2 Commits

Author SHA1 Message Date
xamidev aa30d9c6b5 user program (still many #PF) 2026-04-02 17:05:51 +02:00
xamidev 11a9dd4adb Load limine module + alloc user stack 2026-04-01 15:51:04 +02:00
16 changed files with 160 additions and 11 deletions
+2
View File
@@ -21,6 +21,7 @@ CC_FLAGS=-Wall -Wextra -std=gnu99 -nostdlib -ffreestanding -fstack-protector -fn
LD := x86_64-elf-ld LD := x86_64-elf-ld
$(ELFFILE): $(BUILDDIR) $(OBJFILES) $(ELFFILE): $(BUILDDIR) $(OBJFILES)
nasm -f bin user/hello.S -o $(BUILDDIR)/hello
nasm -f elf64 src/arch/x86/idt.S -o $(BUILDDIR)/idt_stub.o nasm -f elf64 src/arch/x86/idt.S -o $(BUILDDIR)/idt_stub.o
$(LD) -o $(ELFFILE) -T linker.ld $(OBJFILES) $(BUILDDIR)/idt_stub.o $(LD) -o $(ELFFILE) -T linker.ld $(OBJFILES) $(BUILDDIR)/idt_stub.o
# Get the symbols for debugging # Get the symbols for debugging
@@ -47,6 +48,7 @@ build-iso: limine/limine $(ELFFILE)
cp -v $(ELFFILE) iso_root/boot cp -v $(ELFFILE) iso_root/boot
mkdir -p iso_root/boot/limine mkdir -p iso_root/boot/limine
cp -v limine.conf iso_root/boot/limine cp -v limine.conf iso_root/boot/limine
cp $(BUILDDIR)/hello iso_root/boot/
mkdir -p iso_root/EFI/BOOT mkdir -p iso_root/EFI/BOOT
cp -v limine/limine-bios.sys limine/limine-bios-cd.bin limine/limine-uefi-cd.bin iso_root/boot/limine/ cp -v limine/limine-bios.sys limine/limine-bios-cd.bin limine/limine-uefi-cd.bin iso_root/boot/limine/
cp -v limine/BOOTX64.EFI iso_root/EFI/BOOT/ cp -v limine/BOOTX64.EFI iso_root/EFI/BOOT/
-1
View File
@@ -10,7 +10,6 @@ void wrmsr(uint32_t msr, uint64_t value);
bool x86_has_msr(); bool x86_has_msr();
void x86_arch_init(); void x86_arch_init();
void x86_cpu_identification(); void x86_cpu_identification();
int cpuid_get_vendor_string(char* str); int cpuid_get_vendor_string(char* str);
+5
View File
@@ -40,6 +40,11 @@
#define KERNEL_STACK_SIZE 65536 #define KERNEL_STACK_SIZE 65536
#define KERNEL_IDT_ENTRIES 33 #define KERNEL_IDT_ENTRIES 33
/* user */
#define USER_STACK_TOP 0x80000000
#define USER_STACK_PAGES 16 // 16*4096 = 64kb
#define USER_CODE_START 0x400000 // like linux
/* paging */ /* paging */
#define PAGING_MAX_PHYS 0x200000000 #define PAGING_MAX_PHYS 0x200000000
+1
View File
@@ -54,6 +54,7 @@ struct boot_context {
struct limine_hhdm_response* hhdm; struct limine_hhdm_response* hhdm;
struct limine_kernel_address_response* kaddr; struct limine_kernel_address_response* kaddr;
struct limine_boot_time_response* bootdate; struct limine_boot_time_response* bootdate;
struct limine_module_response* module;
}; };
// Are these modules initialized yet? // Are these modules initialized yet?
+2
View File
@@ -22,6 +22,8 @@ void vmm_unmap(uint64_t* pml4, uint64_t virt);
void* vmm_map(uint64_t* pml4, uint64_t virt, uint64_t flags); void* vmm_map(uint64_t* pml4, uint64_t virt, uint64_t flags);
uint64_t* vmm_create_address_space(); uint64_t* vmm_create_address_space();
uint64_t vmm_virt_to_phys(uint64_t* pml4, uint64_t virt); uint64_t vmm_virt_to_phys(uint64_t* pml4, uint64_t virt);
uintptr_t vmm_alloc_user_stack(uint64_t* pml4);
uintptr_t vmm_alloc_user_code(uint64_t* pml4, void* code_addr, uint64_t code_size);
#define VMM_USER_SPACE_START 0x0000000000001000 #define VMM_USER_SPACE_START 0x0000000000001000
#define VMM_USER_SPACE_END 0x00007FFFFFFFF000 #define VMM_USER_SPACE_END 0x00007FFFFFFFF000
+4
View File
@@ -10,6 +10,7 @@
#include <stddef.h> #include <stddef.h>
#include <config.h> #include <config.h>
#include <stdint.h> #include <stdint.h>
#include <limine.h>
typedef enum { typedef enum {
READY, READY,
@@ -24,6 +25,7 @@ struct process {
status_t status; status_t status;
struct cpu_status* context; struct cpu_status* context;
void* root_page_table; // Process PML4 (should contain kernel PML4 in higher half [256-511] void* root_page_table; // Process PML4 (should contain kernel PML4 in higher half [256-511]
void* kernel_stack; // Used for interrupts (syscall: int 0x80), defines the TSS RSP0
struct process* next; struct process* next;
}; };
@@ -36,4 +38,6 @@ void process_exit(void);
void process_display_list(struct process* processes_list); void process_display_list(struct process* processes_list);
void process_create_user(struct limine_file* file);
#endif #endif
+1
View File
@@ -6,3 +6,4 @@ interface_branding: Welcome to the PepperOS disk!
