Introduction to Computer Systems , fall th Lecture, Oct. 14 th

Similar documents
CS213. Exceptional Control Flow Part II. Topics Process Hierarchy Signals

Processes & Signals. System Runs Many Processes Concurrently. State consists of memory image + register values + program counter

Exceptional Control Flow Exists at All Levels of a System. Systemprogrammering 2007 Föreläsning 3 Exceptional Control Flow Part II

ECF Exists at All Levels of a System Exceptional Control Flow Part II Oct. 22, 2002 Topics! Process Hierarchy! Shells! Signals!

Exceptional Control Flow Part II

Giving credit where credit is due

Exceptional Control Flow Part II Nov. 2, 2009"

Exceptional Control Flow Part II October 24, 2007

Lecture 24: Multitasking and Signals

Signals. Jin-Soo Kim Computer Systems Laboratory Sungkyunkwan University

Shell and Signals. Computer Organization 3/17/2015. CSC252 - Spring The World of Multiprogramming or Multitasking. Unix Process Hierarchy

Exceptional Control Flow: Signals and Nonlocal Jumps

ECF Exists at All Levels of a System

Multitasking. Programmer s model of multitasking. fork() spawns new process. exit() terminates own process

Exceptions, Processes and Signals

Programming Assignments will be.. All the PAs are continuous 3 major factors that you should consider

What is an Operating System? Signals, Processes, & Threads. Resource Sharing. Resource Abstraction ... Operating Systems 10/20/2010

Excep&onal Control Flow: Signals and Nonlocal Jumps

Mul$tasking and Shells

Program and OS Intera/on: Mul/tasking and Signals

Last Class. System Calls, Kernel Mode, and Process Implementation. Processes. Today. Operating Systems 9/11/2018 CSC 256/456 1

Operating Systems Components. What is an Operating System? Process Management. Memory Management. Operating Systems 9/7/2018 CSC 256/456 1

Operating Systems 9/6/ SIGINT Terminate Interrupt from keyboard (ctl-c) 9 SIGKILL Terminate Kill program (cannot override or ignore)

CS 201. Processes. Gerson Robboy Portland State University

Exceptional Control Flow: Signals

Exceptional Control Flow: Signals and Nonlocal Jumps

Foundations of Computer Systems

Processes & Threads. (Chapter 3) CS 4410 Operating Systems. [R. Agarwal, L. Alvisi, A. Bracy, M. George, E. Sirer, R. Van Renesse]

!"#$%&'()*+,'(-.'*+/*' ()*5+)(6+7'(*'#)*+89:%5 !,/+!"35-5+)-+;**+<$=$*5+'>+)+2?5-$:

Exceptional Control Flow Part I

Exceptional Control Flow Part I Oct. 17, 2002

Exceptional Control Flow: Exceptions and Processes

Excep&onal Control Flow

CS24: INTRODUCTION TO COMPUTING SYSTEMS. Spring 2018 Lecture 20

Giving credit where credit is due

Control Flow. Systemprogrammering 2007 Föreläsning 2 Exceptional Control Flow Part I. Exceptional Control Flow. Altering the Control Flow

Excep&onal Control Flow

Exceptional Control Flow Part I September 22, 2008

Today. Introduction to Computer Systems /18 243, Fall th Lecture. Control Flow. Altering the Control Flow.

Today. Exceptional Control Flow Processes. Exceptions and Processes. Control Flow. Altering the Control Flow

Processes: Introduction. CS 241 February 13, 2012

Exceptional Control Flow Part I

Are branches/calls the only way we can get the processor to go somewhere in a program? What is a program? A processor? A process?

