CS162 Operating Systems and Systems Programming Lecture 2 Four

56 Slides3.18 MB

CS162 Operating Systems and Systems Programming Lecture 2 Four Fundamental OS Concepts January 19th, 2023 Prof. John Kubiatowicz http://cs162.eecs.Berkeley.edu

Recall: What is an Operating System? Referee – Manage protection, isolation, and sharing of resources » Resource allocation and communication Illusionist – Provide clean, easy-to-use abstractions of physical resources » Infinite memory, dedicated machine » Higher level objects: files, users, messages » Masking limitations, virtualization Glue – Common services » Storage, Window system, Networking » Sharing, Authorization » Look and feel 1/19/2023 Kubiatowicz CS162 UCB Spring 2023 Lec 2.2

Recall: OS Protection Compiled Program 2 Compiled Program 1 System Libs System Libs Process 1 Compiler Threads Address Spaces Process 2 Files Socket s Threads Address Spaces Files Socket s Operating System ISA Processor Hardware PgTbl & TLB Memory OS Mem Networks Storag e I/O Ctrlr 1/19/2023 Kubiatowicz CS162 UCB Spring 2023 Lec 2.3

Recall: OS Protection Segmentation fault (core dumped) Compiled Program 1 Compiled Program 2 System Libs System Libs Process 1 Compiler Threads Address Spaces Process 2 Files Socket s Threads Address Spaces Files Socket s Operating System ISA Processor Hardware PgTbl & TLB Memory OS Mem Networks Storag e I/O Ctrlr 1/19/2023 Kubiatowicz CS162 UCB Spring 2023 Lec 2.4

Challenge: Complexity Applications consisting of – a variety of software modules that – run on a variety of devices (machines) that » » » » implement different hardware architectures run competing applications fail in unexpected ways can be under a variety of attacks Not feasible to test software for all possible environments and combinations of components and devices – The question is not whether there are bugs but how serious are the bugs! 1/19/2023 Kubiatowicz CS162 UCB Spring 2023 Lec 2.5

The World Is Parallel: Intel SkyLake (2017) Up to 28 Cores, 56 Threads – 694 mm² die size (estimated) Many different instructions – Security, Graphics Caches on chip: – L2: 28 MiB – Shared L3: 38.5 MiB (non-inclusive) – Directory-based cache coherence Network: – On-chip Mesh Interconnect – Fast off-chip network directlry supports 8-chips connected DRAM/chips – Up to 1.5 TiB – DDR4 memory 1/19/2023 Kubiatowicz CS162 UCB Spring 2023 Lec 2.6

HW Functionality comes with great complexity! Memory Channels (High BW DRAM) Really High Speed I/O (e.g. graphics) Direct Media Interface (3.93 GBytes/sec) High-Speed I/O devices (PCI Exp) Disks (8 x SATA) HD Audio PCI/e Drives Slower I/O (USB) Integrated Ethernet RAID 0/1/5/10 Smart Connect (autoupdate) Intel Management Engine (ME) and BIOS Support [remote management] 1/19/2023 Intel Skylake-X I/O KubiatowiczConfiguration CS162 UCB Spring 2023 Lec 2.7

For Instance: Software Complexity keeps growing! Linux 2.2.0 Mars Curiosity Rover New Versions usually (much) larger older versions! Firefox Android Linux 3.1 (recent) Windows 7 Microsoft Offi ce 2013 Cars getting really complex! Windows Vista Facebook Mac OS X "Tiger" Modern Car Mouse Base Pairs 0 20 40 60 80 100 120 140 Millions of Lines of Code (source https://informationisbeautiful.net/visualizations/million-lines-of-code/) 1/19/2023 Kubiatowicz CS162 UCB Spring 2023 Lec 2.8

Complexity leaks into OS if not properly designed: Third-party device drivers are one of the most unreliable aspects of OS – Poorly written by non-stake-holders – Ironically, the attempt to provide clean abstractions can lead to crashes! Holes in security model or bugs in OS lead to instability and privacy breaches – Great Example: Meltdown (2017) » Extract data from protected kernel space! Version skew on Libraries can lead to problems with application execution Data breaches, DDOS attacks, timing channels . – Heartbleed (SSL) 1/19/2023 Kubiatowicz CS162 UCB Spring 2023 Lec 2.9

