source: trunk/kernel/syscalls/sys_barrier.c @ 628

Last change on this file since 628 was 626, checked in by alain, 5 years ago

This version has been tested on the sort multithreaded application
for TSAR_IOB architectures ranging from 1 to 8 clusters.
It fixes three bigs bugs:
1) the dev_ioc device API has been modified: the dev_ioc_sync_read()
and dev_ioc_sync_write() function use now extended pointers on the
kernel buffer to access a mapper stored in any cluster.
2) the hal_uspace API has been modified: the hal_copy_to_uspace()
and hal_copy_from_uspace() functions use now a (cxy,ptr) couple
to identify the target buffer (equivalent to an extended pointer.
3) an implementation bug has been fixed in the assembly code contained
in the hal_copy_to_uspace() and hal_copy_from_uspace() functions.

File size: 6.2 KB
Line 
1/*
2 * sys_barrier.c - Access a POSIX barrier.
3 *
4 * authors       Alain Greiner (2016,2017,2018,2019)
5 *
6 * Copyright (c) UPMC Sorbonne Universites
7 *
8 * This file is part of ALMOS-MKH.
9 *
10 * ALMOS-MKH is free software; you can redistribute it and/or modify it
11 * under the terms of the GNU General Public License as published by
12 * the Free Software Foundation; version 2.0 of the License.
13 *
14 * ALMOS-MKH is distributed in the hope that it will be useful, but
15 * WITHOUT ANY WARRANTY; without even the implied warranty of
16 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
17 * General Public License for more details.
18 *
19 * You should have received a copy of the GNU General Public License
20 * along with ALMOS-MKH; if not, write to the Free Software Foundation,
21 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA
22 */
23
24#include <hal_kernel_types.h>
25#include <hal_special.h>
26#include <hal_uspace.h>
27#include <hal_vmm.h>
28#include <errno.h>
29#include <thread.h>
30#include <printk.h>
31#include <vmm.h>
32#include <syscalls.h>
33#include <remote_barrier.h>
34
35#if DEBUG_SYS_BARRIER
36//////////////////////////////////////////////////////
37static char * sys_barrier_op_str( uint32_t operation )
38{
39        if     ( operation == BARRIER_INIT    ) return "INIT";
40        else if( operation == BARRIER_DESTROY ) return "DESTROY";
41        else if( operation == BARRIER_WAIT    ) return "WAIT";
42        else                                    return "undefined";
43}
44#endif
45
46//////////////////////////////////
47int sys_barrier( intptr_t   vaddr,
48                 uint32_t   operation,
49                 uint32_t   count,
50                 intptr_t   attr )   
51{
52        error_t                 error;
53    vseg_t                * vseg;
54    pthread_barrierattr_t   k_attr;
55
56    thread_t  * this    = CURRENT_THREAD;
57    process_t * process = this->process;
58
59#if (DEBUG_SYS_BARRIER || CONFIG_INSTRUMENTATION_SYSCALLS)
60uint64_t     tm_start = hal_get_cycles();
61#endif
62
63#if DEBUG_SYS_BARRIER
64if( DEBUG_SYS_BARRIER < tm_start )
65printk("\n[%s] thread[%x,%x] enters for %s / count %d / cycle %d\n",
66__FUNCTION__, process->pid, this->trdid, sys_barrier_op_str(operation), count,
67(uint32_t)tm_start );
68#endif
69
70    // check vaddr in user vspace
71        error = vmm_get_vseg( process , vaddr , &vseg );
72        if( error )
73    {
74
75#if DEBUG_SYSCALLS_ERROR
76printk("\n[ERROR] in %s : unmapped barrier %x / thread %x / process %x\n",
77__FUNCTION__ , vaddr , this->trdid , process->pid );
78hal_vmm_display( process , false );
79#endif
80        this->errno = error;
81        return -1;
82    }
83
84    // execute requested operation
85        switch( operation )
86        {
87        //////////////////
88            case BARRIER_INIT:
89        {
90            if( attr != 0 )   // QDT barrier required
91            {
92                error = vmm_get_vseg( process , attr , &vseg );
93                if( error )
94                {
95
96#if DEBUG_SYSCALLS_ERROR
