Presentation is loading. Please wait.

Presentation is loading. Please wait.

Limited Direct Execution

Similar presentations


Presentation on theme: "Limited Direct Execution"— Presentation transcript:

1 Limited Direct Execution
Operating Systems CS 550 Spring 2017 Kenneth Chiu

2 How to virtualize a CPU? How can we achieve virtualization of a CPU so that each process has the illusion that itself has the entire CPU? Time-sharing (or time-multiplexing) the CPU: run one process for a little while, then run another one, and so forth.

3 Challenges of time-sharing a CPU
Performance How can we implement virtualization without adding excessive overhead to the system? Control How can we run processes efficiently while retaining control over the CPU? Attaining performance while maintaining control is thus one of the central challenges in building an operating system.

4 Direct execution protocol (without limits)
Essential idea: to run the program directly on the CPU. OS Program Create entry for process list Allocate memory for program Load program into memory Set up stack with argc/argv Clear registers Execute call main() Run main() Execute return from main Free memory of process Remove from process list Problem: There is no mechanism to prevent the program from running forever and take over the machine.

5 Switching Between Processes
Switching between processes (i.e., a context switch) should be simple. The OS should just decide to stop one process and start another. What’s the big deal? If the OS is not running (CPU is running the user processes), how can it do anything at all? How can the operating system regain control of the CPU so that it can switch between processes?

6 The cooperative approach
Assumption: the OS trusts the processes of the system to behave reasonably. Processes that run for too long are assumed to periodically give up the CPU so that the OS can decide to run some other task. Scenarios where user processes give up the CPU Most processes transfer control of the CPU to the OS quite frequently by making system calls. Processes also transfer control to the OS when they do something illegal. Systems using the cooperative approach Systems often include an explicit yield system call, which does nothing except to transfer control to the OS so it can run other processes.

7 The non-cooperative approach
How can the OS gain control of the CPU even if processes are not being cooperative? Short answer: relying on the timer interrupts

8 Limited direct execution protocol – timer interrupt
OS kernel Hardware Program Initialize trap table during boot time Start interrupt timer start timer interrupt CPU in X ms Process A Timer interrupt Save regs(A) to k-stack(A) Move to kernel mode Jump to trap handler Handle the trap Call switch() routine save regs(A) to proc-struct(A) restore regs(B) from proc-struct(B) switch to k-stack(B) return-from-trap (into B) restore regs(B) from k-stack(B) move to user mode jump to B’s PC Process B - Restore regs from kernel stack - Move to user mode - Jump to main

9 Concurrent traps/interrupts
You may be wondering … What happens when, during a system call, a timer interrupt occurs? What happens when you’re handling one interrupt and another one happens? Possible solutions: Disable interrupts during a interrupt processing. Sophisticated locking schemes to protect concurrent access to internal data structures. This enables multiple activities to be on-going within the kernel at the same time. Will be covered when discussing concurrency issues Nested Of course, the OS has to be careful in doing so; disabling interrupts for too long could lead to lost interrupts, which is (in technical terms) bad.


Download ppt "Limited Direct Execution"

Similar presentations


Ads by Google