-
Nov 16, 2015
Bare Metal Rust 3: Configure your PIC to handle interrupts correctly
Want to build your own kernel in Rust? See Bare Metal Rust to get started.
We're almost ready to write a keyboard driver in Rust! But first, we need to deal with two obstacles: setting up the PIC, and handling interrupts without crashing. This is one of the most frustrating steps, as Julia Evans explains in her hilarious and very helpful post After 5 days, my OS doesn't crash when I press a key:
- Turn interrupts on (
sti). - The OS AGAIN crashes every time i press a key. Read “I Can’t Get Interrupts Working” again. This is called “I’m receiving EXC9 instead of IRQ1 when striking a key?!” Feel on top of this.
- Remap the PIC so that interrupt
igets mapped toi + 32, because of an Intel design bug. This basically looks like just typing in a bunch of random numbers, but it works. - 12. THE OS IS STILL CRASHING WHEN I PRESS A KEY. This continues for 2 days.
We're going to follow Julia Evans' roadmap. (She saved me several days of suffering.) And once we're past these next few obstacles, things will get easier. Let's talk to the PIC first.
The 8295/8295A Programmable Interrupt Controller
We're going to with the retro approach here, and handle interrupts using the 8295 PIC. You can read all about it on the OSDev wiki, as usual. The PIC works fine in 64-bit mode, but someday, if we want to support multiple processors and I/O, we'll eventually need to support the newer APIC and IOAPIC. But for now, let's keep it simple.
Technically, the x86 architecture has two PIC chips, usually known as PIC1 and PIC2. PIC1 handles external interrupts 0–7, and PIC2 handles 8–15. PIC2 is actually chained into interrupt 2 on PIC1, which means that we'll frequently need to talk to them as a pair.
Unfortunately, the modern x86 architecture reserves CPU interrupts 0-31 for processor exceptions. This means that when we press a key, the CPU will think it just received the "EXC9" mentioned by Julia Evans, which the Intel manual tells me is "Coprocessor-Segment-Overrun Exception." So we need to tell our PIC that, no, McGyver and Miami Vice are no longer cutting-edge television, that there's this new-fangled thing called 386 Protected Mode, and that it needs to start mapping interrupts at offset 32.
- Turn interrupts on (
-
Nov 11, 2015
Bare Metal Rust 2: Retarget your compiler so interrupts are not evil
Want to build your own kernel in Rust? See the Bare Metal Rust page for more resources and more posts in this series. There's just a few more posts to go until we have keyboard I/O!
Hacking on kernels in Rust is a lot of fun, but it can also result in massive frustration when QEMU starts rebooting continuously because of a triple fault. One good way to minimize frustration is to wander on over to the ever-helpful OSDev wiki. It's sort of like having an experienced kernel developer on hand to give grouchy but sanity-saving advice.
The OSDev Beginner Mistakes page, in particular, has saved me a couple times already. But there's one bit of advice that I want to focus on today, which I've marked in boldface below:
Beginners often ask "What is the easiest way to do X?" rather than "What is the best, proper, correct way to do X?". This is dangerous as the newcomer doesn't invest time into understanding the superior way to implement something, but instead picks a conceptually simpler method copied from a tutorial. Indeed, the simpler route is often too simple and ends up causing more problems in the long run, because the beginner is ignorant of the superior alternative and doesn't know when it is better to switch. What's so bad about taking the hard route instead?
Common examples include being too lazy to use a Cross-Compiler, developing in Real Mode instead of Protected Mode or Long Mode, relying on BIOS calls rather than writing real hardware drivers, using flat binaries instead of ELF, and so on. Experienced developers use the superior alternatives for a reason…
So what does that mean, "being too lazy to use a cross-compiler"? It means cheating, and using our regular
rustcsetup to build ordinary user-space code, and then trying to run it in kernel space. This will actually work, at least for a while. But eventually, we may find ourselves engaged in multiweek debugging nightmares.So today, I'm going to talk about the sanity-saving difference between
--target x86_64-unknown-linux-gnuand--target x86_64-unknown-none-gnu, and how to get your Rust compiler ready for the kernel world. -
Nov 09, 2015
Bare Metal Rust: Low-level CPU I/O ports
Want to build your own kernel in Rust? See the Bare Metal Rust page for more resources and more posts in this series.
