goto segv_term;
}
- if (!SEL_RPL(param->cs)) {
+ if (!SEL_RPL(param->execp->cs)) {
// 如果是内核页错误……
if (do_kernel(&mapping)) {
return;
}
*pte = *pte | pa | PG_PRESENT;
+ memset(PG_ALIGN(ptr), 0, PG_SIZE);
goto resolved;
}
// permission denied on anon page (e.g., write on readonly page)
// if mfile is set (Non-anonymous), then it is a mem map
if (hit_region->mfile && !PG_IS_PRESENT(*pte)) {
struct v_file* file = hit_region->mfile;
- u32_t offset =
- (ptr - hit_region->start) & (PG_SIZE - 1) + hit_region->foff;
+
+ ptr = PG_ALIGN(ptr);
+
+ u32_t offset = (ptr - hit_region->start) + hit_region->foff;
uintptr_t pa = pmm_alloc_page(__current->pid, 0);
if (!pa) {
cpu_invplg(pte);
*pte = (*pte & 0xFFF) | pa | PG_PRESENT;
- ptr = PG_ALIGN(ptr);
memset(ptr, 0, PG_SIZE);
int errno = 0;
kprintf(KERROR "(pid: %d) Segmentation fault on %p (%p:%p)\n",
__current->pid,
ptr,
- param->cs,
- param->eip);
+ param->execp->cs,
+ param->execp->eip);
__SIGSET(__current->sig_pending, _SIGSEGV);
schedule();
// should not reach