Subversion Repositories Kolibri OS

Rev

Rev 8876 | Rev 9709 | Go to most recent revision | Details | Compare with Previous | Last modification | View Log | RSS feed

Rev Author Line No. Line
2288 clevermous 1
;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
2
;;                                                              ;;
8858 rgimad 3
;; Copyright (C) KolibriOS team 2004-2021. All rights reserved. ;;
6793 pathoswith 4
;;  Distributed under terms of the GNU General Public License.  ;;
2288 clevermous 5
;;                                                              ;;
6
;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
7
 
8
$Revision: 9692 $
9
 
10
align 4 ;3A08
11
build_interrupt_table:
12
        mov     edi, idts
13
        mov     esi, sys_int
14
        mov     ecx, 0x40
15
        mov     eax, (10001110b shl 24) + os_code
16
  @@:
8050 rgimad 17
        movsw   ; low word of code-entry
18
        stosd   ; interrupt gate type : os_code selector
19
        movsw   ; high word of code-entry
2288 clevermous 20
        loop    @b
8050 rgimad 21
        movsd   ; copy low  dword of trap gate for int 0x40
22
        movsd   ; copy high dword of trap gate for int 0x40
7733 dunkaist 23
        mov     ecx, 23
24
        mov     eax, (10001110b shl 24) + os_code
25
  @@:
8050 rgimad 26
        movsw   ; low word of code-entry
27
        stosd   ; interrupt gate type : os_code selector
28
        movsw   ; high word of code-entry
7733 dunkaist 29
        loop    @b
2288 clevermous 30
        lidt    [esi]
31
        ret
32
 
33
iglobal
34
  align 4
35
  sys_int:
8050 rgimad 36
    ; exception handlers addresses (for interrupt gate construction)
2288 clevermous 37
        dd      e0,e1,e2,e3,e4,e5,e6,except_7 ; SEE: core/fpu.inc
38
        dd      e8,e9,e10,e11,e12,e13,page_fault_exc,e15
39
        dd      e16, e17,e18, e19
40
        times   12 dd unknown_interrupt ;int_20..int_31
41
 
8050 rgimad 42
    ; interrupt handlers addresses (for interrupt gate construction)
7733 dunkaist 43
        ; 0x20+ are IRQ handlers
44
        dd irq0
45
        rept 12 irqn:1  \{dd irq_serv.irq_\#irqn\}
46
        dd irqD
47
        rept 18 irqn:14 \{dd irq_serv.irq_\#irqn\}
2288 clevermous 48
 
7733 dunkaist 49
        ; int_0x40 gate trap (for directly copied)
50
        dw i40 and 0xFFFF, os_code, 11101111b shl 8, i40 shr 16
2288 clevermous 51
 
7733 dunkaist 52
        rept 23 irqn:33 \{dd irq_serv.irq_\#irqn\}
53
 
2288 clevermous 54
  idtreg: ; data for LIDT instruction (!!! must be immediately below sys_int data)
55
        dw      2*($-sys_int-4)-1
8050 rgimad 56
        dd      idts ; 0x8000B100
57
        dw      0    ; alignment
2288 clevermous 58
 
59
  msg_fault_sel dd  msg_exc_8,msg_exc_u,msg_exc_a,msg_exc_b
6817 dunkaist 60
                dd  msg_exc_c,msg_exc_d,msg_exc_e,msg_exc_u
61
                dd  msg_exc_u,msg_exc_11
2288 clevermous 62
 
63
  msg_exc_8     db "Double fault", 0
64
  msg_exc_u     db "Undefined Exception", 0
65
  msg_exc_a     db "Invalid TSS", 0
66
  msg_exc_b     db "Segment not present", 0
67
  msg_exc_c     db "Stack fault", 0
68
  msg_exc_d     db "General protection fault", 0
69
  msg_exc_e     db "Page fault", 0
6817 dunkaist 70
  msg_exc_11    db "Alignment Check", 0
2288 clevermous 71
 
3342 yogev_ezra 72
  if lang eq sp
3344 yogev_ezra 73
    include 'core/sys32-sp.inc'
3342 yogev_ezra 74
  else
75
    msg_sel_ker   db "kernel", 0
76
    msg_sel_app   db "application", 0
3309 esevece 77
  end if
2288 clevermous 78
 
