10caab7085
Comprehensive boot process improvement across the entire stack: Compositor (NEW): Real Rust Wayland display server (690 lines) - Full XDG shell protocol (15/15 protocols implemented and verified) - wl_shm.format, xdg_wm_base, xdg_surface.get_toplevel support - wl_buffer.release lifecycle, buffer composite to framebuffer - Framebuffer mapping via scheme:memory (Redox) with fallback - PID/status files for greeterd health checks - Integration test suite (3 cases passing) - Diagnostic tool: redbear-compositor-check DRM/KMS Chain: - KWIN_DRM_DEVICES=/scheme/drm/card0 wired through init→greeterd→compositor - session-launch propagates KWIN_DRM_DEVICES (new test, 11/11 pass) - DRM auto-detect + 5s wait loop in compositor wrapper - Boot verified: compositor uses DRM backend in QEMU Intel DRM: - Gen8-Gen12 supported with firmware (SKL/KBL/CNL/ICL/GLK/RKL/DG1/TGL/ADLP/DG2/MTL/ARL/LNL/BMG) - Gen4-Gen7 device IDs recognized, unsupported with clear error message - Linux 7.0 i915 reference for all 200+ device IDs - Display fixes: sticky pipe refresh, PIPE=4/PORT=6, 64-bit page flip, EDID skeleton - 4 durability patches wired into recipe VirtIO GPU Driver (NEW): - 220-line DRM/KMS backend for QEMU virtio-gpu - Full GpuDriver trait implementation (11 methods) - PCI BAR0 framebuffer mapping, connector/mode info, GEM management Kernel: - 4GB RAM hang root cause: MEMORY_MAP overflow at 512 entries → fixed to 1024 - Canary chain R S 1 2 3 4 5 6 7 (9 COM1 checkpoints through boot) - Verified: kernel boots at 4GB with all canaries present - 3 durability patches (P0-canary, P1-memory-overflow) Live ISO: - Preload capped at 1 GiB with partial preload messaging - P5 patch wired into bootloader recipe Greeter: - Startup progress logging (4 checkpoints) - QML crash diagnostic (exit code 1 → specific error message) - greeterd tests: 8/8 pass Boot Daemons: - dhcpd: auto-detect interface from /scheme/netcfg/ifaces/ - i2c-gpio-expanderd: I2C decode retry (3× with 50ms delay) - ucsid: same I2C decode hardening - Compositor: safe framebuffer fallback (prevents crash) Qt6 Toolchain: - -march=x86-64 for CPU compatibility (prevents invalid_opcode on core2duo) - -fpermissive for header compatibility (unlinkat/linkat redefinition) Documentation: - BOOT-PROCESS-IMPROVEMENT-PLAN.md (comprehensive, 320 lines) - PROFILE-MATRIX.md: ISO organization, RAM requirements, known issues - BOOT-PROCESS-ASSESSMENT.md: Phase 7 kernel hang diagnosis - Deleted 4 stale docs (BAREMETAL-LOG, ACPI-FIXES, 02-GAP-ANALYSIS, _CUB_RBPKGBUILD) - Cross-references updated across all docs KWin stubs replaced with real compositor delegation. redbear-kde-session script created for post-login session launch. 30+ files, 10 patches, 3 binaries, 22 tests, 0 errors.
50 lines
1.7 KiB
Diff
50 lines
1.7 KiB
Diff
diff --git a/src/header/unistd/mod.rs b/src/header/unistd/mod.rs
|
|
index 573d69ad..d7ebe10d 100644
|
|
--- a/src/header/unistd/mod.rs
|
|
+++ b/src/header/unistd/mod.rs
|
|
@@ -534,7 +534,7 @@ pub extern "C" fn getdtablesize() -> c_int {
|
|
};
|
|
if r == 0 {
|
|
let cur = unsafe { lim.assume_init() }.rlim_cur;
|
|
- match cur {
|
|
+ return match cur {
|
|
c if c < i32::MAX as u64 => c as i32,
|
|
_ => i32::MAX,
|
|
};
|
|
}
|
|
-1
|
|
}
|
|
|
|
diff --git a/src/platform/redox/mod.rs b/src/platform/redox/mod.rs
|
|
index 752339a7..8f87913b 100644
|
|
--- a/src/platform/redox/mod.rs
|
|
+++ b/src/platform/redox/mod.rs
|
|
@@ -43,7 +43,7 @@ use crate::{
|
|
sys_file,
|
|
sys_mman::{MAP_ANONYMOUS, PROT_READ, PROT_WRITE},
|
|
sys_random,
|
|
- sys_resource::{RLIM_INFINITY, rlimit, rusage},
|
|
+ sys_resource::{RLIM_INFINITY, RLIMIT_NOFILE, RLIMIT_STACK, rlimit, rusage},
|
|
sys_select::timeval,
|
|
sys_stat::{S_ISVTX, stat},
|
|
sys_statvfs::statvfs,
|
|
@@ -736,10 +736,15 @@ impl Pal for Sys {
|
|
}
|
|
|
|
fn getrlimit(resource: c_int, mut rlim: Out<rlimit>) -> Result<()> {
|
|
- todo_skip!(0, "getrlimit({}, {:p}): not implemented", resource, rlim);
|
|
+ // Return sensible defaults without logging; full kernel syscall not yet available.
|
|
+ let (cur, max) = match resource {
|
|
+ RLIMIT_NOFILE => (65536, 65536),
|
|
+ RLIMIT_STACK => (8 * 1024 * 1024, RLIM_INFINITY as u64),
|
|
+ _ => (RLIM_INFINITY as u64, RLIM_INFINITY as u64),
|
|
+ };
|
|
rlim.write(rlimit {
|
|
- rlim_cur: RLIM_INFINITY,
|
|
- rlim_max: RLIM_INFINITY,
|
|
+ rlim_cur: cur,
|
|
+ rlim_max: max,
|
|
});
|
|
Ok(())
|
|
}
|