Computer System Operation I/O Structure Storage Structure Storage Hierarchy Hardware Protection General System Architecture
Computer System Operation I/O Structure Storage Structure Storage Hierarchy Hardware Protection General System Architecture
2.1
Computer-System Architecture
2.2
Computer-System Operation
type.
Each device controller has a local buffer.
CPU moves data from/to main memory to/from local
buffers
I/O is from the device to local buffer of controller.
Device controller informs CPU that it has finished its
operation by causing an interrupt.
2.3
2.4
Note: This picture is excerpted from Write a Linux Hardware
Device Driver,
AndrewGalvin
OShauqhnessy,
Unix world
Silberschatz,
and Gagne 2002
2.5
Interrupt Handling
The operating system preserves the state of the CPU by
Signal
Value
Action
Comment
------------------------------------------------------------------------SIGHUP
1
Term
Hangup detected on controlling terminal
or death of controlling process
SIGINT
2
Term
Interrupt from keyboard
SIGQUIT
3
Core
Quit from keyboard
SIGILL
4
Core
Illegal Instruction
SIGABRT
6
Core
Abort signal from abort(3)
SIGFPE
8
Core
Floating point exception
SIGKILL
9
Term
Kill signal
SIGSEGV
11
Core
Invalid memory reference
SIGPIPE
13
Term
Broken pipe: write to pipe with no readers
SIGALRM
14
Term
Timer signal from alarm(2)
SIGTERM
15
Term
Termination signal
SIGUSR1
30,10,16
Term
User-defined signal 1
SIGUSR2
31,12,17
Term
User-defined signal 2
:
2.6
2.7
I/O Structure
After I/O starts, control returns to user program only upon
I/O completion.
2.8
Synchronous
Asynchronous
2.9
Device-Status Table
2.10
2.11
Storage Structure
2.12
2.13
Storage Hierarchy
2.14
Storage-Device Hierarchy
2.15
Caching
data.
Requires a cache management policy.
Caching introduces another level in storage hierarchy.
This requires data that is simultaneously stored in more
than one level to be consistent.
2.16
2.17
Hardware Protection
Dual-Mode Operation
I/O Protection
Memory Protection
CPU Protection
2.18
Dual-Mode Operation
2.19
monitor
user
set user mode
2.20
I/O Protection
2.21
2.22
Memory Protection
address.
Limit register contains the size of the range
2.23
2.24
2.25
Hardware Protection
2.26
CPU Protection
2.27
Network Structure
2.28
2.29
2.30