Excep&onal Control Flow: Signals and Nonlocal Jumps

Computer Science & Engineering Department I. I. T. Kharagpur. Operating System: CS rd Year CSE: 5th Semester (Autumn ) Lecture VII

Exceptional Control Flow Part I Oct. 28, 2009"

CS24: INTRODUCTION TO COMPUTING SYSTEMS. Spring 2017 Lecture 19

Processes, Exceptional

Signals, Synchronization. CSCI 3753 Operating Systems Spring 2005 Prof. Rick Han

Signals: Management and Implementation. Sanjiv K. Bhatia Univ. of Missouri St. Louis

Processes. Jin-Soo Kim Computer Systems Laboratory Sungkyunkwan University

Concurrent Processes. CS 475, Spring 2018 Concurrent & Distributed Systems

Q & A (1) Where were string literals stored? Virtual Address. SSE2033: System Software Experiment 2 Spring 2016 Jin-Soo Kim

CS24: INTRODUCTION TO COMPUTING SYSTEMS. Spring 2018 Lecture 18

Introduction to Computer Systems , fall th Lecture, Oct. 7 th

Announcement (1) sys.skku.edu is now available

Exceptions, Processes and Signals

Operating System Structure

IMPLEMENTATION OF SIGNAL HANDLING. CS124 Operating Systems Fall , Lecture 15

CSC 252: Computer Organization Spring 2018: Lecture 19

Process Control. Philipp Koehn. 23 April 2018

University of Washington What is a process?

Exceptional Control Flow: Exceptions and Processes

Altering the Control Flow

Process Management forks, bombs, zombies, and daemons! Lecture 5, Hands-On Unix System Administration DeCal

Altering the Control Flow

Excep&onal Control Flow: Excep&ons and Processes

Processes. CSE 351 Autumn Instructor: Justin Hsia

Signals. Goals of this Lecture. Help you learn about: Sending signals Handling signals

Signals and Session Management. Signals. Mechanism to notify processes of system events

Most of the work is done in the context of the process rather than handled separately by the kernel

Processes. CSE 351 Autumn Instructor: Justin Hsia

System Programming. Signals I

PROCESS CONTROL BLOCK TWO-STATE MODEL (CONT D)

CS 4410, Fall 2017 Project 1: My First Shell Assigned: August 27, 2017 Due: Monday, September 11:59PM

Advanced Unix/Linux System Program. Instructor: William W.Y. Hsu

CS240: Programming in C

Excep onal Control Flow: Excep ons and Processes

KING FAHD UNIVERSITY OF PETROLEUM AND MINERALS Information and Computer Science Department ICS 431 Operating Systems Lab # 6

CPSC 341 OS & Networks. Processes. Dr. Yingwu Zhu

Fall 2015 COMP Operating Systems. Lab #3

Processes. CS3026 Operating Systems Lecture 05

Carnegie Mellon. Processes. Lecture 12, May 19 th Alexandre David. Credits to Randy Bryant & Dave O Hallaron from Carnegie Mellon

Processes. Processes (cont d)

Lesson 3. The func procedure allows a user to choose the action upon receipt of a signal.

Process. Signal #8. Signals are software interrupts from unexpected events. a power failure. an alarm clock. the death of a child process

Processes, Signals, I/O, Shell Lab : Introduc>on to Computer Systems Recita>on 9: Monday, Oct. 21, 2013 Marjorie Carlson Sec>on A

CS631 - Advanced Programming in the UNIX Environment. Process Groups, Sessions, Signals

System Programming. Signals II

CSCI0330 Intro Computer Systems Doeppner. Project Shell 2. Due: November 8, 2017 at 11:59pm. 1 Introduction 2

Process management. What s in a process? What is a process? The OS s process namespace. A process s address space (idealized)

CS 355 Operating Systems. Keeping Track of Processes. When are processes created? Process States 1/26/18. Processes, Unix Processes and System Calls

Unix Processes. What is a Process?

Processes. Jin-Soo Kim Computer Systems Laboratory Sungkyunkwan University

System Calls & Signals. CS449 Spring 2016

Preview. Process Termination. wait and waitpid() System Call. wait and waitpid() System Call. waitpid() System Call 10/23/2018

CS3733: Operating Systems

PROCESSES. Jo, Heeseung

Processes. Jo, Heeseung

CSci 4061 Introduction to Operating Systems. (Advanced Control Signals)

Transcription:

Introduction to Computer Systems 15 213, fall 2009 14 th Lecture, Oct. 14 th Instructors: Majd Sakr and Khaled Harras

ECF Exists at All Levels of a System Exceptions Hardware and operating system kernel software Signals Kernel software Non local jumps Application code Previous Lecture This Lecture

