mirror of
https://github.com/phil-opp/blog_os.git
synced 2025-12-16 14:27:49 +00:00
Compare commits
3 Commits
fe04fb8093
...
post-04-no
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
db307d89bc | ||
|
|
fe23af5b3e | ||
|
|
a3d58588a2 |
@@ -1,9 +1,11 @@
|
|||||||
[unstable]
|
[unstable]
|
||||||
build-std = ["core", "compiler_builtins", "alloc"]
|
# build-std = ["core", "compiler_builtins"]
|
||||||
build-std-features = ["compiler-builtins-mem"]
|
|
||||||
|
|
||||||
[build]
|
[build]
|
||||||
target = "x86_64-blog_os.json"
|
# target = "x86_64-blog_os.json"
|
||||||
|
|
||||||
[target.'cfg(target_os = "none")']
|
[target.'cfg(target_os = "none")']
|
||||||
runner = "bootimage runner"
|
runner = "cargo run --manifest-path disk_image/Cargo.toml --bin runner --quiet"
|
||||||
|
|
||||||
|
[alias]
|
||||||
|
bootimage = "run --manifest-path disk_image/Cargo.toml --bin disk_image --quiet"
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
name: Code
|
name: Build Code
|
||||||
|
|
||||||
on:
|
on:
|
||||||
push:
|
push:
|
||||||
@@ -16,7 +16,6 @@ jobs:
|
|||||||
check:
|
check:
|
||||||
name: Check
|
name: Check
|
||||||
strategy:
|
strategy:
|
||||||
fail-fast: false
|
|
||||||
matrix:
|
matrix:
|
||||||
platform: [
|
platform: [
|
||||||
ubuntu-latest,
|
ubuntu-latest,
|
||||||
@@ -42,7 +41,6 @@ jobs:
|
|||||||
test:
|
test:
|
||||||
name: Test
|
name: Test
|
||||||
strategy:
|
strategy:
|
||||||
fail-fast: false
|
|
||||||
matrix:
|
matrix:
|
||||||
platform: [
|
platform: [
|
||||||
ubuntu-latest,
|
ubuntu-latest,
|
||||||
@@ -78,10 +76,14 @@ jobs:
|
|||||||
HOMEBREW_NO_AUTO_UPDATE: 1
|
HOMEBREW_NO_AUTO_UPDATE: 1
|
||||||
HOMEBREW_NO_BOTTLE_SOURCE_FALLBACK: 1
|
HOMEBREW_NO_BOTTLE_SOURCE_FALLBACK: 1
|
||||||
HOMEBREW_NO_INSTALL_CLEANUP: 1
|
HOMEBREW_NO_INSTALL_CLEANUP: 1
|
||||||
- name: Install QEMU (Windows)
|
- name: Install Scoop (Windows)
|
||||||
run: |
|
run: |
|
||||||
choco install qemu --version 2021.5.5
|
Invoke-Expression (New-Object System.Net.WebClient).DownloadString('https://get.scoop.sh')
|
||||||
echo "$Env:Programfiles\qemu" | Out-File -FilePath $env:GITHUB_PATH -Encoding utf8 -Append
|
echo ::add-path::$HOME\scoop\shims
|
||||||
|
if: runner.os == 'Windows'
|
||||||
|
shell: pwsh
|
||||||
|
- name: Install QEMU (Windows)
|
||||||
|
run: scoop install qemu
|
||||||
if: runner.os == 'Windows'
|
if: runner.os == 'Windows'
|
||||||
shell: pwsh
|
shell: pwsh
|
||||||
- name: "Print QEMU Version"
|
- name: "Print QEMU Version"
|
||||||
241
Cargo.lock
generated
241
Cargo.lock
generated
@@ -1,30 +1,22 @@
|
|||||||
# This file is automatically @generated by Cargo.
|
# This file is automatically @generated by Cargo.
|
||||||
# It is not intended for manual editing.
|
# It is not intended for manual editing.
|
||||||
version = 4
|
|
||||||
|
|
||||||
[[package]]
|
[[package]]
|
||||||
name = "autocfg"
|
name = "anyhow"
|
||||||
version = "1.5.0"
|
version = "1.0.32"
|
||||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||||
checksum = "c08606f8c3cbf4ce6ec8e28fb0014a2c086708fe954eaa885384a6165172e7e8"
|
checksum = "6b602bfe940d21c130f3895acd65221e8a61270debe89d628b9cb4e3ccb8569b"
|
||||||
|
|
||||||
[[package]]
|
[[package]]
|
||||||
name = "bit_field"
|
name = "bit_field"
|
||||||
version = "0.10.2"
|
version = "0.9.0"
|
||||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||||
checksum = "dc827186963e592360843fb5ba4b973e145841266c1357f7180c43526f2e5b61"
|
checksum = "ed8765909f9009617974ab6b7d332625b320b33c326b1e9321382ef1999b5d56"
|
||||||
|
|
||||||
[[package]]
|
[[package]]
|
||||||
name = "bitflags"
|
name = "bitflags"
|
||||||
version = "1.3.2"
|
version = "1.2.1"
|
||||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||||
checksum = "bef38d45163c2f1dde094a7dfd33ccf595c92905c8f8f4fdc18d06fb1037718a"
|
checksum = "cf1de2fe8c75bc145a2f577add951f8134889b4795d47466a54a5c846d691693"
|
||||||
|
|
||||||
[[package]]
|
|
||||||
name = "bitflags"
|
|
||||||
version = "2.9.2"
|
|
||||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
|
||||||
checksum = "6a65b545ab31d687cff52899d4890855fec459eb6afe0da6417b8a18da87aa29"
|
|
||||||
|
|
||||||
[[package]]
|
[[package]]
|
||||||
name = "blog_os"
|
name = "blog_os"
|
||||||
@@ -32,75 +24,168 @@ version = "0.1.0"
|
|||||||
dependencies = [
|
dependencies = [
|
||||||
"bootloader",
|
"bootloader",
|
||||||
"lazy_static",
|
"lazy_static",
|
||||||
"linked_list_allocator",
|
"rlibc",
|
||||||
"pc-keyboard",
|
"spin",
|
||||||
"pic8259",
|
|
||||||
"spin 0.5.2",
|
|
||||||
"uart_16550",
|
"uart_16550",
|
||||||
"volatile 0.2.7",
|
"volatile",
|
||||||
"x86_64",
|
"x86_64",
|
||||||
]
|
]
|
||||||
|
|
||||||
[[package]]
|
[[package]]
|
||||||
name = "bootloader"
|
name = "bootloader"
|
||||||
version = "0.9.32"
|
version = "0.9.8"
|
||||||
|
|
||||||
|
[[package]]
|
||||||
|
name = "bootloader-locator"
|
||||||
|
version = "0.0.3"
|
||||||
|
dependencies = [
|
||||||
|
"cargo_metadata",
|
||||||
|
"locate-cargo-manifest",
|
||||||
|
"thiserror",
|
||||||
|
]
|
||||||
|
|
||||||
|
[[package]]
|
||||||
|
name = "cargo_metadata"
|
||||||
|
version = "0.11.1"
|
||||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||||
checksum = "1ea119c3ed05625c179e09d17d0914570a3753ca09c890a73d98f6b72aea00d2"
|
checksum = "89fec17b16f1ac67908af82e47d0a90a7afd0e1827b181cd77504323d3263d35"
|
||||||
|
dependencies = [
|
||||||
|
"semver",
|
||||||
|
"serde",
|
||||||
|
"serde_json",
|
||||||
|
]
|
||||||
|
|
||||||
|
[[package]]
|
||||||
|
name = "disk_image"
|
||||||
|
version = "0.1.0"
|
||||||
|
dependencies = [
|
||||||
|
"anyhow",
|
||||||
|
"bootloader-locator",
|
||||||
|
"locate-cargo-manifest",
|
||||||
|
"runner-utils",
|
||||||
|
]
|
||||||
|
|
||||||
|
[[package]]
|
||||||
|
name = "itoa"
|
||||||
|
version = "0.4.6"
|
||||||
|
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||||
|
checksum = "dc6f3ad7b9d11a0c00842ff8de1b60ee58661048eb8049ed33c73594f359d7e6"
|
||||||
|
|
||||||
|
[[package]]
|
||||||
|
name = "json"
|
||||||
|
version = "0.12.4"
|
||||||
|
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||||
|
checksum = "078e285eafdfb6c4b434e0d31e8cfcb5115b651496faca5749b88fafd4f23bfd"
|
||||||
|
|
||||||
[[package]]
|
[[package]]
|
||||||
name = "lazy_static"
|
name = "lazy_static"
|
||||||
version = "1.5.0"
|
version = "1.4.0"
|
||||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||||
checksum = "bbd2bcb4c963f2ddae06a2efc7e9f3591312473c50c6685e1f298068316e66fe"
|
checksum = "e2abad23fbc42b3700f2f279844dc832adb2b2eb069b2df918f455c4e18cc646"
|
||||||
dependencies = [
|
dependencies = [
|
||||||
"spin 0.9.8",
|
"spin",
|
||||||
]
|
]
|
||||||
|
|
||||||
[[package]]
|
[[package]]
|
||||||
name = "linked_list_allocator"
|
name = "libc"
|
||||||
version = "0.9.1"
|
version = "0.2.76"
|
||||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||||
checksum = "549ce1740e46b291953c4340adcd74c59bcf4308f4cac050fd33ba91b7168f4a"
|
checksum = "755456fae044e6fa1ebbbd1b3e902ae19e73097ed4ed87bb79934a867c007bc3"
|
||||||
|
|
||||||
|
[[package]]
|
||||||
|
name = "locate-cargo-manifest"
|
||||||
|
version = "0.2.0"
|
||||||
|
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||||
|
checksum = "d264d672563b20c0a2eb9045f4072e1352002f6c316cc0677bed8b767e17b7e1"
|
||||||
dependencies = [
|
dependencies = [
|
||||||
"spinning_top",
|
"json",
|
||||||
|
"thiserror",
|
||||||
]
|
]
|
||||||
|
|
||||||
[[package]]
|
[[package]]
|
||||||
name = "lock_api"
|
name = "proc-macro2"
|
||||||
version = "0.4.13"
|
version = "1.0.19"
|
||||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||||
checksum = "96936507f153605bddfcda068dd804796c84324ed2510809e5b2a624c81da765"
|
checksum = "04f5f085b5d71e2188cb8271e5da0161ad52c3f227a661a3c135fdf28e258b12"
|
||||||
dependencies = [
|
dependencies = [
|
||||||
"autocfg",
|
"unicode-xid",
|
||||||
"scopeguard",
|
|
||||||
]
|
]
|
||||||
|
|
||||||
[[package]]
|
[[package]]
|
||||||
name = "pc-keyboard"
|
name = "quote"
|
||||||
|
version = "1.0.7"
|
||||||
|
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||||
|
checksum = "aa563d17ecb180e500da1cfd2b028310ac758de548efdd203e18f283af693f37"
|
||||||
|
dependencies = [
|
||||||
|
"proc-macro2",
|
||||||
|
]
|
||||||
|
|
||||||
|
[[package]]
|
||||||
|
name = "rlibc"
|
||||||
|
version = "1.0.0"
|
||||||
|
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||||
|
checksum = "fc874b127765f014d792f16763a81245ab80500e2ad921ed4ee9e82481ee08fe"
|
||||||
|
|
||||||
|
[[package]]
|
||||||
|
name = "runner-utils"
|
||||||
|
version = "0.0.2"
|
||||||
|
dependencies = [
|
||||||
|
"thiserror",
