Subversion Repositories Kolibri OS

Rev

Rev 9709 | Rev 9742 | Go to most recent revision | Details | Compare with Previous | Last modification | View Log | RSS feed

Rev Author Line No. Line
2288 clevermous 1
;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
2
;;                                                              ;;
9715 Doczom 3
;; Copyright (C) KolibriOS team 2004-2022. All rights reserved. ;;
6793 pathoswith 4
;;  Distributed under terms of the GNU General Public License.  ;;
2288 clevermous 5
;;                                                              ;;
6
;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;
7
 
8
$Revision: 9715 $
9
 
10
align 4 ;3A08
11
build_interrupt_table:
12
        mov     edi, idts
13
        mov     esi, sys_int
14
        mov     ecx, 0x40
15
        mov     eax, (10001110b shl 24) + os_code
16
  @@:
8050 rgimad 17
        movsw   ; low word of code-entry
18
        stosd   ; interrupt gate type : os_code selector
19
        movsw   ; high word of code-entry
2288 clevermous 20
        loop    @b
8050 rgimad 21
        movsd   ; copy low  dword of trap gate for int 0x40
22
        movsd   ; copy high dword of trap gate for int 0x40
7733 dunkaist 23
        mov     ecx, 23
24
        mov     eax, (10001110b shl 24) + os_code
25
  @@:
8050 rgimad 26
        movsw   ; low word of code-entry
27
        stosd   ; interrupt gate type : os_code selector
28
        movsw   ; high word of code-entry
7733 dunkaist 29
        loop    @b
2288 clevermous 30
        lidt    [esi]
31
        ret
32
 
33
iglobal
34
  align 4
35
  sys_int:
8050 rgimad 36
    ; exception handlers addresses (for interrupt gate construction)
2288 clevermous 37
        dd      e0,e1,e2,e3,e4,e5,e6,except_7 ; SEE: core/fpu.inc
38
        dd      e8,e9,e10,e11,e12,e13,page_fault_exc,e15
39
        dd      e16, e17,e18, e19
40
        times   12 dd unknown_interrupt ;int_20..int_31
41
 
8050 rgimad 42
    ; interrupt handlers addresses (for interrupt gate construction)
7733 dunkaist 43
        ; 0x20+ are IRQ handlers
44
        dd irq0
45
        rept 12 irqn:1  \{dd irq_serv.irq_\#irqn\}
46
        dd irqD
47
        rept 18 irqn:14 \{dd irq_serv.irq_\#irqn\}
2288 clevermous 48
 
7733 dunkaist 49
        ; int_0x40 gate trap (for directly copied)
50
        dw i40 and 0xFFFF, os_code, 11101111b shl 8, i40 shr 16
2288 clevermous 51
 
7733 dunkaist 52
        rept 23 irqn:33 \{dd irq_serv.irq_\#irqn\}
53
 
2288 clevermous 54
  idtreg: ; data for LIDT instruction (!!! must be immediately below sys_int data)
55
        dw      2*($-sys_int-4)-1
8050 rgimad 56
        dd      idts ; 0x8000B100
57
        dw      0    ; alignment
2288 clevermous 58
 
59
  msg_fault_sel dd  msg_exc_8,msg_exc_u,msg_exc_a,msg_exc_b
6817 dunkaist 60
                dd  msg_exc_c,msg_exc_d,msg_exc_e,msg_exc_u
61
                dd  msg_exc_u,msg_exc_11
2288 clevermous 62
 
63
  msg_exc_8     db "Double fault", 0
64
  msg_exc_u     db "Undefined Exception", 0
65
  msg_exc_a     db "Invalid TSS", 0
66
  msg_exc_b     db "Segment not present", 0
67
  msg_exc_c     db "Stack fault", 0
68
  msg_exc_d     db "General protection fault", 0
69
  msg_exc_e     db "Page fault", 0
6817 dunkaist 70
  msg_exc_11    db "Alignment Check", 0
2288 clevermous 71
 
3342 yogev_ezra 72
  if lang eq sp
3344 yogev_ezra 73
    include 'core/sys32-sp.inc'
3342 yogev_ezra 74
  else
75
    msg_sel_ker   db "kernel", 0
76
    msg_sel_app   db "application", 0
3309 esevece 77
  end if
2288 clevermous 78
 
79
endg
80
 
81
macro save_ring3_context {
82
        pushad
83
}
84
macro restore_ring3_context {
85
        popad
86
}
87
macro exc_wo_code [num] {
88
  e#num :
89
        save_ring3_context
90
        mov     bl, num
91
        jmp     exc_c
92
} exc_wo_code   0,1,2,3,4,5,6,15,16,19
93
 
