1 Program and OS interactions: Exceptions and Processes Andrew Case Slides adapted from Jinyang Li, Randy Bryant and Dave O’Hallaron.

Slides:



Advertisements
Similar presentations
1 CS345 Operating Systems Φροντιστήριο Άσκησης 1.
Advertisements

Carnegie Mellon 1 Exceptional Control Flow: Exceptions and Processes /18-243: Introduction to Computer Systems 13 th Lecture, June 15, 2011 Instructors:
Exceptional Control Flow Processes Today. Control Flow Processors do only one thing: From startup to shutdown, a CPU simply reads and executes (interprets)
University of Washington Today Midterm grades posted  76. HW 3 due Lab 4 fun! 1.
1. Processes 2. Signals. Processes Definition: A process is an instance of a running program.  One of the most profound ideas in computer science  Not.
University of Washington Today Finish up cache-aware programming example Processes  So we can move on to virtual memory 1.
University of Washington Today Move on to … 1. University of Washington Hmm… Lets look at this again Disk Main Memory L2 unified cache L1 I-cache L1 D-cache.
Processes Topics Process context switches Creating and destroying processes CS 105 “Tour of the Black Holes of Computing!”
Exceptional Control Flow Part I September 22, 2008 Topics Exceptions Process context switches Creating and destroying processes class11.ppt ,
Exceptional Control Flow Part I Topics Exceptions Process context switches Creating and destroying processes class14.ppt CS 123.
Exceptional Control Flow Part I Topics Exceptions Process context switches Creating and destroying processes.
Carnegie Mellon Exceptions and Processes Slides adapted from: Gregory Kesden and Markus Püschel of Carnegie Mellon University.
Fabián E. Bustamante, Spring 2007 Exceptional Control Flow Part I Today Exceptions Process context switches Creating and destroying processes Next time.
Exceptional Control Flow Part I March 4, 2004 Topics Exceptions Process context switches Creating and destroying processes class16.ppt “The course.
CS 3214 Computer Systems Godmar Back Lecture 12. Announcements Exercise 6 coming up Project 3 milestone due Oct 8 CS 3214 Fall 2010.
Creating and Executing Processes
Processes Topics Process context switches Creating and destroying processes CS 105 “Tour of the Black Holes of Computing!”
Carnegie Mellon 1 Exceptional Control Flow: Exceptions and Processes : Introduction to Computer Systems 13 th Lecture, Oct. 7, 2014 Instructors:
CSC 2405 Computer Systems II Exceptions Mini-Lecture Traps & Interrupts.
Processes Topics Process context switches Creating and destroying processes CS 105 “Tour of the Black Holes of Computing!”
University of Amsterdam Computer Systems – Processes Arnoud Visser 1 Computer Systems Processes.
Program Translation and Execution II: Processes Oct 1, 1998 Topics User-level view of processes Implementation of processes setjmp/longjmp class12.ppt.
Exceptional Control Flow Part I Topics Exceptions Process context switches Creating and destroying processes class16.ppt.
Exceptional Control Flow Topics Exceptions except1.ppt CS 105 “Tour of the Black Holes of Computing”
PROCESS AND THREADS. Three ways for supporting concurrency with socket programming  I/O multiplexing  Select  Epoll: man epoll  Libevent 
Exceptional Flow Control Part I
University of Washington Exceptional Control Flow The Hardware/Software Interface CSE351 Winter 2013.
University of Washington Roadmap 1 car *c = malloc(sizeof(car)); c->miles = 100; c->gals = 17; float mpg = get_mpg(c); free(c); Car c = new Car(); c.setMiles(100);
Exceptional Control Flow I March 12, 2002
1 Exceptional Control Flow III. 2 Outline Loading and Running Programs Multitasking, shells Suggested reading 8.4.
Carnegie Mellon Exceptions and Processes Slides adapted from: Gregory Kesden and Markus Püschel of Carnegie Mellon University.
1 Exceptional Control Flow Ⅱ. 2 Outline Kernel Mode and User Mode Process context switches Three States of Processes Context Switch System Calls and Error.
Exceptional Control Flow II Oct 23, 2001 Topics Exceptions Process context switches class17.ppt “The course that gives CMU its Zip!”
Carnegie Mellon Introduction to Computer Systems /18-243, spring th Lecture, Mar. 3 rd Instructors: Gregory Kesden and Markus Püschel.
Carnegie Mellon 1 Bryant and O’Hallaron, Computer Systems: A Programmer’s Perspective, Third Edition Exceptional Control Flow: Exceptions and Processes.
Carnegie Mellon Exceptions and Processes Slides adapted from: Gregory Kesden and Markus Püschel of Carnegie Mellon University.
Overview of today’s lecture Re-view of the previous lecture Process management models and state machines (cont’d from the previous lecture) What is in.
University of Washington Roadmap 1 car *c = malloc(sizeof(car)); c->miles = 100; c->gals = 17; float mpg = get_mpg(c); free(c); Car c = new Car(); c.setMiles(100);
Exceptional Control Flow
Section 8: Processes What is a process Creating processes Fork-Exec
Exceptional Control Flow & Processes
Exceptional Control Flow
Exceptions and Processes
Exceptional Control Flow
Instructor: Randy Bryant
Exceptional Control Flow
Overview of today’s lecture
Roadmap C: Java: Assembly language: OS: Machine code: Computer system:
Exceptional Control Flow Part I
Exceptional Control Flow
Instructors: Anthony Rowe, Seth Goldstein and Gregory Kesden
CS703 – Advanced Operating Systems
Exceptional Control Flow: System Calls, Page Faults etc.
Exceptional Flow Control I
Processes CSE 351 Autumn 2016 Instructor: Justin Hsia
CS 105 “Tour of the Black Holes of Computing!”
Exceptional Control Flow Part I Mar. 11, 2003
Exceptional Control Flow Ⅱ
Exceptional Control Flow Part I
Exceptions Control Flow
CS 105 “Tour of the Black Holes of Computing!”
Processes Prof. Ikjun Yeom TA – Mugyo
CS201 - Lecture 17 Exceptions
CS 105 “Tour of the Black Holes of Computing!”
CS 105 “Tour of the Black Holes of Computing!”
CS 105 “Tour of the Black Holes of Computing!”
Processes CSE 351 Autumn 2018 Guest Instructor: Teaching Assistants:
Exceptional Control Flow & Processes October 2, 2008
Chapter 3 Process Description and Control
Presentation transcript:

1 Program and OS interactions: Exceptions and Processes Andrew Case Slides adapted from Jinyang Li, Randy Bryant and Dave O’Hallaron

2 User-level programs vs. OS bomb httpd safari OS kernel Send/recv packets, Open/close files …

3 User-level programs vs. OS Role of an OS:  Implements OS-level services: I/O, network  Enforce protection: no stomping on each other’s memory/files/packets…  Resource sharing: execute multiple programs “simultaneously”, … bomb httpd safari OS kernel Send/recv packets, Open/close files …

4 Ways user-level programs interact with OS Invoke syscalls  Send/receive data  Create/delete files  Execute/kill other programs Generate exceptions (to be handled by OS)  Touch illegal memory  Divide by zero Get interrupted by OS  OS preempts a program to execute other programs  OS does “upcalls” to user-programs via signals Achieved via h/w’s exceptional control flow

5 Topics Exceptional Control Flow Processes

6 Control Flow inst 1 inst 2 inst 3 … inst n A CPU core reads and executes a series of instructions, one at a time  This sequence is the CPU’s control flow Physical control flow Time

7 Altering the Control Flow Up to now: two mechanisms for changing control flow:  Jumps and branches  Call and return Both react to changes in program state “exceptional control flow” – react to changes in system state  data arrives from a disk or a network adapter  instruction divides by zero  user hits Ctrl-C at the keyboard  System timer expires

8 Types of Exceptions Asynchronous (interrupts): caused by events external to CPU  hitting Ctrl-C at the keyboard  arrival of a packet from a network  arrival of data from a disk Synchronous: caused by executing an instruction  Intentional (Traps): e.g. INT 0x80 (syscall)  Unintentional but recoverable (Faults): e.g. page or protection faults  unintentional and unrecoverable (Aborts): e.g. memory error

9 Exceptions An exception is a transfer of control to the OS in response to some event (i.e., change in processor state) User ProcessOS exception exception processing by exception handler event I_current I_next

10 Exceptions An exception is a transfer of control to the OS in response to some event (i.e., change in processor state) User ProcessOS exception exception processing by exception handler fault: return to I_current trap,interrupt: return to I_next Abort: machine reboot, process termination event I_current I_next

n-1 Interrupt Vectors Each type of exception has a unique exception number k, used to index into exception table (a.k.a. interrupt vector) Handler k is called each time exception k occurs Handled by the OS, not user- level programs Exception Table code for exception handler 0 code for exception handler 1 code for exception handler 2 code for exception handler n-1... Exception numbers

12 Trap Example: Syscall (System call) User-level program calls: open(filename, options) Function open executes system call instruction int OS must find or create file, get it ready for reading or writing Returns integer file descriptor 0804d070 : d082:cd 80 int $0x80 # interrupt d084:5b pop %ebx... User ProcessOS exception open file returns int pop