|
||||||
|
"wait-timeout",
|
||||||
|
]
|
||||||
|
|
||||||
|
[[package]]
|
||||||
|
name = "ryu"
|
||||||
|
version = "1.0.5"
|
||||||
|
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||||
|
checksum = "71d301d4193d031abdd79ff7e3dd721168a9572ef3fe51a1517aba235bd8f86e"
|
||||||
|
|
||||||
|
[[package]]
|
||||||
|
name = "semver"
|
||||||
|
version = "0.10.0"
|
||||||
|
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||||
|
checksum = "394cec28fa623e00903caf7ba4fa6fb9a0e260280bb8cdbbba029611108a0190"
|
||||||
|
dependencies = [
|
||||||
|
"semver-parser",
|
||||||
|
"serde",
|
||||||
|
]
|
||||||
|
|
||||||
|
[[package]]
|
||||||
|
name = "semver-parser"
|
||||||
version = "0.7.0"
|
version = "0.7.0"
|
||||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||||
checksum = "ed089a1fbffe3337a1a345501c981f1eb1e47e69de5a40e852433e12953c3174"
|
checksum = "388a1df253eca08550bef6c72392cfe7c30914bf41df5269b68cbd6ff8f570a3"
|
||||||
|
|
||||||
[[package]]
|
[[package]]
|
||||||
name = "pic8259"
|
name = "serde"
|
||||||
version = "0.10.4"
|
version = "1.0.115"
|
||||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||||
checksum = "cb844b5b01db1e0b17938685738f113bfc903846f18932b378bc0eabfa40e194"
|
checksum = "e54c9a88f2da7238af84b5101443f0c0d0a3bbdc455e34a5c9497b1903ed55d5"
|
||||||
dependencies = [
|
dependencies = [
|
||||||
"x86_64",
|
"serde_derive",
|
||||||
]
|
]
|
||||||
|
|
||||||
[[package]]
|
[[package]]
|
||||||
name = "rustversion"
|
name = "serde_derive"
|
||||||
version = "1.0.22"
|
version = "1.0.115"
|
||||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||||
checksum = "b39cdef0fa800fc44525c84ccb54a029961a8215f9619753635a9c0d2538d46d"
|
checksum = "609feed1d0a73cc36a0182a840a9b37b4a82f0b1150369f0536a9e3f2a31dc48"
|
||||||
|
dependencies = [
|
||||||
|
"proc-macro2",
|
||||||
|
"quote",
|
||||||
|
"syn",
|
||||||
|
]
|
||||||
|
|
||||||
[[package]]
|
[[package]]
|
||||||
name = "scopeguard"
|
name = "serde_json"
|
||||||
version = "1.2.0"
|
version = "1.0.57"
|
||||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||||
checksum = "94143f37725109f92c262ed2cf5e59bce7498c01bcc1502d7b9afe439a4e9f49"
|
checksum = "164eacbdb13512ec2745fb09d51fd5b22b0d65ed294a1dcf7285a360c80a675c"
|
||||||
|
dependencies = [
|
||||||
|
"itoa",
|
||||||
|
"ryu",
|
||||||
|
"serde",
|
||||||
|
]
|
||||||
|
|
||||||
[[package]]
|
[[package]]
|
||||||
name = "spin"
|
name = "spin"
|
||||||
@@ -109,51 +194,73 @@ source = "registry+https://github.com/rust-lang/crates.io-index"
|
|||||||
checksum = "6e63cff320ae2c57904679ba7cb63280a3dc4613885beafb148ee7bf9aa9042d"
|
checksum = "6e63cff320ae2c57904679ba7cb63280a3dc4613885beafb148ee7bf9aa9042d"
|
||||||
|
|
||||||
[[package]]
|
[[package]]
|
||||||
name = "spin"
|
name = "syn"
|
||||||
version = "0.9.8"
|
version = "1.0.39"
|
||||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||||
checksum = "6980e8d7511241f8acf4aebddbb1ff938df5eebe98691418c4468d0b72a96a67"
|
checksum = "891d8d6567fe7c7f8835a3a98af4208f3846fba258c1bc3c31d6e506239f11f9"
|
||||||
|
dependencies = [
|
||||||
|
"proc-macro2",
|
||||||
|
"quote",
|
||||||
|
"unicode-xid",
|
||||||
|
]
|
||||||
|
|
||||||
[[package]]
|
[[package]]
|
||||||
name = "spinning_top"
|
name = "thiserror"
|
||||||
version = "0.2.5"
|
version = "1.0.20"
|
||||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||||
checksum = "5b9eb1a2f4c41445a3a0ff9abc5221c5fcd28e1f13cd7c0397706f9ac938ddb0"
|
checksum = "7dfdd070ccd8ccb78f4ad66bf1982dc37f620ef696c6b5028fe2ed83dd3d0d08"
|
||||||
dependencies = [
|
dependencies = [
|
||||||
"lock_api",
|
"thiserror-impl",
|
||||||
|
]
|
||||||
|
|
||||||
|
[[package]]
|
||||||
|
name = "thiserror-impl"
|
||||||
|
version = "1.0.20"
|
||||||
|
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||||
|
checksum = "bd80fc12f73063ac132ac92aceea36734f04a1d93c1240c6944e23a3b8841793"
|
||||||
|
dependencies = [
|
||||||
|
"proc-macro2",
|
||||||
|
"quote",
|
||||||
|
"syn",
|
||||||
]
|
]
|
||||||
|
|
||||||
[[package]]
|
[[package]]
|
||||||
name = "uart_16550"
|
name = "uart_16550"
|
||||||
version = "0.2.19"
|
version = "0.2.7"
|
||||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||||
checksum = "614ff2a87880d4bd4374722268598a970bbad05ced8bf630439417347254ab2e"
|
checksum = "e58fc40dc1712664fc9b0a7bd8ca2f21ab49960924fb245a80a05e1e92f3dfe9"
|
||||||
dependencies = [
|
dependencies = [
|
||||||
"bitflags 1.3.2",
|
"bitflags",
|
||||||
"rustversion",
|
|
||||||
"x86_64",
|
"x86_64",
|
||||||
]
|
]
|
||||||
|
|
||||||
[[package]]
|
[[package]]
|
||||||
name = "volatile"
|
name = "unicode-xid"
|
||||||
version = "0.2.7"
|
version = "0.2.1"
|
||||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||||
checksum = "f6b06ad3ed06fef1713569d547cdbdb439eafed76341820fb0e0344f29a41945"
|
checksum = "f7fe0bb3479651439c9112f72b6c505038574c9fbb575ed1bf3b797fa39dd564"
|
||||||
|
|
||||||
[[package]]
|
[[package]]
|
||||||
name = "volatile"
|
name = "volatile"
|
||||||
version = "0.4.6"
|
version = "0.4.0-alpha.00"
|
||||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||||
checksum = "442887c63f2c839b346c192d047a7c87e73d0689c9157b00b53dcc27dd5ea793"
|
checksum = "9a1da81878b88e2b57ca8b3d62c0c3e9979d9531cfe0e6d1c094174d8458eac6"
|
||||||
|
|
||||||
|
[[package]]
|
||||||
|
name = "wait-timeout"
|
||||||
|
version = "0.2.0"
|
||||||
|
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||||
|
checksum = "9f200f5b12eb75f8c1ed65abd4b2db8a6e1b138a20de009dacee265a2498f3f6"
|
||||||
|
dependencies = [
|
||||||
|
"libc",
|
||||||
|
]
|
||||||
|
|
||||||
[[package]]
|
[[package]]
|
||||||
name = "x86_64"
|
name = "x86_64"
|
||||||
version = "0.14.13"
|
version = "0.11.0"
|
||||||
source = "registry+https://github.com/rust-lang/crates.io-index"
|
source = "registry+https://github.com/rust-lang/crates.io-index"
|
||||||
checksum = "c101112411baafbb4bf8d33e4c4a80ab5b02d74d2612331c61e8192fc9710491"
|
checksum = "365de37eb7c6da582cbb510dd0f3f1235d24ff6309a8a96e8a9909cc9bfd608f"
|
||||||
dependencies = [
|
dependencies = [
|
||||||
"bit_field",
|
"bit_field",
|
||||||
"bitflags 2.9.2",
|
"bitflags",
|
||||||
"rustversion",
|
|
||||||
"volatile 0.4.6",
|
|
||||||
]
|
]
|
||||||
|
|||||||
36
Cargo.toml
36
Cargo.toml
@@ -2,43 +2,33 @@
|
|||||||
name = "blog_os"
|
name = "blog_os"
|
||||||
version = "0.1.0"
|
version = "0.1.0"
|
||||||
authors = ["Philipp Oppermann <dev@phil-opp.com>"]
|
authors = ["Philipp Oppermann <dev@phil-opp.com>"]
|
||||||
edition = "2024"
|
edition = "2018"
|
||||||
|
|
||||||
|
[workspace]
|
||||||
|
members = [
|
||||||
|
"disk_image",
|
||||||
|
]
|
||||||
|
|
||||||
[[test]]
|
[[test]]
|
||||||
name = "should_panic"
|
name = "should_panic"
|
||||||
harness = false
|
harness = false
|
||||||
|
|
||||||
[[test]]
|
|
||||||
name = "stack_overflow"
|
|
||||||
harness = false
|
|
||||||
|
|
||||||
[dependencies]
|
[dependencies]
|
||||||
bootloader = { version = "0.9", features = ["map_physical_memory"] }
|
bootloader = { path = "../../uefi-test"}
|
||||||
volatile = "0.2.6"
|
rlibc = "1.0.0"
|
||||||
|
volatile = "0.4.0-alpha"
|
||||||
spin = "0.5.2"
|
spin = "0.5.2"
|
||||||
x86_64 = "0.14.2"
|
x86_64 = "0.11.0"
|
||||||
uart_16550 = "0.2.0"
|
uart_16550 = "0.2.0"
|
||||||
pic8259 = "0.10.1"
|
|
||||||
pc-keyboard = "0.7.0"
|
|
||||||
linked_list_allocator = "0.9.0"
|
|
||||||
|
|
||||||
[dependencies.lazy_static]
|
[dependencies.lazy_static]
|
||||||
version = "1.0"
|
version = "1.0"
|
||||||
features = ["spin_no_std"]
|
features = ["spin_no_std"]
|
||||||
|
|
||||||
[[bin]]
|
|
||||||
name = "blog_os"
|
|
||||||
test = true
|
|
||||||
bench = false
|
|
||||||
|
|
||||||
|
|
||||||
[package.metadata.bootimage]
|
[package.metadata.bootimage]
|
||||||
test-args = [
|
test-args = [
|
||||||
"-device",
|
"-device", "isa-debug-exit,iobase=0xf4,iosize=0x04", "-serial", "stdio",
|
||||||
"isa-debug-exit,iobase=0xf4,iosize=0x04",
|
"-display", "none"
|
||||||
"-serial",
|
|
||||||
"stdio",
|
|
||||||
"-display",
|
|
||||||
"none",
|
|
||||||
]
|
]
|
||||||
test-success-exit-code = 33 # (0x10 << 1) | 1
|
test-success-exit-code = 33 # (0x10 << 1) | 1
|
||||||
|
|||||||
@@ -1,10 +1,10 @@
|
|||||||
# Blog OS (Allocator Designs)
|
# Blog OS (Testing)
|
||||||
|
|
||||||
[](https://github.com/phil-opp/blog_os/actions?query=workflow%3A%22Code%22+branch%3Apost-11)
|
[](https://github.com/phil-opp/blog_os/actions?query=workflow%3A%22Build+Code%22+branch%3Apost-04)
|
||||||
|
|
||||||
This repository contains the source code for the [Allocator Designs][post] post of the [Writing an OS in Rust](https://os.phil-opp.com) series.
