a/kernel/main.c b/kernel/main.c
index 3b75c7d..d1afc01 100644
--- a/kernel/main.c
+++ b/kernel/main.c
@@ -18,6 +18,8 @@
#include <syscall.h>
#include <timer.h>
+#include <print.h>
+
void kernel_main(struct mem_info *mem_info, struct vid_info *vid_info); // Decl
void kernel_main(struct mem_info *mem_info, struct vid_info *vid_info)
{