OS Abstracts Underlying Hardware to help Tame Complexity Processor Thread Memory Address Space Disks, SSDs, Files Networks Sockets Machines Processes OS as an Illusionist: Application Operating System Abstract Machine Interface Physical Machine Interface Hardware – Remove software/hardware quirks (fight complexity) – Optimize for convenience, utilization, reliability, (help the programmer) For any OS area (e.g. file systems, virtual memory, networking, scheduling): – What hardware interface to handle? (physical reality) – What’s software interface to provide? (nicer abstraction) 1/19/2023 Kubiatowicz CS162 UCB Spring 2023 Lec 2.10

Today: Four Fundamental OS Concepts Thread: Execution Context – Fully describes program state – Program Counter, Registers, Execution Flags, Stack Address space (with or w/o translation) – Set of memory addresses accessible to program (for read or write) – May be distinct from memory space of the physical machine (in which case programs operate in a virtual address space) Process: an instance of a running program – Protected Address Space One or more Threads Dual mode operation / Protection – Only the “system” has the ability to access certain resources – Combined with translation, isolates programs from each other and the OS from programs 1/19/2023 Kubiatowicz CS162 UCB Spring 2023 Lec 2.11

OS Bottom Line: Run Programs foo.c instructions a.out Write them and compile them Load instruction and data segments of executable file into memory Create stack and heap “Transfer control to program” Provide services to program While protecting OS and program 1/19/2023 Load & Execute compiler data OS Kubiatowicz CS162 UCB Spring 2023 stack heap Memory editor Program Source int main() { ; } 0xFFF Executable data instructions 0x000 PC: registers Processor Lec 2.12

Recall (61C): Instruction Fetch/Decode/Execute The instruction cycle next Processor Memory PC: instruction Instruction fetch Decode decode Registers Execute ALU data 1/19/2023 Kubiatowicz CS162 UCB Spring 2023 Lec 2.13

First OS Concept: Thread of Control Thread: Single unique execution context – Program Counter, Registers, Execution Flags, Stack, Memory State A thread is executing on a processor (core) when it is resident in the processor registers Resident means: Registers hold the root state (context) of the thread: – Including program counter (PC) register & currently executing instruction » PC points at next instruction in memory » Instructions stored in memory – Including intermediate values for ongoing computations » Can include actual values (like integers) or pointers to values in memory – Stack pointer holds the address of the top of stack (which is in memory) – The rest is “in memory” A thread is suspended (not executing) when its state is not loaded (resident) into the processor – Processor state pointing at some other thread – Program counter register is not pointing at next instruction from this thread – Often: a copy of the last value for each register stored in memory 1/19/2023 Kubiatowicz CS162 UCB Spring 2023 Lec 2.14

Recall (61C): What happens during program execution? Addr 232-1 R0 R31 F0 F30 PC Data1 Fetch Data0 Exec Inst237 Inst236 Inst5 Execution sequence: Inst4 – Fetch Instruction at PC Inst3 – Decode Inst2 – Execute (possibly using registers) Inst1 – Write results to registers/mem Inst0 – PC Next Instruction(PC) – Repeat 1/19/2023 Kubiatowicz CS162 UCB Spring 2023 PC PC PC PC Addr 0 Lec 2.15

Registers: RISC-V x86 Load/Store Arch (RISC-V) with software conventions Complex mem-mem arch (x86) with specialized registers and “segments” cs61C does RISC-V. Will need to learn x86 Section will cover this architecture 1/19/2023 Kubiatowicz CS162 UCB Spring 2023 Lec 2.16

Illusion of Multiple Processors Assume a single processor (core). How do we provide the illusion of multiple processors? vCPU1 vCPU2 vCPU3 Shared Memory Programmer’s View – Multiplex in time! Threads are virtual cores vCPU1 vCPU2 vCPU3 vCPU1 vCPU2 Time Contents of virtual core (thread): – Program counter, stack pointer – Registers Where is “it” (the thread)? – On the real (physical) core, or – Saved in chunk of memory – called the Thread Control Block (TCB) 1/19/2023 Kubiatowicz CS162 UCB Spring 2023 Lec 2.17

