101 lines
2.9 KiB
C
101 lines
2.9 KiB
C
/*
|
|
* @author xamidev <xamidev@riseup.net>
|
|
* @brief PepperOS kernel shell
|
|
* @license GPL-3.0-only
|
|
*/
|
|
|
|
#include <io/term/term.h>
|
|
#include <config.h>
|
|
#include <io/kbd/ps2.h>
|
|
#include <string/string.h>
|
|
#include <stdint.h>
|
|
#include <kernel.h>
|
|
#include <time/date.h>
|
|
#include <mem/kheap.h>
|
|
|
|
__attribute__((noinline))
|
|
void smash_it()
|
|
{
|
|
char buf[16]; (void)buf;
|
|
for (size_t i=0; i<256; i++) {
|
|
buf[i] = (char)i;
|
|
}
|
|
}
|
|
|
|
/*
|
|
* pedicel_main - Kernel shell main function
|
|
* @arg: argument (optional)
|
|
*
|
|
* This is the entry point for the kernel shell process.
|
|
* It is used to start programs and to test different things
|
|
* on different real hardware easily.
|
|
*
|
|
* Named after the root part of the pepper.
|
|
*/
|
|
void pedicel_main(void* arg)
|
|
{
|
|
printf("Welcome to the kernel shell!\r\nType 'help' for a list of commands.\r\n");
|
|
|
|
for (;;) {
|
|
char input_buf[PEDICEL_INPUT_SIZE] = {0};
|
|
printf(PEDICEL_PROMPT);
|
|
keyboard_getline(input_buf, PEDICEL_INPUT_SIZE);
|
|
|
|
if (strncmp(input_buf, "help", 4) == 0) {
|
|
printf("\r\nYou are currently running the test kernel shell. This is not\r\n"
|
|
"a fully-fledged shell like you'd find in a complete operating system,\r\n"
|
|
"but rather a toy to play around in the meantime.\r\n\r\n"
|
|
"clear - clear the screen\r\n"
|
|
"panic - trigger a test panic\r\n"
|
|
"syscall - trigger int 0x80\r\n"
|
|
"pf - trigger a page fault\r\n"
|
|
"now - get current date\r\n"
|
|
"smash - smash the stack\r\n"
|
|
"mem - get used heap info\r\n");
|
|
continue;
|
|
}
|
|
|
|
if (strncmp(input_buf, "", 1) == 0) {
|
|
continue;
|
|
}
|
|
|
|
if (strncmp(input_buf, "clear", 5) == 0) {
|
|
printf("\x1b[2J\x1b[H");
|
|
continue;
|
|
}
|
|
|
|
if (strncmp(input_buf, "panic", 5) == 0) {
|
|
panic(NULL, "test panic");
|
|
}
|
|
|
|
if (strncmp(input_buf, "syscall", 7) == 0) {
|
|
__asm__ volatile("mov $0x00, %rdi");
|
|
__asm__ volatile("int $0x80");
|
|
continue;
|
|
}
|
|
|
|
if (strncmp(input_buf, "pf", 2) == 0) {
|
|
volatile uint64_t* fault = (uint64_t*)0xdeadbeef;
|
|
fault[0] = 1;
|
|
}
|
|
|
|
if (strncmp(input_buf, "now", 3) == 0) {
|
|
struct date now = date_now();
|
|
printf("Now is %02u:%02u:%02u on %u/%u/%u\r\n", now.hour, now.minute,
|
|
now.second, now.day, now.month, now.year);
|
|
continue;
|
|
}
|
|
|
|
if (strncmp(input_buf, "smash", 5) == 0) {
|
|
smash_it();
|
|
continue;
|
|
}
|
|
|
|
if (strncmp(input_buf, "mem", 3) == 0) {
|
|
kheap_info();
|
|
continue;
|
|
}
|
|
|
|
printf("%s: command not found\r\n", input_buf);
|
|
}
|
|
} |