|
This repository contains the source code for the [Testing][post] post of the [Writing an OS in Rust](https://os.phil-opp.com) series.
|
||||||
|
|
||||||
[post]: https://os.phil-opp.com/allocator-designs/
|
[post]: https://os.phil-opp.com/testing/
|
||||||
|
|
||||||
**Check out the [master branch](https://github.com/phil-opp/blog_os) for more information.**
|
**Check out the [master branch](https://github.com/phil-opp/blog_os) for more information.**
|
||||||
|
|
||||||
|
|||||||
13
disk_image/Cargo.toml
Normal file
13
disk_image/Cargo.toml
Normal file
@@ -0,0 +1,13 @@
|
|||||||
|
[package]
|
||||||
|
name = "disk_image"
|
||||||
|
version = "0.1.0"
|
||||||
|
authors = ["Philipp Oppermann <dev@phil-opp.com>"]
|
||||||
|
edition = "2018"
|
||||||
|
|
||||||
|
# See more keys and their definitions at https://doc.rust-lang.org/cargo/reference/manifest.html
|
||||||
|
|
||||||
|
[dependencies]
|
||||||
|
anyhow = "1.0.32"
|
||||||
|
bootloader-locator = {path = "../../../bootloader-locator"}
|
||||||
|
runner-utils = { path = "../../../runner-utils/" }
|
||||||
|
locate-cargo-manifest = "0.2.0"
|
||||||
57
disk_image/src/bin/runner.rs
Normal file
57
disk_image/src/bin/runner.rs
Normal file
@@ -0,0 +1,57 @@
|
|||||||
|
use anyhow::anyhow;
|
||||||
|
use std::{
|
||||||
|
path::PathBuf,
|
||||||
|
process::{Command, ExitStatus},
|
||||||
|
time::Duration,
|
||||||
|
};
|
||||||
|
|
||||||
|
const RUN_ARGS: &[&str] = &["-d", "int", "--no-reboot", "-s"];
|
||||||
|
const TEST_ARGS: &[&str] = &[
|
||||||
|
"-device",
|
||||||
|
"isa-debug-exit,iobase=0xf4,iosize=0x04",
|
||||||
|
"-serial",
|
||||||
|
"stdio",
|
||||||
|
"-display",
|
||||||
|
"none",
|
||||||
|
"--no-reboot",
|
||||||
|
];
|
||||||
|
const TEST_TIMEOUT_SECS: u64 = 10;
|
||||||
|
|
||||||
|
fn main() -> anyhow::Result<()> {
|
||||||
|
let kernel_binary_path = {
|
||||||
|
let path = PathBuf::from(std::env::args().nth(1).unwrap());
|
||||||
|
path.canonicalize()?
|
||||||
|
};
|
||||||
|
|
||||||
|
let disk_image = disk_image::create_disk_image(&kernel_binary_path, true)?;
|
||||||
|
|
||||||
|
let mut run_cmd = Command::new("qemu-system-x86_64");
|
||||||
|
run_cmd
|
||||||
|
.arg("-drive")
|
||||||
|
.arg(format!("format=raw,file={}", disk_image.display()));
|
||||||
|
|
||||||
|
let binary_kind = runner_utils::binary_kind(&kernel_binary_path);
|
||||||
|
if binary_kind.is_test() {
|
||||||
|
run_cmd.args(TEST_ARGS);
|
||||||
|
|
||||||
|
let exit_status = run_test_command(run_cmd)?;
|
||||||
|
match exit_status.code() {
|
||||||
|
Some(33) => {} // success
|
||||||
|
other => return Err(anyhow!("Test failed (exit code: {:?})", other)),
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
run_cmd.args(RUN_ARGS);
|
||||||
|
|
||||||
|
let exit_status = run_cmd.status()?;
|
||||||
|
if !exit_status.success() {
|
||||||
|
std::process::exit(exit_status.code().unwrap_or(1));
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
Ok(())
|
||||||
|
}
|
||||||
|
|
||||||
|
fn run_test_command(mut cmd: Command) -> anyhow::Result<ExitStatus> {
|
||||||
|
let status = runner_utils::run_with_timeout(&mut cmd, Duration::from_secs(TEST_TIMEOUT_SECS))?;
|
||||||
|
Ok(status)
|
||||||
|
}
|
||||||
45
disk_image/src/lib.rs
Normal file
45
disk_image/src/lib.rs
Normal file
@@ -0,0 +1,45 @@
|
|||||||
|
use anyhow::anyhow;
|
||||||
|
use std::{
|
||||||
|
path::{Path, PathBuf},
|
||||||
|
process::Command,
|
||||||
|
};
|
||||||
|
|
||||||
|
pub fn create_disk_image(kernel_binary_path: &Path, bios_only: bool) -> anyhow::Result<PathBuf> {
|
||||||
|
let bootloader_info = bootloader_locator::locate_bootloader()?;
|
||||||
|
let kernel_manifest_path = &bootloader_info.kernel_manifest_path;
|
||||||
|
|
||||||
|
let mut build_cmd = Command::new(env!("CARGO"));
|
||||||
|
build_cmd.current_dir(bootloader_info.package.manifest_path.parent().unwrap());
|
||||||
|
build_cmd.arg("builder");
|
||||||
|
build_cmd
|
||||||
|
.arg("--kernel-manifest")
|
||||||
|
.arg(&kernel_manifest_path);
|
||||||
|
build_cmd.arg("--kernel-binary").arg(&kernel_binary_path);
|
||||||
|
build_cmd
|
||||||
|
.arg("--target-dir")
|
||||||
|
.arg(kernel_manifest_path.parent().unwrap().join("target"));
|
||||||
|
build_cmd
|
||||||
|
.arg("--out-dir")
|
||||||
|
.arg(kernel_binary_path.parent().unwrap());
|
||||||
|
build_cmd.arg("--quiet");
|
||||||
|
if bios_only {
|
||||||
|
build_cmd.arg("--firmware").arg("bios");
|
||||||
|
}
|
||||||
|
|
||||||
|
if !build_cmd.status()?.success() {
|
||||||
|
return Err(anyhow!("build failed"));
|
||||||
|
}
|
||||||
|
|
||||||
|
let kernel_binary_name = kernel_binary_path.file_name().unwrap().to_str().unwrap();
|
||||||
|
let disk_image = kernel_binary_path
|
||||||
|
.parent()
|
||||||
|
.unwrap()
|
||||||
|
.join(format!("bootimage-bios-{}.bin", kernel_binary_name));
|
||||||
|
if !disk_image.exists() {
|
||||||
|
return Err(anyhow!(
|
||||||
|
"Disk image does not exist at {} after bootloader build",
|
||||||
|
disk_image.display()
|
||||||
|
));
|
||||||
|
}
|
||||||
|
Ok(disk_image)
|
||||||
|
}
|
||||||
40
disk_image/src/main.rs
Normal file
40
disk_image/src/main.rs
Normal file
@@ -0,0 +1,40 @@
|
|||||||
|
use anyhow::anyhow;
|
||||||
|
use std::process::Command;
|
||||||
|
|
||||||
|
const TARGET_NAME: &str = "x86_64-blog_os";
|
||||||
|
const KERNEL_BINARIES: &[&str] = &["blog_os"];
|
||||||
|
|
||||||
|
fn main() -> anyhow::Result<()> {
|
||||||
|
// build all binaries
|
||||||
|
let mut build_cmd = Command::new(env!("CARGO"));
|
||||||
|
build_cmd.arg("build");
|
||||||
|
build_cmd.arg("--release");
|
||||||
|
build_cmd.arg("-Zbuild-std=core");
|
||||||
|
build_cmd
|
||||||
|
.arg("--target")
|
||||||
|
.arg(format!("{}.json", TARGET_NAME));
|
||||||
|
if !build_cmd.status()?.success() {
|
||||||
|
return Err(anyhow!("build failed"));
|
||||||
|
};
|
||||||
|
|
||||||
|
let kernel_manifest = locate_cargo_manifest::locate_manifest()?;
|
||||||
|
let target_dir_root = kernel_manifest.parent().unwrap().join("target");
|
||||||
|
let target_dir = target_dir_root.join(TARGET_NAME).join("release");
|
||||||
|
|
||||||
|
for binary_name in KERNEL_BINARIES {
|
||||||
|
let binary_path = {
|
||||||
|
let path = target_dir.join(binary_name);
|
||||||
|
path.canonicalize()?