79
endg
80
 
81
macro save_ring3_context {
82
        pushad
83
}
84
macro restore_ring3_context {
85
        popad
86
}
87
macro exc_wo_code [num] {
88
  e#num :
89
        save_ring3_context
90
        mov     bl, num
91
        jmp     exc_c
92
} exc_wo_code   0,1,2,3,4,5,6,15,16,19
93
 
94
macro exc_w_code [num] {
95
  e#num :
96
        add     esp, 4
97
        save_ring3_context
98
        mov     bl, num
99
        jmp     exc_c
100
} exc_w_code    8,9,10,11,12,13,17,18
101
 
102
 
103
uglobal
104
  pf_err_code   dd ?
105
endg
106
 
8050 rgimad 107
page_fault_exc:                   ; foolproof: selectors are clobbered ...
108
        pop     [ss:pf_err_code]  ; actually, until the next #PF
2288 clevermous 109
        save_ring3_context
110
        mov     bl, 14
111
 
8050 rgimad 112
exc_c:                            ; exceptions (all but 7th - #NM)
113
 ; stack frame when exception/interrupt from ring3 + pushad (i.e right here)
2288 clevermous 114
  reg_ss        equ esp+0x30
115
  reg_esp3      equ esp+0x2C
116
  reg_eflags    equ esp+0x28
117
  reg_cs3       equ esp+0x24
118
  reg_eip       equ esp+0x20
8050 rgimad 119
 ; this if frame from pushad
2288 clevermous 120
  reg_eax       equ esp+0x1C
121
  reg_ecx       equ esp+0x18
122
  reg_edx       equ esp+0x14
123
  reg_ebx       equ esp+0x10
124
  reg_esp0      equ esp+0x0C
125
  reg_ebp       equ esp+0x08
126
  reg_esi       equ esp+0x04
127
  reg_edi       equ esp+0x00
128
 
8050 rgimad 129
        mov     ax, app_data       ; exception
130
        mov     ds, ax             ; load proper values
131
        mov     es, ax             ; to registers
8051 rgimad 132
        cld                        ; clear the direction flag
2288 clevermous 133
        movzx   ebx, bl
134
; redirect to V86 manager? (EFLAGS & 0x20000) != 0?
135
        test    byte[reg_eflags+2], 2
136
        jnz     v86_exc_c
8050 rgimad 137
        cmp     bl, 14             ; #PF
2288 clevermous 138
        jne     @f
139
        call    page_fault_handler ; SEE: core/memory.inc
140
  @@:
141
        mov     esi, [current_slot]
142
        btr     [esi+APPDATA.except_mask], ebx
143
        jnc     @f
144
        mov     eax, [esi+APPDATA.exc_handler]
145
        test    eax, eax
146
        jnz     IRetToUserHook
147
  @@:
148
        cli
149
        mov     eax, [esi+APPDATA.debugger_slot]
150
        test    eax, eax
151
        jnz     .debug
6793 pathoswith 152
; not debuggee => say error and terminate
153
        call    show_error_parameters
2288 clevermous 154
        sti
8876 rgimad 155
        mov     [edx + TASKDATA.state], TSTATE_TERMINATING
3534 clevermous 156
        call    wakeup_osloop
3615 clevermous 157
        call    change_task
158
; If we're here, then the main OS thread has crashed before initializing IDLE thread.
159
; Or they both have crashed. Anyway, things are hopelessly broken.
160
        hlt
161
        jmp     $-1
2288 clevermous 162
.debug:
163
; we are debugged process, notify debugger and suspend ourself
164
; eax=debugger PID
165
        mov     ecx, 1          ; debug_message code=other_exception
166
        cmp     bl, 1           ; #DB
167
        jne     .notify         ; notify debugger and suspend ourself
168
        mov     ebx, dr6        ; debug_message data=DR6_image
169
        xor     edx, edx
170
        mov     dr6, edx
171
        mov     edx, dr7
172
        mov     cl, not 8
173
  .l1:
174
        shl     dl, 2
175
        jc      @f
176
        and     bl, cl
177
  @@:
178
        sar     cl, 1
179
        jc      .l1
180
        mov     cl, 3           ; debug_message code=debug_exception
181
.notify:
182
        push    ebx             ; debug_message data
9692 Doczom 183
        mov     ebx, [current_slot]
184
        push    [ebx + APPDATA.tid] ; PID
2288 clevermous 185
        push    ecx             ; debug_message code ((here: ecx==1/3))
186
        mov     cl, 12          ; debug_message size
187
        call    debugger_notify ;; only ONE using, inline ??? SEE: core/debug.inc
188
        add     esp, 12
189
        mov     edx, [TASK_BASE]
8876 rgimad 190
        mov     [edx+TASKDATA.state], TSTATE_RUN_SUSPENDED
2288 clevermous 191
        call    change_task     ; SEE: core/shed.inc
192
        restore_ring3_context
193
        iretd
194
 