97printk("\n[ERROR] in %s : unmapped barrier attributes %x / thread %x / process %x\n",
98__FUNCTION__ , attr , this->trdid , process->pid );
99hal_vmm_display( process , false );
100#endif
101                    this->errno = EINVAL;
102                    return -1;
103                }
104 
105                // copy barrier attributes into kernel space
106                hal_copy_from_uspace( local_cxy,
107                                      &k_attr,
108                                      (void*)attr,
109                                      sizeof(pthread_barrierattr_t) );
110
111                if ( count != k_attr.x_size * k_attr.y_size *k_attr.nthreads ) 
112                {
113
114#if DEBUG_SYSCALLS_ERROR
115printk("\n[ERROR] in %s : wrong arguments / count %d / x_size %d / y_size %d / nthreads %x\n",
116__FUNCTION__, count, k_attr.x_size, k_attr.y_size, k_attr.nthreads );
117#endif
118                    this->errno = EINVAL;
119                    return -1;
120                }
121 
122
123                // call relevant system function
124                error = generic_barrier_create( vaddr , count , &k_attr );
125            }
126            else               // simple barrier required
127            {
128                error = generic_barrier_create( vaddr , count , NULL );
129            }
130
131                    if( error )
132            {
133
134#if DEBUG_SYSCALLS_ERROR
135printk("\n[ERROR] in %s : cannot create barrier %x / thread %x / process %x\n",
136__FUNCTION__ , vaddr , this->trdid , process->pid );
137#endif
138                this->errno = ENOMEM;
139                return -1;
140            }
141                        break;
142        }
143        //////////////////
144            case BARRIER_WAIT:
145        {
146            xptr_t barrier_xp = generic_barrier_from_ident( vaddr );
147
148            if( barrier_xp == XPTR_NULL )     // user error
149            {
150
151#if DEBUG_SYSCALLS_ERROR
152printk("\n[ERROR] in %s : barrier %x not registered / thread %x / process %x\n",
153__FUNCTION__ , (intptr_t)vaddr , this->trdid , process->pid );
154#endif
155                this->errno = EINVAL;
156                return -1;
157            }
158            else                          // success
159            {
160                generic_barrier_wait( barrier_xp ); 
161            }
162            break;
163        }
164        /////////////////////
165            case BARRIER_DESTROY:
166        {
167            xptr_t barrier_xp = generic_barrier_from_ident( vaddr );
168
169            if( barrier_xp == XPTR_NULL )     // user error
170            {
171
172#if DEBUG_SYSCALLS_ERROR
173printk("\n[ERROR] in %s : barrier %x not registered / thread %x / process %x\n",
174__FUNCTION__ , (intptr_t)vaddr , this->trdid , process->pid );
175#endif
176                this->errno = EINVAL;
177                return -1;
178            }
179            else                          // success
180            {
181                generic_barrier_destroy( barrier_xp ); 
182            }
183            break;
184        }
185        ////////
186        default: {
187            assert ( false, "illegal operation type <%x>", operation );
188        }
189        }  // end switch
190
191    hal_fence();
192
193#if (DEBUG_SYS_BARRIER || CONFIG_INSTRUMENTATION_SYSCALLS)
194uint64_t     tm_end = hal_get_cycles();
195#endif
196
197#if DEBUG_SYS_BARRIER
198if( DEBUG_SYS_BARRIER < tm_end )
199printk("\n[%s] thread[%x,%x] exit for %s / cycle %d\n",
200__FUNCTION__, process->pid, this->trdid, sys_barrier_op_str(operation), (uint32_t)tm_end );
201#endif
202
203#if CONFIG_INSTRUMENTATION_SYSCALLS
204hal_atomic_add( &syscalls_cumul_cost[SYS_BARRIER] , tm_end - tm_start );
205hal_atomic_add( &syscalls_occurences[SYS_BARRIER] , 1 );
206#endif
207
208        return 0;
209
210}  // end sys_barrier()
211
Note: See TracBrowser for help on using the repository browser.