|
||||||
|
};
|
||||||
|
|
||||||
|
let disk_image = disk_image::create_disk_image(&binary_path, false)?;
|
||||||
|
|
||||||
|
println!(
|
||||||
|
"Created disk image for binary {} at {}",
|
||||||
|
binary_name,
|
||||||
|
disk_image.display()
|
||||||
|
);
|
||||||
|
}
|
||||||
|
|
||||||
|
Ok(())
|
||||||
|
}
|
||||||
@@ -1,82 +0,0 @@
|
|||||||
use alloc::alloc::{GlobalAlloc, Layout};
|
|
||||||
use core::ptr::null_mut;
|
|
||||||
use fixed_size_block::FixedSizeBlockAllocator;
|
|
||||||
use x86_64::{
|
|
||||||
VirtAddr,
|
|
||||||
structures::paging::{
|
|
||||||
FrameAllocator, Mapper, Page, PageTableFlags, Size4KiB, mapper::MapToError,
|
|
||||||
},
|
|
||||||
};
|
|
||||||
|
|
||||||
pub mod bump;
|
|
||||||
pub mod fixed_size_block;
|
|
||||||
pub mod linked_list;
|
|
||||||
|
|
||||||
pub const HEAP_START: usize = 0x_4444_4444_0000;
|
|
||||||
pub const HEAP_SIZE: usize = 100 * 1024; // 100 KiB
|
|
||||||
|
|
||||||
#[global_allocator]
|
|
||||||
static ALLOCATOR: Locked<FixedSizeBlockAllocator> = Locked::new(FixedSizeBlockAllocator::new());
|
|
||||||
|
|
||||||
pub fn init_heap(
|
|
||||||
mapper: &mut impl Mapper<Size4KiB>,
|
|
||||||
frame_allocator: &mut impl FrameAllocator<Size4KiB>,
|
|
||||||
) -> Result<(), MapToError<Size4KiB>> {
|
|
||||||
let page_range = {
|
|
||||||
let heap_start = VirtAddr::new(HEAP_START as u64);
|
|
||||||
let heap_end = heap_start + HEAP_SIZE - 1u64;
|
|
||||||
let heap_start_page = Page::containing_address(heap_start);
|
|
||||||
let heap_end_page = Page::containing_address(heap_end);
|
|
||||||
Page::range_inclusive(heap_start_page, heap_end_page)
|
|
||||||
};
|
|
||||||
|
|
||||||
for page in page_range {
|
|
||||||
let frame = frame_allocator
|
|
||||||
.allocate_frame()
|
|
||||||
.ok_or(MapToError::FrameAllocationFailed)?;
|
|
||||||
let flags = PageTableFlags::PRESENT | PageTableFlags::WRITABLE;
|
|
||||||
unsafe { mapper.map_to(page, frame, flags, frame_allocator)?.flush() };
|
|
||||||
}
|
|
||||||
|
|
||||||
unsafe {
|
|
||||||
ALLOCATOR.lock().init(HEAP_START, HEAP_SIZE);
|
|
||||||
}
|
|
||||||
|
|
||||||
Ok(())
|
|
||||||
}
|
|
||||||
|
|
||||||
pub struct Dummy;
|
|
||||||
|
|
||||||
unsafe impl GlobalAlloc for Dummy {
|
|
||||||
unsafe fn alloc(&self, _layout: Layout) -> *mut u8 {
|
|
||||||
null_mut()
|
|
||||||
}
|
|
||||||
|
|
||||||
unsafe fn dealloc(&self, _ptr: *mut u8, _layout: Layout) {
|
|
||||||
panic!("dealloc should be never called")
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/// A wrapper around spin::Mutex to permit trait implementations.
|
|
||||||
pub struct Locked<A> {
|
|
||||||
inner: spin::Mutex<A>,
|
|
||||||
}
|
|
||||||
|
|
||||||
impl<A> Locked<A> {
|
|
||||||
pub const fn new(inner: A) -> Self {
|
|
||||||
Locked {
|
|
||||||
inner: spin::Mutex::new(inner),
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn lock(&self) -> spin::MutexGuard<A> {
|
|
||||||
self.inner.lock()
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/// Align the given address `addr` upwards to alignment `align`.
|
|
||||||
///
|
|
||||||
/// Requires that `align` is a power of two.
|
|
||||||
fn align_up(addr: usize, align: usize) -> usize {
|
|
||||||
(addr + align - 1) & !(align - 1)
|
|
||||||
}
|
|
||||||
@@ -1,61 +0,0 @@
|
|||||||
use super::{Locked, align_up};
|
|
||||||
use alloc::alloc::{GlobalAlloc, Layout};
|
|
||||||
use core::ptr;
|
|
||||||
|
|
||||||
pub struct BumpAllocator {
|
|
||||||
heap_start: usize,
|
|
||||||
heap_end: usize,
|
|
||||||
next: usize,
|
|
||||||
allocations: usize,
|
|
||||||
}
|
|
||||||
|
|
||||||
impl BumpAllocator {
|
|
||||||
/// Creates a new empty bump allocator.
|
|
||||||
pub const fn new() -> Self {
|
|
||||||
BumpAllocator {
|
|
||||||
heap_start: 0,
|
|
||||||
heap_end: 0,
|
|
||||||
next: 0,
|
|
||||||
allocations: 0,
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/// Initializes the bump allocator with the given heap bounds.
|
|
||||||
///
|
|
||||||
/// This method is unsafe because the caller must ensure that the given
|
|
||||||
/// memory range is unused. Also, this method must be called only once.
|
|
||||||
pub unsafe fn init(&mut self, heap_start: usize, heap_size: usize) {
|
|
||||||
self.heap_start = heap_start;
|
|
||||||
self.heap_end = heap_start.saturating_add(heap_size);
|
|
||||||
self.next = heap_start;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
unsafe impl GlobalAlloc for Locked<BumpAllocator> {
|
|
||||||
unsafe fn alloc(&self, layout: Layout) -> *mut u8 {
|
|
||||||
let mut bump = self.lock(); // get a mutable reference
|
|
||||||
|
|
||||||
let alloc_start = align_up(bump.next, layout.align());
|
|
||||||
let alloc_end = match alloc_start.checked_add(layout.size()) {
|
|
||||||
Some(end) => end,
|
|
||||||
None => return ptr::null_mut(),
|
|
||||||
};
|
|
||||||
|
|
||||||
if alloc_end > bump.heap_end {
|
|
||||||
ptr::null_mut() // out of memory
|
|
||||||
} else {
|
|
||||||
bump.next = alloc_end;
|
|
||||||
bump.allocations += 1;
|
|
||||||
alloc_start as *mut u8
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
unsafe fn dealloc(&self, _ptr: *mut u8, _layout: Layout) {
|
|
||||||
let mut bump = self.lock(); // get a mutable reference
|
|
||||||
|
|
||||||
bump.allocations -= 1;
|
|
||||||
if bump.allocations == 0 {
|
|
||||||
bump.next = bump.heap_start;
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@@ -1,109 +0,0 @@
|
|||||||
use super::Locked;
|
|
||||||
use alloc::alloc::{GlobalAlloc, Layout};
|
|
||||||
use core::{
|
|
||||||
mem,
|
|
||||||
ptr::{self, NonNull},
|
|
||||||
};
|
|
||||||
|
|
||||||
/// The block sizes to use.
|
|
||||||
///
|
|
||||||
/// The sizes must each be power of 2 because they are also used as
|
|
||||||
/// the block alignment (alignments must be always powers of 2).
|
|
||||||
const BLOCK_SIZES: &[usize] = &[8, 16, 32, 64, 128, 256, 512, 1024, 2048];
|
|
||||||
|
|
||||||
/// Choose an appropriate block size for the given layout.
|
|
||||||
///
|
|
||||||
/// Returns an index into the `BLOCK_SIZES` array.
|
|
||||||
fn list_index(layout: &Layout) -> Option<usize> {
|
|
||||||
let required_block_size = layout.size().max(layout.align());
|
|
||||||
BLOCK_SIZES.iter().position(|&s| s >= required_block_size)
|
|
||||||
}
|
|
||||||
|
|
||||||
struct ListNode {
|
|
||||||
next: Option<&'static mut ListNode>,
|
|
||||||
}
|
|
||||||
|
|
||||||
pub struct FixedSizeBlockAllocator {
|
|
||||||
list_heads: [Option<&'static mut ListNode>; BLOCK_SIZES.len()],
|
|
||||||
fallback_allocator: linked_list_allocator::Heap,
|
|
||||||
}
|
|
||||||
|
|
||||||
impl FixedSizeBlockAllocator {
|
|
||||||
/// Creates an empty FixedSizeBlockAllocator.
|
|
||||||
pub const fn new() -> Self {
|
|
||||||
const EMPTY: Option<&'static mut ListNode> = None;
|
|
||||||
FixedSizeBlockAllocator {
|
|
||||||
list_heads: [EMPTY; BLOCK_SIZES.len()],
|
|
||||||
fallback_allocator: linked_list_allocator::Heap::empty(),
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/// Initialize the allocator with the given heap bounds.
|
|
||||||
///
|
|
||||||
/// This function is unsafe because the caller must guarantee that the given
|
|
||||||
/// heap bounds are valid and that the heap is unused. This method must be
|
|
||||||
/// called only once.
|
|
||||||
pub unsafe fn init(&mut self, heap_start: usize, heap_size: usize) {
|
|
||||||
unsafe {
|
|
||||||
self.fallback_allocator.init(heap_start, heap_size);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/// Allocates using the fallback allocator.