195
IRetToUserHook:
196
        xchg    eax, [reg_eip]
197
        sub     dword[reg_esp3], 8
198
        mov     edi, [reg_esp3]
199
        stosd
200
        mov     [edi], ebx
201
        restore_ring3_context
202
; simply return control to interrupted process
203
unknown_interrupt:
204
        iretd
205
 
206
;-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
207
; bl - error vector
208
show_error_parameters:
209
        cmp     bl, 0x06
210
        jnz     .no_ud
211
        push    ebx
212
        mov     ebx, ud_user_message
213
        mov     ebp, notifyapp
214
        call    fs_execute_from_sysdir_param
215
        pop     ebx
216
.no_ud:
9692 Doczom 217
        mov     edx, [current_slot];not scratched below
3309 esevece 218
        if lang eq sp
9692 Doczom 219
        DEBUGF  1, "K : Proceso - terminado forzado PID: %x [%s]\n", [edx + APPDATA.tid], [current_slot]
3309 esevece 220
        else
9692 Doczom 221
        DEBUGF  1, "K : Process - forced terminate PID: %x [%s]\n", [edx + APPDATA.tid], [current_slot]
3309 esevece 222
        end if
2288 clevermous 223
        cmp     bl, 0x08
224
        jb      .l0
6817 dunkaist 225
        cmp     bl, 0x11
2288 clevermous 226
        jbe     .l1
227
  .l0:
228
        mov     bl, 0x09
229
  .l1:
230
        mov     eax, [msg_fault_sel+ebx*4 - 0x08*4]
231
        DEBUGF  1, "K : %s\n", eax
232
        mov     eax, [reg_cs3+4]
233
        mov     edi, msg_sel_app
234
        mov     ebx, [reg_esp3+4]
235
        cmp     eax, app_code
236
        je      @f
237
        mov     edi, msg_sel_ker
238
        mov     ebx, [reg_esp0+4]
239
    @@:
240
        DEBUGF  1, "K : EAX : %x EBX : %x ECX : %x\n", [reg_eax+4], [reg_ebx+4], [reg_ecx+4]
241
        DEBUGF  1, "K : EDX : %x ESI : %x EDI : %x\n", [reg_edx+4], [reg_esi+4], [reg_edi+4]
242
        DEBUGF  1, "K : EBP : %x EIP : %x ESP : %x\n", [reg_ebp+4], [reg_eip+4], ebx
243
        DEBUGF  1, "K : Flags : %x CS : %x (%s)\n", [reg_eflags+4], eax, edi
3911 mario79 244
 
