[UNSW] COMP3231/9201/3891/9283 Operating Systems 2021/T1

ASST2 Walkthrough


    Code walk-through

    This walkthrough complements the existing ASST2 video. There are answers available on the wiki. Additionally, if you have any further queries, use one of the week 6 consultations that are running during the normal tutorial timeslots.

    General system calls

    kern/arch/mips/: traps and syscalls

    Exceptions are the key to operating systems; they are the mechanism that enables the OS to regain control of execution and therefore do its job. You can think of exceptions as the interface between the processor and the operating system. When the OS boots, it installs an "exception handler" (carefully crafted assembly code) at a specific address in memory. When the processor raises an exception, it invokes this, which sets up a "trap frame" and calls into the operating system. Since "exception" is such an overloaded term in computer science, operating system lingo for an exception is a "trap", when the OS traps execution. Interrupts are exceptions, and more significantly for this assignment, so are system calls. Specifically, syscall.c handles traps that happen to be syscalls. Understanding at least the C code in this directory is key to being a real operating systems junkie, so we highly recommend reading through it carefully. The code is also covered in the system calls lecture.


    mips_trap() is the key function for returning control to the operating system. This is the C function that gets called by the assembly exception handler. kill_curthread() is the function for handling broken user programs; when the processor is in usermode and hits something it can't handle (say, a bad instruction), it raises an exception. There's no way to recover from this, so the OS needs to kill off the process. The bonus part of this assignment will include writing a useful version of this function.


    syscall() is the function that delegates the actual work of a system call off to the kernel function that implements it. Notice that reboot and time are the only cases currently handled.


  1. What is the numerical value of the exception code for a MIPS system call (Hint: EX_SYS)?
  2. How many bytes is an instruction in MIPS? (Answer this by reading syscall() carefully, not by looking somewhere else.)
  3. What is the contents of the struct trapframe? Where is the struct trapframe that is passed into syscall() stored?
  4. What would be required to implement a system call that took more than 4 arguments?
  5. What is the purpose of userptr_t?
  6. Moving data between kernel and userland.


    This file contains functions for moving data between kernel and user space. Knowing when and how to cross this boundary is critical to properly implementing userlevel programs, so this is a good file to read very carefully. The framework provided is needed to safely implement application buffer handling in the read() and write() system calls. You should also examine the code in lib/uio.c.


  7. What is the difference between UIO_USERISPACE and UIO_USERSPACE? When should one use UIO_SYSSPACE instead?
  8. Why can the struct uio that is used to read in an ELF segment be allocated on the stack in load_segment() (i.e., where is the destination memory for the read)?
  9. In what file are copyin() and copyout() defined? memmove()? Why can't copyin() and copyout() be implemented as simply as memmove()?
  10. The VFS interface.


    The files vfs.h and vnode.h in this directory contain function declarations and comments that are directly relevant to this assignment.


  11. How are vfs_open, vfs_close used? What other vfs_() calls are relevant?
  12. What are VOP_READ, VOP_WRITE? How are they used?
  13. What does VOP_ISSEEKABLE do?
  14. Where is the struct thread defined? What does this structure contain?
  15. Where is the struct proc defined? What does this structure contain?
  16. Loading and running programs.

    These questions mostly relate to the advanced assignment, but are worth exploring to understand how a program starts running.


    This directory contains some syscall implementations, and the files that are responsible for the loading and running of userlevel programs. Currently, the only files in the directory are loadelf.c, runprogram.c, and time_syscalls.c, although you may want to add more of your own during this assignment. Understanding these files is the key to getting started with the assignment, especially the advanced part, the implementation of multiprogramming. Note that to answer some of the questions, you will have to look in files outside this directory.


    This file contains the functions responsible for loading an ELF executable from the filesystem and into virtual memory space. Of course, at this point this virtual memory space does not provide what is normally meant by virtual memory, although there is translation between the addresses that executables "believe" they are using and physical addresses, there is no mechanism for providing more memory than exists physically.


    This file contains only one function, runprogram(), which is the function that is responsible for running a program from the kernel menu. Once you have designed your file system calls, a program started by runprogram() should have the standard file descriptors (stdout, stderr) available while it's running.

    In the advanced assignment, runprogram() is a good base for writing the execv() system call, but only a base. When thinking about your design, you should determine what more is required for execv() that runprogram() does not need to worry about. Once you have designed your process framework, runprogram() should be altered to start processes properly within this framework.


  17. What are the ELF magic numbers?
  18. In runprogram(), why is it important to call vfs_close before going to usermode?
  19. What function forces the processor to switch into usermode? Is this function machine dependent?
  20. fork()

    Answer these questions by reading the fork() man page and the sections dealing with fork() in the textbook.


  21. What is the purpose of the fork() system call?
  22. What process state is shared between the parent and child?
  23. What process state is copied between the parent and child?
  24. The userland side of system calls.

    This section is mostly related to the advanced version, but is still generally insightful to understand how system calls transition into the kernel. This was covered in some detail in the system call lecture in week 4.


    The userland C startup code. There's only one file in here, mips/crt0.S, which contains the MIPS assembly code that receives control first when a user-level program is started. It calls main(). This is the code that your execv() implementation will be interfacing to, so be sure to check what values it expects to appear in what registers and so forth.


    There's obviously a lot of code in the OS/161 C library (and a lot more yet in a real system's C library...) We don't expect you to read it all, although it may be instructive in the long run to do so. Job interviewers have an uncanny habit of asking people to implement simple standard C functions on the whiteboard. For present purposes you need only look at the code that implements the user-level side of system calls.


    This is where the global variable errno is defined.


    This file contains the machine-dependent code necessary for implementing the userlevel side of MIPS system calls. syscalls.S is created from this file at compile time and is the actual file assembled to put into the C library. The actual names of the system calls are placed in this file using a script called gensyscalls.sh that reads them from the kernel's header files. This avoids having to make a second list of the system calls. In a real system, typically each system call stub is placed in its own source file, to allow selectively linking them in. OS/161 puts them all together to simplify the makefiles.


  25. What is the purpose of the SYSCALL macro?
  26. What is the MIPS instruction that actually triggers a system call? (Answer this by reading the source in this directory, not looking somewhere else.)

Page last modified: 2:54pm on Wednesday, 29th of September, 2021

Print Version

CRICOS Provider Number: 00098G