|
|
||||||
fn fallback_alloc(&mut self, layout: Layout) -> *mut u8 {
|
|
||||||
match self.fallback_allocator.allocate_first_fit(layout) {
|
|
||||||
Ok(ptr) => ptr.as_ptr(),
|
|
||||||
Err(_) => ptr::null_mut(),
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
unsafe impl GlobalAlloc for Locked<FixedSizeBlockAllocator> {
|
|
||||||
unsafe fn alloc(&self, layout: Layout) -> *mut u8 {
|
|
||||||
let mut allocator = self.lock();
|
|
||||||
match list_index(&layout) {
|
|
||||||
Some(index) => {
|
|
||||||
match allocator.list_heads[index].take() {
|
|
||||||
Some(node) => {
|
|
||||||
allocator.list_heads[index] = node.next.take();
|
|
||||||
node as *mut ListNode as *mut u8
|
|
||||||
}
|
|
||||||
None => {
|
|
||||||
// no block exists in list => allocate new block
|
|
||||||
let block_size = BLOCK_SIZES[index];
|
|
||||||
// only works if all block sizes are a power of 2
|
|
||||||
let block_align = block_size;
|
|
||||||
let layout = Layout::from_size_align(block_size, block_align).unwrap();
|
|
||||||
allocator.fallback_alloc(layout)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
None => allocator.fallback_alloc(layout),
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
unsafe fn dealloc(&self, ptr: *mut u8, layout: Layout) {
|
|
||||||
let mut allocator = self.lock();
|
|
||||||
match list_index(&layout) {
|
|
||||||
Some(index) => {
|
|
||||||
let new_node = ListNode {
|
|
||||||
next: allocator.list_heads[index].take(),
|
|
||||||
};
|
|
||||||
// verify that block has size and alignment required for storing node
|
|
||||||
assert!(mem::size_of::<ListNode>() <= BLOCK_SIZES[index]);
|
|
||||||
assert!(mem::align_of::<ListNode>() <= BLOCK_SIZES[index]);
|
|
||||||
let new_node_ptr = ptr as *mut ListNode;
|
|
||||||
unsafe {
|
|
||||||
new_node_ptr.write(new_node);
|
|
||||||
allocator.list_heads[index] = Some(&mut *new_node_ptr);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
None => {
|
|
||||||
let ptr = NonNull::new(ptr).unwrap();
|
|
||||||
unsafe {
|
|
||||||
allocator.fallback_allocator.deallocate(ptr, layout);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@@ -1,151 +0,0 @@
|
|||||||
use super::{Locked, align_up};
|
|
||||||
use alloc::alloc::{GlobalAlloc, Layout};
|
|
||||||
use core::{mem, ptr};
|
|
||||||
|
|
||||||
struct ListNode {
|
|
||||||
size: usize,
|
|
||||||
next: Option<&'static mut ListNode>,
|
|
||||||
}
|
|
||||||
|
|
||||||
impl ListNode {
|
|
||||||
const fn new(size: usize) -> Self {
|
|
||||||
ListNode { size, next: None }
|
|
||||||
}
|
|
||||||
|
|
||||||
fn start_addr(&self) -> usize {
|
|
||||||
self as *const Self as usize
|
|
||||||
}
|
|
||||||
|
|
||||||
fn end_addr(&self) -> usize {
|
|
||||||
self.start_addr() + self.size
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
pub struct LinkedListAllocator {
|
|
||||||
head: ListNode,
|
|
||||||
}
|
|
||||||
|
|
||||||
impl LinkedListAllocator {
|
|
||||||
/// Creates an empty LinkedListAllocator.
|
|
||||||
pub const fn new() -> Self {
|
|
||||||
Self {
|
|
||||||
head: ListNode::new(0),
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/// Initialize the allocator with the given heap bounds.
|
|
||||||
///
|
|
||||||
/// This function is unsafe because the caller must guarantee that the given
|
|
||||||
/// heap bounds are valid and that the heap is unused. This method must be
|
|
||||||
/// called only once.
|
|
||||||
pub unsafe fn init(&mut self, heap_start: usize, heap_size: usize) {
|
|
||||||
unsafe {
|
|
||||||
self.add_free_region(heap_start, heap_size);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/// Adds the given memory region to the front of the list.
|
|
||||||
unsafe fn add_free_region(&mut self, addr: usize, size: usize) {
|
|
||||||
// ensure that the freed region is capable of holding ListNode
|
|
||||||
assert_eq!(align_up(addr, mem::align_of::<ListNode>()), addr);
|
|
||||||
assert!(size >= mem::size_of::<ListNode>());
|
|
||||||
|
|
||||||
// create a new list node and append it at the start of the list
|
|
||||||
let mut node = ListNode::new(size);
|
|
||||||
node.next = self.head.next.take();
|
|
||||||
let node_ptr = addr as *mut ListNode;
|
|
||||||
unsafe {
|
|
||||||
node_ptr.write(node);
|
|
||||||
self.head.next = Some(&mut *node_ptr);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/// Looks for a free region with the given size and alignment and removes
|
|
||||||
/// it from the list.
|
|
||||||
///
|
|
||||||
/// Returns a tuple of the list node and the start address of the allocation.
|
|
||||||
fn find_region(&mut self, size: usize, align: usize) -> Option<(&'static mut ListNode, usize)> {
|
|
||||||
// reference to current list node, updated for each iteration
|
|
||||||
let mut current = &mut self.head;
|
|
||||||
// look for a large enough memory region in linked list
|
|
||||||
while let Some(ref mut region) = current.next {
|
|
||||||
if let Ok(alloc_start) = Self::alloc_from_region(®ion, size, align) {
|
|
||||||
// region suitable for allocation -> remove node from list
|
|
||||||
let next = region.next.take();
|
|
||||||
let ret = Some((current.next.take().unwrap(), alloc_start));
|
|
||||||
current.next = next;
|
|
||||||
return ret;
|
|
||||||
} else {
|
|
||||||
// region not suitable -> continue with next region
|
|
||||||
current = current.next.as_mut().unwrap();
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
// no suitable region found
|
|
||||||
None
|
|
||||||
}
|
|
||||||
|
|
||||||
/// Try to use the given region for an allocation with given size and alignment.
|
|
||||||
///
|
|
||||||
/// Returns the allocation start address on success.
|
|
||||||
fn alloc_from_region(region: &ListNode, size: usize, align: usize) -> Result<usize, ()> {
|
|
||||||
let alloc_start = align_up(region.start_addr(), align);
|
|
||||||
let alloc_end = alloc_start.checked_add(size).ok_or(())?;
|
|
||||||
|
|
||||||
if alloc_end > region.end_addr() {
|
|
||||||
// region too small
|
|
||||||
return Err(());
|
|
||||||
}
|
|
||||||
|
|
||||||
let excess_size = region.end_addr() - alloc_end;
|
|
||||||
if excess_size > 0 && excess_size < mem::size_of::<ListNode>() {
|
|
||||||
// rest of region too small to hold a ListNode (required because the
|
|
||||||
// allocation splits the region in a used and a free part)
|
|
||||||
return Err(());
|
|
||||||
}
|
|
||||||
|
|
||||||
// region suitable for allocation
|
|
||||||
Ok(alloc_start)
|
|
||||||
}
|
|
||||||
|
|
||||||
/// Adjust the given layout so that the resulting allocated memory
|
|
||||||
/// region is also capable of storing a `ListNode`.
|
|
||||||
///
|
|
||||||
/// Returns the adjusted size and alignment as a (size, align) tuple.
|
|
||||||
fn size_align(layout: Layout) -> (usize, usize) {
|
|
||||||
let layout = layout
|
|
||||||
.align_to(mem::align_of::<ListNode>())
|
|
||||||
.expect("adjusting alignment failed")
|
|
||||||
.pad_to_align();
|
|
||||||
let size = layout.size().max(mem::size_of::<ListNode>());
|
|
||||||
(size, layout.align())
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
unsafe impl GlobalAlloc for Locked<LinkedListAllocator> {
|
|
||||||
unsafe fn alloc(&self, layout: Layout) -> *mut u8 {
|
|
||||||
// perform layout adjustments
|
|
||||||
let (size, align) = LinkedListAllocator::size_align(layout);
|
|
||||||
let mut allocator = self.lock();
|
|
||||||
|
|
||||||
if let Some((region, alloc_start)) = allocator.find_region(size, align) {
|
|
||||||
let alloc_end = alloc_start.checked_add(size).expect("overflow");
|
|
||||||
let excess_size = region.end_addr() - alloc_end;
|
|
||||||
if excess_size > 0 {
|
|
||||||
unsafe {
|
|
||||||
allocator.add_free_region(alloc_end, excess_size);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
alloc_start as *mut u8
|
|
||||||
} else {
|
|
||||||
ptr::null_mut()
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
unsafe fn dealloc(&self, ptr: *mut u8, layout: Layout) {
|
|
||||||
// perform layout adjustments
|
|
||||||
let (size, _) = LinkedListAllocator::size_align(layout);
|
|
||||||
|
|
||||||
unsafe { self.lock().add_free_region(ptr as usize, size) }
|
|
||||||
}
|
|
||||||
}
|
|
||||||
52
src/gdt.rs
52
src/gdt.rs
@@ -1,52 +0,0 @@
|
|||||||
use lazy_static::lazy_static;
|
|
||||||
use x86_64::VirtAddr;
|
|
||||||
use x86_64::structures::gdt::{Descriptor, GlobalDescriptorTable, SegmentSelector};
|
|
||||||
use x86_64::structures::tss::TaskStateSegment;
|
|
||||||
|
|
||||||
pub const DOUBLE_FAULT_IST_INDEX: u16 = 0;