94
macro exc_w_code [num] {
95
  e#num :
96
        add     esp, 4
97
        save_ring3_context
98
        mov     bl, num
99
        jmp     exc_c
100
} exc_w_code    8,9,10,11,12,13,17,18
101
 
102
 
103
uglobal
104
  pf_err_code   dd ?
105
endg
106
 
8050 rgimad 107
page_fault_exc:                   ; foolproof: selectors are clobbered ...
108
        pop     [ss:pf_err_code]  ; actually, until the next #PF
2288 clevermous 109
        save_ring3_context
110
        mov     bl, 14
111
 
8050 rgimad 112
exc_c:                            ; exceptions (all but 7th - #NM)
113
 ; stack frame when exception/interrupt from ring3 + pushad (i.e right here)
2288 clevermous 114
  reg_ss        equ esp+0x30
115
  reg_esp3      equ esp+0x2C
116
  reg_eflags    equ esp+0x28
117
  reg_cs3       equ esp+0x24
118
  reg_eip       equ esp+0x20
8050 rgimad 119
 ; this if frame from pushad
2288 clevermous 120
  reg_eax       equ esp+0x1C
121
  reg_ecx       equ esp+0x18
122
  reg_edx       equ esp+0x14
123
  reg_ebx       equ esp+0x10
124
  reg_esp0      equ esp+0x0C
125
  reg_ebp       equ esp+0x08
126
  reg_esi       equ esp+0x04
127
  reg_edi       equ esp+0x00
128
 
8050 rgimad 129
        mov     ax, app_data       ; exception
130
        mov     ds, ax             ; load proper values
131
        mov     es, ax             ; to registers
8051 rgimad 132
        cld                        ; clear the direction flag
2288 clevermous 133
        movzx   ebx, bl
134
; redirect to V86 manager? (EFLAGS & 0x20000) != 0?
135
        test    byte[reg_eflags+2], 2
136
        jnz     v86_exc_c
8050 rgimad 137
        cmp     bl, 14             ; #PF
2288 clevermous 138
        jne     @f
139
        call    page_fault_handler ; SEE: core/memory.inc
140
  @@:
141
        mov     esi, [current_slot]
9715 Doczom 142
        btr     [esi + APPDATA.except_mask], ebx
2288 clevermous 143
        jnc     @f
9715 Doczom 144
        mov     eax, [esi + APPDATA.exc_handler]
2288 clevermous 145
        test    eax, eax
146
        jnz     IRetToUserHook
147
  @@:
148
        cli
9715 Doczom 149
        mov     eax, [esi + APPDATA.debugger_slot]
2288 clevermous 150
        test    eax, eax
151
        jnz     .debug
6793 pathoswith 152
; not debuggee => say error and terminate
9709 Doczom 153
        call    show_error_parameters  ; this function output in edx = current_slot
2288 clevermous 154
        sti
9709 Doczom 155
        mov     [edx + APPDATA.state], TSTATE_TERMINATING
3534 clevermous 156
        call    wakeup_osloop
3615 clevermous 157
        call    change_task
158
; If we're here, then the main OS thread has crashed before initializing IDLE thread.
159
; Or they both have crashed. Anyway, things are hopelessly broken.
160
        hlt
161
        jmp     $-1
2288 clevermous 162
.debug:
163
; we are debugged process, notify debugger and suspend ourself
164
; eax=debugger PID
165
        mov     ecx, 1          ; debug_message code=other_exception
166
        cmp     bl, 1           ; #DB
167
        jne     .notify         ; notify debugger and suspend ourself
168
        mov     ebx, dr6        ; debug_message data=DR6_image
169
        xor     edx, edx
170
        mov     dr6, edx
171
        mov     edx, dr7
172
        mov     cl, not 8
173
  .l1:
174
        shl     dl, 2
175
        jc      @f
176
        and     bl, cl
177
  @@:
178
        sar     cl, 1
179
        jc      .l1
180
        mov     cl, 3           ; debug_message code=debug_exception
181
.notify:
182
        push    ebx             ; debug_message data
9692 Doczom 183
        mov     ebx, [current_slot]
184
        push    [ebx + APPDATA.tid] ; PID
2288 clevermous 185
        push    ecx             ; debug_message code ((here: ecx==1/3))
186
        mov     cl, 12          ; debug_message size
187
        call    debugger_notify ;; only ONE using, inline ??? SEE: core/debug.inc
188
        add     esp, 12
9709 Doczom 189
        mov     edx, [current_slot]
190
        mov     [edx + APPDATA.state], TSTATE_RUN_SUSPENDED
2288 clevermous 191
        call    change_task     ; SEE: core/shed.inc
192
        restore_ring3_context
193
        iretd
194
 
