Subversion Repositories HelenOS

Rev

Go to most recent revision | Show changed files | Directory listing | RSS feed

Filtering Options

Rev Age Author Path Log message Diff
2148 6343 d 15 h jancik /branches/arm/kernel/doc/  
2147 6343 d 15 h jancik /branches/arm/kernel/arch/arm32/include/ alf: Page table structure  
2146 6343 d 19 h kebrt /branches/arm/kernel/arch/arm32/ small changes for gxemul (elf->binary), OUTPUT_ARCH added  
2145 6343 d 19 h kebrt /branches/arm/boot/arch/arm32/ first version of arm boot loader, still cannot jump to kernel  
2144 6343 d 20 h jermar /trunk/kernel/arch/sparc64/src/mm/ Fix TSB size.  
2143 6344 d 2 h jermar /trunk/kernel/arch/sparc64/include/ Remove unneeded enum member.  
2142 6344 d 2 h jermar /trunk/kernel/generic/include/mm/ Remove out of date comment.  
2141 6344 d 18 h jermar /trunk/ The Ultimate Solution To Illegal Virtual Aliases.
It is better to avoid them completely than to fight them.
Switch the sparc64 port to 16K pages. The TLBs and TSBs
continue to operate with 8K pages only. Page tables and
other generic parts operate with 16K pages.

Because the MMU doesn't support 16K directly, each 16K
page is emulated by a pair of 8K pages. With 16K pages,
illegal aliases cannot be created in 16K D-cache.
 
2140 6344 d 19 h decky /branches/gc/ add garbage collector branch  
2139 6344 d 19 h decky /trunk/contrib/toolchain/ move to GCC 4.1.2, make scripts really host platform independent
remove orphaned libobjc
 
2138 6344 d 21 h decky /trunk/contrib/toolchain/ revert previous change (libobjc is actually HOST platform dependent)  
2137 6344 d 22 h kebrt /branches/arm/contrib/toolchain/ typo  
2136 6344 d 22 h kebrt /branches/arm/kernel/doc/ new developer  
2135 6345 d 2 h stepan /branches/arm/kernel/doc/ test commit  
2134 6345 d 22 h jermar /trunk/kernel/ Reworked handling of illegal virtual aliases caused by frame reuse.
We moved the incomplete handling from backend's frame method to
backend's page_fault method. The page_fault method is the one that
can create an illegal alias if it writes the userspace frame using
kernel address with a different page color than the page to which is
this frame mapped in userspace. When we detect this, we do D-cache
shootdown on all processors (!!!).

If we add code that accesses userspace memory from kernel address
space, we will have to check for illegal virtual aliases at all such
places.

I tested this on a 4-way simulated E6500 and a real-world Ultra 5,
which has unfortunatelly only one processor.

This solves ticket #26.
 
2133 6345 d 22 h jermar /trunk/kernel/generic/src/mm/ Coding style and indentation fixes.  
2132 6347 d 4 h jermar /trunk/kernel/generic/src/mm/ Fix coding style in the address space area backends.  
2131 6348 d 0 h decky /branches/ add development branches  
2130 6380 d 19 h jermar /tags/0.2.0.4/ Tagging 0.2.0.4 release.  
2129 6380 d 21 h jermar /trunk/ Fix small problem in sparc64 port.

Bump version to 0.2.0.4 (Sunset).
 

Show All