|
|
||||||
|
|
||||||
lazy_static! {
|
|
||||||
static ref TSS: TaskStateSegment = {
|
|
||||||
let mut tss = TaskStateSegment::new();
|
|
||||||
tss.interrupt_stack_table[DOUBLE_FAULT_IST_INDEX as usize] = {
|
|
||||||
const STACK_SIZE: usize = 4096 * 5;
|
|
||||||
static mut STACK: [u8; STACK_SIZE] = [0; STACK_SIZE];
|
|
||||||
|
|
||||||
let stack_start = VirtAddr::from_ptr(&raw const STACK);
|
|
||||||
let stack_end = stack_start + STACK_SIZE;
|
|
||||||
stack_end
|
|
||||||
};
|
|
||||||
tss
|
|
||||||
};
|
|
||||||
}
|
|
||||||
|
|
||||||
lazy_static! {
|
|
||||||
static ref GDT: (GlobalDescriptorTable, Selectors) = {
|
|
||||||
let mut gdt = GlobalDescriptorTable::new();
|
|
||||||
let code_selector = gdt.add_entry(Descriptor::kernel_code_segment());
|
|
||||||
let tss_selector = gdt.add_entry(Descriptor::tss_segment(&TSS));
|
|
||||||
(
|
|
||||||
gdt,
|
|
||||||
Selectors {
|
|
||||||
code_selector,
|
|
||||||
tss_selector,
|
|
||||||
},
|
|
||||||
)
|
|
||||||
};
|
|
||||||
}
|
|
||||||
|
|
||||||
struct Selectors {
|
|
||||||
code_selector: SegmentSelector,
|
|
||||||
tss_selector: SegmentSelector,
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn init() {
|
|
||||||
use x86_64::instructions::segmentation::{CS, Segment};
|
|
||||||
use x86_64::instructions::tables::load_tss;
|
|
||||||
|
|
||||||
GDT.0.load();
|
|
||||||
unsafe {
|
|
||||||
CS::set_reg(GDT.1.code_selector);
|
|
||||||
load_tss(GDT.1.tss_selector);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@@ -1,119 +0,0 @@
|
|||||||
use crate::{gdt, hlt_loop, print, println};
|
|
||||||
use lazy_static::lazy_static;
|
|
||||||
use pic8259::ChainedPics;
|
|
||||||
use spin;
|
|
||||||
use x86_64::structures::idt::{InterruptDescriptorTable, InterruptStackFrame, PageFaultErrorCode};
|
|
||||||
|
|
||||||
pub const PIC_1_OFFSET: u8 = 32;
|
|
||||||
pub const PIC_2_OFFSET: u8 = PIC_1_OFFSET + 8;
|
|
||||||
|
|
||||||
#[derive(Debug, Clone, Copy)]
|
|
||||||
#[repr(u8)]
|
|
||||||
pub enum InterruptIndex {
|
|
||||||
Timer = PIC_1_OFFSET,
|
|
||||||
Keyboard,
|
|
||||||
}
|
|
||||||
|
|
||||||
impl InterruptIndex {
|
|
||||||
fn as_u8(self) -> u8 {
|
|
||||||
self as u8
|
|
||||||
}
|
|
||||||
|
|
||||||
fn as_usize(self) -> usize {
|
|
||||||
usize::from(self.as_u8())
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
pub static PICS: spin::Mutex<ChainedPics> =
|
|
||||||
spin::Mutex::new(unsafe { ChainedPics::new(PIC_1_OFFSET, PIC_2_OFFSET) });
|
|
||||||
|
|
||||||
lazy_static! {
|
|
||||||
static ref IDT: InterruptDescriptorTable = {
|
|
||||||
let mut idt = InterruptDescriptorTable::new();
|
|
||||||
idt.breakpoint.set_handler_fn(breakpoint_handler);
|
|
||||||
idt.page_fault.set_handler_fn(page_fault_handler);
|
|
||||||
unsafe {
|
|
||||||
idt.double_fault
|
|
||||||
.set_handler_fn(double_fault_handler)
|
|
||||||
.set_stack_index(gdt::DOUBLE_FAULT_IST_INDEX);
|
|
||||||
}
|
|
||||||
idt[InterruptIndex::Timer.as_usize()].set_handler_fn(timer_interrupt_handler);
|
|
||||||
idt[InterruptIndex::Keyboard.as_usize()].set_handler_fn(keyboard_interrupt_handler);
|
|
||||||
idt
|
|
||||||
};
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn init_idt() {
|
|
||||||
IDT.load();
|
|
||||||
}
|
|
||||||
|
|
||||||
extern "x86-interrupt" fn breakpoint_handler(stack_frame: InterruptStackFrame) {
|
|
||||||
println!("EXCEPTION: BREAKPOINT\n{:#?}", stack_frame);
|
|
||||||
}
|
|
||||||
|
|
||||||
extern "x86-interrupt" fn page_fault_handler(
|
|
||||||
stack_frame: InterruptStackFrame,
|
|
||||||
error_code: PageFaultErrorCode,
|
|
||||||
) {
|
|
||||||
use x86_64::registers::control::Cr2;
|
|
||||||
|
|
||||||
println!("EXCEPTION: PAGE FAULT");
|
|
||||||
println!("Accessed Address: {:?}", Cr2::read());
|
|
||||||
println!("Error Code: {:?}", error_code);
|
|
||||||
println!("{:#?}", stack_frame);
|
|
||||||
hlt_loop();
|
|
||||||
}
|
|
||||||
|
|
||||||
extern "x86-interrupt" fn double_fault_handler(
|
|
||||||
stack_frame: InterruptStackFrame,
|
|
||||||
_error_code: u64,
|
|
||||||
) -> ! {
|
|
||||||
panic!("EXCEPTION: DOUBLE FAULT\n{:#?}", stack_frame);
|
|
||||||
}
|
|
||||||
|
|
||||||
extern "x86-interrupt" fn timer_interrupt_handler(_stack_frame: InterruptStackFrame) {
|
|
||||||
print!(".");
|
|
||||||
unsafe {
|
|
||||||
PICS.lock()
|
|
||||||
.notify_end_of_interrupt(InterruptIndex::Timer.as_u8());
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
extern "x86-interrupt" fn keyboard_interrupt_handler(_stack_frame: InterruptStackFrame) {
|
|
||||||
use pc_keyboard::{DecodedKey, HandleControl, Keyboard, ScancodeSet1, layouts};
|
|
||||||
use spin::Mutex;
|
|
||||||
use x86_64::instructions::port::Port;
|
|
||||||
|
|
||||||
lazy_static! {
|
|
||||||
static ref KEYBOARD: Mutex<Keyboard<layouts::Us104Key, ScancodeSet1>> =
|
|
||||||
Mutex::new(Keyboard::new(
|
|
||||||
ScancodeSet1::new(),
|
|
||||||
layouts::Us104Key,
|
|
||||||
HandleControl::Ignore
|
|
||||||
));
|
|
||||||
}
|
|
||||||
|
|
||||||
let mut keyboard = KEYBOARD.lock();
|
|
||||||
let mut port = Port::new(0x60);
|
|
||||||
|
|
||||||
let scancode: u8 = unsafe { port.read() };
|
|
||||||
if let Ok(Some(key_event)) = keyboard.add_byte(scancode) {
|
|
||||||
if let Some(key) = keyboard.process_keyevent(key_event) {
|
|
||||||
match key {
|
|
||||||
DecodedKey::Unicode(character) => print!("{}", character),
|
|
||||||
DecodedKey::RawKey(key) => print!("{:?}", key),
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
unsafe {
|
|
||||||
PICS.lock()
|
|
||||||
.notify_end_of_interrupt(InterruptIndex::Keyboard.as_u8());
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test_case]
|
|
||||||
fn test_breakpoint_exception() {
|
|
||||||
// invoke a breakpoint exception
|
|
||||||
x86_64::instructions::interrupts::int3();
|
|
||||||
}
|
|
||||||
36
src/lib.rs
36
src/lib.rs
@@ -1,26 +1,16 @@
|
|||||||
#![no_std]
|
#![no_std]
|
||||||
#![cfg_attr(test, no_main)]
|
#![cfg_attr(test, no_main)]
|
||||||
#![feature(custom_test_frameworks)]
|
#![feature(custom_test_frameworks)]
|
||||||
#![feature(abi_x86_interrupt)]
|
|
||||||
#![test_runner(crate::test_runner)]
|
#![test_runner(crate::test_runner)]
|
||||||
#![reexport_test_harness_main = "test_main"]
|
#![reexport_test_harness_main = "test_main"]
|
||||||
|
|
||||||
extern crate alloc;
|
extern crate rlibc;
|
||||||
|
|
||||||
use core::panic::PanicInfo;
|
use core::panic::PanicInfo;
|
||||||
|
|
||||||
pub mod allocator;
|
|
||||||
pub mod gdt;
|
|
||||||
pub mod interrupts;
|
|
||||||
pub mod memory;
|
|
||||||
pub mod serial;
|
pub mod serial;
|
||||||
pub mod vga_buffer;
|
//pub mod vga_buffer;
|
||||||
|
|
||||||
pub fn init() {
|
|
||||||
gdt::init();
|
|
||||||
interrupts::init_idt();
|
|
||||||
unsafe { interrupts::PICS.lock().initialize() };
|
|
||||||
x86_64::instructions::interrupts::enable();
|
|
||||||
}
|
|
||||||
pub trait Testable {
|
pub trait Testable {
|
||||||
fn run(&self) -> ();
|
fn run(&self) -> ();
|
||||||
}
|
}
|
||||||
@@ -48,7 +38,7 @@ pub fn test_panic_handler(info: &PanicInfo) -> ! {
|
|||||||
serial_println!("[failed]\n");
|
serial_println!("[failed]\n");
|
||||||
serial_println!("Error: {}\n", info);
|
serial_println!("Error: {}\n", info);
|
||||||
exit_qemu(QemuExitCode::Failed);
|
exit_qemu(QemuExitCode::Failed);
|
||||||
hlt_loop();
|
loop {}
|
||||||
}
|
}
|
||||||
|
|
||||||
#[derive(Debug, Clone, Copy, PartialEq, Eq)]
|
#[derive(Debug, Clone, Copy, PartialEq, Eq)]
|
||||||
@@ -67,24 +57,12 @@ pub fn exit_qemu(exit_code: QemuExitCode) {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
pub fn hlt_loop() -> ! {
|
|
||||||
loop {
|
|
||||||
x86_64::instructions::hlt();
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
#[cfg(test)]
|
|
||||||
use bootloader::{BootInfo, entry_point};
|
|
||||||
|
|
||||||
#[cfg(test)]
|
|
||||||
entry_point!(test_kernel_main);
|
|
||||||
|
|
||||||
/// Entry point for `cargo xtest`
|
/// Entry point for `cargo xtest`
|
||||||
#[cfg(test)]
|
#[cfg(test)]
|
||||||
fn test_kernel_main(_boot_info: &'static BootInfo) -> ! {
|
#[no_mangle]
|
||||||
init();
|
pub extern "C" fn _start() -> ! {
|
||||||
test_main();
|
test_main();
|
||||||
hlt_loop();
|
loop {}
|
||||||
}
|
}
|
||||||
|
|
||||||
#[cfg(test)]
|
#[cfg(test)]
|
||||||
|
|||||||
71
src/main.rs
71
src/main.rs
@@ -4,66 +4,37 @@
|
|||||||
#![test_runner(blog_os::test_runner)]
|
#![test_runner(blog_os::test_runner)]
|
||||||
#![reexport_test_harness_main = "test_main"]
|