195
IRetToUserHook:
196
        xchg    eax, [reg_eip]
197
        sub     dword[reg_esp3], 8
198
        mov     edi, [reg_esp3]
199
        stosd
200
        mov     [edi], ebx
201
        restore_ring3_context
202
; simply return control to interrupted process
203
unknown_interrupt:
204
        iretd
205
 
206
;-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
207
; bl - error vector
208
show_error_parameters:
209
        cmp     bl, 0x06
210
        jnz     .no_ud
211
        push    ebx
212
        mov     ebx, ud_user_message
213
        mov     ebp, notifyapp
214
        call    fs_execute_from_sysdir_param
215
        pop     ebx
216
.no_ud:
9692 Doczom 217
        mov     edx, [current_slot];not scratched below
3309 esevece 218
        if lang eq sp
9692 Doczom 219
        DEBUGF  1, "K : Proceso - terminado forzado PID: %x [%s]\n", [edx + APPDATA.tid], [current_slot]
3309 esevece 220
        else
9692 Doczom 221
        DEBUGF  1, "K : Process - forced terminate PID: %x [%s]\n", [edx + APPDATA.tid], [current_slot]
3309 esevece 222
        end if
2288 clevermous 223
        cmp     bl, 0x08
224
        jb      .l0
6817 dunkaist 225
        cmp     bl, 0x11
2288 clevermous 226
        jbe     .l1
227
  .l0:
228
        mov     bl, 0x09
229
  .l1:
230
        mov     eax, [msg_fault_sel+ebx*4 - 0x08*4]
231
        DEBUGF  1, "K : %s\n", eax
232
        mov     eax, [reg_cs3+4]
233
        mov     edi, msg_sel_app
234
        mov     ebx, [reg_esp3+4]
235
        cmp     eax, app_code
236
        je      @f
237
        mov     edi, msg_sel_ker
238
        mov     ebx, [reg_esp0+4]
239
    @@:
240
        DEBUGF  1, "K : EAX : %x EBX : %x ECX : %x\n", [reg_eax+4], [reg_ebx+4], [reg_ecx+4]
241
        DEBUGF  1, "K : EDX : %x ESI : %x EDI : %x\n", [reg_edx+4], [reg_esi+4], [reg_edi+4]
242
        DEBUGF  1, "K : EBP : %x EIP : %x ESP : %x\n", [reg_ebp+4], [reg_eip+4], ebx
243
        DEBUGF  1, "K : Flags : %x CS : %x (%s)\n", [reg_eflags+4], eax, edi
3911 mario79 244
 
3909 mario79 245
        DEBUGF  1, "K : Stack dump:\n"
3911 mario79 246
        push    eax ebx ecx edx
247
        call    .check_ESP
248
        test    eax, eax
249
        jnz     .error_ESP
250
        DEBUGF  1, "K : [ESP+00]: %x",[ebx]
251
        add     ebx, 4
252
        call    .check_ESP
253
        test    eax, eax
254
        jnz     .error_ESP
255
        DEBUGF  1, " [ESP+04]: %x",[ebx]
256
        add     ebx, 4
257
        call    .check_ESP
258
        test    eax, eax
259
        jnz     .error_ESP
5356 serge 260
        DEBUGF  1, " [ESP+08]: %x\n",[ebx]
3911 mario79 261
        add     ebx, 4
262
        call    .check_ESP
263
        test    eax, eax
264
        jnz     .error_ESP
265
        DEBUGF  1, "K : [ESP+12]: %x",[ebx]
266
        add     ebx, 4
267
        call    .check_ESP
268
        test    eax, eax
269
        jnz     .error_ESP
270
        DEBUGF  1, " [ESP+16]: %x",[ebx]
271
        add     ebx, 4
272
        call    .check_ESP
273
        test    eax, eax
274
        jnz     .error_ESP
275
        DEBUGF  1, " [ESP+20]: %x\n",[ebx]
276
        add     ebx, 4
277
        call    .check_ESP
278
        test    eax, eax
279
        jnz     .error_ESP
280
        DEBUGF  1, "K : [ESP+24]: %x",[ebx]
281
        add     ebx, 4
282
        call    .check_ESP
283
        test    eax, eax
284
        jnz     .error_ESP
285
        DEBUGF  1, " [ESP+28]: %x",[ebx]
286
        add     ebx, 4
287
        call    .check_ESP
288
        test    eax, eax
289
        jnz     .error_ESP
5356 serge 290
        DEBUGF  1, " [ESP+32]: %x\n",[ebx]
3911 mario79 291
        pop     edx ecx ebx eax
2288 clevermous 292
        ret
3911 mario79 293
.error_ESP:
294
        pop     edx ecx ebx eax
295
        DEBUGF  1, "\n"
296
        DEBUGF  1, "K : Unexpected end of the stack\n"
297
        ret
298
;--------------------------------------
299
.check_ESP:
300
        push    ebx
301
        shr     ebx, 12
302
        mov     ecx, ebx
303
        shr     ecx, 10
9715 Doczom 304
        mov     edx, [master_tab + ecx*4]
5356 serge 305
        test    edx, PG_READ
8050 rgimad 306
        jz      .fail             ; page table is not created
307
                                  ; incorrect address in the program
3911 mario79 308
 
