15 213 The course that gives CMU its Zip Exceptional Control Flow Part I March 4 2008 Topics Exceptions Process context switches Creating and destroying processes class14 ppt Control Flow Computers do only one thing From startup to shutdown a CPU simply reads and executes interprets a sequence of instructions one at a time This sequence is the system s physical control flow or flow of control Physical control flow Time 2 startup inst1 inst2 inst3 instn shutdown 15 213 S 08 Altering the Control Flow Up to now two mechanisms for changing control flow 1 Jumps and branches 2 Call and return using the stack discipline Both react to choices the program makes voluntarily Insufficient for a useful system Difficult for the CPU to react to changes in system state Data arrives from a disk or a network adapter Instruction divides by zero User hits Control C at the keyboard Interval timer expires time for this processor to run another program System needs mechanisms for exceptional control flow 3 15 213 S 08 Exceptional Control Flow Mechanisms for exceptional control flow exists at all levels of a computer system Low level Mechanism Exceptions change in control flow in response to a system event i e change in system state Combination of hardware and OS software Higher Level Mechanisms Process context switch Signals Non local jumps setjmp longjmp Implemented by either 4 OS software context switch and signals C language runtime library non local jumps 15 213 S 08 System context for exceptions USB Ports Keyboard Processor Interrupt controller Mouse Modem Serial port controllers Timer Printer Parallel port controller Super I O Chip Local IO Bus Memory IDE disk controller SCSI controller Video adapter Network adapter Display Network SCSI bus disk disk 5 CDROM 15 213 S 08 Exceptions An exception is a transfer of control to the OS in response to some event i e change in processor state User Process event current next OS exception exception processing by exception handler exception return optional 6 15 213 S 08 Interrupt Vectors Exception numbers code for exception handler 0 interrupt vector 0 1 2 n 1 Each type of event has a unique exception number k Index into jump table a k a interrupt vector Jump table entry k points to a function exception handler Handler k is called each time exception k occurs code for exception handler 1 code for exception handler 2 code for exception handler n 1 7 15 213 S 08 Asynchronous Exceptions Interrupts Caused by events external to the processor Indicated by setting the processor s interrupt pin handler returns to next instruction Examples I O interrupts Hard reset interrupt hitting the reset button Soft reset interrupt 8 hitting ctl c at the keyboard arrival of a packet from a network arrival of a data sector from a disk hitting ctl alt delete on a PC 15 213 S 08 Synchronous Exceptions Caused by events that occur as a result of executing an instruction Traps Faults Unintentional but possibly recoverable Examples page faults recoverable protection faults unrecoverable floating point exceptions Either re executes faulting current instruction or aborts Aborts 9 Intentional Examples system calls breakpoint traps special instructions Returns control to next instruction unintentional and unrecoverable Examples parity error machine check Aborts current program 15 213 S 08 Trap Example Opening a File User calls open filename options 0804d070 libc open 804d082 cd 80 804d084 5b int pop 0x80 ebx Function open executes system call instruction int OS must find or create file get it ready for reading or writing Returns integer file descriptor User Process int pop 10 OS exception Open file return 15 213 S 08 Fault Example 1 int a 1000 main a 500 13 Memory Reference User writes to memory location That portion page of user s memory is currently on disk 80483b7 c7 05 10 9d 04 08 0d movl 0xd 0x8049d10 Page handler must load page into physical memory Returns to faulting instruction Successful on second try User Process event movl OS page fault return 11 Create page and load into memory 15 213 S 08 Fault Example 2 int a 1000 main a 5000 13 Invalid Memory Reference User writes to memory location Address is not valid 80483b7 c7 05 60 e3 04 08 0d movl 0xd 0x804e360 Page handler detects invalid address Sends SIGSEGV signal to user process User process exits with segmentation fault User Process event movl OS page fault Detect invalid address Signal process 12 15 213 S 08 Processes Definition A process is an instance of a running program One of the most profound ideas in computer science Not the same as program or processor Process provides each program with two key abstractions Logical control flow Each program seems to have exclusive use of the CPU Private address space Each program seems to have exclusive use of main memory How are these Illusions maintained Process executions interleaved multitasking Address spaces managed by virtual memory system 13 15 213 S 08 Logical Control Flows Each process has its own logical control flow Process A Process B Process C Time 14 15 213 S 08 Concurrent Processes Two processes run concurrently are concurrent if their flows overlap in time Otherwise they are sequential Examples Concurrent A B A C Sequential B C Process A Process B Process C Time 15 15 213 S 08 User View of Concurrent Processes Control flows for concurrent processes are physically disjoint in time However we can think of concurrent processes are running in parallel with each other Process A Process B Process C Time 16 15 213 S 08 Context Switching Processes are managed by a shared chunk of OS code called the kernel Important the kernel is not a separate process but rather runs as part of some user process Control flow passes from one process to another via a context switch Process A code Process B code user code Time kernel code context switch user code kernel code context switch user code 17 15 213 S 08 Private Address Spaces Each process has its own private address space 0xffffffff kernel virtual memory code data heap stack 0xc0000000 user stack created at runtime 0x40000000 read write segment data bss 18 0 esp stack pointer memory mapped region for shared libraries run time heap managed by malloc 0x08048000 memory invisible to user code read only segment init text rodata brk loaded from the executable file unused 15 213 S 08 fork Creating New Processes int fork void creates a new process child process that is identical to the calling process parent process returns 0 to the child
View Full Document