comment: Default configuration (warning: spicy) comment: Default configuration (warning: spicy)
path: boot():/boot/pepperk path: boot():/boot/pepperk
module_path: boot():/boot/hello
+4 -3
View File
@@ -77,7 +77,7 @@ void idt_init()
idt_set_entry(i, vector_0_handler + (i*16), 0); idt_set_entry(i, vector_0_handler + (i*16), 0);
} }
idt_set_entry(0x80, vector_128_handler, 0); idt_set_entry(0x80, vector_128_handler, 3);
idt_load(&idt); idt_load(&idt);
DEBUG("IDT initialized"); DEBUG("IDT initialized");
@@ -264,9 +264,10 @@ struct cpu_status* interrupt_dispatch(struct cpu_status* context)
// Send an EOI so that we can continue having interrupts // Send an EOI so that we can continue having interrupts
outb(0x20, 0x20); outb(0x20, 0x20);
if (ticks % SCHEDULER_QUANTUM == 0) { // Scheduler is temporarily disabled to test user trampoline
/* if (ticks % SCHEDULER_QUANTUM == 0) {
return scheduler_schedule(context); return scheduler_schedule(context);
} } */
break; break;
+1 -1
View File
@@ -45,7 +45,7 @@ static void x86_enable_fpu()
__asm__ volatile("mov %%cr4, %0" : "=r"(cr4)); __asm__ volatile("mov %%cr4, %0" : "=r"(cr4));
cr4 |= 0x200; cr4 |= 0x200;
__asm__ volatile("mov %0, %%cr4" :: "r"(cr4)); __asm__ volatile("mov %0, %%cr4" :: "r"(cr4));
uint16_t cw = 0x37F; uint16_t cw = 0x37F; // control word
asm volatile("fldcw %0" :: "m"(cw)); asm volatile("fldcw %0" :: "m"(cw));
} }
+9 -2
View File
@@ -13,6 +13,9 @@
#include <limine.h> #include <limine.h>
#include <stddef.h> #include <stddef.h>
__attribute__((used, section(".limine_requests_start")))
volatile LIMINE_REQUESTS_START_MARKER;
__attribute__((used, section(".limine_requests"))) __attribute__((used, section(".limine_requests")))
volatile struct limine_framebuffer_request framebuffer_request = { volatile struct limine_framebuffer_request framebuffer_request = {
.id = LIMINE_FRAMEBUFFER_REQUEST, .id = LIMINE_FRAMEBUFFER_REQUEST,
@@ -43,8 +46,11 @@ volatile struct limine_boot_time_request date_request = {
.revision = 0 .revision = 0
}; };
__attribute__((used, section(".limine_requests_start"))) __attribute__((used, section(".limine_requests")))
volatile LIMINE_REQUESTS_START_MARKER; volatile struct limine_module_request module_request = {
.id = LIMINE_MODULE_REQUEST,
.revision = 0
};
__attribute__((used, section(".limine_requests_end"))) __attribute__((used, section(".limine_requests_end")))
volatile LIMINE_REQUESTS_END_MARKER; volatile LIMINE_REQUESTS_END_MARKER;
@@ -58,4 +64,5 @@ void populate_boot_context(struct boot_context* ctx)
ctx->hhdm = hhdm_request.response ? hhdm_request.response : NULL; ctx->hhdm = hhdm_request.response ? hhdm_request.response : NULL;
ctx->kaddr = kerneladdr_request.response ? kerneladdr_request.response : NULL; ctx->kaddr = kerneladdr_request.response ? kerneladdr_request.response : NULL;
ctx->bootdate = date_request.response ? date_request.response : NULL; ctx->bootdate = date_request.response ? date_request.response : NULL;
ctx->module = module_request.response ? module_request.response : NULL;
} }
+1 -1
View File
@@ -18,7 +18,7 @@ extern int panic_count;
*/ */
void read_rflags(uint64_t rflags) void read_rflags(uint64_t rflags)
{ {
DEBUG("\x1b[38;5;226m%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s\x1b[38;5;231m", printf("\x1b[38;5;226m%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s%s\x1b[38;5;231m",
CHECK_BIT(rflags, 0) ? "CF " : "", /*carry flag*/ CHECK_BIT(rflags, 0) ? "CF " : "", /*carry flag*/
CHECK_BIT(rflags, 2) ? "PF " : "", /*parity flag*/ CHECK_BIT(rflags, 2) ? "PF " : "", /*parity flag*/