9715 Doczom 309
        mov     eax, [page_tabs + ebx*4]
3911 mario79 310
        test    eax, 2
8050 rgimad 311
        jz      .fail             ; address not reserved for use. error
5356 serge 312
 
313
        pop     ebx
3911 mario79 314
        xor     eax, eax
5356 serge 315
        ret
316
 
3911 mario79 317
.fail:
318
        pop     ebx
319
        xor     eax, eax
320
        dec     eax
321
        ret
2288 clevermous 322
;-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=
323
 
324
  restore  reg_ss
325
  restore  reg_esp3
326
  restore  reg_eflags
327
  restore  reg_cs
328
  restore  reg_eip
329
  restore  reg_eax
330
  restore  reg_ecx
331
  restore  reg_edx
332
  restore  reg_ebx
333
  restore  reg_esp0
334
  restore  reg_ebp
335
  restore  reg_esi
336
  restore  reg_edi
337
 
338
 
339
align 4
3534 clevermous 340
lock_application_table:
341
        push    eax ecx edx
342
        mov     ecx, application_table_mutex
343
        call    mutex_lock
2288 clevermous 344
 
8869 rgimad 345
        mov     eax, [current_slot_idx]
9692 Doczom 346
        shl     eax, BSF sizeof.APPDATA
347
        mov     eax, [eax + SLOT_BASE + APPDATA.tid]
2288 clevermous 348
 
3534 clevermous 349
        mov     [application_table_owner], eax
2288 clevermous 350
 
3534 clevermous 351
        pop     edx ecx eax
2288 clevermous 352
 
353
        ret
354
 
355
align 4
3534 clevermous 356
unlock_application_table:
357
        push    eax ecx edx
2288 clevermous 358
 
3534 clevermous 359
        mov     [application_table_owner], 0
360
        mov     ecx, application_table_mutex
361
        call    mutex_unlock
2288 clevermous 362
 
3534 clevermous 363
        pop     edx ecx eax
2288 clevermous 364
 
365
        ret
366
 
8050 rgimad 367
; sysfn 64 implementation
2288 clevermous 368
align 4
369
sys_resize_app_memory:
8050 rgimad 370
; in:   eax = 64 - function number
371
;       ebx = 1 - number of its only subfunction
372
;       ecx = new amount of memory
373
; out:
374
;       eax = 0 - success
375
;       eax = 1 - out of memory
2288 clevermous 376
 
377
;        cmp    eax,1
378
        dec     ebx
379
        jnz     .no_application_mem_resize
4313 mario79 380
 
381
        mov     eax, [pg_data.pages_free]
382
        shl     eax, 12
383
        cmp     eax, ecx
384
        jae     @f
385
 
386
        xor     eax, eax
387
        inc     eax
388
        jmp     .store_result
389
@@:
2288 clevermous 390
        stdcall new_mem_resize, ecx
4313 mario79 391
.store_result:
2288 clevermous 392
        mov     [esp+32], eax
393
.no_application_mem_resize:
394
        ret
395
 
396
iglobal
397
;  process_terminating  db 'K : Process - terminating',13,10,0
398
;  process_terminated   db 'K : Process - done',13,10,0
399
  msg_obj_destroy       db 'K : destroy app object',13,10,0
400
endg
401
 
402
; param
403
;  esi= slot
404
 
405
align 4
406
terminate: ; terminate application
5130 serge 407
destroy_thread:
2288 clevermous 408
 
