History log of /xv6-public/x86.h (Results 1 – 25 of 49)
Revision (<<< Hide revision tags) (Show revision tags >>>) Date Author Comments
Revision tags: xv6-rev11, xv6-rev9
# 7894fcd2 25-Aug-2016 Frans Kaashoek <kaashoek@mit.edu>

Remove trailing white space with:
for f in *.{h,c}; do sed -i .sed 's/[[:blank:]]*$//' $f; done
(Thanks to Nicolás Wolovick)


Revision tags: xv6-rev8, xv6-rev7, osdi12-submit, xv6-rev6
# 30c1901a 02-Sep-2011 Austin Clements <amdragon@mit.edu>

Remove unused x86.h definitions


# 6bb92213 01-Sep-2011 Frans Kaashoek <kaashoek@26-4-190.dynamic.csail.mit.edu>

Fix layout


# d0f3efca 01-Sep-2011 Austin Clements <amdragon@mit.edu>

Use stosl in memset; makes boot time bearable


# 9aa0337d 29-Jul-2011 Frans Kaashoek <kaashoek@Frans-Kaashoeks-MacBook-Pro.local>

Map kernel high
Very important to give qemu memory through PHYSTOP :(


Revision tags: xv6-rev5, xv6-2010, xv6-rev4
# d599aa2e 02-Sep-2010 Austin Clements <amdragon@mit.edu>

Remove unused nop_pause function.


# 29c054df 31-Aug-2010 Austin Clements <amdragon@mit.edu>

We don't use lesp/lebp and using them at all from C would be fraught with peril. Keep resp/rebp, but fix their code style.


# 92639b6b 31-Aug-2010 Austin Clements <amdragon@mit.edu>

Follow xv6 code style. Also fixes indexing for these functions


# 37ee75f4 31-Aug-2010 Austin Clements <amdragon@mit.edu>

Rearrange for better page breaking


# 4714c205 23-Jul-2010 Frans Kaashoek <kaashoek@Frans-Kaashoeks-MacBook-Pro.local>

Checkpoint page-table version for SMP
Includes code for TLB shootdown (which actually seems unnecessary for xv6)


# 40889627 02-Jul-2010 Frans Kaashoek <kaashoek@fransk-6.local>

Initial version of single-cpu xv6 with page tables


Revision tags: xv6-rev3
# d26025d1 02-Sep-2009 Russ Cox <rsc@x40.(none)>

can set just %gs now.


# 0aef8914 08-Aug-2009 Russ Cox <rsc@swtch.com>

shuffle and tweak for formatting.
pdf has very good page breaks now.
would be a good copy for fall 2009.


# 7b644318 31-May-2009 rsc <rsc>

clean up %fs %gs use


# 19333efb 31-May-2009 rsc <rsc>

Some proc cleanup, moving some of copyproc into allocproc.

Also, an experiment: use "thread-local" storage for c and cp
instead of the #define macro for curproc[cpu()].


# 21575761 08-Mar-2009 rsc <rsc>

be consistent: no underscores in function names


# c396d065 08-Mar-2009 rsc <rsc>

xv6/x86.h: add stosb, fix bugs in insl/outsl (rep not repne)


# 4003e9be 08-Mar-2009 rsc <rsc>

xv6/x86.h: inline assembly cleanup


# c7317d4d 24-Sep-2008 kolya <kolya>

always save and restore %fs, %gs to ensure old segment entries are never
accessible to user from the hidden CPU segment registers.


Revision tags: xv6-2008
# 943fd378 01-Oct-2007 rsc <rsc>

Incorporate new understanding of/with Intel SMP spec.

Dropped cmpxchg in favor of xchg, to match lecture notes.

Use xchg to release lock, for future protection and to
keep gcc from acting clever.


# 9fd9f804 30-Sep-2007 rsc <rsc>

Re: why cpuid() in locking code?

rtm wrote:
> Why does acquire() call cpuid()? Why does release() call cpuid()?

The cpuid in acquire is redundant with the cmpxchg, as you said.
I have removed the c

Re: why cpuid() in locking code?

rtm wrote:
> Why does acquire() call cpuid()? Why does release() call cpuid()?

The cpuid in acquire is redundant with the cmpxchg, as you said.
I have removed the cpuid from acquire.

The cpuid in release is actually doing something important,
but not on the hardware. It keeps gcc from reordering the
lock->locked assignment above the other two during optimization.
(Not that current gcc -O2 would choose to do that, but it is allowed to.)
I have replaced the cpuid in release with a "gcc barrier" that
keeps gcc from moving things around but has no hardware effect.

On a related note, I don't think the cpuid in mpmain is necessary,
for the same reason that the cpuid wasn't needed in release.

As to the question of whether

acquire();
x = protected;
release();

might read protected after release(), I still haven't convinced
myself whether it can. I'll put the cpuid back into release if
we determine that it can.

Russ

show more ...


# c8919e65 27-Sep-2007 rsc <rsc>

kernel SMP interruptibility fixes.

Last year, right before I sent xv6 to the printer, I changed the
SETGATE calls so that interrupts would be disabled on entry to
interrupt handlers, and I added the

kernel SMP interruptibility fixes.

