Rev |
Age |
Author |
Path |
Log message |
Diff |
Changes |
8675 |
1099 d 11 h |
rgimad |
/kernel/trunk/ |
fixed vulnerability (reading kernel memory from userspace) in sysfn25 |
|
/kernel/trunk/kernel.asm
|
8598 |
1159 d 21 h |
rgimad |
/kernel/trunk/ |
fixed vulnerabilities in sysfn 18.11 and 36, now user applications cannot corrupt kernel memory via invalid buffer address |
|
/kernel/trunk/kernel.asm
|
8493 |
1213 d 17 h |
rgimad |
/kernel/trunk/ |
is_region_userspace: removed extra condition which caused incorrect behavior of boxlib menu in hexedit and rtfread (cuz it uses address 0 i didnt know:D ) |
|
/kernel/trunk/kernel.asm
|
8329 |
1237 d 11 h |
rgimad |
/kernel/trunk/ |
is_region_userspace: refactoring and fix |
|
/kernel/trunk/kernel.asm
|
8270 |
1244 d 18 h |
dunkaist |
/kernel/trunk/ |
kernel: Protect OS threads from terminating by sf18.2. |
|
/kernel/trunk/kernel.asm
|
8249 |
1248 d 16 h |
rgimad |
/kernel/trunk/ |
fix return value from .addr_error in sysfn 26.2 , 9 |
|
/kernel/trunk/kernel.asm
|
8248 |
1248 d 17 h |
rgimad |
/kernel/trunk/ |
fix prior |
|
/kernel/trunk/kernel.asm
|
8247 |
1248 d 18 h |
rgimad |
/kernel/trunk/ |
SysFn 18.13 security fix: now apps cannot destroy kernel memory via passing illegal address in ecx
Update docs on SysFn 18.13 |
|
/kernel/trunk/docs/sysfuncr.txt /kernel/trunk/docs/sysfuncs.txt /kernel/trunk/kernel.asm
|
8246 |
1249 d 12 h |
rgimad |
/kernel/trunk/ |
SysFn 9 security fix: now apps cannot destroy kernel memory via passing illegal address in ebx
Update docs on SysFn 9 |
|
/kernel/trunk/docs/sysfuncr.txt /kernel/trunk/docs/sysfuncs.txt /kernel/trunk/kernel.asm
|
8216 |
1255 d 11 h |
rgimad |
/kernel/trunk/ |
fix is_region_userspace (worked incorrectly for e.g 0xFFFFFFFF) |
|
/kernel/trunk/kernel.asm
|
8176 |
1261 d 8 h |
dunkaist |
/kernel/trunk/ |
Fix r8139: delay_ms was 10x slower when using HPET. |
|
/kernel/trunk/kernel.asm
|
8160 |
1265 d 14 h |
rgimad |
/kernel/trunk/ |
added is_region_userspace, fix sysfn 26.2 address security checks |
|
/kernel/trunk/kernel.asm
|
8158 |
1266 d 7 h |
rgimad |
/kernel/trunk/ |
SysFn 26.2 security fix: now apps cannot destroy kernel memory via passing illegal address to this sysfn |
|
/kernel/trunk/kernel.asm
|
8139 |
1267 d 11 h |
dunkaist |
/kernel/trunk/ |
kernel: Make delay_ms use HPET when available.
I got a laptop that has timer on channel 1 of PIT that doesn't tick. |
|
/kernel/trunk/kernel.asm
|
8119 |
1276 d 11 h |
dunkaist |
/kernel/trunk/ |
fix r8111: Map acpi_apic_base page before access. |
|
/kernel/trunk/acpi/acpi.inc /kernel/trunk/kernel.asm
|
8111 |
1282 d 16 h |
dunkaist |
/kernel/trunk/ |
kernel: Split acpi.inc and hpet.inc from init.inc.