3909 mario79 245
        DEBUGF  1, "K : Stack dump:\n"
3911 mario79 246
        push    eax ebx ecx edx
247
        call    .check_ESP
248
        test    eax, eax
249
        jnz     .error_ESP
250
        DEBUGF  1, "K : [ESP+00]: %x",[ebx]
251
        add     ebx, 4
252
        call    .check_ESP
253
        test    eax, eax
254
        jnz     .error_ESP
255
        DEBUGF  1, " [ESP+04]: %x",[ebx]
256
        add     ebx, 4
257
        call    .check_ESP
258
        test    eax, eax
259
        jnz     .error_ESP
5356 serge 260
        DEBUGF  1, " [ESP+08]: %x\n",[ebx]
3911 mario79 261
        add     ebx, 4
262
        call    .check_ESP
263
        test    eax, eax
264
        jnz     .error_ESP
265
        DEBUGF  1, "K : [ESP+12]: %x",[ebx]
266
        add     ebx, 4
267
        call    .check_ESP
268
        test    eax, eax
269
        jnz     .error_ESP
270
        DEBUGF  1, " [ESP+16]: %x",[ebx]
271
        add     ebx, 4
272
        call    .check_ESP
273
        test    eax, eax
274
        jnz     .error_ESP
275
        DEBUGF  1, " [ESP+20]: %x\n",[ebx]
276
        add     ebx, 4
277
        call    .check_ESP
278
        test    eax, eax
279
        jnz     .error_ESP
280
        DEBUGF  1, "K : [ESP+24]: %x",[ebx]
281
        add     ebx, 4
282
        call    .check_ESP
283
        test    eax, eax
284
        jnz     .error_ESP
285
        DEBUGF  1, " [ESP+28]: %x",[ebx]
286
        add     ebx, 4
287
        call    .check_ESP
288
        test    eax, eax
289
        jnz     .error_ESP
5356 serge 290
        DEBUGF  1, " [ESP+32]: %x\n",[ebx]
3911 mario79 291
        pop     edx ecx ebx eax
2288 clevermous 292
        ret
3911 mario79 293
.error_ESP:
294
        pop     edx ecx ebx eax
295
        DEBUGF  1, "\n"
296
        DEBUGF  1, "K : Unexpected end of the stack\n"
297
        ret
298
;--------------------------------------
299
.check_ESP:
300
        push    ebx
301
        shr     ebx, 12
302
        mov     ecx, ebx
303
        shr     ecx, 10
304
        mov     edx, [master_tab+ecx*4]
5356 serge 305
        test    edx, PG_READ
8050 rgimad 306
        jz      .fail             ; page table is not created
307
                                  ; incorrect address in the program
3911 mario79 308
 
309
        mov     eax, [page_tabs+ebx*4]
310
        test    eax, 2
8050 rgimad 311
        jz      .fail             ; address not reserved for use. error
5356 serge 312
 
313
        pop     ebx
3911 mario79 314
        xor     eax, eax
5356 serge 315
        ret
316
 
3911 mario79 317
.fail:
318
        pop     ebx
319
        xor     eax, eax
320
        dec     eax
321
        ret
2288 clevermous 322
;-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
323
 
324
  restore  reg_ss
325
  restore  reg_esp3
326
  restore  reg_eflags
327
  restore  reg_cs
328
  restore  reg_eip
329
  restore  reg_eax
330
  restore  reg_ecx
331
  restore  reg_edx
332
  restore  reg_ebx
333
  restore  reg_esp0
334
  restore  reg_ebp
335
  restore  reg_esi
336
  restore  reg_edi
337
 
338
 
339
align 4
3534 clevermous 340
lock_application_table:
341
        push    eax ecx edx
342
        mov     ecx, application_table_mutex
343
        call    mutex_lock
2288 clevermous 344
 
8869 rgimad 345
        mov     eax, [current_slot_idx]
9692 Doczom 346
        shl     eax, BSF sizeof.APPDATA
347
        mov     eax, [eax + SLOT_BASE + APPDATA.tid]
2288 clevermous 348
 
3534 clevermous 349
        mov     [application_table_owner], eax
2288 clevermous 350
 
3534 clevermous 351
        pop     edx ecx eax
2288 clevermous 352
 
353
        ret
354
 
355
align 4
3534 clevermous 356
unlock_application_table:
357
        push    eax ecx edx
2288 clevermous 358
 
3534 clevermous 359
        mov     [application_table_owner], 0
360
        mov     ecx, application_table_mutex
361
        call    mutex_unlock
2288 clevermous 362
 
3534 clevermous 363
        pop     edx ecx eax
2288 clevermous 364
 
365
        ret
366
 
8050 rgimad 367
; sysfn 64 implementation
2288 clevermous 368
align 4
369
sys_resize_app_memory:
8050 rgimad 370
; in:   eax = 64 - function number
371
;       ebx = 1 - number of its only subfunction
372
;       ecx = new amount of memory
373
; out:
374
;       eax = 0 - success
375
;       eax = 1 - out of memory
2288 clevermous 376
 
377
;        cmp    eax,1
378
        dec     ebx
379
        jnz     .no_application_mem_resize
4313 mario79 380
 
381
        mov     eax, [pg_data.pages_free]
382
        shl     eax, 12
383
        cmp     eax, ecx
384
        jae     @f
385
 
386
        xor     eax, eax
387
        inc     eax
388
        jmp     .store_result
389
@@:
2288 clevermous 390
        stdcall new_mem_resize, ecx
4313 mario79 391
.store_result:
2288 clevermous 392
        mov     [esp+32], eax
393
.no_application_mem_resize:
394
        ret
395
 