Illusion of Multiple Processors (Continued) Consider: vCPU1 vCPU2 vCPU3 Shared Memory Programmer’s View – At T1: vCPU1 on real core, vCPU2 in memory – At T2: vCPU2 on real core, vCPU1 in memory T1 vCPU1 T2 vCPU2 vCPU3 vCPU1 vCPU2 Time What happened? – OS Ran [how?] – Saved PC, SP, in vCPU1's thread control block (memory) – Loaded PC, SP, from vCPU2's TCB, jumped to PC What triggered this switch? – Timer, voluntary yield, I/O, other things we will discuss 1/19/2023 Kubiatowicz CS162 UCB Spring 2023 Lec 2.18

Multiprogramming - Multiple Threads of Control Proc 1 Proc 2 Proc n stack heap Static Data code OS stack Thread Control Block (TCB) – Holds contents of registers when thread not running – What other information? Where are TCBs stored? – For now, in the kernel PINTOS? – read thread.h and thread.c 1/19/2023 Kubiatowicz CS162 UCB Spring 2023 heap Static Data code stack heap Static Data code Lec 2.19

Administrivia: Getting started Should be working on Homework 0 already! Due Wednesday (1/25) – cs162-xx account, Github account, registration survey – Vagrant and VirtualBox – VM environment for the course » Consistent, managed environment on your machine – Get familiar with all the cs162 tools, submit to autograder via git We are aware of issues with M1/M2 processors and may have a fix semi-soon – Use the instructional machines until then if you are in this position . Start Project 0 Monday! – To be done on your own – like a homework Slip days: I’d bank these and not spend them right away! – Limited credit when late and run out of slip days – You have 4 slip days for homework – You have 5 slip days for projects Monday is an optional REVIEW session for C – Time and location/Zoom link TBA – May be recorded 1/19/2023 Kubiatowicz CS162 UCB Spring 2023 Lec 2.20

Administrivia (Con’t) We have increased class size a bit – Will be moving more students from waitlist class – If you are on waitlist (or have a CE application still pending), assume you could get into the class at any time in next week or so! – Keep up with work (until you drop or we close the class) Friday (1/27) is drop day for this class! – Very hard to drop afterwards – Please drop sooner if you are going to anyway Let someone else in! 1/19/2023 Kubiatowicz CS162 UCB Spring 2023 Lec 2.21

CS 162 Collaboration Policy Explaining a concept to someone in another group Discussing algorithms/testing strategies with other groups Discussing debugging approaches with other groups Searching online for generic algorithms (e.g., hash table) Sharing code or test cases with another group Copying OR reading another group’s code or test cases Copying OR reading online code or test cases from prior years Helping someone in another group to debug their code We compare all project submissions against prior year submissions and online solutions and will take actions (described on the course overview page) against offenders Don’t put a friend in a bad position by asking for help that they shouldn’t give! 1/19/2023 Kubiatowicz CS162 UCB Spring 2023 Lec 2.22

Second OS Concept: Address Space Address space the set of accessible addresses state associated with them: stack – For 32-bit processor: 232 4 billion (109) addresses – For 64-bit processor: 264 18 quintillion (1018) addresses heap What happens when you read or write to an address? – Perhaps acts like regular memory – Perhaps ignores writes – Perhaps causes I/O operation 0xFFF Static Data code 0x000 » (Memory-mapped I/O) – Perhaps causes exception (fault) – Communicates with another program – . 1/19/2023 Kubiatowicz CS162 UCB Spring 2023 Lec 2.23

Address Space: In a Picture 0xFFF stack PC: SP: heap Processor registers Static Data instructio n Segment Code 0x000 What’s in the code segment? Static data segment? What’s in the Stack Segment? – How is it allocated? How big is it? What’s in the Heap Segment? – How is it allocated? How big? 1/19/2023 Kubiatowicz CS162 UCB Spring 2023 Lec 2.24

Previous discussion of threads: Very Simple Multiprogramming All vCPU's share non-CPU resources – Memory, I/O Devices vCPU1 Each thread can read/write memory vCPU2 vCPU3 vCPU1 vCPU2 Time – Perhaps data of others – can overwrite OS ? Unusable? This approach is used in – Very early days of computing – Embedded applications – MacOS 1-9/Windows 3.1 (switch only with voluntary yield) – Windows 95-ME (switch with yield or timer) However it is risky 1/19/2023 Kubiatowicz CS162 UCB Spring 2023 Lec 2.25