Also, replace some hardcoded constants with macros. |
|
/kernel/trunk/acpi /kernel/trunk/acpi/acpi.inc /kernel/trunk/core/hpet.inc
/kernel/trunk/boot/shutdown.inc /kernel/trunk/const.inc /kernel/trunk/core/apic.inc /kernel/trunk/init.inc /kernel/trunk/kernel.asm /kernel/trunk/kernel32.inc
|
8093 |
1292 d 4 h |
dunkaist |
/kernel/trunk/ |
Assert sizeof.APPDATA=256, use it instead of hardcoded 256 value. |
|
/kernel/trunk/const.inc /kernel/trunk/core/sched.inc /kernel/trunk/core/sys32.inc /kernel/trunk/core/taskman.inc /kernel/trunk/kernel.asm
|
8092 |
1298 d 3 h |
dunkaist |
/ |
uefi4kos: Read config and kernel files from the disk.
* Now there is a config file with boot options, example included.
* Config, kernel and ramdisk are loaded from the disk, not compiled in.
* DEVICES.DAT file is also optionally loaded from the disk.
* Also, move the loader to /kernel/trunk/bootloader/uefi4kos. |
|
/kernel/trunk/bootloader/uefi4kos /kernel/trunk/bootloader/uefi4kos/Tupfile.lua /kernel/trunk/bootloader/uefi4kos/kolibri.ini /kernel/trunk/bootloader/uefi4kos/uefi.inc /kernel/trunk/bootloader/uefi4kos/uefi4kos.asm
/kernel/trunk/boot/uefi.inc /kernel/trunk/boot/uefi4kos.asm
/data/Tupfile.lua /kernel/trunk/Tupfile.lua /kernel/trunk/boot/parsers.inc /kernel/trunk/const.inc /kernel/trunk/core/apic.inc /kernel/trunk/data32.inc /kernel/trunk/kernel.asm
|
8091 |
1299 d 14 h |
dunkaist |
/ |
Add extended_primary_loader to autobuild.
* Build fat1x, fat32, cdfs, after_win loaders.
* Set use_lba=1 by default in fat32 loader.
* Build kolibri.raw: flash / hdd image.
* Add example config.ini file.
* Add an option (config file and screen) to not load ramdisk image.
* Add an option (config file only) to set /sys path.
Now you can boot without a ramdisk from a storage that is supported
by the kernel itself, i.e. without loadable drivers. Thus you can not
load the system without a ramdisk from SATA/AHCI and USB drives. |
|
/kernel/trunk/bootloader/extended_primary_loader/after_win/Tupfile.lua /kernel/trunk/bootloader/extended_primary_loader/cdfs/Tupfile.lua /kernel/trunk/bootloader/extended_primary_loader/config.ini /kernel/trunk/bootloader/extended_primary_loader/fat1x/Tupfile.lua /kernel/trunk/bootloader/extended_primary_loader/fat32/Tupfile.lua
/data/Tupfile.lua /kernel/trunk/Tupfile.lua /kernel/trunk/boot/bootcode.inc /kernel/trunk/boot/booten.inc /kernel/trunk/boot/bootru.inc /kernel/trunk/boot/parsers.inc /kernel/trunk/boot/preboot.inc /kernel/trunk/boot/rdload.inc /kernel/trunk/boot/uefi4kos.asm /kernel/trunk/bootloader/extended_primary_loader/cdfs/bootsect.asm /kernel/trunk/bootloader/extended_primary_loader/fat32/bootsect.asm /kernel/trunk/const.inc /kernel/trunk/data16.inc /kernel/trunk/fs/parse_fn.inc /kernel/trunk/kernel.asm /kernel/trunk/readme-ext-loader.txt /tup.config.template
|
8089 |
1301 d 17 h |
dunkaist |
/kernel/trunk/ |
kernel: don't use ramdisk if asked.
The blue screen is not aware of this option. |
|
/kernel/trunk/boot/bootcode.inc /kernel/trunk/boot/preboot.inc /kernel/trunk/boot/rdload.inc /kernel/trunk/boot/uefi4kos.asm /kernel/trunk/const.inc /kernel/trunk/fs/parse_fn.inc /kernel/trunk/kernel.asm
|