Releases: Elieren/Kernel-C
Releases · Elieren/Kernel-C
v0.0.7
Added kernel memory protection via per-task page tables.
- Each task now runs in its own isolated memory space
- Programs can only access their own memory and
mallocallocations - Any out-of-bounds access or wild pointer instantly kills the task with SIGSEGV
- Kernel memory is fully protected from user-mode code
v0.0.6
Migrated file system storage from RAMDisk to physical disk (IDE)
The file system now uses persistent storage on the physical disk instead of RAM:
- Files are saved directly to the hard drive
- Data persists across reboots — all files and directories are automatically restored from disk
How it works
The kernel uses a separate physical disk for storage (not an ISO image).
Setup Instructions
For Virtual Machines (QEMU, VirtualBox, VMware, etc.):
- Create a new virtual disk
- Attach it to the VM as an IDE device at Primary IDE Master (IDE 0) — this is required for the kernel to detect it (temporary limitation)
- Boot the kernel
For Real Hardware:
- Ensure your target disk is configured as Primary IDE Master (IDE 0)
- Boot the kernel
First Boot Notice
v0.0.5
Support for user mode has been added.
You can now:
- Enhance system security: The kernel is protected from faulty application behavior.
- Run applications in an isolated space: Crashes in programs do not affect the stability of the entire operating system.
- Control resource access: The kernel manages applications' access to hardware and memory.
- Create a stable environment for programs: Applications run in a predictable and protected environment.