5130 serge 409
        .slot     equ esp+4             ;locals
410
        .process  equ esp               ;ptr to parent process
2288 clevermous 411
 
5130 serge 412
 
2288 clevermous 413
        push    esi        ;save .slot
414
 
9709 Doczom 415
        shl     esi, BSF sizeof.APPDATA
9715 Doczom 416
        mov     edx, [SLOT_BASE + esi + APPDATA.process]
5130 serge 417
        test    edx, edx
418
        jnz     @F
9709 Doczom 419
        mov     [SLOT_BASE + esi + APPDATA.state], TSTATE_FREE
2288 clevermous 420
        pop     esi
421
        ret
422
@@:
5130 serge 423
        push    edx                     ;save .process
9715 Doczom 424
        lea     edx, [SLOT_BASE + esi]
3534 clevermous 425
        call    scheduler_remove_thread
426
        call    lock_application_table
2288 clevermous 427
 
428
; if the process is in V86 mode...
429
        mov     eax, [.slot]
9709 Doczom 430
        shl     eax, BSF sizeof.APPDATA
9715 Doczom 431
        mov     esi, [SLOT_BASE + eax + APPDATA.pl0_stack]
2288 clevermous 432
        add     esi, RING0_STACK_SIZE
9715 Doczom 433
        cmp     [SLOT_BASE + eax + APPDATA.saved_esp0], esi
2288 clevermous 434
        jz      .nov86
435
; ...it has page directory for V86 mode
9715 Doczom 436
        mov     esi, [SLOT_BASE + eax + APPDATA.saved_esp0]
2288 clevermous 437
        mov     ecx, [esi+4]
9715 Doczom 438
        mov     [SLOT_BASE + eax + APPDATA.process], ecx
2288 clevermous 439
; ...and I/O permission map for V86 mode
440
        mov     ecx, [esi+12]
9715 Doczom 441
        mov     [SLOT_BASE + eax + APPDATA.io_map], ecx
2288 clevermous 442
        mov     ecx, [esi+8]
9715 Doczom 443
        mov     [SLOT_BASE + eax + APPDATA.io_map+4], ecx
2288 clevermous 444
.nov86:
8050 rgimad 445
; destroy per-thread kernel objects
2288 clevermous 446
        mov     esi, [.slot]
9709 Doczom 447
        shl     esi, BSF sizeof.APPDATA
9715 Doczom 448
        add     esi, SLOT_BASE + APP_OBJ_OFFSET
2288 clevermous 449
@@:
9715 Doczom 450
        mov     eax, [esi + APPOBJ.fd]
2288 clevermous 451
        test    eax, eax
452
        jz      @F
453
 
454
        cmp     eax, esi
455
        je      @F
456
 
457
        push    esi
9715 Doczom 458
        call    [eax + APPOBJ.destroy]
2288 clevermous 459
           DEBUGF 1,"%s",msg_obj_destroy
460
        pop     esi
461
        jmp     @B
462
@@:
463
        mov     esi, [.slot]
3534 clevermous 464
        cmp     [fpu_owner], esi ; if user fpu last -> fpu user = 2
2288 clevermous 465
        jne     @F
466
 
3534 clevermous 467
        mov     [fpu_owner], 2
9715 Doczom 468
        mov     eax, [SLOT_BASE + sizeof.APPDATA*2 + APPDATA.fpu_state]
2288 clevermous 469
        clts
470
        bt      [cpu_caps], CAPS_SSE
471
        jnc     .no_SSE
472
        fxrstor [eax]
473
        jmp     @F
474
.no_SSE:
475
        fnclex
476
        frstor  [eax]
477
@@:
478
 
479
        mov     [KEY_COUNT], byte 0    ; empty keyboard buffer
480
        mov     [BTN_COUNT], byte 0    ; empty button buffer
481
 
482
 
483
; remove defined hotkeys
484
        mov     eax, hotkey_list
485
.loop:
486
        cmp     [eax+8], esi
487
        jnz     .cont
488
        mov     ecx, [eax]
489
        jecxz   @f
490
        push    dword [eax+12]
491
        pop     dword [ecx+12]
492
@@:
493
        mov     ecx, [eax+12]
494
        push    dword [eax]
495
        pop     dword [ecx]
496
        xor     ecx, ecx
497
        mov     [eax], ecx
498
        mov     [eax+4], ecx
499
        mov     [eax+8], ecx
500
        mov     [eax+12], ecx
501
.cont:
502
        add     eax, 16
503
        cmp     eax, hotkey_list+256*16
504
        jb      .loop
2709 mario79 505
; get process PID
506
        mov     eax, esi
9692 Doczom 507
        shl     eax, BSF sizeof.APPDATA
508
        mov     eax, [eax + SLOT_BASE + APPDATA.tid]
2709 mario79 509
; compare current lock input with process PID
510
        cmp     eax, [PID_lock_input]
511
        jne     @f
512
 