396
iglobal
397
;  process_terminating  db 'K : Process - terminating',13,10,0
398
;  process_terminated   db 'K : Process - done',13,10,0
399
  msg_obj_destroy       db 'K : destroy app object',13,10,0
400
endg
401
 
402
; param
403
;  esi= slot
404
 
405
align 4
406
terminate: ; terminate application
5130 serge 407
destroy_thread:
2288 clevermous 408
 
5130 serge 409
        .slot     equ esp+4             ;locals
410
        .process  equ esp               ;ptr to parent process
2288 clevermous 411
 
5130 serge 412
 
2288 clevermous 413
        push    esi        ;save .slot
414
 
415
        shl     esi, 8
5130 serge 416
        mov     edx, [SLOT_BASE+esi+APPDATA.process]
417
        test    edx, edx
418
        jnz     @F
2288 clevermous 419
        pop     esi
8869 rgimad 420
        shl     esi, BSF sizeof.TASKDATA
8874 rgimad 421
        mov     [TASK_TABLE+esi+TASKDATA.state], TSTATE_FREE
2288 clevermous 422
        ret
423
@@:
5130 serge 424
        push    edx                     ;save .process
3534 clevermous 425
        lea     edx, [SLOT_BASE+esi]
426
        call    scheduler_remove_thread
427
        call    lock_application_table
2288 clevermous 428
 
429
; if the process is in V86 mode...
430
        mov     eax, [.slot]
431
        shl     eax, 8
432
        mov     esi, [eax+SLOT_BASE+APPDATA.pl0_stack]
433
        add     esi, RING0_STACK_SIZE
434
        cmp     [eax+SLOT_BASE+APPDATA.saved_esp0], esi
435
        jz      .nov86
436
; ...it has page directory for V86 mode
437
        mov     esi, [eax+SLOT_BASE+APPDATA.saved_esp0]
438
        mov     ecx, [esi+4]
5130 serge 439
        mov     [eax+SLOT_BASE+APPDATA.process], ecx
2288 clevermous 440
; ...and I/O permission map for V86 mode
441
        mov     ecx, [esi+12]
442
        mov     [eax+SLOT_BASE+APPDATA.io_map], ecx
443
        mov     ecx, [esi+8]
444
        mov     [eax+SLOT_BASE+APPDATA.io_map+4], ecx
445
.nov86:
8050 rgimad 446
; destroy per-thread kernel objects
2288 clevermous 447
        mov     esi, [.slot]
448
        shl     esi, 8
449
        add     esi, SLOT_BASE+APP_OBJ_OFFSET
450
@@:
451
        mov     eax, [esi+APPOBJ.fd]
452
        test    eax, eax
453
        jz      @F
454
 
455
        cmp     eax, esi
456
        je      @F
457
 
458
        push    esi
459
        call    [eax+APPOBJ.destroy]
460
           DEBUGF 1,"%s",msg_obj_destroy
461
        pop     esi
462
        jmp     @B
463
@@:
464
        mov     esi, [.slot]
3534 clevermous 465
        cmp     [fpu_owner], esi ; if user fpu last -> fpu user = 2
2288 clevermous 466
        jne     @F
467
 
3534 clevermous 468
        mov     [fpu_owner], 2
8093 dunkaist 469
        mov     eax, [sizeof.APPDATA*2+SLOT_BASE+APPDATA.fpu_state]
2288 clevermous 470
        clts
471
        bt      [cpu_caps], CAPS_SSE
472
        jnc     .no_SSE
473
        fxrstor [eax]
474
        jmp     @F
475
.no_SSE:
476
        fnclex
477
        frstor  [eax]
478
@@:
479
 
480
        mov     [KEY_COUNT], byte 0    ; empty keyboard buffer
481
        mov     [BTN_COUNT], byte 0    ; empty button buffer
482
 