#![reexport_test_harness_main = "test_main"]
|
||||||
|
|
||||||
extern crate alloc;
|
use blog_os::serial_println;
|
||||||
|
use core::{panic::PanicInfo, ptr, slice};
|
||||||
use alloc::{boxed::Box, rc::Rc, vec, vec::Vec};
|
|
||||||
use blog_os::println;
|
|
||||||
use bootloader::{BootInfo, entry_point};
|
|
||||||
use core::panic::PanicInfo;
|
|
||||||
|
|
||||||
entry_point!(kernel_main);
|
|
||||||
|
|
||||||
fn kernel_main(boot_info: &'static BootInfo) -> ! {
|
|
||||||
use blog_os::allocator;
|
|
||||||
use blog_os::memory::{self, BootInfoFrameAllocator};
|
|
||||||
use x86_64::VirtAddr;
|
|
||||||
|
|
||||||
println!("Hello World{}", "!");
|
|
||||||
blog_os::init();
|
|
||||||
|
|
||||||
let phys_mem_offset = VirtAddr::new(boot_info.physical_memory_offset);
|
|
||||||
let mut mapper = unsafe { memory::init(phys_mem_offset) };
|
|
||||||
let mut frame_allocator = unsafe { BootInfoFrameAllocator::init(&boot_info.memory_map) };
|
|
||||||
|
|
||||||
allocator::init_heap(&mut mapper, &mut frame_allocator).expect("heap initialization failed");
|
|
||||||
|
|
||||||
// allocate a number on the heap
|
|
||||||
let heap_value = Box::new(41);
|
|
||||||
println!("heap_value at {:p}", heap_value);
|
|
||||||
|
|
||||||
// create a dynamically sized vector
|
|
||||||
let mut vec = Vec::new();
|
|
||||||
for i in 0..500 {
|
|
||||||
vec.push(i);
|
|
||||||
}
|
|
||||||
println!("vec at {:p}", vec.as_slice());
|
|
||||||
|
|
||||||
// create a reference counted vector -> will be freed when count reaches 0
|
|
||||||
let reference_counted = Rc::new(vec![1, 2, 3]);
|
|
||||||
let cloned_reference = reference_counted.clone();
|
|
||||||
println!(
|
|
||||||
"current reference count is {}",
|
|
||||||
Rc::strong_count(&cloned_reference)
|
|
||||||
);
|
|
||||||
core::mem::drop(reference_counted);
|
|
||||||
println!(
|
|
||||||
"reference count is {} now",
|
|
||||||
Rc::strong_count(&cloned_reference)
|
|
||||||
);
|
|
||||||
|
|
||||||
|
#[no_mangle]
|
||||||
|
pub extern "C" fn _start(boot_info: &'static mut bootloader::boot_info::BootInfo) -> ! {
|
||||||
#[cfg(test)]
|
#[cfg(test)]
|
||||||
test_main();
|
test_main();
|
||||||
|
|
||||||
println!("It did not crash!");
|
let mut framebuffer = {
|
||||||
blog_os::hlt_loop();
|
let ptr = boot_info.framebuffer.start_addr as *mut u8;
|
||||||
|
let slice = unsafe { slice::from_raw_parts_mut(ptr, boot_info.framebuffer.len) };
|
||||||
|
volatile::Volatile::new(slice)
|
||||||
|
};
|
||||||
|
|
||||||
|
//serial_println!("Hello World{}", "!");
|
||||||
|
|
||||||
|
for i in 0..boot_info.framebuffer.len {
|
||||||
|
framebuffer.index_mut(i).write(0x99);
|
||||||
|
}
|
||||||
|
|
||||||
|
loop {
|
||||||
|
x86_64::instructions::hlt();
|
||||||
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
/// This function is called on panic.
|
/// This function is called on panic.
|
||||||
#[cfg(not(test))]
|
#[cfg(not(test))]
|
||||||
#[panic_handler]
|
#[panic_handler]
|
||||||
fn panic(info: &PanicInfo) -> ! {
|
fn panic(info: &PanicInfo) -> ! {
|
||||||
println!("{}", info);
|
serial_println!("{}", info);
|
||||||
blog_os::hlt_loop();
|
loop {}
|
||||||
}
|
}
|
||||||
|
|
||||||
#[cfg(test)]
|
#[cfg(test)]
|
||||||
|
|||||||
@@ -1,86 +0,0 @@
|
|||||||
use bootloader::bootinfo::{MemoryMap, MemoryRegionType};
|
|
||||||
use x86_64::{
|
|
||||||
PhysAddr, VirtAddr,
|
|
||||||
structures::paging::{FrameAllocator, OffsetPageTable, PageTable, PhysFrame, Size4KiB},
|
|
||||||
};
|
|
||||||
|
|
||||||
/// Initialize a new OffsetPageTable.
|
|
||||||
///
|
|
||||||
/// This function is unsafe because the caller must guarantee that the
|
|
||||||
/// complete physical memory is mapped to virtual memory at the passed
|
|
||||||
/// `physical_memory_offset`. Also, this function must be only called once
|
|
||||||
/// to avoid aliasing `&mut` references (which is undefined behavior).
|
|
||||||
pub unsafe fn init(physical_memory_offset: VirtAddr) -> OffsetPageTable<'static> {
|
|
||||||
unsafe {
|
|
||||||
let level_4_table = active_level_4_table(physical_memory_offset);
|
|
||||||
OffsetPageTable::new(level_4_table, physical_memory_offset)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/// Returns a mutable reference to the active level 4 table.
|
|
||||||
///
|
|
||||||
/// This function is unsafe because the caller must guarantee that the
|
|
||||||
/// complete physical memory is mapped to virtual memory at the passed
|
|
||||||
/// `physical_memory_offset`. Also, this function must be only called once
|
|
||||||
/// to avoid aliasing `&mut` references (which is undefined behavior).
|
|
||||||
unsafe fn active_level_4_table(physical_memory_offset: VirtAddr) -> &'static mut PageTable {
|
|
||||||
use x86_64::registers::control::Cr3;
|
|
||||||
|
|
||||||
let (level_4_table_frame, _) = Cr3::read();
|
|
||||||
|
|
||||||
let phys = level_4_table_frame.start_address();
|
|
||||||
let virt = physical_memory_offset + phys.as_u64();
|
|
||||||
let page_table_ptr: *mut PageTable = virt.as_mut_ptr();
|
|
||||||
|
|
||||||
unsafe { &mut *page_table_ptr }
|
|
||||||
}
|
|
||||||
|
|
||||||
/// A FrameAllocator that always returns `None`.
|
|
||||||
pub struct EmptyFrameAllocator;
|
|
||||||
|
|
||||||
unsafe impl FrameAllocator<Size4KiB> for EmptyFrameAllocator {
|
|
||||||
fn allocate_frame(&mut self) -> Option<PhysFrame> {
|
|
||||||
None
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/// A FrameAllocator that returns usable frames from the bootloader's memory map.
|
|
||||||
pub struct BootInfoFrameAllocator {
|
|
||||||
memory_map: &'static MemoryMap,
|
|
||||||
next: usize,
|
|
||||||
}
|
|
||||||
|
|
||||||
impl BootInfoFrameAllocator {
|
|
||||||
/// Create a FrameAllocator from the passed memory map.
|
|
||||||
///
|
|
||||||
/// This function is unsafe because the caller must guarantee that the passed
|
|
||||||
/// memory map is valid. The main requirement is that all frames that are marked
|
|
||||||
/// as `USABLE` in it are really unused.
|
|
||||||
pub unsafe fn init(memory_map: &'static MemoryMap) -> Self {
|
|
||||||
BootInfoFrameAllocator {
|
|
||||||
memory_map,
|
|
||||||
next: 0,
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
/// Returns an iterator over the usable frames specified in the memory map.
|
|
||||||
fn usable_frames(&self) -> impl Iterator<Item = PhysFrame> {
|
|
||||||
// get usable regions from memory map
|
|
||||||
let regions = self.memory_map.iter();
|
|
||||||
let usable_regions = regions.filter(|r| r.region_type == MemoryRegionType::Usable);
|
|
||||||
// map each region to its address range
|
|
||||||
let addr_ranges = usable_regions.map(|r| r.range.start_addr()..r.range.end_addr());
|
|
||||||
// transform to an iterator of frame start addresses
|
|
||||||
let frame_addresses = addr_ranges.flat_map(|r| r.step_by(4096));
|
|
||||||
// create `PhysFrame` types from the start addresses
|
|
||||||
frame_addresses.map(|addr| PhysFrame::containing_address(PhysAddr::new(addr)))
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
unsafe impl FrameAllocator<Size4KiB> for BootInfoFrameAllocator {
|
|
||||||
fn allocate_frame(&mut self) -> Option<PhysFrame> {
|
|
||||||
let frame = self.usable_frames().nth(self.next);
|
|
||||||
self.next += 1;
|
|
||||||
frame
|
|
||||||
}
|
|
||||||
}
|
|
||||||
@@ -13,14 +13,10 @@ lazy_static! {
|
|||||||
#[doc(hidden)]
|
#[doc(hidden)]
|
||||||
pub fn _print(args: ::core::fmt::Arguments) {
|
pub fn _print(args: ::core::fmt::Arguments) {
|
||||||
use core::fmt::Write;
|
use core::fmt::Write;
|
||||||
use x86_64::instructions::interrupts;
|
SERIAL1
|
||||||
|
.lock()
|
||||||
interrupts::without_interrupts(|| {
|
.write_fmt(args)
|
||||||
SERIAL1
|
.expect("Printing to serial failed");
|
||||||
.lock()
|
|
||||||
.write_fmt(args)
|
|
||||||
.expect("Printing to serial failed");
|
|
||||||
});
|
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Prints to the host through the serial interface.
|
/// Prints to the host through the serial interface.
|
||||||
|
|||||||
@@ -163,16 +163,11 @@ macro_rules! println {
|
|||||||
($($arg:tt)*) => ($crate::print!("{}\n", format_args!($($arg)*)));
|
($($arg:tt)*) => ($crate::print!("{}\n", format_args!($($arg)*)));
|
||||||
}
|
}
|
||||||
|
|
||||||
/// Prints the given formatted string to the VGA text buffer
|
/// Prints the given formatted string to the VGA text buffer through the global `WRITER` instance.
|
||||||
/// through the global `WRITER` instance.