Today Multitasking, shells Signals Long jumps More on signals

The World of Multitasking System runs many processes concurrently Process: executing program State includes memory image + register values + program counter Regularly switches from one process to another Suspend process when it needs I/O resource or timer event occurs Resume process when I/O available or given scheduling priority Appears to user(s) as if all processes executing simultaneously Even though most systems can only execute one process at a time Except possibly with lower performance than if running alone

Programmer s Model of Multitasking Basic functions fork() spawns new process Called once, returns twice exit() terminates own process Called once, never returns Puts it into zombie status wait() and waitpid() wait for and reap terminated children execl() and execve() run new program in existing process Called once, (normally) never returns Programming challenge Understanding the nonstandard semantics of the functions Avoiding improper use of system resources E.g. Fork bombs can disable a system

Unix Process Hierarchy [0] init [1] Daemon e.g. httpd Login shell Child Child Child Grandchild Grandchild

The ps command Unix> ps aux -w --forest (output edited to fit slide) USER PID TTY STAT COMMAND root 1? S init [3] root 2? SW [keventd] root 3? SWN [ksoftirqd_cpu0] root 4? SW [kswapd] root 5? SW [bdflush] root 6? SW [kupdated] root 9? SW< [mdrecoveryd] root 12? SW [scsi_eh_0] root 397? S /sbin/pump -i eth0 root 484? S< /usr/local/sbin/afsd -nosettime root 533? S syslogd -m 0 root 538? S klogd -2 rpc 563? S portmap rpcuser 578? S rpc.statd daemon 696? S /usr/sbin/atd root 713? S /usr/local/etc/nanny -init /etc/nanny.conf mmdf 721? S \_ /usr/local/etc/deliver -b -csmtpcmu root 732? S \_ /usr/local/sbin/named -f root 738? S \_ /usr/local/sbin/sshd -D root 739? S<L \_ /usr/local/etc/ntpd -n root 752? S<L \_ /usr/local/etc/ntpd -n root 753? S<L \_ /usr/local/etc/ntpd -n root 744? S \_ /usr/local/sbin/zhm -n zephyr-1.srv.cm root 774? S gpm -t ps/2 -m /dev/mouse root 786? S crond

The ps Command (cont.) USER PID TTY STAT COMMAND root 889 tty1 S /bin/login -- agn agn 900 tty1 S \_ xinit -- :0 root 921? SL \_ /etc/x11/x -auth /usr1/agn/.xauthority :0 agn 948 tty1 S \_ /bin/sh /afs/cs.cmu.edu/user/agn/.xinitrc agn 958 tty1 S \_ xterm -geometry 80x45+1+1 -C -j -ls -n agn 966 pts/0 S \_ -tcsh agn 1184 pts/0 S \_ /usr/local/bin/wish8.0 -f /usr agn 1212 pts/0 S \_ /usr/local/bin/wish8.0 -f agn 3346 pts/0 S \_ aspell -a -S agn 1191 pts/0 S \_ /bin/sh /usr/local/libexec/moz agn 1204 8 pts/0 S \_ /usr/local/libexec/mozilla agn 1207 8 pts/0 S \_ /usr/local/libexec/moz agn 1208 8 pts/0 S \_ /usr/local/libexec agn 1209 8 pts/0 S \_ /usr/local/libexec agn 17814 8 pts/0 S \_ /usr/local/libexec agn 2469 pts/0 S \_ usr/local/lib/acrobat agn 2483 pts/0 S \_ java_vm agn 2484 pts/0 S \_ java_vm agn 2485 pts/0 S \_ java_vm agn 3042 pts/0 S \_ java_vm agn 959 tty1 S \_ /bin/sh /usr/local/libexec/kde/bin/sta agn 1020 tty1 S \_ kwrapper ksmserver

Unix Startup: Step 1 1. Pushing reset button loads the PC with the address of a small bootstrap program. 2. Bootstrap program loads the boot block (disk block 0). 3. Boot block program loads kernel binary (e.g., /boot/vmlinux) 4. Boot block program passes control to kernel. 5. Kernel handcrafts the data structures for process 0. [0] Process 0: handcrafted kernel process Process 0 forks child process 1 init [1] Child process 1 execs /sbin/init