Rust is a really fun language: It allows me to work on low-level kernel code, but it also allows me to wrap my code up in clean, high-level APIs. If you this sounds interesting, you should really check out Philipp Oppermann's blog posts about writing a basic x86_64 operating system kernel in Rust. He walks you through booting the kernel, entering long mode, getting Rust running, and printing text to the screen.
Once you get a basic kernel running, you'll probably want to start working on basic I/O, which requires interrupts. And this point, you'll find that pretty much every tutorial dives right into the
inandoutinstructions. For example, if you look at the OSDev.org introduction to interrupts, the very first code you'll see is (comments added):mov al,20h ; Move interrupt acknowledgment code into al. out 20h,al ; Write al to PIC on port 0x20.Here, we're talking to the PIC ("Programmable Interrupt Controller"), and we're telling it that we've finished handling a processor interrupt. To do this, we need to write an 8-bit status code to the I/O port at address 0x20.
Traditionally, we would wrap this up in an
outb("out byte") function, which might look something like this in Rust:// The asm! macro requires a nightly build of Rust, and // we need to opt-in explicitly. #![feature(asm)] unsafe fn outb(value: u8, port: u16) { asm!("outb %al, %dx" :: "{dx}"(port), "{al}"(value) :: "volatile"); }This writes an 8-byte value to the specified port. It uses the unstable Rust extension
asm!, which allows us to use GCC/LLVM-style inline assembly. We'd invoke it like this:outb(0x20, 0x20);But let's see if we can wrap a higher-level API around an I/O port.
-
Jul 19, 2015
Proving sorted lists correct using the Coq proof assistant
About 15 years ago, I was hanging out at the MIT AI Lab, and there was an ongoing seminar on the Coq proof assistant. The idea was that you wouldn't have to guess whether your programs were correct; you could prove that they worked correctly.
The were just two little problems:
- It looked ridiculously intimidating.
- Rumor said that it took a grad student all summer to implement and prove the greatest common divisor algorithm, which sounded rather impractical.
So I decided to stick to Lispy languages, which is what I was officially supposed to be hacking on, anyway, and I never did try to sit in on the seminar.
Taking another look
I should have taken a look much sooner. This stuff provides even more twisted fun than Haskell! Also, projects like the CompCert C compiler are impressive: Imagine a C compiler where every optimization has been proven correct.
Even better, we can write code in Coq, prove it correct, then export it to Haskell or several other functional languages.
Here's an example Coq proof. Let's start with a basic theorem that says "If we know
Ais true, and we knowBis true, then we knowA /\ B(bothAandB) is true."Theorem basic_conj : forall (A B : Prop), A -> B -> A /\ B. Proof. (* Give names to our inputs. *) intros A B H_A_True H_B_True. (* Specify that we want to prove each half of /\ separately. *) split. - apply H_A_True. (* Prove the left half. *) - apply H_B_True. (* Prove the right half. *) Qed.But Coq proofs are intended to be read interactively, using a tool like CoqIDE or Emacs Proof General. Let me walk you through how this proof would really look.
Proof.At this point, the right-hand pane will show the theorem that we're trying to prove:
1 subgoals, subgoal 1 (ID 1) ============================ forall A B : Prop, A -> B -> A /\ B -
May 17, 2015
Unscientific column store benchmarking in Rust
I've been fooling around with some natural language data from OPUS, the “open parallel corpus.” This contains many gigabytes of movie subtitles, UN documents and other text, much of it tagged by part-of-speech and aligned across multiple languages. In total, there's over 50 GB of data, compressed.
“50 GB, compressed” is an awkward quantity of data:
- It's large enough so that Pandas can't suck it all into memory.
- It's large enough that PostgreSQL stops being fun, and starts feeling like work. (Although cstore_fdw might help.)
- It's too small to justify cloud-based tools like Hadoop. As the saying goes, “If it fits on your laptop’s SSD, it’s not big data.” I have USB sticks large enough to hold 50 GB!
Let's look at various ways to tackle this.
-
Apr 05, 2015
Migrating from Heroku (and Linode) to Docker on AWS
I've long been a huge fan of Heroku. They've made it super easy to deploy and scale web applications without getting bogged down in server administration. Also, their free tier has been very generous, which made Heroku a perfect place to run weekend projects. (And my clients have happily paid plenty of money to Heroku over the years, so nobody's been losing out.)