513
        xor     eax, eax
514
        mov     [PID_lock_input], eax
515
@@:
2288 clevermous 516
; remove hotkeys in buffer
517
        mov     eax, hotkey_buffer
518
.loop2:
519
        cmp     [eax], esi
520
        jnz     .cont2
521
        and     dword [eax+4], 0
522
        and     dword [eax], 0
523
.cont2:
524
        add     eax, 8
525
        cmp     eax, hotkey_buffer+120*8
526
        jb      .loop2
527
 
528
        mov     ecx, esi          ; remove buttons
529
  bnewba2:
530
        mov     edi, [BTN_ADDR]
531
        mov     eax, edi
532
        cld
533
        movzx   ebx, word [edi]
534
        inc     bx
535
  bnewba:
536
        dec     bx
537
        jz      bnmba
538
        add     eax, 0x10
539
        cmp     cx, [eax]
540
        jnz     bnewba
541
        pusha
542
        mov     ecx, ebx
543
        inc     ecx
544
        shl     ecx, 4
545
        mov     ebx, eax
546
        add     eax, 0x10
547
        call    memmove
548
        dec     dword [edi]
549
        popa
550
        jmp     bnewba2
551
  bnmba:
552
 
553
        pusha   ; save window coordinates for window restoring
554
        cld
8858 rgimad 555
        shl     esi, BSF sizeof.WDATA
2288 clevermous 556
        add     esi, window_data
9715 Doczom 557
        mov     eax, [esi + WDATA.box.left]
2288 clevermous 558
        mov     [draw_limits.left], eax
9715 Doczom 559
        add     eax, [esi + WDATA.box.width]
2288 clevermous 560
        mov     [draw_limits.right], eax
9715 Doczom 561
        mov     eax, [esi + WDATA.box.top]
2288 clevermous 562
        mov     [draw_limits.top], eax
9715 Doczom 563
        add     eax, [esi + WDATA.box.height]
2288 clevermous 564
        mov     [draw_limits.bottom], eax
565
 
566
        xor     eax, eax
8858 rgimad 567
        mov     edi, esi
568
        mov     ecx, sizeof.WDATA/4
569
        rep stosd
570
 
9715 Doczom 571
        lea     edi, [esi - window_data + draw_data]
8858 rgimad 572
        mov     ecx, sizeof.WDATA/4
2288 clevermous 573
        rep stosd
574
        popa
575
 
576
; debuggee test
577
        pushad
578
        mov     edi, esi
9692 Doczom 579
        shl     edi, BSF sizeof.APPDATA
580
        mov     eax, [SLOT_BASE + edi + APPDATA.debugger_slot]
2288 clevermous 581
        test    eax, eax
582
        jz      .nodebug
3598 clevermous 583
        movi    ecx, 8
9692 Doczom 584
        push    dword [SLOT_BASE + edi + APPDATA.tid]; PID
2288 clevermous 585
        push    2
586
        call    debugger_notify
587
        pop     ecx
588
        pop     ecx
589
.nodebug:
590
        popad
591
 
592
        mov     ebx, [.slot]
9709 Doczom 593
        shl     ebx, BSF sizeof.APPDATA
2288 clevermous 594
        push    ebx
9715 Doczom 595
        mov     ebx, [SLOT_BASE + ebx + APPDATA.pl0_stack]
2288 clevermous 596
 
597
        stdcall kernel_free, ebx
598
 
599
        pop     ebx
9715 Doczom 600
        mov     ebx, [SLOT_BASE + ebx + APPDATA.cur_dir]
2288 clevermous 601
        stdcall kernel_free, ebx
602
 
603
        mov     edi, [.slot]
9709 Doczom 604
        shl     edi, BSF sizeof.APPDATA
2288 clevermous 605
        add     edi, SLOT_BASE
606
 