Simple Multiplexing has no Protection! Operating System must protect itself from user programs – Reliability: compromising the operating system generally causes it to crash – Security: limit the scope of what threads can do – Privacy: limit each thread to the data it is permitted to access – Fairness: each thread should be limited to its appropriate share of system resources (CPU time, memory, I/O, etc) OS must protect User programs from one another – Prevent threads owned by one user from impacting threads owned by another user – Example: prevent one user from stealing secret information from another user 1/19/2023 Kubiatowicz CS162 UCB Spring 2023 Lec 2.26

What can the hardware do to help the OS protect itself from programs? 1/19/2023 Kubiatowicz CS162 UCB Spring 2023 Lec 2.27

Simple Protection: Base and Bound (B&B) code 0000 code 0000 Static Data Static Data heap stack heap stack 0100 Base 0010 1000 code Program 1010 address 1000 Static Data heap Bound 1100 stack 1100 FFFF 1/19/2023 Kubiatowicz CS162 UCB Spring 2023 Lec 2.28

Simple Protection: Base and Bound (B&B) code 0000 code 0000 Static Data Static Data heap stack heap stack 0100 Base 0010 1000 code Program 1010 address Addresses translated when program loaded Static Data heap Bound 1100 stack Still protects OS and isolates program Requires relocating loader No addition on address path 1/19/2023 1000 Kubiatowicz CS162 UCB Spring 2023 1100 FFFF Lec 2.29

61C Review: Relocation Compiled .obj file linked together in an .exe All address in the .exe are as if it were loaded at memory address 00000000 File contains a list of all the addresses that need to be adjusted when it is “relocated” to somewhere else. 1/19/2023 Kubiatowicz CS162 UCB Spring 2023 Lec 2.30

Simple address translation with Base and Bound 0000 code code Static Data heap stack 0010 Program 0010 address Static Data Addresses translated on-the-fly 0100 Base Address heap stack 1000 code 1000 Static Data 1010 Bound heap stack 0100 Hardware relocation Can the program touch OS? Can it touch other programs? 1/19/2023 0000 Kubiatowicz CS162 UCB Spring 2023 1100 FFFF Lec 2.31

x86 – segments and stacks code static data heap Processor Registers CS EIP SS ESP stack CS: EAX DS EBX ES ECX EIP: code static data EDX ESI EDI heap Start address, length and access rights associated with each segment register 1/19/2023 SS: ESP: stack Kubiatowicz CS162 UCB Spring 2023 Lec 2.32

Another idea: Address Space Translation Registers 0x000 cal y si translato r “ph “vi Processor rtu al a dd res s ” ad dre s s” Program operates in an address space that is distinct from the physical memory space of the machine Memory 0xFFF 1/19/2023 Kubiatowicz CS162 UCB Spring 2023 Lec 2.33

Paged Virtual Address Space What if we break the entire virtual address space into equal size chunks (i.e., pages) have a base for each? All pages same size, so easy to place each page in memory! Hardware translates address using a page table – Each page has a separate base – The “bound” is the page size – Special hardware register stores pointer to page table – Treat memory as page size frames and put any page into any frame Another cs61C review 1/19/2023 Kubiatowicz CS162 UCB Spring 2023 Lec 2.34

Paged Virtual Address Memory Processor Registers Page # Page Table Frame Addr instruction Page Offset Virtual Address Page # Page Offset Page (eg, 4 kb) PT Addr Instructions operate on virtual addresses – Instruction address, load/store data address Translated to a physical address through a Page Table by the hardware Any Page of address space can be in any (page sized) frame in memory – Or not-present (access generates a page fault) Special register holds page table base address (of the process) 1/19/2023 Kubiatowicz CS162 UCB Spring 2023 Lec 2.35

Third OS Concept: Process Definition: execution environment with Restricted Rights – (Protected) Address Space with One or More Threads – Owns memory (address space) – Owns file descriptors, file system context, – Encapsulate one or more threads sharing process resources Application program executes as a process – Complex applications can fork/exec child processes [later!] Why processes? – Protected from each other! – OS Protected from them – Processes provides memory protection Fundamental tradeoff between protection and efficiency – Communication easier within a process – Communication harder between processes 1/19/2023 Kubiatowicz CS162 UCB Spring 2023 Lec 2.36