Last year, right before I sent xv6 to the printer, I changed the
SETGATE calls so that interrupts would be disabled on entry to
interrupt handlers, and I added the nlock++ / nlock-- in trap()
so that interrupts would stay disabled while the hw handlers
(but not the syscall handler) did their work. I did this because
the kernel was otherwise causing Bochs to triple-fault in SMP
mode, and time was short.

Robert observed yesterday that something was keeping the SMP
preemption user test from working. It turned out that when I
simplified the lapic code I swapped the order of two register
writes that I didn't realize were order dependent. I fixed that
and then since I had everything paged in kept going and tried
to figure out why you can't leave interrupts on during interrupt
handlers. There are a few issues.

First, there must be some way to keep interrupts from "stacking
up" and overflowing the stack. Keeping interrupts off the whole
time solves this problem -- even if the clock tick handler runs
long enough that the next clock tick is waiting when it finishes,
keeping interrupts off means that the handler runs all the way
through the "iret" before the next handler begins. This is not
really a problem unless you are putting too many prints in trap
-- if the OS is doing its job right, the handlers should run
quickly and not stack up.

Second, if xv6 had page faults, then it would be important to
keep interrupts disabled between the start of the interrupt and
the time that cr2 was read, to avoid a scenario like:

p1 page faults [cr2 set to faulting address]
p1 starts executing trapasm.S
clock interrupt, p1 preempted, p2 starts executing
p2 page faults [cr2 set to another faulting address]
p2 starts, finishes fault handler
p1 rescheduled, reads cr2, sees wrong fault address

Alternately p1 could be rescheduled on the other cpu, in which
case it would still see the wrong cr2. That said, I think cr2
is the only interrupt state that isn't pushed onto the interrupt
stack atomically at fault time, and xv6 doesn't care. (This isn't
entirely hypothetical -- I debugged this problem on Plan 9.)

Third, and this is the big one, it is not safe to call cpu()
unless interrupts are disabled. If interrupts are enabled then
there is no guarantee that, between the time cpu() looks up the
cpu id and the time that it the result gets used, the process
has not been rescheduled to the other cpu. For example, the
very commonly-used expression curproc[cpu()] (aka the macro cp)
can end up referring to the wrong proc: the code stores the
result of cpu() in %eax, gets rescheduled to the other cpu at
just the wrong instant, and then reads curproc[%eax].

We use curproc[cpu()] to get the current process a LOT. In that
particular case, if we arranged for the current curproc entry
to be addressed by %fs:0 and just use a different %fs on each
CPU, then we could safely get at curproc even with interrupts
disabled, since the read of %fs would be atomic with the read
of %fs:0. Alternately, we could have a curproc() function that
disables interrupts while computing curproc[cpu()]. I've done
that last one.

Even in the current kernel, with interrupts off on entry to trap,
interrupts are enabled inside release if there are no locks held.
Also, the scheduler's idle loop must be interruptible at times
so that the clock and disk interrupts (which might make processes
runnable) can be handled.

In addition to the rampant use of curproc[cpu()], this little
snippet from acquire is wrong on smp:

if(cpus[cpu()].nlock == 0)
cli();
cpus[cpu()].nlock++;

because if interrupts are off then we might call cpu(), get
rescheduled to a different cpu, look at cpus[oldcpu].nlock, and
wrongly decide not to disable interrupts on the new cpu. The
fix is to always call cli(). But this is wrong too:

if(holding(lock))
panic("acquire");
cli();
cpus[cpu()].nlock++;

because holding looks at cpu(). The fix is:

cli();
if(holding(lock))
panic("acquire");
cpus[cpu()].nlock++;

I've done that, and I changed cpu() to complain the first time
it gets called with interrupts disabled. (It gets called too
much to complain every time.)

I added new functions splhi and spllo that are like acquire and
release but without the locking:

void
splhi(void)
{
cli();
cpus[cpu()].nsplhi++;
}

void
spllo(void)
{
if(--cpus[cpu()].nsplhi == 0)
sti();
}

and I've used those to protect other sections of code that refer
to cpu() when interrupts would otherwise be disabled (basically
just curproc and setupsegs). I also use them in acquire/release
and got rid of nlock.

I'm not thrilled with the names, but I think the concept -- a
counted cli/sti -- is sound. Having them also replaces the
nlock++/nlock-- in trap.c and main.c, which is nice.


Final note: it's still not safe to enable interrupts in
the middle of trap() between lapic_eoi and returning
to user space. I don't understand why, but we get a
fault on pop %es because 0x10 is a bad segment
descriptor (!) and then the fault faults trying to go into
a new interrupt because 0x8 is a bad segment descriptor too!
Triple fault. I haven't debugged this yet.

show more ...


# ab4cedb5 31-Aug-2007 rtm <rtm>

continuous quality management


Revision tags: xv6-2007, xv6-rev1
# 7bb73cdb 27-Aug-2007 rsc <rsc>

nits


# 68ae4cc1 24-Aug-2007 rsc <rsc>

comment what +m means; omit needless __


12