|
|
||||||
#[doc(hidden)]
|
#[doc(hidden)]
|
||||||
pub fn _print(args: fmt::Arguments) {
|
pub fn _print(args: fmt::Arguments) {
|
||||||
use core::fmt::Write;
|
use core::fmt::Write;
|
||||||
use x86_64::instructions::interrupts;
|
WRITER.lock().write_fmt(args).unwrap();
|
||||||
|
|
||||||
interrupts::without_interrupts(|| {
|
|
||||||
WRITER.lock().write_fmt(args).unwrap();
|
|
||||||
});
|
|
||||||
}
|
}
|
||||||
|
|
||||||
#[test_case]
|
#[test_case]
|
||||||
@@ -189,16 +184,10 @@ fn test_println_many() {
|
|||||||
|
|
||||||
#[test_case]
|
#[test_case]
|
||||||
fn test_println_output() {
|
fn test_println_output() {
|
||||||
use core::fmt::Write;
|
|
||||||
use x86_64::instructions::interrupts;
|
|
||||||
|
|
||||||
let s = "Some test string that fits on a single line";
|
let s = "Some test string that fits on a single line";
|
||||||
interrupts::without_interrupts(|| {
|
println!("{}", s);
|
||||||
let mut writer = WRITER.lock();
|
for (i, c) in s.chars().enumerate() {
|
||||||
writeln!(writer, "\n{}", s).expect("writeln failed");
|
let screen_char = WRITER.lock().buffer.chars[BUFFER_HEIGHT - 2][i].read();
|
||||||
for (i, c) in s.chars().enumerate() {
|
assert_eq!(char::from(screen_char.ascii_character), c);
|
||||||
let screen_char = writer.buffer.chars[BUFFER_HEIGHT - 2][i].read();
|
}
|
||||||
assert_eq!(char::from(screen_char.ascii_character), c);
|
|
||||||
}
|
|
||||||
});
|
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -4,10 +4,9 @@
|
|||||||
#![test_runner(blog_os::test_runner)]
|
#![test_runner(blog_os::test_runner)]
|
||||||
#![reexport_test_harness_main = "test_main"]
|
#![reexport_test_harness_main = "test_main"]
|
||||||
|
|
||||||
use blog_os::println;
|
|
||||||
use core::panic::PanicInfo;
|
use core::panic::PanicInfo;
|
||||||
|
|
||||||
#[unsafe(no_mangle)] // don't mangle the name of this function
|
#[no_mangle] // don't mangle the name of this function
|
||||||
pub extern "C" fn _start() -> ! {
|
pub extern "C" fn _start() -> ! {
|
||||||
test_main();
|
test_main();
|
||||||
|
|
||||||
@@ -21,5 +20,5 @@ fn panic(info: &PanicInfo) -> ! {
|
|||||||
|
|
||||||
#[test_case]
|
#[test_case]
|
||||||
fn test_println() {
|
fn test_println() {
|
||||||
println!("test_println output");
|
//println!("test_println output");
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,70 +0,0 @@
|
|||||||
#![no_std]
|
|
||||||
#![no_main]
|
|
||||||
#![feature(custom_test_frameworks)]
|
|
||||||
#![test_runner(blog_os::test_runner)]
|
|
||||||
#![reexport_test_harness_main = "test_main"]
|
|
||||||
|
|
||||||
extern crate alloc;
|
|
||||||
|
|
||||||
use alloc::{boxed::Box, vec::Vec};
|
|
||||||
use blog_os::allocator::HEAP_SIZE;
|
|
||||||
use bootloader::{BootInfo, entry_point};
|
|
||||||
use core::panic::PanicInfo;
|
|
||||||
|
|
||||||
entry_point!(main);
|
|
||||||
|
|
||||||
fn main(boot_info: &'static BootInfo) -> ! {
|
|
||||||
use blog_os::allocator;
|
|
||||||
use blog_os::memory::{self, BootInfoFrameAllocator};
|
|
||||||
use x86_64::VirtAddr;
|
|
||||||
|
|
||||||
blog_os::init();
|
|
||||||
let phys_mem_offset = VirtAddr::new(boot_info.physical_memory_offset);
|
|
||||||
let mut mapper = unsafe { memory::init(phys_mem_offset) };
|
|
||||||
let mut frame_allocator = unsafe { BootInfoFrameAllocator::init(&boot_info.memory_map) };
|
|
||||||
allocator::init_heap(&mut mapper, &mut frame_allocator).expect("heap initialization failed");
|
|
||||||
|
|
||||||
test_main();
|
|
||||||
loop {}
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test_case]
|
|
||||||
fn simple_allocation() {
|
|
||||||
let heap_value_1 = Box::new(41);
|
|
||||||
let heap_value_2 = Box::new(13);
|
|
||||||
assert_eq!(*heap_value_1, 41);
|
|
||||||
assert_eq!(*heap_value_2, 13);
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test_case]
|
|
||||||
fn large_vec() {
|
|
||||||
let n = 1000;
|
|
||||||
let mut vec = Vec::new();
|
|
||||||
for i in 0..n {
|
|
||||||
vec.push(i);
|
|
||||||
}
|
|
||||||
assert_eq!(vec.iter().sum::<u64>(), (n - 1) * n / 2);
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test_case]
|
|
||||||
fn many_boxes() {
|
|
||||||
for i in 0..HEAP_SIZE {
|
|
||||||
let x = Box::new(i);
|
|
||||||
assert_eq!(*x, i);
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
#[test_case]
|
|
||||||
fn many_boxes_long_lived() {
|
|
||||||
let long_lived = Box::new(1); // new
|
|
||||||
for i in 0..HEAP_SIZE {
|
|
||||||
let x = Box::new(i);
|
|
||||||
assert_eq!(*x, i);
|
|
||||||
}
|
|
||||||
assert_eq!(*long_lived, 1); // new
|
|
||||||
}
|
|
||||||
|
|
||||||
#[panic_handler]
|
|
||||||
fn panic(info: &PanicInfo) -> ! {
|
|
||||||
blog_os::test_panic_handler(info)
|
|
||||||
}
|
|
||||||
@@ -1,10 +1,10 @@
|
|||||||
#![no_std]
|
#![no_std]
|
||||||
#![no_main]
|
#![no_main]
|
||||||
|
|
||||||
use blog_os::{QemuExitCode, exit_qemu, serial_print, serial_println};
|
use blog_os::{exit_qemu, serial_print, serial_println, QemuExitCode};
|
||||||
use core::panic::PanicInfo;
|
use core::panic::PanicInfo;
|
||||||
|
|
||||||
#[unsafe(no_mangle)]
|
#[no_mangle]
|
||||||
pub extern "C" fn _start() -> ! {
|
pub extern "C" fn _start() -> ! {
|
||||||
should_fail();
|
should_fail();
|
||||||
serial_println!("[test did not panic]");
|
serial_println!("[test did not panic]");
|
||||||
|
|||||||
@@ -1,58 +0,0 @@
|
|||||||
#![no_std]
|
|
||||||
#![no_main]
|
|
||||||
#![feature(abi_x86_interrupt)]
|
|
||||||
|
|
||||||
use blog_os::{QemuExitCode, exit_qemu, serial_print, serial_println};
|
|
||||||
use core::panic::PanicInfo;
|
|
||||||
use lazy_static::lazy_static;
|
|
||||||
use x86_64::structures::idt::{InterruptDescriptorTable, InterruptStackFrame};
|
|
||||||
|
|
||||||
#[unsafe(no_mangle)]
|
|
||||||
pub extern "C" fn _start() -> ! {
|
|
||||||
serial_print!("stack_overflow::stack_overflow...\t");
|
|
||||||
|
|
||||||
blog_os::gdt::init();
|
|
||||||
init_test_idt();
|
|
||||||
|
|
||||||
// trigger a stack overflow
|
|
||||||
stack_overflow();
|
|
||||||
|
|
||||||
panic!("Execution continued after stack overflow");
|
|
||||||
}
|
|
||||||
|
|
||||||
#[allow(unconditional_recursion)]
|
|
||||||
fn stack_overflow() {
|
|
||||||
stack_overflow(); // for each recursion, the return address is pushed
|
|
||||||
volatile::Volatile::new(0).read(); // prevent tail recursion optimizations
|
|
||||||
}
|
|
||||||
|
|
||||||
lazy_static! {
|
|
||||||
static ref TEST_IDT: InterruptDescriptorTable = {
|
|
||||||
let mut idt = InterruptDescriptorTable::new();
|
|
||||||
unsafe {
|
|
||||||
idt.double_fault
|
|
||||||
.set_handler_fn(test_double_fault_handler)
|
|
||||||
.set_stack_index(blog_os::gdt::DOUBLE_FAULT_IST_INDEX);
|
|
||||||
}
|
|
||||||
|
|
||||||
idt
|
|
||||||
};
|
|
||||||
}
|
|
||||||
|
|
||||||
pub fn init_test_idt() {
|
|
||||||
TEST_IDT.load();
|
|
||||||
}
|
|
||||||
|
|
||||||
extern "x86-interrupt" fn test_double_fault_handler(
|
|
||||||
_stack_frame: InterruptStackFrame,
|
|
||||||
_error_code: u64,
|
|
||||||
) -> ! {
|
|
||||||
serial_println!("[ok]");
|
|
||||||
exit_qemu(QemuExitCode::Success);
|
|
||||||
loop {}
|
|
||||||
}
|
|
||||||
|
|
||||||
#[panic_handler]
|
|
||||||
fn panic(info: &PanicInfo) -> ! {
|
|
||||||
blog_os::test_panic_handler(info)
|
|
||||||
}
|
|
||||||
@@ -1,16 +1,15 @@
|
|||||||
{
|
{
|
||||||
"llvm-target": "x86_64-unknown-none",
|
"llvm-target": "x86_64-unknown-none",
|
||||||
"data-layout": "e-m:e-p270:32:32-p271:32:32-p272:64:64-i64:64-i128:128-f80:128-n8:16:32:64-S128",
|
"data-layout": "e-m:e-i64:64-f80:128-n8:16:32:64-S128",
|
||||||
"arch": "x86_64",
|
"arch": "x86_64",
|
||||||
"target-endian": "little",
|
"target-endian": "little",
|
||||||
"target-pointer-width": "64",
|
"target-pointer-width": "64",
|
||||||
"target-c-int-width": 32,
|
"target-c-int-width": "32",
|
||||||
"os": "none",
|
"os": "none",
|
||||||
"executables": true,
|
"executables": true,
|
||||||
"linker-flavor": "ld.lld",
|
"linker-flavor": "ld.lld",
|
||||||
"linker": "rust-lld",
|
"linker": "rust-lld",
|
||||||
"panic-strategy": "abort",
|
"panic-strategy": "abort",
|
||||||
"disable-redzone": true,
|
"disable-redzone": true,
|
||||||
"features": "-mmx,-sse,+soft-float",
|
"features": "-mmx,-sse,+soft-float"
|
||||||
"rustc-abi": "x86-softfloat"
|
|
||||||
}
|
}
|
||||||
Reference in New Issue
Block a user