Some PC Start up Details Boot Disk / CD / Floppy CPU 0xffffffff 0xffff0000 BIOS ROM 0x00000000

Some PC Start up Details Boot Disk / CD / Floppy CPU Power on/reset 0xffffffff 0xffff0000 BIOS ROM 0x00000000

Some PC Start up Details Boot Disk / CD / Floppy Start Execution at 0xfffffff0 CPU 0xffffffff 0xffff0000 BIOS ROM 0x00000000

Some PC Start up Details Boot Disk / CD / Floppy CPU 0xffffffff 0xffff0000 BIOS ROM Copy Master Boot Record (MBR) into memory 0x00007c00 0x00000000

Some PC Start up Details Boot Disk / CD / Floppy CPU 0xffffffff 0xffff0000 BIOS ROM BIOS verifies MBR and jumps to 0x00007c00 0x00007c00 0x00000000

Some PC Start up Details Boot Disk / CD / Floppy CPU 0xffffffff 0xffff0000 BIOS ROM LILO (or GRUB) is loaded from first sector of active partition 0x00007c00 0x00000000

Some PC Start up Details Boot Disk / CD / Floppy CPU 0xffffffff 0xffff0000 BIOS ROM CPU executes LILO 0x00007c00 0x00000000

Some PC Start up Details Boot Disk / CD / Floppy CPU 0xffffffff 0xffff0000 BIOS ROM The Linux kernel is loaded and begins initialization 0x00007c00 0x00000000

Unix Startup: Step 2 [0] /etc/inittab Daemons e.g. ftpd, httpd init [1] getty init forks and execs daemons per /etc/inittab, and forks and execs a getty program for the console

Unix Startup: Step 3 [0] init [1] login The getty process execs a login program

Unix Startup: Step 4 [0] init [1] tcsh login reads login-id and passwd. if OK, it execs a shell. if not OK, it execs another getty In case of login on the console xinit may be used instead of a shell to start the window manger

Shell Programs A shell is an application program that runs programs on behalf of the user. sh Original Unix shell (Stephen Bourne, AT&T Bell Labs, 1977) csh BSD Unix C shell (tcsh: csh enhanced at CMU and elsewhere) bash Bourne Again Shell Execution is a sequence of read/evaluate steps int main() { char cmdline[maxline]; while (1) { /* read */ printf("> "); Fgets(cmdline, MAXLINE, stdin); if (feof(stdin)) exit(0); /* evaluate */ eval(cmdline);

Simple Shell eval Function void eval(char *cmdline) { char *argv[maxargs]; /* argv for execve() */ int bg; /* should the job run in bg or fg? */ pid_t pid; /* process id */ bg = parseline(cmdline, argv); if (!builtin_command(argv)) { if ((pid = Fork()) == 0) { /* child runs user job */ if (execve(argv[0], argv, environ) < 0) { printf("%s: Command not found.\n", argv[0]); exit(0); Carnegie Mellon if (!bg) { /* parent waits for fg job to terminate */ int status; if (waitpid(pid, &status, 0) < 0) unix_error("waitfg: waitpid error"); else /* otherwise, don t wait for bg job */ printf("%d %s", pid, cmdline);

What Is a Background Job? Users generally run one command at a time Type command, read output, type another command Some programs run for a long time Example: delete this file in two hours % sleep 7200; rm /tmp/junk # shell stuck for 2 hours A background job is a process we don't want to wait for % (sleep 7200 ; rm /tmp/junk) & [1] 907 % # ready for next command

Problem with Simple Shell Example Shell correctly waits for and reaps foreground jobs But what about background jobs? Will become zombies when they terminate Will never be reaped because shell (typically) will not terminate Will create a memory leak that could theoretically run the kernel out of memory Modern Unix: once you exceed your process quota, your shell can't run any new commands for you: fork() returns 1 % limit maxproc # csh syntax maxproc 3574 $ ulimit -u # bash syntax 3574