Heroku's costs and limitations
Lately, the costs of using Heroku for weekend projects have been creeping upwards:
-
Sep 19, 2014
Rust lifetimes: Getting away with things that would be reckless in C++
Over the years, I've learned to be cautious with C++ pointers. In particular, I'm always very careful about who owns a given pointer, and who's in charge of calling
deleteon it. But my caution often forces me to write deliberately inefficient functions. For example:vector<string> tokenize_string(const string &text);Here, we have a large string
text, and we want to split it into a vector of tokens. This function is nice and safe, but it allocates onestringfor every token in the input. Now, if we were feeling reckless, we could avoid these allocations by returning a vector of pointers intotext:vector<pair<const char *,const char *>> tokenize_string2(const string &text);In this version, each token is represented by two pointers into
text: One pointing to the first character, and one pointing just beyond the last character.1 But this can go horribly wrong:// Disaster strikes! auto v = tokenize_string2(get_input_string()); munge(v);Why does this fail? The function
get_input_stringreturns a temporary string, andtokenize_string2builds an array of pointers into that string. Unfortunately, the temporary string only lives until the end of the current expression, and then the underlying memory is released. And so all our pointers invnow point into oblivion—and our program just wound up getting featured in a CERT advisory. So personally, I'm going to prefer the inefficienttokenize_stringfunction almost every time.Rust lifetimes to the rescue!
Going back to our original design, let's declare a type
Token. Each token is either aWordor anOther, and each token contains pointers into a pre-existing string. In Rust, we can declare this as follows:#[deriving(Show, PartialEq)] enum Token<'a> { Word(&'a str), Other(&'a str) } -
Sep 17, 2014
Deploying Rust applications to Heroku, with example code for Iron
Now with support for Iron, Cargo and
Cargo.lock!You can deploy an example Rust application to Heroku using this button:
If you'd prefer to use the command line, you'll need
gitand the Heroku toolbelt. Once these are installed, run:git clone https://github.com/emk/heroku-rust-cargo-hello.git cd heroku-rust-cargo-hello heroku create --buildpack https://github.com/emk/heroku-buildpack-rust.git git push heroku masterThis will download the example application, create a new Heroku project, and deploy the code to Heroku. That's it!
How it works
Our server is based on the Iron middleware library. We parse URL parameters and dispatch HTTP requests to the appropriate handler routine using Iron's router module:
fn main() { let mut router = Router::new(); router.get("/", hello); router.get("/:name", hello_name); Iron::new(router).listen(Ipv4Addr(0, 0, 0, 0), get_server_port()); }The
hellofunction returns an HTTP status code and the content to send to the user:fn hello(_: &mut Request) -> IronResult<Response> { Ok(Response::with(status::Ok, "Hello world!")) }The
hello_namefunction is similar, but we look up the value of the:nameparameter that we declared to the router, above.fn hello_name(req: &mut Request) -> IronResult<Response> { let params = req.extensions.find::<Router,Params>().unwrap(); let name = params.find("name").unwrap(); Ok(Response::with(status::Ok, format!("Hello, {}!", name))) }The final piece needed to run on Heroku is a function to look up up our port number:
fn get_server_port() -> Port { getenv("PORT") .and_then(|s| from_str::<Port>(s.as_slice())) .unwrap_or(8080) }The full source code is available on GitHub. To learn more about Rust, see the excellent Rust guide.
Keep reading for notes on building the program locally and on configuring your own programs to run on Heroku.
-
May 30, 2014
Deploying Rust applications to Heroku, with example code for Rustful
Update, 24 June 2014: I'm planning to add support for building projects with Cargo shortly. I'll announce it here and on Twitter when it's ready.
Update, 12 July 2014: Highly experimental Cargo support is now available.
Update, 17 September 2014: This post is obsolete. Please see Deploying Rust to Heroku, with example code for Iron.
If you have
gitand the Heroku toolbelt on your system, this should be easy:git clone https://github.com/emk/heroku-rust-hello.git cd heroku-rust-hello heroku create --buildpack https://github.com/emk/heroku-buildpack-rust.git git push heroku masterIf you want to create your own Rust web server from scratch, keep reading. But fair warning: Rust is not yet ready for serious web development.