483
 
484
; remove defined hotkeys
485
        mov     eax, hotkey_list
486
.loop:
487
        cmp     [eax+8], esi
488
        jnz     .cont
489
        mov     ecx, [eax]
490
        jecxz   @f
491
        push    dword [eax+12]
492
        pop     dword [ecx+12]
493
@@:
494
        mov     ecx, [eax+12]
495
        push    dword [eax]
496
        pop     dword [ecx]
497
        xor     ecx, ecx
498
        mov     [eax], ecx
499
        mov     [eax+4], ecx
500
        mov     [eax+8], ecx
501
        mov     [eax+12], ecx
502
.cont:
503
        add     eax, 16
504
        cmp     eax, hotkey_list+256*16
505
        jb      .loop
2709 mario79 506
; get process PID
507
        mov     eax, esi
9692 Doczom 508
        shl     eax, BSF sizeof.APPDATA
509
        mov     eax, [eax + SLOT_BASE + APPDATA.tid]
2709 mario79 510
; compare current lock input with process PID
511
        cmp     eax, [PID_lock_input]
512
        jne     @f
513
 
514
        xor     eax, eax
515
        mov     [PID_lock_input], eax
516
@@:
2288 clevermous 517
; remove hotkeys in buffer
518
        mov     eax, hotkey_buffer
519
.loop2:
520
        cmp     [eax], esi
521
        jnz     .cont2
522
        and     dword [eax+4], 0
523
        and     dword [eax], 0
524
.cont2:
525
        add     eax, 8
526
        cmp     eax, hotkey_buffer+120*8
527
        jb      .loop2
528
 
529
        mov     ecx, esi          ; remove buttons
530
  bnewba2:
531
        mov     edi, [BTN_ADDR]
532
        mov     eax, edi
533
        cld
534
        movzx   ebx, word [edi]
535
        inc     bx
536
  bnewba:
537
        dec     bx
538
        jz      bnmba
539
        add     eax, 0x10
540
        cmp     cx, [eax]
541
        jnz     bnewba
542
        pusha
543
        mov     ecx, ebx
544
        inc     ecx
545
        shl     ecx, 4
546
        mov     ebx, eax
547
        add     eax, 0x10
548
        call    memmove
549
        dec     dword [edi]
550
        popa
551
        jmp     bnewba2
552
  bnmba:
553
 
554
        pusha   ; save window coordinates for window restoring
555
        cld
8858 rgimad 556
        shl     esi, BSF sizeof.WDATA
2288 clevermous 557
        add     esi, window_data
558
        mov     eax, [esi+WDATA.box.left]
559
        mov     [draw_limits.left], eax
560
        add     eax, [esi+WDATA.box.width]
561
        mov     [draw_limits.right], eax
562
        mov     eax, [esi+WDATA.box.top]
563
        mov     [draw_limits.top], eax
564
        add     eax, [esi+WDATA.box.height]
565
        mov     [draw_limits.bottom], eax
566
 
567
        xor     eax, eax
8858 rgimad 568
        mov     edi, esi
569
        mov     ecx, sizeof.WDATA/4
570
        rep stosd
571
 
2288 clevermous 572
        lea     edi, [esi-window_data+draw_data]
8858 rgimad 573
        mov     ecx, sizeof.WDATA/4
2288 clevermous 574
        rep stosd
575
        popa
576
 
577
; debuggee test
578
        pushad
579
        mov     edi, esi
9692 Doczom 580
        shl     edi, BSF sizeof.APPDATA
581
        mov     eax, [SLOT_BASE + edi + APPDATA.debugger_slot]
2288 clevermous 582
        test    eax, eax
583
        jz      .nodebug
3598 clevermous 584
        movi    ecx, 8
9692 Doczom 585
        push    dword [SLOT_BASE + edi + APPDATA.tid]; PID
2288 clevermous 586
        push    2
587
        call    debugger_notify
588
        pop     ecx
589
        pop     ecx
590
.nodebug:
591
        popad
592
 
593
        mov     ebx, [.slot]
594
        shl     ebx, 8
595
        push    ebx
596
        mov     ebx, [SLOT_BASE+ebx+APPDATA.pl0_stack]
597
 
598
        stdcall kernel_free, ebx
599
 
600
        pop     ebx
601
        mov     ebx, [SLOT_BASE+ebx+APPDATA.cur_dir]
602
        stdcall kernel_free, ebx
603
 
604
        mov     edi, [.slot]
605
        shl     edi, 8
606
        add     edi, SLOT_BASE
607
 