ECF to the Rescue! Problem The shell doesn't know when a background job will finish By nature, it could happen at any time The shell's regular control flow can't reap exited background processes in a timely fashion Regular control flow is wait until running job completes, then reap it Solution: Exceptional control flow The kernel will interrupt regular processing to alert us when a background process completes In Unix, the alert mechanism is called a signal

Today Multitasking, shells Signals Long jumps More on signals

Signals A signal is a small message that notifies a process that an event of some type has occurred in the system akin to exceptions and interrupts sent from the kernel (sometimes at the request of another process) to a process signal type is identified by small integer ID s (1 30) only information in a signal is its ID and the fact that it arrived ID Name Default Action Corresponding Event 2 SIGINT Terminate Interrupt (e.g., ctl cfrom keyboard) 9 SIGKILL Terminate Kill program (cannot override or ignore) 11 SIGSEGV Terminate & Dump Segmentation violation 14 SIGALRM Terminate Timer signal 17 SIGCHLD Ignore Child stopped or terminated

Sending a Signal Kernel sends (delivers) a signal to a destination process by updating some state in the context of the destination process Kernel sends a signal for one of the following reasons: Kernel has detected a system event such as divide by zero (SIGFPE) or the termination of a child process (SIGCHLD) Another process has invoked the kill system call to explicitly request the kernel to send a signal to the destination process

Receiving a Signal A destination process receives a signal when it is forced by the kernel to react in some way to the delivery of the signal Three possible ways to react: Ignore the signal (do nothing) Terminate the process (with optional core dump) Catch the signal by executing a user level function called signal handler Akin to a hardware exception handler being called in response to an asynchronous interrupt

Signal Concepts (continued) A signal is pending if sent but not yet received There can be at most one pending signal of any particular type Important: Signals are not queued If a process has a pending signal of type k, then subsequent signals of type k that are sent to that process are discarded A process can block the receipt of certain signals Blocked signals can be delivered, but will not be received until the signal is unblocked A pending signal is received at most once

Signal Concepts Kernel maintains pending and blocked bit vectors in the context of each process pending: represents the set of pending signals Kernel sets bit k in pending when a signal of type k is delivered Kernel clears bit k in pending when a signal of type k is received blocked: represents the set of blocked signals Can be set and cleared by using the sigprocmask function

Process Groups Every process belongs to exactly one process group pid=10 pgid=10 Shell pid=20 pgid=20 Foreground job Background job #1 pid=32 pgid=32 Background job #2 pid=40 pgid=40 Child Child Background process group 32 Background process group 40 pid=21 pgid=20 Foreground process group 20 pid=22 pgid=20 getpgrp() Return process group of current process setpgid() Change process group of a process

Sending Signals with kill Program kill program sends arbitrary signal to a process or process group Examples kill 9 24818 Send SIGKILL to process 24818 kill 9 24817 Send SIGKILL to every process in process group 24817 linux>./forks 16 linux> Child1: pid=24818 pgrp=24817 Child2: pid=24819 pgrp=24817 linux> ps PID TTY TIME CMD 24788 pts/2 00:00:00 tcsh 24818 pts/2 00:00:02 forks 24819 pts/2 00:00:02 forks 24820 pts/2 00:00:00 ps linux> kill -9-24817 linux> ps PID TTY TIME CMD 24788 pts/2 00:00:00 tcsh 24823 pts/2 00:00:00 ps linux>

Sending Signals with kill Function void fork12() { pid_t pid[n]; int i, child_status; for (i = 0; i < N; i++) if ((pid[i] = fork()) == 0) while(1); /* Child infinite loop */ /* Parent terminates the child processes */ for (i = 0; i < N; i++) { printf("killing process %d\n", pid[i]); kill(pid[i], SIGINT); /* Parent reaps terminated children */ for (i = 0; i < N; i++) { pid_t wpid = wait(&child_status); if (WIFEXITED(child_status)) printf("child %d terminated with exit status %d\n", wpid, WEXITSTATUS(child_status)); else printf("child %d terminated abnormally\n", wpid);

Receiving Signals Suppose kernel is returning from an exception handler and is ready to pass control to process p Kernel computes pnb = pending & ~blocked The set of pending nonblocked signals for process p If (pnb == 0) Pass control to next instruction in the logical flow for p Else Choose least nonzero bit k in pnb and force process p to receive signal k The receipt of the signal triggers some action by p Repeat for all nonzero k in pnb Pass control to next instruction in logical flow for p

