15 213 The course that gives CMU its Zip Exceptional Control Flow Part I October 13 2006 Topics class14 ppt Exceptions Process context switches Creating and destroying processes Control Flow Computers do only one thing From startup to shutdown a CPU simply reads and executes interprets a sequence of instructions one at a time This sequence is the system s physical control flow or flow of control Physical control flow Time 2 startup inst1 inst2 inst3 instn shutdown 15 213 F 06 Altering the Control Flow Up to Now two mechanisms for changing control flow Jumps and branches Call and return using the stack discipline Both react to changes in program state Insufficient for a useful system Difficult for the CPU to react to changes in system state data arrives from a disk or a network adapter Instruction divides by zero User hits ctl c at the keyboard System timer expires System needs mechanisms for exceptional control flow 3 15 213 F 06 Exceptional Control Flow Mechanisms for exceptional control flow exists at all levels of a computer system Low level Mechanism exceptions change in control flow in response to a system event i e change in system state Combination of hardware and OS software Higher Level Mechanisms Process context switch Signals Nonlocal jumps setjmp longjmp Implemented by either OS software context switch and signals C language runtime library nonlocal jumps 4 15 213 F 06 System context for exceptions USB Ports Keyboard Keyboard Processor Processor Interrupt Interrupt controller controller Mouse Mouse Modem Modem Serial Serialport port controllers controllers Timer Timer Printer Printer Parallel Parallelport port controller controller Super I O Chip Local IO Local IOBus Bus Memory Memory IDE IDEdisk disk controller controller disk SCSI SCSI controller controller SCSI SCSIbus bus disk 5 Video Video adapter adapter Network Network adapter adapter Display Display Network Network CDROM 15 213 F 06 Exceptions An exception is a transfer of control to the OS in response to some event i e change in processor state User Process event current next OS exception exception processing by exception handler exception return optional 6 15 213 F 06 Interrupt Vectors Exception numbers interrupt vector 0 1 2 n 1 code codefor for exception exceptionhandler handler00 Each type of event has a unique exception number k code codefor for exception handler exception handler11 Index into jump table a k a interrupt vector code codefor for exception exceptionhandler handler22 Jump table entry k points to a function exception handler Handler k is called each time exception k occurs code codefor for exception handler exception handlern 1 n 1 7 15 213 F 06 Asynchronous Exceptions Interrupts Caused by events external to the processor Indicated by setting the processor s interrupt pin handler returns to next instruction Examples I O interrupts hitting ctl c at the keyboard arrival of a packet from a network arrival of a data sector from a disk Hard reset interrupt hitting the reset button Soft reset interrupt hitting ctl alt delete on a PC 8 15 213 F 06 Synchronous Exceptions Caused by events that occur as a result of executing an instruction Traps Intentional Examples system calls breakpoint traps special instructions Returns control to next instruction Faults Unintentional but possibly recoverable Examples page faults recoverable protection faults unrecoverable floating point exceptions Either re executes faulting current instruction or aborts Aborts unintentional and unrecoverable Examples parity error machine check Aborts current program 9 15 213 F 06 Trap Example Opening a File User calls open filename options 0804d070 libc open 804d082 cd 80 804d084 5b int pop 0x80 ebx Function open executes system call instruction int OS must find or create file get it ready for reading or writing Returns integer file descriptor User Process int pop 10 OS exception Open file return 15 213 F 06 Fault Example 1 Memory Reference User writes to memory location That portion page of user s memory is currently on disk Page handler must load page into physical memory Returns to faulting instruction Successful on second try 80483b7 c7 05 10 9d 04 08 0d User Process event movl 0xd 0x8049d10 OS page fault return 11 movl int a 1000 main a 500 13 Create page and load into memory 15 213 F 06 Fault Example 2 int a 1000 main a 5000 13 Invalid Memory Reference User writes to memory location Address is not valid Page handler detects invalid address 80483b7 c7 05 60 e3 04 08 0d Sends SIGSEG signal to user process User process exits with segmentation fault User Process event 12 movl movl 0xd 0x804e360 OS page fault Detect invalid address Signal process 15 213 F 06 Processes Definition A process is an instance of a running program One of the most profound ideas in computer science Not the same as program or processor Process provides each program with two key abstractions Logical control flow Each program seems to have exclusive use of the CPU Private address space Each program seems to have exclusive use of main memory How are these Illusions maintained 13 Process executions interleaved multitasking Address spaces managed by virtual memory system 15 213 F 06 Logical Control Flows Each process has its own logical control flow Process A Process B Process C Time 14 15 213 F 06 Concurrent Processes Two processes run concurrently are concurrent if their flows overlap in time Otherwise they are sequential Examples Concurrent A B A C Sequential B C Process A Process B Process C Time 15 15 213 F 06 User View of Concurrent Processes Control flows for concurrent processes are physically disjoint in time However we can think of concurrent processes are running in parallel with each other Process A Process B Process C Time 16 15 213 F 06 Context Switching Processes are managed by a shared chunk of OS code called the kernel Important the kernel is not a separate process but rather runs as part of some user process Control flow passes from one process to another via a context switch Process A code Process B code user code Time kernel code context switch user code kernel code context switch user code 17 15 213 F 06 Private Address Spaces Each process has its own private address space 0xffffffff 0xc0000000 0x40000000 kernel virtual memory code data heap stack user stack created at runtime read write segment data bss 18 0 esp stack pointer memory mapped region for shared libraries run time heap managed by malloc 0x08048000 memory invisible to user
View Full Document