608
        mov     eax, [edi+APPDATA.io_map]
8093 dunkaist 609
        cmp     eax, [SLOT_BASE+sizeof.APPDATA+APPDATA.io_map]
2288 clevermous 610
        je      @F
611
        call    free_page
612
@@:
613
        mov     eax, [edi+APPDATA.io_map+4]
8093 dunkaist 614
        cmp     eax, [SLOT_BASE+sizeof.APPDATA+APPDATA.io_map+4]
2288 clevermous 615
        je      @F
616
        call    free_page
617
@@:
5130 serge 618
        lea     ebx, [edi+APPDATA.list]
619
        list_del ebx                    ;destroys edx, ecx
620
 
2288 clevermous 621
        mov     eax, 0x20202020
622
        stosd
623
        stosd
624
        stosd
625
        mov     ecx, 244/4
626
        xor     eax, eax
627
        rep stosd
628
 
629
  ; activate window
630
        movzx   eax, word [WIN_STACK + esi*2]
8866 rgimad 631
        cmp     eax, [thread_count]
2288 clevermous 632
        jne     .dont_activate
633
        pushad
634
 .check_next_window:
635
        dec     eax
636
        cmp     eax, 1
637
        jbe     .nothing_to_activate
638
        lea     esi, [WIN_POS+eax*2]
639
        movzx   edi, word [esi]              ; edi = process
8869 rgimad 640
        shl     edi, BSF sizeof.TASKDATA
8874 rgimad 641
        cmp     [TASK_TABLE + edi + TASKDATA.state], TSTATE_FREE ; skip free slots
2288 clevermous 642
        je      .check_next_window
643
        add     edi, window_data
644
; \begin{diamond}[19.09.2006]
645
; skip minimized windows
646
        test    [edi + WDATA.fl_wstate], WSTATE_MINIMIZED
647
        jnz     .check_next_window
648
; \end{diamond}
649
        call    waredraw
650
 .nothing_to_activate:
651
        popad
652
 .dont_activate:
653
 
654
        push    esi     ; remove hd1 & cd & flp reservation
9692 Doczom 655
        shl     esi, BSF sizeof.APPDATA
656
        mov     esi, [esi + SLOT_BASE + APPDATA.tid]
2288 clevermous 657
        cmp     [cd_status], esi
658
        jnz     @f
659
        call    free_cd_channel
660
        and     [cd_status], 0
661
@@:
662
        pop     esi
663
        cmp     [bgrlockpid], esi
664
        jnz     @f
665
        and     [bgrlockpid], 0
666
        and     [bgrlock], 0
667
@@:
668
 
669
        pusha                 ; remove all port reservations
670
        mov     edx, esi
9692 Doczom 671
        shl     edx, BSF sizeof.APPDATA
672
        mov     edx, [edx + SLOT_BASE + APPDATA.tid]
2288 clevermous 673
 
674
  rmpr0:
675
 
676
        mov     esi, [RESERVED_PORTS]
677
 
678
        test    esi, esi
679
        jz      rmpr9
680
 
681
  rmpr3:
682
 
683
        mov     edi, esi
684
        shl     edi, 4
685
        add     edi, RESERVED_PORTS
686
 
687
        cmp     edx, [edi]
688
        je      rmpr4
689
 
690
        dec     esi
691
        jnz     rmpr3
692
 
693
        jmp     rmpr9
694
 
695
  rmpr4:
696
 
697
        mov     ecx, 256
698
        sub     ecx, esi
699
        shl     ecx, 4
700
 
701
        mov     esi, edi
702
        add     esi, 16
703
        cld
704
        rep movsb
705
 
706
        dec     dword [RESERVED_PORTS]
707
 
708
        jmp     rmpr0
709
 
710
  rmpr9:
711
 
712
        popa
713
        mov     edi, esi ; do not run this process slot
8869 rgimad 714
        shl     edi, BSF sizeof.TASKDATA
8874 rgimad 715
        mov     [edi+TASK_TABLE + TASKDATA.state], TSTATE_FREE
2288 clevermous 716
; debugger test - terminate all debuggees
717
        mov     eax, 2
9692 Doczom 718
        mov     ecx, SLOT_BASE+2*sizeof.APPDATA + APPDATA.debugger_slot
2288 clevermous 719
.xd0:
8866 rgimad 720
        cmp     eax, [thread_count]
2288 clevermous 721
        ja      .xd1
722
        cmp     dword [ecx], esi
723
        jnz     @f
724
        and     dword [ecx], 0
725
        pushad
726
        xchg    eax, ecx
727
        mov     ebx, 2
728
        call    sys_system
729
        popad
730
@@:
731
        inc     eax
9692 Doczom 732
        add     ecx, sizeof.APPDATA
2288 clevermous 733
        jmp     .xd0
734
.xd1:
5130 serge 735
;release slot
736
 