9715 Doczom 607
        mov     eax, [edi + APPDATA.io_map]
608
        cmp     eax, [SLOT_BASE + sizeof.APPDATA+APPDATA.io_map]
2288 clevermous 609
        je      @F
610
        call    free_page
611
@@:
612
        mov     eax, [edi+APPDATA.io_map+4]
8093 dunkaist 613
        cmp     eax, [SLOT_BASE+sizeof.APPDATA+APPDATA.io_map+4]
2288 clevermous 614
        je      @F
615
        call    free_page
616
@@:
9715 Doczom 617
        lea     ebx, [edi + APPDATA.list]
5130 serge 618
        list_del ebx                    ;destroys edx, ecx
619
 
2288 clevermous 620
        mov     eax, 0x20202020
621
        stosd
622
        stosd
623
        stosd
624
        mov     ecx, 244/4
625
        xor     eax, eax
626
        rep stosd
627
 
628
  ; activate window
629
        movzx   eax, word [WIN_STACK + esi*2]
8866 rgimad 630
        cmp     eax, [thread_count]
2288 clevermous 631
        jne     .dont_activate
632
        pushad
633
 .check_next_window:
634
        dec     eax
635
        cmp     eax, 1
636
        jbe     .nothing_to_activate
9715 Doczom 637
        lea     esi, [WIN_POS + eax*2]
2288 clevermous 638
        movzx   edi, word [esi]              ; edi = process
9709 Doczom 639
        shl     edi, BSF sizeof.APPDATA
640
        cmp     [SLOT_BASE + edi + APPDATA.state], TSTATE_FREE ; skip free slots
2288 clevermous 641
        je      .check_next_window
9709 Doczom 642
        shr     edi, 3
2288 clevermous 643
        add     edi, window_data
644
; \begin{diamond}[19.09.2006]
645
; skip minimized windows
646
        test    [edi + WDATA.fl_wstate], WSTATE_MINIMIZED
647
        jnz     .check_next_window
648
; \end{diamond}
649
        call    waredraw
650
 .nothing_to_activate:
651
        popad
652
 .dont_activate:
653
 
654
        push    esi     ; remove hd1 & cd & flp reservation
9692 Doczom 655
        shl     esi, BSF sizeof.APPDATA
9715 Doczom 656
        mov     esi, [SLOT_BASE + esi + APPDATA.tid]
2288 clevermous 657
        cmp     [cd_status], esi
658
        jnz     @f
659
        call    free_cd_channel
660
        and     [cd_status], 0
661
@@:
662
        pop     esi
663
        cmp     [bgrlockpid], esi
664
        jnz     @f
665
        and     [bgrlockpid], 0
666
        and     [bgrlock], 0
667
@@:
668
 
669
        pusha                 ; remove all port reservations
670
        mov     edx, esi
9692 Doczom 671
        shl     edx, BSF sizeof.APPDATA
9715 Doczom 672
        mov     edx, [SLOT_BASE + edx + APPDATA.tid]
2288 clevermous 673
 
674
  rmpr0:
675
 
676
        mov     esi, [RESERVED_PORTS]
677
 
678
        test    esi, esi
679
        jz      rmpr9
680
 
681
  rmpr3:
682
 
683
        mov     edi, esi
684
        shl     edi, 4
685
        add     edi, RESERVED_PORTS
686
 
687
        cmp     edx, [edi]
688
        je      rmpr4
689
 
690
        dec     esi
691
        jnz     rmpr3
692
 
693
        jmp     rmpr9
694
 
695
  rmpr4:
696
 
697
        mov     ecx, 256
698
        sub     ecx, esi
699
        shl     ecx, 4
700
 
701
        mov     esi, edi
702
        add     esi, 16
703
        cld
704
        rep movsb
705
 
706
        dec     dword [RESERVED_PORTS]
707
 
708
        jmp     rmpr0
709
 
710
  rmpr9:
711
 
712
        popa
713
        mov     edi, esi ; do not run this process slot
9709 Doczom 714
        shl     edi, BSF sizeof.APPDATA
9715 Doczom 715
        mov     [SLOT_BASE + edi + APPDATA.state], TSTATE_FREE
2288 clevermous 716
; debugger test - terminate all debuggees
717
        mov     eax, 2
9715 Doczom 718
        mov     ecx, SLOT_BASE + 2*sizeof.APPDATA + APPDATA.debugger_slot
2288 clevermous 719
.xd0:
8866 rgimad 720
        cmp     eax, [thread_count]
2288 clevermous 721
        ja      .xd1
722
        cmp     dword [ecx], esi
723
        jnz     @f
724
        and     dword [ecx], 0
725
        pushad
726
        xchg    eax, ecx
727
        mov     ebx, 2
728
        call    sys_system
729
        popad
730
@@:
731
        inc     eax
9692 Doczom 732
        add     ecx, sizeof.APPDATA
2288 clevermous 733
        jmp     .xd0
734
.xd1:
5130 serge 735
;release slot
736
 