Default Actions Each signal type has a predefined default action, which is one of: The process terminates The process terminates and dumps core The process stops until restarted by a SIGCONT signal The process ignores the signal

Installing Signal Handlers The signal function modifies the default action associated with the receipt of signal signum: handler_t *signal(int signum, handler_t *handler) Different values for handler: SIG_IGN: ignore signals of type signum SIG_DFL: revert to the default action on receipt of signals of type signum Otherwise, handler is the address of a signal handler Called when process receives signal of type signum Referred to as installing the handler Executing handler is called catching or handling the signal When the handler executes its return statement, control passes back to instruction in the control flow of the process that was interrupted by receipt of the signal

Signal Handling Example void int_handler(int sig) { printf("process %d received signal %d\n", getpid(), sig); exit(0); void fork13() { pid_t pid[n]; int i, child_status; signal(sigint, int_handler);... User: Ctrl C (once) linux>./forks 13 Killing process 24973 Killing process 24974 Killing process 24975 Killing process 24976 Killing process 24977 Process 24977 received signal 2 Child 24977 terminated with exit status 0 Process 24976 received signal 2 Child 24976 terminated with exit status 0 Process 24975 received signal 2 Child 24975 terminated with exit status 0 Process 24974 received signal 2 Child 24974 terminated with exit status 0 Process 24973 received signal 2 Child 24973 terminated with exit status 0 linux>

Signals Handlers as Concurrent Flows A signal handler is a separate logical flow (not process) that runs concurrently with the main program concurrently in the not sequential sense Process A while (1) ; Process A handler(){ Process B Time

Another View of Signal Handlers as Concurrent Flows Process A Process B Signal delivered Signal received I curr I next user code (main) kernel code user code (main) kernel code user code (handler) kernel code user code (main) context switch context switch

Today Multitasking, shells Signals Long jumps More on signals

Nonlocal Jumps: setjmp/longjmp Powerful (but dangerous) user level mechanism for transferring control to an arbitrary location Controlled to way to break the procedure call / return discipline Useful for error recovery and signal handling int setjmp(jmp_buf j) Must be called before longjmp Identifies a return site for a subsequent longjmp Called once, returns one or more times Implementation: Remember where you are by storing the current register context, stack pointer, and PC value in jmp_buf Return 0

setjmp/longjmp (cont) void longjmp(jmp_buf j, int i) Meaning: return from the setjmp remembered by jump buffer j again... this time returning i instead of 0 Called after setjmp Called once, but never returns longjmp Implementation: Restore register context (stack pointer, base pointer, PC value) from jump buffer j Set %eax (the return value) to i Jump to the location indicated by the PC stored in jump buf j

setjmp/longjmp Example #include <setjmp.h> jmp_buf buf; main() { if (setjmp(buf)!= 0) { printf("back in main due to an error\n"); else printf("first time through\n"); p1(); /* p1 calls p2, which calls p3 */... p3() { <error checking code> if (error) longjmp(buf, 1)

Limitations of Nonlocal Jumps Works within stack discipline Can only long jump to environment of function that has been called but not yet completed jmp_buf env; P1() { if (setjmp(env)) { /* Long Jump to here */ else { P2(); env Before longjmp P1 P2 P2 P2 After longjmp P1 P2() {... P2();... P3(); P3 P3() { longjmp(env, 1);

Limitations of Long Jumps (cont.) Works within stack discipline Can only long jump to environment of function that has been called but not yet completed jmp_buf env; P1 P1() { P2(); P3(); env P2 At setjmp P2() { if (setjmp(env)) { /* Long Jump to here */ env X P1 P2 P2 returns P1 P3() { longjmp(env, 1); env X P3 At longjmp

Putting It All Together: A Program That Restarts Itself When ctrl-c d #include <stdio.h> #include <signal.h> #include <setjmp.h> sigjmp_buf buf; void handler(int sig) { siglongjmp(buf, 1); main() { signal(sigint, handler); if (!sigsetjmp(buf, 1)) printf("starting\n"); else printf("restarting\n"); bass> a.out starting processing... processing... restarting processing... processing... restarting processing... Ctrl c Ctrl c while(1) { sleep(1); printf("processing...\n");