737
        bts     [thr_slot_map], esi
738
 
739
        mov     ecx, [.process]
740
        lea     eax, [ecx+PROC.thr_list]
741
        cmp     eax, [eax+LHEAD.next]
742
        jne     @F
743
 
744
        call    destroy_process.internal
745
@@:
2288 clevermous 746
        sti     ; .. and life goes on
747
 
748
        mov     eax, [draw_limits.left]
749
        mov     ebx, [draw_limits.top]
750
        mov     ecx, [draw_limits.right]
751
        mov     edx, [draw_limits.bottom]
752
        call    calculatescreen
753
        xor     eax, eax
754
        xor     esi, esi
755
        call    redrawscreen
756
 
3534 clevermous 757
        call    unlock_application_table
2288 clevermous 758
    ;mov   esi,process_terminated
759
    ;call  sys_msg_board_str
5130 serge 760
        add     esp, 8
2288 clevermous 761
        ret
762
restore .slot
5130 serge 763
restore .process
2288 clevermous 764
 
3296 clevermous 765
; Three following procedures are used to guarantee that
766
; some part of kernel code will not be terminated from outside
767
; while it is running.
768
; Note: they do not protect a thread from terminating due to errors inside
769
; the thread; accessing a nonexisting memory would still terminate it.
770
 
771
; First two procedures must be used in pair by thread-to-be-protected
772
; to signal the beginning and the end of an important part.
773
; It is OK to have nested areas.
774
 
775
; The last procedure must be used by outside wanna-be-terminators;
776
; if it is safe to terminate the given thread immediately, it returns eax=1;
777
; otherwise, it returns eax=0 and notifies the target thread that it should
778
; terminate itself when leaving a critical area (the last critical area if
779
; they are nested).
780
 
781
; Implementation. Those procedures use one dword in APPDATA for the thread,
782
; APPDATA.terminate_protection.
783
; * The upper bit is 1 during normal operations and 0 when terminate is requested.
784
; * Other bits form a number = depth of critical regions,
785
;   plus 1 if the upper bit is 1.
786
; * When this dword goes to zero, the thread should be destructed,
787
;   and the procedure in which it happened becomes responsible for destruction.
788
 
789
; Enter critical area. Called by thread which wants to be protected.
790
proc protect_from_terminate
791
        mov     edx, [current_slot]
792
; Atomically increment depth of critical areas and get the old value.
793
        mov     eax, 1
794
        lock xadd [edx+APPDATA.terminate_protection], eax
795
; If the old value was zero, somebody has started to terminate us,
796
; so we are destructing and cannot do anything protected.
797
; Otherwise, return to the caller.
798
        test    eax, eax
799
        jz      @f
800
        ret
801
@@:
802
; Wait for somebody to finish us.
803
        call    change_task
804
        jmp     @b
805
endp
806
 
807
; Leave critical area. Called by thread which wants to be protected.
808
proc unprotect_from_terminate
809
        mov     edx, [current_slot]
810
; Atomically decrement depth of critical areas.
811
        lock dec [edx+APPDATA.terminate_protection]
812
; If the result of decrement is zero, somebody has requested termination,
813
; but at that moment we were inside a critical area; terminate now.
814
        jz      sys_end
815
; Otherwise, return to the caller.
816
        ret
817
endp
818
 
8093 dunkaist 819
; Request termination of thread identified by edx = SLOT_BASE + slot*sizeof.APPDATA.
3296 clevermous 820
; Called by anyone.
821
proc request_terminate
822
        xor     eax, eax        ; set return value
823
; Atomically clear the upper bit. If it was already zero, then
824
; somebody has requested termination before us, so just exit.
825
        lock btr [edx+APPDATA.terminate_protection], 31
826
        jnc     .unsafe
827
; Atomically decrement depth of critical areas.
828
        lock dec [edx+APPDATA.terminate_protection]
829
; If the result of decrement is nonzero, the target thread is inside a
830
; critical area; leave termination to leaving that area.
831
        jnz     .unsafe
832
; Otherwise, it is safe to kill the target now and the caller is responsible
833
; for this. Return eax=1.
834
        inc     eax
835
.unsafe:
836
        ret
837
endp
838