CHECK_BIT(rflags, 4) ? "AF " : "", /*auxiliary carry flag*/ CHECK_BIT(rflags, 4) ? "AF " : "", /*auxiliary carry flag*/
+13
View File
@@ -62,6 +62,9 @@ extern volatile struct limine_memmap_request memmap_request;
extern volatile struct limine_hhdm_request hhdm_request; extern volatile struct limine_hhdm_request hhdm_request;
extern volatile struct limine_kernel_address_request kerneladdr_request; extern volatile struct limine_kernel_address_request kerneladdr_request;
extern volatile struct limine_boot_time_request date_request; extern volatile struct limine_boot_time_request date_request;
extern volatile struct limine_module_request module_request;
struct limine_file* file;
extern struct process* processes_list; extern struct process* processes_list;
extern struct process* current_process; extern struct process* current_process;
@@ -119,8 +122,18 @@ void kmain()
scheduler_init(); scheduler_init();
if (!boot_ctx.module) {
panic(NULL, "could not load 'hello' executable :(");
}
printf(PEPPEROS_SPLASH); printf(PEPPEROS_SPLASH);
init.all = true; init.all = true;
if (boot_ctx.module->module_count == 1) {
file = boot_ctx.module->modules[0];
DEBUG("file: addr=%p size=%u", file->address, file->size);
process_create_user(file);
}
idle(); idle();
} }
+19 -3
View File
@@ -99,30 +99,46 @@ void paging_map_page(uint64_t* root_table, uint64_t virt, uint64_t phys, uint64_
uint64_t *pdpt, *pd, *pt; uint64_t *pdpt, *pd, *pt;
// Any parent entry on a userspace mapping must also carry PTE_USER,
// otherwise CPL3 accesses fault even if the final PTE is user.
uint64_t parent_flags = PTE_PRESENT | PTE_WRITABLE;
if (flags & PTE_USER) {
parent_flags |= PTE_USER;
}
// PML4 // PML4
// If the entry at index is not present, allocate enough space for it // If the entry at index is not present, allocate enough space for it
// then populate the entry with correct addr + flags // then populate the entry with correct addr + flags
if (!(root_table[pml4_i] & PTE_PRESENT)) { if (!(root_table[pml4_i] & PTE_PRESENT)) {
pdpt = alloc_page_table(); pdpt = alloc_page_table();
root_table[pml4_i] = VIRT_TO_PHYS(pdpt) | PTE_PRESENT | PTE_WRITABLE; root_table[pml4_i] = VIRT_TO_PHYS(pdpt) | parent_flags;
} else { } else {
pdpt = (uint64_t *)PHYS_TO_VIRT(root_table[pml4_i] & PTE_ADDR_MASK); pdpt = (uint64_t *)PHYS_TO_VIRT(root_table[pml4_i] & PTE_ADDR_MASK);
if (flags & PTE_USER) {
root_table[pml4_i] |= PTE_USER;
}
} }
// PDPT: same here // PDPT: same here
if (!(pdpt[pdpt_i] & PTE_PRESENT)) { if (!(pdpt[pdpt_i] & PTE_PRESENT)) {
pd = alloc_page_table(); pd = alloc_page_table();
pdpt[pdpt_i] = VIRT_TO_PHYS(pd) | PTE_PRESENT | PTE_WRITABLE; pdpt[pdpt_i] = VIRT_TO_PHYS(pd) | parent_flags;
} else { } else {
pd = (uint64_t *)PHYS_TO_VIRT(pdpt[pdpt_i] & PTE_ADDR_MASK); pd = (uint64_t *)PHYS_TO_VIRT(pdpt[pdpt_i] & PTE_ADDR_MASK);
if (flags & PTE_USER) {
pdpt[pdpt_i] |= PTE_USER;
}
} }
// PD: and here // PD: and here
if (!(pd[pd_i] & PTE_PRESENT)) { if (!(pd[pd_i] & PTE_PRESENT)) {
pt = alloc_page_table(); pt = alloc_page_table();
pd[pd_i] = VIRT_TO_PHYS(pt) | PTE_PRESENT | PTE_WRITABLE; pd[pd_i] = VIRT_TO_PHYS(pt) | parent_flags;
} else { } else {
pt = (uint64_t *)PHYS_TO_VIRT(pd[pd_i] & PTE_ADDR_MASK); pt = (uint64_t *)PHYS_TO_VIRT(pd[pd_i] & PTE_ADDR_MASK);
if (flags & PTE_USER) {
pd[pd_i] |= PTE_USER;
}
} }
// PT: finally, populate the page table entry // PT: finally, populate the page table entry
+36
View File
@@ -13,6 +13,7 @@ in a specified virtual space
compared to the PMM which allocs/frees 4kb frames ("physical pages"). compared to the PMM which allocs/frees 4kb frames ("physical pages").