Summary Signals provide process level exception handling Can generate from user programs Can define effect by declaring signal handler Some caveats Very high overhead >10,000 clock cycles Only use for exceptional conditions Don t have queues Just one bit for each pending signal type Nonlocal jumps provide exceptional control flow within process Within constraints of stack discipline

Today Multitasking, shells Signals Long jumps More on signals

Sending Signals from the Keyboard Typing ctrl c (ctrl z) sends a SIGINT (SIGTSTP) to every job in the foreground process group. SIGINT default action is to terminate each process SIGTSTP default action is to stop (suspend) each process pid=10 pgid=10 Shell pid=20 pgid=20 Foreground job Background job #1 pid=32 pgid=32 Background job #2 pid=40 pgid=40 Child Child Background process group 32 Background process group 40 pid=21 pgid=20 Foreground process group 20 pid=22 pgid=20

Example of ctrl-c and ctrl-z bluefish>./forks 17 Child: pid=28108 pgrp=28107 Parent: pid=28107 pgrp=28107 <types ctrl-z> Suspended bluefish> ps w PID TTY STAT TIME COMMAND 27699 pts/8 Ss 0:00 -tcsh 28107 pts/8 T 0:01./forks 17 28108 pts/8 T 0:01./forks 17 28109 pts/8 R+ 0:00 ps w bluefish> fg./forks 17 <types ctrl-c> bluefish> ps w PID TTY STAT TIME COMMAND 27699 pts/8 Ss 0:00 -tcsh 28110 pts/8 R+ 0:00 ps w STAT (process state) Legend: First letter: S: sleeping T: stopped R: running Second letter: s: session leader +: foreground proc group See man ps for more details

Signal Handler Funkiness int ccount = 0; void child_handler(int sig) { int child_status; pid_t pid = wait(&child_status); ccount--; printf("received signal %d from process %d\n", sig, pid); void fork14() { pid_t pid[n]; int i, child_status; ccount = N; signal(sigchld, child_handler); for (i = 0; i < N; i++) if ((pid[i] = fork()) == 0) { sleep(1); /* deschedule child */ exit(0); /* Child: Exit */ while (ccount > 0) pause(); /* Suspend until signal occurs */ Pending signals are not queued For each signal type, just have single bit indicating whether or not signal is pending Even if multiple processes have sent this signal

Living With Nonqueuing Signals Must check for all terminated jobs Typically loop with wait void child_handler2(int sig) { int child_status; pid_t pid; while ((pid = waitpid(-1, &child_status, WNOHANG)) > 0) { ccount--; printf("received signal %d from process %d\n", sig, pid); void fork15() {... signal(sigchld, child_handler2);...

Signal Handler Funkiness (Cont.) Signal arrival during long system calls (say a read) Signal handler interrupts read() call Linux: upon return from signal handler, the read() call is restarted automatically Some other flavors of Unix can cause the read() call to fail with an EINTER error number (errno) in this case, the application program can restart the slow system call Subtle differences like these complicate the writing of portable code that uses signals

A Program That Reacts to Externally Generated Events (Ctrl c) #include <stdlib.h> #include <stdio.h> #include <signal.h> void handler(int sig) { printf("you think hitting ctrl-c will stop the bomb?\n"); sleep(2); printf("well..."); fflush(stdout); sleep(1); printf("ok\n"); exit(0); main() { signal(sigint, handler); /* installs ctl-c handler */ while(1) {

A Program That Reacts to Internally Generated Events #include <stdio.h> #include <signal.h> int beeps = 0; main() { signal(sigalrm, handler); alarm(1); /* send SIGALRM in 1 second */ /* SIGALRM handler */ void handler(int sig) { printf("beep\n"); fflush(stdout); while (1) { /* handler returns here */ if (++beeps < 5) alarm(1); else { printf("boom!\n"); exit(0); linux> a.out BEEP BEEP BEEP BEEP BEEP BOOM! bass>