-
May 30, 2014
Installing Rust nightly builds on Ubuntu 10.04 Lucid
Rust is a systems programming language designed around speed and safety. It sits roughly halfway between Go and Haskell. In particular, it combines precise, safe control over memory with high-level functional programming. Haskell programmers, for example, will notice that Rust's
and_thenworks much likebindin Haskell'sMaybemonad:use std::os::getenv; use std::io::net::ip::Port; /// Look up our server port number in PORT. fn get_server_port() -> Port { getenv("PORT") .and_then(|s| from_str::<Port>(s.as_slice())) .unwrap_or(8080) }Anyway, I spent this morning trying to get Rust working on Ubuntu 10.04 Lucid, as part of a larger effort to deploy a Rust application on Heroku. (More on that soon.) On Ubuntu 10.04,
rustcfails looking forlibstdc++.so.6: - May 28, 2014 My personal tool choices for rich JavaScript applications (May 2014)
- May 22, 2014 Learning Middle Egyptian with Anki, slowly
- May 21, 2014 Scraping your Fitocracy score with capybara-webkit
- May 21, 2014 Site update in progress
- May 21, 2014 "Build Your Own Probability Monads" paper back online
- Jan 18, 2012 Best article I've seen on SOPA
- Jun 05, 2011 Screencast: Use Rails and RDF.rb to parse Best Buy product reviews
- Jun 03, 2011 Heroku "Celadon Cedar" review
- May 20, 2011 Derivatives of algebraic data structures: An excellent tutorial
- May 12, 2011 What do these fixed points have in common?
- Apr 25, 2011 AWS outage timeline & downtimes by recovery strategy
- Dec 20, 2010 The state of Ruby, RDF and Rails 3
- Oct 13, 2010 Feedhose demo: Real-time RSS using Node.js and Socket.io
- Dec 29, 2009 Visualizing WordNet relationships as graphs
- Dec 28, 2009 Experimenting with NLTK
- Dec 28, 2009 Interesting Python libraries for natural language processing
- Nov 21, 2009 Wave Hackathon
- Sep 12, 2009 Upgrading randomhacks.net
- Sep 01, 2009 Real-time text annotation with Google Wave
- May 08, 2009 Write a 32-line chat client using Ruby, AMQP & EventMachine (and a GUI using Shoes)
- May 05, 2009 Financial crisis background and Munger on the banks
- Apr 30, 2009 Designing programs with RSpec and Cucumber (plus a book recomendation)
- Apr 30, 2009 Remote root holes reported as "denial of service"
- Jan 11, 2009 Installing TortoiseGit
- Sep 01, 2008 Ubiquitous Hoogle
- Oct 02, 2007 Probability monads at Hac 07 II
- Sep 18, 2007 Freiburg in October: Scheme, Dylan, and probability monads
- Sep 18, 2007 September 8th, 2007
- Jul 01, 2007 Ruby-style metaprogramming in JavaScript (plus a port of RSpec)
- Apr 28, 2007 Bowling in Haskell: A response to Ron Jeffries
- Apr 19, 2007 Robot localization using a particle system monad
- Mar 15, 2007 How to make Data.Set a monad
- Mar 12, 2007 Monads in 15 minutes: Backtracking and Maybe
- Mar 10, 2007 8 ways to report errors in Haskell
- Mar 07, 2007 Jim Hefferon's Linear Algebra: A free textbook with fascinating applications
- Mar 05, 2007 Three things I don't understand about monads
- Mar 03, 2007 Smart classification using Bayesian monads in Haskell
- Feb 22, 2007 Bayes' rule in Haskell, or why drug tests don't work
- Feb 21, 2007 Refactoring probability distributions, part 2: Random sampling
- Feb 21, 2007 Refactoring probability distributions, part 1: PerhapsT
- Feb 10, 2007 Probabilistic Functional Programming is cool
- Feb 10, 2007 Map fusion: Making Haskell 225% faster
- Feb 09, 2007 The first Carnival of Mathematics
- Feb 08, 2007 Haskell: Queues without pointers
- Feb 07, 2007 Do early adopters use IE?
- Feb 02, 2007 Haskell: What happens when you divide infinity by 2?