*/ */
#include "config.h"
#include <mem/vmm.h> #include <mem/vmm.h>
#include <mem/paging.h> #include <mem/paging.h>
#include <stddef.h> #include <stddef.h>
@@ -225,6 +226,41 @@ void* vmm_alloc_region(uint64_t* pml4, size_t pages, uint64_t flags)
return NULL; return NULL;
} }
/*
* vmm_map_user_stack - Map a user stack
* @pml4: the user process's PML4
*
* This function maps and allocates a userspace
* stack in the user @pml4 provided, according
* to constants USER_STACK_TOP and USER_STACK_PAGES.
*
* Return:
* <addr> - User stack top address
*/
uintptr_t vmm_alloc_user_stack(uint64_t* pml4)
{
uintptr_t stack_top = USER_STACK_TOP;
size_t stack_size = USER_STACK_PAGES*PAGE_SIZE;
for (size_t i=stack_top; i>stack_top-stack_size; i-=PAGE_SIZE) {
vmm_map(pml4, i, PTE_PRESENT | PTE_WRITABLE | PTE_USER);
}
return stack_top;
}
uintptr_t vmm_alloc_user_code(uint64_t* pml4, void* code_addr, uint64_t code_size)
{
uintptr_t code_start = USER_CODE_START;
for (size_t i=code_start; i<code_start+code_size; i+=PAGE_SIZE) {
vmm_map(pml4, i, PTE_PRESENT | PTE_WRITABLE | PTE_USER);
}
return code_start;
}
void vmm_init() void vmm_init()
{ {
// NO U // NO U
+58
View File
@@ -4,6 +4,8 @@
* @license GPL-3.0-only * @license GPL-3.0-only
*/ */
#include "mem/paging.h"
#include "mem/vmm.h"
#include <stddef.h> #include <stddef.h>
#include <sched/process.h> #include <sched/process.h>
#include <mem/kheap.h> #include <mem/kheap.h>
@@ -13,6 +15,7 @@
#include <config.h> #include <config.h>
#include <io/serial/serial.h> #include <io/serial/serial.h>
#include <io/term/flanterm.h> #include <io/term/flanterm.h>
#include <mem/utils.h>
extern struct flanterm_context* ft_ctx; extern struct flanterm_context* ft_ctx;
@@ -197,3 +200,58 @@ void process_exit()
asm("hlt"); asm("hlt");
} }
} }
/*
* process_jump_to_user - Jump to userland
* @stack_top: Address of the top of the user stack
* @user_code: Address of the first instruction of user code
*/
void process_jump_to_user(uintptr_t stack_top, uintptr_t user_code)
{
// 0x20 | 3 = 0x23 (user data segment | 3)
// 0x18 | 3 = 0x1B (user code segment | 3)
asm volatile(" \
push $0x23 \n\
push %0 \n\
push $0x202 \n\
push $0x1B \n\
push %1 \n\
iretq \n\
" :: "r"(stack_top), "r"(user_code));
}
// Kernel stack used for interrupts from userland process.
// Should be set in TSS.RSP0 when switching to userland process.
uint8_t interrupt_stack[0x8000];
extern struct tss tss;
/*
* process_create_user - Create a new user process
* @file: pointer to Limine file structure
*
* This function takes a loaded Limine executable
* module, and maps its code, a user stack, sets the
* TSS RSP0 for interrupts, and finally jumps to the
* user code.
*/
void process_create_user(struct limine_file* file)
{
void* exec_addr = file->address;
uint64_t exec_size = file->size;
uint64_t* user_pml4 = vmm_create_address_space();
uintptr_t stack_top = vmm_alloc_user_stack(user_pml4);
uint64_t code = vmm_alloc_user_code(user_pml4, exec_addr, exec_size);
// Could be kalloc_stack()ed PER PROCESS when we grow that
tss.rsp0 = (uint64_t)(interrupt_stack + sizeof(interrupt_stack));
// Load user_pml4 into cr3 along here??
load_cr3(VIRT_TO_PHYS((uint64_t)user_pml4));
// Copy code into user pages
memcpy((uint64_t*)code, exec_addr, exec_size);
process_jump_to_user(stack_top, code);
}
+4
View File
@@ -0,0 +1,4 @@
bits 64
hello:
mov rax, 0xcafebabe