Block a user
1f5f6a5e3b
libc: Add strcspn (with a test)
6816a5b11f
Scheduler: do not reboot on PID 1 exit if we are in a test
27a18a608c
libc: Implement fgets, fgetc, getc, getchar (with buffered read IO)
51e024588e
libc: Update inttypes.h
bef9158450
Kernel, libc: Add isatty() and F_ISTTY to fcntl()
93207820b3
libc: Add a few errors to errno.h
62fa773b27
libc: Add dummy argv
6d7a8a0d0b
libc: Add very basic strtoul()
bf026d0dea
libc: Add bad time() function
bd4c587409
sh: Try to execute programs in /bin if they are not found
a06e1c5a21
VFS: Remove warning when file is not found
27448611b3
UserMemory: do not map refs into kernel memory
712f4f5e51
KernelHeap: Add more debug logging
9d0dfbaedf
PMM: Log invalid frees
073c90e948
InitRD: leak an unused pointer so kmalloc() doesn't map memory all the time
7d71bd192d
Tools: Add a fast-run.sh script which does not build, only run
weird memory stuff
Ok, so this is a little bit clearer now. The userspace pointer is still perfectly valid, what happens is KernelHeap believes it's "full" and refuses to allocate space to map it into the kernel's…
de167c3c67
sh: Show last command' exit status in prompt if non-zero
cd9ecc1746
Kernel: Return EFAULT when the kernel believes the wstatus pointer is invalid