- Feb 01, 2007 Some useful closures, in Ruby
- Jan 22, 2007 High-Performance Haskell
- Jan 20, 2007 13 Ways of Looking at a Ruby Symbol
- Feb 15, 2006 Selenium on Rails, Reloaded: Client-Side Tests in Ruby
- Dec 03, 2005 Why Ruby is an acceptable LISP
- Nov 15, 2005 Moving a blog to Typo
- Nov 13, 2005 Typo sidebars: Recent Comments and Tagged Articles
- Oct 11, 2005 Random Hacks is back online
- Oct 11, 2005 McCarthy's Ambiguous Operator
- Jul 07, 2003 Preparing for the Winter Garden
- Jun 30, 2003 Tomato Update: Weeding and Irrigation
- Jun 30, 2003 Mason Update: The Weaver Has Woven
- Jun 27, 2003 Comments on "Putting open source on trial"
- Jun 27, 2003 Responses to "The Missing Future"
- Jun 22, 2003 The Missing Future
- Jun 22, 2003 PLUG Protests at SCO
- Jun 22, 2003 About the Author
- Jun 20, 2003 15 Minutes and 150MB of RAM to Compare Unix and Linux
- May 30, 2003 Tomato Progress
- May 30, 2003 Checking Code Ownership
- Mar 14, 2003 Update on the Strange SCO Case
- Mar 10, 2003 SCO Goes Nuclear
- Jan 21, 2003 Tomato Advice
- Jan 20, 2003 wxWindows Multimedia Work
- Jan 20, 2003 Last of the Tomatoes
- Jan 19, 2003 Winter Weather
- Jan 19, 2003 Back on the Slopes
- Dec 31, 2002 Wireless Weblogging
- Dec 31, 2002 Hardware Fun With Linux
- Dec 15, 2002 Open Source Consultants
- Dec 11, 2002 Contractor Hiring Tips
- Dec 10, 2002 wxWindows Experiences
- Nov 10, 2002 Lightweight Languages 2 Conference (MIT, 2002)
- Sep 30, 2002 Fromberger spam filtering paper
- Sep 29, 2002 Bayesian Whitelisting: Finding the Good Mail Among the Spam
- Sep 24, 2002 Macintosh Developer Pain
- Sep 23, 2002 Using Bogofilter with Spam Assassin
- Sep 23, 2002 Machine Learning Links
- Sep 23, 2002 FTC Spam Archive
- Sep 22, 2002 How To Test a Trainable Spam Filter
- Sep 20, 2002 Things I Hate About CodeWarrior, Part I
- Sep 19, 2002 EU free software study
- Sep 16, 2002 Weekend Spam Update
- Sep 13, 2002 Why Hygienic Macros Rock
- Sep 13, 2002 Bogofilter: A New Spam Filter
- Sep 13, 2002 Back from France
- Aug 27, 2002 Busy for a While
- Aug 13, 2002 RedHat Bill Update
- Aug 12, 2002 California Open Source Bill: A Really Bad Idea
- Aug 06, 2002 SpamAssassin: An Decent Spam Filter
- Jul 23, 2002 Internet Explorer still broken
- Jul 22, 2002 Yet Another PHP Security Hole
- Jul 22, 2002 Panopticon
- Jul 22, 2002 On the Air
- Jul 22, 2002 Common RSS Bugs
- Jul 21, 2002 Ogg Theora link
- Apr 12, 2002 Unix is a zombie
- Apr 12, 2002 Random Hacks Site Design
- Dec 07, 1998 IMAP multiplexing
- Dec 04, 1998 IMAP engine progress
- Dec 03, 1998 IMAP command loop
- Dec 02, 1998 IMAP and gperf
- Dec 01, 1998 IMAP progress report
- Nov 30, 1998 Linuxconf and IMAP
- Nov 25, 1998 More Gwydion Dylan and BlitzMail
- Nov 23, 1998 Gwydion Dylan and BlitzMail
- Jul 15, 1998 Parsing C headers with Gwydion Dylan's Melange
- Jul 06, 1998 BlitzMail architecture
- Jul 04, 1998 Trying out Glade
- Jul 03, 1998 Enlightenment and Guile
- Jul 02, 1998 Guile's looking much better
- Jul 01, 1998 MathMap custom spread filter
- Jun 30, 1998 Random Hacks goes online! (and a randomized emboss in MathMap)
Subscribe via RSS.