13 Fault Example: Page Fault User writes to memory location That address is not in memory (on disk) int a[1000]; main () { a[500] = 13; } 80483b7:c d d movl $0xd,0x8049d10 User ProcessOS exception: page fault Create page and load into memory returns movl OS loads page into physical memory Returns to faulting instruction Successful on second try

14 Fault Example: Invalid Memory Reference OS detects invalid address Sends SIGSEGV signal to user process User process exits with “segmentation fault” int a[1000]; main () { a[5000] = 13; } 80483b7:c e d movl $0xd,0x804e360 User ProcessOS exception: page fault detect invalid address movl signal process

15 Topics Exceptional Control Flow Processes

16 Processes A process is an instance of a running program.  Not the same as “program” or “processor” OS and Process provides each program with two key abstractions:  Logical control flow  Each program seems to have exclusive use of the CPU  Private virtual address space  Each program seems to have exclusive use of main memory How are these Illusions maintained?  Process executions interleaved (multitasking) or run on separate cores  Virtual Memory managed by OS

17 Concurrent Processes Two processes run concurrently (are concurrent) if their flows overlap in time Otherwise, they are sequential Examples (running on single core):  Concurrent: A & B, A & C  Sequential: B & C Process AProcess BProcess C Time

18 User View of Concurrent Processes Control flows for concurrent processes are physically disjoint in time However, we can think of concurrent processes are running in parallel with each other Time Process AProcess BProcess C

19 Context Switching Processes are managed by a shared chunk of OS code called the kernel Control flow passes from one process to another via a context switch Process AProcess B user code kernel code user code kernel code user code context switch Time

20 Basic UNIX syscalls for managing processes fork  Create a new process exit wait  Synchronize among processes execve  Load a new process image Syscalls are documented in man pages section 2: man -2 fork Standard C library provides wrapper functions for many syscalls

21 fork : Creating New Processes int fork(void)  creates a new process (child process) that is identical to the calling process (parent process) Fork is called once but returns twice pid_t pid = fork(); if (pid == 0) { printf("hello from child\n"); } else { printf("hello from parent: child pid is %d\n”, pid); } Return 0 to the child process Return child’s pid to the parent

22 Understanding fork pid_t pid = fork(); if (pid == 0) { printf("hello from child\n"); } else { printf("hello from parent\n"); } Process n pid_t pid = fork(); if (pid == 0) { printf("hello from child\n"); } else { printf("hello from parent\n"); } Child Process m pid_t pid = fork(); if (pid == 0) { printf("hello from child\n"); } else { printf("hello from parent\n"); } pid = m pid_t pid = fork(); if (pid == 0) { printf("hello from child\n"); } else { printf("hello from parent\n"); } pid = 0 pid_t pid = fork(); if (pid == 0) { printf("hello from child\n"); } else { printf("hello from parent\n"); } pid_t pid = fork(); if (pid == 0) { printf("hello from child\n"); } else { printf("hello from parent\n"); } hello from parenthello from child Which one is first?

23 Fork Example #1 void fork1() { int x = 1; pid_t pid = fork(); if (pid == 0) { printf("Child has x = %d\n", ++x); } else { printf("Parent has x = %d\n", --x); } printf("Bye from process %d with x = %d\n", getpid(), x); } Parent and child both run same code  Distinguish parent from child by return value from fork Start with same state, but each has private copy  Including shared output file descriptor  Relative ordering of their print statements undefined

24 Fork Example #2 void fork2() { printf("L0\n"); fork(); printf("L1\n"); fork(); printf("Bye\n"); } Both parent and child can continue forking L0 L1 Bye

25 Fork Example #3 Both parent and child can continue forking void fork3() { printf("L0\n"); fork(); printf("L1\n"); fork(); printf("L2\n"); fork(); printf("Bye\n"); } L1L2 Bye L1L2 Bye L0

26 Fork Example #4 Just parent can continue forking void fork4() { printf("L0\n"); if (fork() != 0) { printf("L1\n"); if (fork() != 0) { printf("L2\n"); fork(); } printf("Bye\n"); } L0 L1 Bye L2 Bye

27 Fork Example #5 Just child can continue forking void fork5() { printf("L0\n"); if (fork() == 0) { printf("L1\n"); if (fork() == 0) { printf("L2\n"); fork(); } printf("Bye\n"); } L0 Bye L1 Bye L2

28 Beware: the fork bomb Both parent and child can continue forking… indefinitely void fork_bomb() { int cnt = 0; while(1) { printf(”L%d\n”, cnt++); fork(); } } L1L2 … … … … L1L2 … … … … L0 CAUTION: DO NOT RUN ON A SYSTEM YOU DO NOT OWN! THIS WILL PROBABLY HOSE YOUR SYSTEM!!!

