5 ;KERNEL_BASE equ 0xFFFF800000000000
6 KERNEL_BASE equ 0xFFFFFFFF80000000
10 [extern gMultibootPtr]
11 [extern gMultibootMagic]
24 mov rax, start64.himem
29 mov dr0, rax ; Set CPU0
32 mov rax, 0x1F201F201F201F20 ; Set the screen to White on blue, space (4 characters)
38 mov rsp, 0xFFFFA00000000000 + 0x10000
41 mov edi, [gMultibootMagic - KERNEL_BASE]
42 mov esi, [gMultibootPtr - KERNEL_BASE]
54 sub ax, 0x38 ; TSS Base
55 shr ax, 4 ; One 16-byte TSS per CPU
58 KSTACK_USERSTATE_SIZE equ (16+1+5)*8 ; GPRegs, CPU, IRET
59 [global Proc_ReturnToUser]
60 [extern Proc_GetCurThread]
62 ; RBP is the handler to use
64 call Proc_GetCurThread
66 ; EAX is the current thread
68 mov rax, [rbx+40] ; Get Kernel Stack
69 sub rax, KSTACK_USERSTATE_SIZE
72 ; NOTE: This can cause corruption if the signal happens while the user
73 ; has called a kernel operation.
74 ; Good thing this can only be called on a user fault.
77 ; Get and alter User SP
78 mov rcx, [rax+KSTACK_USERSTATE_SIZE-3*8]
79 mov rdx, [rbx+60] ; Get Signal Number
81 mov rax, User_Syscall_RetAndExit
85 ; Restore Segment Registers
92 push 0x202 ; RFLAGS (IF and Rsvd)
98 ; int CallWithArgArray(void *Ptr, int NArgs, Uint *Args)
99 ; Call a function passing the array as arguments
100 [global CallWithArgArray]
107 mov [rbp+2*8], rdi ; Save Ptr to stack
142 ; No support for more
145 mov rax, [rbp+2*8] ; Ptr
156 User_Syscall_RetAndExit:
158 jmp User_Syscall_Exit