Single and Multithreaded Processes Threads encapsulate concurrency: – “Active” component Address spaces encapsulate protection: – “Passive” component – Keeps buggy programs from crashing the system Why have multiple threads per address space? – Parallelism: take advantage of actual hardware parallelism (e.g. multicore) – Concurrency: ease of handling I/O and other simultaneous events 1/19/2023 Kubiatowicz CS162 UCB Spring 2023 Lec 2.37

Protection and Isolation Why Do We Need Processes? – Reliability: bugs can only overwrite memory of process they are in – Security and privacy: malicious or compromised process can’t read or write other process’ data – (to some degree) Fairness: enforce shares of disk, CPU Mechanisms: – Address translation: address space only contains its own data – BUT: why can’t a process change the page table pointer? » Or use I/O instructions to bypass the system? – Hardware must support privilege levels 1/19/2023 Kubiatowicz CS162 UCB Spring 2023 Lec 2.38

Fourth OS Concept: Dual Mode Operation Hardware provides at least two modes (at least 1 mode bit): 1. Kernel Mode (or “supervisor” mode) 2. User Mode Certain operations are prohibited when running in user mode – Changing the page table pointer, disabling interrupts, interacting directly w/ hardware, writing to kernel memory Carefully controlled transitions between user mode and kernel mode – System calls, interrupts, exceptions 1/19/2023 Kubiatowicz CS162 UCB Spring 2023 Lec 2.39

For example: UNIX System Structure User Mode Applications Standard Libs Kernel Mode Hardware 1/19/2023 Kubiatowicz CS162 UCB Spring 2023 Lec 2.40

User/Kernel (Privileged) Mode User Mode interrupt syscal l exec rtn rfi Kernel Mode Limited HW access 1/19/2023 exceptio n exit Full HW access Kubiatowicz CS162 UCB Spring 2023 Lec 2.41

Additional Layers of Protection for Modern Systems Additional layers of protection through virtual machines or containers – Run a complete operating system in a virtual machine – Package all the libraries associated with an app into a container for execution More on these ideas later in the class 1/19/2023 Kubiatowicz CS162 UCB Spring 2023 Lec 2.42

Tying it together: Simple B&B: OS loads process Proc 1 Proc 2 code Proc n 0000 Static Data heap OS stack sysmode 1 code Base xxxx 0000 Static Data Bound xxxx FFFF heap uPC xxxx stack PC code regs 1000 1100 3000 Static Data heap stack 3080 FFFF 1/19/2023 Kubiatowicz CS162 UCB Spring 2023 Lec 2.43

Simple B&B: OS gets ready to execute process Proc 1 Proc 2 code Proc n 0000 RTU Static Data heap OS stack sysmode 1 Base 1000 Bound 1100 0000 Static Data FFFF heap uPC 0001 Privileged Inst: set special registers RTU (Return To Usermode) code stack PC code regs 00FF 1000 1100 3000 Static Data heap stack 3080 FFFF 1/19/2023 Kubiatowicz CS162 UCB Spring 2023 Lec 2.44

Simple B&B: User Code Running Proc 1 Proc 2 code Proc n 0000 Static Data heap OS stack sysmode 0 Base 1000 Bound 1100 uPC How does kernel switch between PC processes? regs First question: How to return to system? code 0000 Static Data FFFF heap xxxx stack 0001 code 00FF 1000 1100 3000 Static Data heap stack 3080 FFFF 1/19/2023 Kubiatowicz CS162 UCB Spring 2023 Lec 2.45

3 types of User Kernel Mode Transfer Syscall – Process requests a system service, e.g., exit – Like a function call, but “outside” the process – Does not have the address of the system function to call – Like a Remote Procedure Call (RPC) – for later – Marshall the syscall id and args in registers and exec syscall Interrupt – External asynchronous event triggers context switch – e. g., Timer, I/O device – Independent of user process Trap or Exception – Internal synchronous event in process triggers context switch – e.g., Protection violation (segmentation fault), Divide by zero, All 3 are an UNPROGRAMMED CONTROL TRANSFER – Where does it go? 1/19/2023 Kubiatowicz CS162 UCB Spring 2023 Lec 2.46