29 exit : Ending a process void exit(int status)  exits a process  Normally return with status 0  atexit() registers functions to be executed upon exit void cleanup(void) { printf("cleaning up\n"); } void fork6() { atexit(cleanup); fork(); exit(0); }

30 Zombies Idea  When process terminates, still consumes system resources  Why? So that parents can learn of children’s exit status  Called a “zombie” - dead, but still taking up resources Reaping  Performed by parent on terminated child  Parent is given exit status information  Kernel discards process What if parent doesn’t reap?  If any parent terminates without reaping a child, then child will be reaped by init process  Ancestor of all

31 linux>./forks 7 & [1] 6639 Running Parent, PID = 6639 Terminating Child, PID = 6640 linux> ps PID TTY TIME CMD 6585 ttyp9 00:00:00 tcsh 6639 ttyp9 00:00:03 forks 6640 ttyp9 00:00:00 forks 6641 ttyp9 00:00:00 ps linux> kill 6639 [1] Terminated linux> ps PID TTY TIME CMD 6585 ttyp9 00:00:00 tcsh 6642 ttyp9 00:00:00 ps Zombie Example ps shows child process as “defunct” Killing parent allows child to be reaped by init How do you handle them without killing parent process? void fork7() { if (fork() == 0) { /* Child */ printf("Terminating Child, PID = %d\n", getpid()); exit(0); } else { printf("Running Parent, PID = %d\n", getpid()); while (1) ; /* Infinite loop */ }

32 wait : Synchronizing with Children int wait(int *child_status)  Blocks until some child exits  return value is the pid of terminated child  If multiple children completed, will take in arbitrary order (use waitpid to wait for a specific child) void fork9() { if (fork() == 0) { printf("HC: hello from child\n"); } else { printf("HP: hello from parent\n"); wait(NULL); printf("CT: child has terminated\n"); } printf("Bye\n"); exit(); } HP HCBye CTBye

33 wait() Example If multiple children completed, will take in arbitrary order Can use macros WIFEXITED (Wait If Exited) and WEXITSTATUS to get information about exit status void fork10() { pid_t pid[N]; int i; int child_status; for (i = 0; i < N; i++) if ((pid[i] = fork()) == 0) exit(100+i); /* Child */ for (i = 0; i < N; i++) { pid_t wpid = wait(&child_status); if (WIFEXITED(child_status)) printf("Child %d terminated with exit status %d\n", wpid, WEXITSTATUS(child_status)); else printf("Child %d terminate abnormally\n", wpid); }

34 waitpid() : Waiting for a Specific Process waitpid(pid, &status, options)  suspends current process until specific process terminates  various options (see textbook) void fork11() { pid_t pid[N]; int i; int child_status; for (i = 0; i < N; i++) if ((pid[i] = fork()) == 0) exit(100+i); /* Child */ for (i = N-1; i >= 0; i--) { pid_t wpid = waitpid(pid[i], &child_status, 0); if (WIFEXITED(child_status)) printf("Child %d terminated with exit status %d\n", wpid, WEXITSTATUS(child_status)); else printf("Child %d terminated abnormally\n", wpid); }

35 execve : Execute a new program int execve( char *filename, //executable char *argv[], //arguments char *envp[] //environment ) Does not return (unless error) overwrites current process code, data, and stack with new executable  keeps pid, open files and signal context Kernel virtual memory shared libraries Heap Stack Unused 0 Read/write segment (. data,. bss ) Read-only segment (.init,. text,.rodata )

36 execve Example if ((pid = Fork()) == 0) { /* Child runs user job */ if (execve(argv[0], argv, environ) < 0) { printf("%s: Command not found.\n", argv[0]); exit(0); } envp[n] = NULL envp[n-1] envp[0] … argv[argc] = NULL argv[argc-1] argv[0] … “ls” “-lt” “/usr/include” “USER=cso” “PATH=/usr/bin:/bin:…” “PWD=/home/cso” environ argv

37 execve : Loading and Running Programs int execve( char *filename, char *argv[], char *envp[] ) Loads and runs in current process:  Executable filename  With argument list argv  And environment variable list envp Environment variables:  “name=value” strings  getenv() and putenv() Null-terminated env var strings unused Null-terminated cmd line arg strings envp[n] == NULL envp[n-1] envp[0] … Linker vars argv[argc] == NULL argv[argc-1] argv[0] … envp argc argv Stack bottom Stack frame for main Stack top environ

38 Summary Exceptions  Used for events that require non-standard control flow  Hardware mechanism: exception control flow  Generated externally (interrupts) or internally (traps and faults) OS abstraction of Processes  At any given time, system has multiple active processes  Each process appears to have total control of CPU + private memory space  Programs interface with OS using syscalls/interrupts:  fork, exit, wait, exec