Rev 2575 | Rev 4055 | Go to most recent revision | Details | Compare with Previous | Last modification | View Log | RSS feed
Rev | Author | Line No. | Line |
---|---|---|---|
1 | jermar | 1 | /* |
2071 | jermar | 2 | * Copyright (c) 2005 Jakub Jermar |
1 | jermar | 3 | * All rights reserved. |
4 | * |
||
5 | * Redistribution and use in source and binary forms, with or without |
||
6 | * modification, are permitted provided that the following conditions |
||
7 | * are met: |
||
8 | * |
||
9 | * - Redistributions of source code must retain the above copyright |
||
10 | * notice, this list of conditions and the following disclaimer. |
||
11 | * - Redistributions in binary form must reproduce the above copyright |
||
12 | * notice, this list of conditions and the following disclaimer in the |
||
13 | * documentation and/or other materials provided with the distribution. |
||
14 | * - The name of the author may not be used to endorse or promote products |
||
15 | * derived from this software without specific prior written permission. |
||
16 | * |
||
17 | * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR |
||
18 | * IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES |
||
19 | * OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. |
||
20 | * IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, |
||
21 | * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT |
||
22 | * NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, |
||
23 | * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY |
||
24 | * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT |
||
25 | * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF |
||
26 | * THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. |
||
27 | */ |
||
28 | |||
1888 | jermar | 29 | /** @addtogroup ia32 |
1702 | cejka | 30 | * @{ |
31 | */ |
||
32 | /** @file |
||
33 | */ |
||
34 | |||
1 | jermar | 35 | #include <userspace.h> |
36 | #include <arch/pm.h> |
||
37 | #include <arch/types.h> |
||
38 | #include <arch.h> |
||
1078 | jermar | 39 | #include <proc/uarg.h> |
703 | jermar | 40 | #include <mm/as.h> |
1 | jermar | 41 | |
65 | decky | 42 | |
43 | /** Enter userspace |
||
44 | * |
||
45 | * Change CPU protection level to 3, enter userspace. |
||
46 | * |
||
47 | */ |
||
1078 | jermar | 48 | void userspace(uspace_arg_t *kernel_uarg) |
1 | jermar | 49 | { |
413 | jermar | 50 | ipl_t ipl; |
1121 | jermar | 51 | |
413 | jermar | 52 | ipl = interrupts_disable(); |
22 | jermar | 53 | |
2082 | decky | 54 | asm volatile ( |
1078 | jermar | 55 | /* |
56 | * Clear nested task flag. |
||
57 | */ |
||
703 | jermar | 58 | "pushfl\n" |
59 | "pop %%eax\n" |
||
1078 | jermar | 60 | "and $0xffffbfff, %%eax\n" |
703 | jermar | 61 | "push %%eax\n" |
62 | "popfl\n" |
||
141 | vana | 63 | |
1112 | palkovsky | 64 | /* Set up GS register (TLS) */ |
65 | "movl %6, %%gs\n" |
||
66 | |||
125 | jermar | 67 | "pushl %0\n" |
68 | "pushl %1\n" |
||
69 | "pushl %2\n" |
||
70 | "pushl %3\n" |
||
71 | "pushl %4\n" |
||
1078 | jermar | 72 | "movl %5, %%eax\n" |
1104 | jermar | 73 | "iret\n" |
315 | jermar | 74 | : |
2575 | jermar | 75 | : "i" (selector(UDATA_DES) | PL_USER), |
76 | "r" ((uint8_t *) kernel_uarg->uspace_stack + |
||
77 | THREAD_STACK_SIZE), |
||
78 | "r" (ipl), |
||
79 | "i" (selector(UTEXT_DES) | PL_USER), |
||
80 | "r" (kernel_uarg->uspace_entry), |
||
81 | "r" (kernel_uarg->uspace_uarg), |
||
82 | "r" (selector(TLS_DES)) |
||
315 | jermar | 83 | : "eax"); |
65 | decky | 84 | |
85 | /* Unreachable */ |
||
703 | jermar | 86 | for(;;) |
87 | ; |
||
1 | jermar | 88 | } |
1702 | cejka | 89 | |
1888 | jermar | 90 | /** @} |
1702 | cejka | 91 | */ |