How do we get the system target address of the “unprogrammed control transfer?” 1/19/2023 Kubiatowicz CS162 UCB Spring 2023 Lec 2.47

Interrupt Vector interrupt number (i) Address and properties of each interrupt handler intrpHandler i () { . } Where else do you see this dispatch pattern? 1/19/2023 Kubiatowicz CS162 UCB Spring 2023 Lec 2.48

Simple B&B: User Kernel Proc 1 Proc 2 code Proc n 0000 Static Data heap OS stack sysmode 0 Base 1000 Bound 1100 code 0000 Static Data FFFF heap uPC xxxx stack PC 0000 1234 code regs So: How to return to system? 00FF – Timer Interrupt – I/O requests – Other things 1/19/2023 1000 1100 3000 Static Data heap stack 3080 FFFF Kubiatowicz CS162 UCB Spring 2023 Lec 2.49

Simple B&B: Interrupt Proc 1 Proc 2 code Proc n 0000 Static Data heap OS stack sysmode 1 code Base 1000 0000 Static Data Bound 1100 FFFF heap uPC 0000 1234 stack PC IntrpVector[i] code regs How to save registers and set up system stack? 00FF 1000 1100 3000 Static Data heap stack 3080 FFFF 1/19/2023 Kubiatowicz CS162 UCB Spring 2023 Lec 2.50

Simple B&B: Switch User Process Proc 1 Proc 2 code Proc n 0000 RTU Static Data heap OS stack 1000 1100 0000 1234 regs 00FF sysmode 1 code Base 3000 0000 Static Data Bound 0080 FFFF heap uPC 0000 0248 stack PC 0001 0124 code regs How to save registers and set up system stack? 00D0 1000 1100 3000 Static Data heap stack 3080 FFFF 1/19/2023 Kubiatowicz CS162 UCB Spring 2023 Lec 2.51

Simple B&B: “resume” Proc 1 Proc 2 code Proc n 0000 RTU Static Data heap OS stack 1000 1100 0000 1234 regs 00FF sysmode 0 code Base 3000 0000 Static Data Bound 0080 FFFF heap uPC xxxx xxxx stack PC 000 0248 code regs How to save registers and set up system stack? 00D0 1000 1100 3000 Static Data heap stack 3080 FFFF 1/19/2023 Kubiatowicz CS162 UCB Spring 2023 Lec 2.52

Running Many Programs ? We have the basic mechanism to – switch between user processes and the kernel, – the kernel can switch among user processes, – Protect OS from user processes and processes from each other Questions ? How do we decide which user process to run? How do we represent user processes in the OS? How do we pack up the process and set it aside? How do we get a stack and heap for the kernel? Aren’t we wasting are lot of memory? 1/19/2023 Kubiatowicz CS162 UCB Spring 2023 Lec 2.53

Process Control Block Kernel represents each process as a process control block (PCB) – Status (running, ready, blocked, ) – Register state (when not ready) – Process ID (PID), User, Executable, Priority, – Execution time, – Memory space, translation, Kernel Scheduler maintains a data structure containing the PCBs Scheduling algorithm selects the next one to run 1/19/2023 Kubiatowicz CS162 UCB Spring 2023 Lec 2.54

Scheduler if ( readyProcesses(PCBs) ) { nextPCB selectProcess(PCBs); run( nextPCB ); } else { run idle process(); } 1/19/2023 Kubiatowicz CS162 UCB Spring 2023 Lec 2.55

Conclusion: Four Fundamental OS Concepts Thread: Execution Context – Fully describes program state – Program Counter, Registers, Execution Flags, Stack Address space (with or w/o translation) – Set of memory addresses accessible to program (for read or write) – May be distinct from memory space of the physical machine (in which case programs operate in a virtual address space) Process: an instance of a running program – Protected Address Space One or more Threads Dual mode operation / Protection – Only the “system” has the ability to access certain resources – Combined with translation, isolates programs from each other and the OS from programs 1/19/2023 Kubiatowicz CS162 UCB Spring 2023 Lec 2.56

Back to top button