737
        bts     [thr_slot_map], esi
738
 
739
        mov     ecx, [.process]
9715 Doczom 740
        lea     eax, [ecx + PROC.thr_list]
741
        cmp     eax, [eax + LHEAD.next]
5130 serge 742
        jne     @F
743
 
744
        call    destroy_process.internal
745
@@:
2288 clevermous 746
        sti     ; .. and life goes on
747
 
748
        mov     eax, [draw_limits.left]
749
        mov     ebx, [draw_limits.top]
750
        mov     ecx, [draw_limits.right]
751
        mov     edx, [draw_limits.bottom]
752
        call    calculatescreen
753
        xor     eax, eax
754
        xor     esi, esi
755
        call    redrawscreen
756
 
3534 clevermous 757
        call    unlock_application_table
2288 clevermous 758
    ;mov   esi,process_terminated
759
    ;call  sys_msg_board_str
5130 serge 760
        add     esp, 8
2288 clevermous 761
        ret
762
restore .slot
5130 serge 763
restore .process
2288 clevermous 764
 
3296 clevermous 765
; Three following procedures are used to guarantee that
766
; some part of kernel code will not be terminated from outside
767
; while it is running.
768
; Note: they do not protect a thread from terminating due to errors inside
769
; the thread; accessing a nonexisting memory would still terminate it.
770
 
771
; First two procedures must be used in pair by thread-to-be-protected
772
; to signal the beginning and the end of an important part.
773
; It is OK to have nested areas.
774
 
775
; The last procedure must be used by outside wanna-be-terminators;
776
; if it is safe to terminate the given thread immediately, it returns eax=1;
777
; otherwise, it returns eax=0 and notifies the target thread that it should
778
; terminate itself when leaving a critical area (the last critical area if
779
; they are nested).
780
 
781
; Implementation. Those procedures use one dword in APPDATA for the thread,
782
; APPDATA.terminate_protection.
783
; * The upper bit is 1 during normal operations and 0 when terminate is requested.
784
; * Other bits form a number = depth of critical regions,
785
;   plus 1 if the upper bit is 1.
786
; * When this dword goes to zero, the thread should be destructed,
787
;   and the procedure in which it happened becomes responsible for destruction.
788
 
789
; Enter critical area. Called by thread which wants to be protected.
790
proc protect_from_terminate
791
        mov     edx, [current_slot]
792
; Atomically increment depth of critical areas and get the old value.
793
        mov     eax, 1
9715 Doczom 794
        lock xadd [edx + APPDATA.terminate_protection], eax
3296 clevermous 795
; If the old value was zero, somebody has started to terminate us,
796
; so we are destructing and cannot do anything protected.
797
; Otherwise, return to the caller.
798
        test    eax, eax
799
        jz      @f
800
        ret
801
@@:
802
; Wait for somebody to finish us.
803
        call    change_task
804
        jmp     @b
805
endp
806
 
807
; Leave critical area. Called by thread which wants to be protected.
808
proc unprotect_from_terminate
809
        mov     edx, [current_slot]
810
; Atomically decrement depth of critical areas.
9715 Doczom 811
        lock dec [edx + APPDATA.terminate_protection]
3296 clevermous 812
; If the result of decrement is zero, somebody has requested termination,
813
; but at that moment we were inside a critical area; terminate now.
814
        jz      sys_end
815
; Otherwise, return to the caller.
816
        ret
817
endp
818
 
8093 dunkaist 819
; Request termination of thread identified by edx = SLOT_BASE + slot*sizeof.APPDATA.
3296 clevermous 820
; Called by anyone.
821
proc request_terminate
822
        xor     eax, eax        ; set return value
823
; Atomically clear the upper bit. If it was already zero, then
824
; somebody has requested termination before us, so just exit.
9715 Doczom 825
        lock btr [edx + APPDATA.terminate_protection], 31
3296 clevermous 826
        jnc     .unsafe
827
; Atomically decrement depth of critical areas.
9715 Doczom 828
        lock dec [edx + APPDATA.terminate_protection]
3296 clevermous 829
; If the result of decrement is nonzero, the target thread is inside a
830
; critical area; leave termination to leaving that area.
831
        jnz     .unsafe
832
; Otherwise, it is safe to kill the target now and the caller is responsible
833
; for this. Return eax=1.
834
        inc     eax
835
.unsafe:
836
        ret
837
endp
838