#![feature(ptr_internals)] #![feature(lang_items)] #![feature(const_fn)] #![feature(alloc)] #![feature(const_unique_new, const_atomic_usize_new)] #![feature(unique)] #![feature(allocator_api)] #![feature(global_allocator)] #![feature(abi_x86_interrupt)] #![feature(iterator_step_by)] #![no_std] #[macro_use] extern crate alloc; extern crate rlibc; extern crate volatile; extern crate spin; extern crate multiboot2; #[macro_use] extern crate bitflags; extern crate x86_64; #[macro_use] extern crate once; extern crate linked_list_allocator; #[macro_use] extern crate lazy_static; extern crate bit_field; #[macro_use] // print! mod io; mod memory; mod interrupts; mod lang; mod util; #[macro_use] // test! mod test_util; mod consts; #[allow(dead_code)] #[cfg(target_arch = "x86_64")] #[path = "arch/x86_64/mod.rs"] mod arch; // The entry point of Rust kernel #[no_mangle] pub extern "C" fn rust_main(multiboot_information_address: usize) { // ATTENTION: we have a very small stack and no guard page println!("Hello World{}", "!"); let boot_info = unsafe { multiboot2::load(multiboot_information_address) }; arch::init(); // set up guard page and map the heap pages let mut memory_controller = memory::init(boot_info); unsafe { HEAP_ALLOCATOR.lock().init(HEAP_START, HEAP_START + HEAP_SIZE); } // initialize our IDT interrupts::init(&mut memory_controller); test!(global_allocator); test!(guard_page); test!(find_mp); // TODO Build temp page map. Now page fault. let acpi = arch::driver::acpi::init().expect("Failed to init ACPI"); debug!("{:?}", acpi); unimplemented!(); arch::driver::apic::init(acpi.lapic_addr); io::init(); test_end!(); } use linked_list_allocator::LockedHeap; pub const HEAP_START: usize = 0o_000_001_000_000_0000; pub const HEAP_SIZE: usize = 100 * 1024; // 100 KiB #[global_allocator] static HEAP_ALLOCATOR: LockedHeap = LockedHeap::empty(); mod test { pub fn global_allocator() { for i in 0..10000 { format!("Some String"); } } pub fn find_mp() { use arch; let mp = arch::driver::mp::find_mp(); assert!(mp.is_some()); } pub fn guard_page() { use x86_64; // invoke a breakpoint exception x86_64::instructions::interrupts::int3(); fn stack_overflow() { stack_overflow(); // for each recursion, the return address is pushed } // trigger a stack overflow stack_overflow(); println!("It did not crash!"); } }