Home » Linux » Internals of a Linux system call

Internals of a Linux system call

Posted by: admin November 29, 2017 Leave a comment

Questions:

What happens (in detail) when a thread makes a system call by raising interrupt 80? What work does Linux do to the thread’s stack and other state? What changes are done to the processor to put it into kernel mode? After running the interrupt handler, how is control restored back to the calling process?

What if the system call can’t be completed quickly: e.g. a read from disk. How does the interrupt handler relinquish control so that the processor can do other stuff while data is being loaded and how does it then obtain control again?

Answers:

A crash course in kernel mode in one stack overflow answer

Good questions! (Interview questions?)


  • What happens (in detail) when a
    thread makes a system call by raising
    interrupt 80?

The int $80 operation is vaguely like a function call. The CPU “takes a trap” and restarts at a known address in kernel mode, typically with a different MMU mode as well. The kernel will save many of the registers, though it doesn’t have to save the registers that a program would not expect an ordinary function call to save.

  • What work does Linux do to the
    thread’s stack and other state?

Typically an OS will save registers that the ABI promises not to change during procedure calls. The stack will stay the same; the kernel will run on a per-thread kernel stack rather than the per-thread user stack. Naturally some state will change, otherwise there would be no reason to do the system call.

  • What changes are done to the
    processor to put it into kernel mode?

This is usually entirely automatic. The CPU has, generically, a software-interrupt instruction that is a bit like a functional-call operation. It will cause the switch to kernel mode under controlled conditions. Typically, the CPU will change some sort of PSW protection bit, save the old PSW and PC, start at a well-known trap vector address, and may also switch to a different memory management protection and mapping arrangement.

  • After running the interrupt handler,
    how is control restored back to the
    calling process?

There will be some sort of “return from interrupt” or “return from trap” instruction, typically, that will act a bit like a complicated function-return instruction. Some RISC processors did very little automatically and required specific code to do the return and some CISC processors like x86 have (never-really-used) instructions that would execute dozens of operations documented in pages of architecture-manual pseudo-code for capability adjustments.

  • What if the system call can’t be
    completed quickly: e.g. a read from
    disk. How does the interrupt handler
    relinquish control so that the
    processor can do other stuff while
    data is being loaded and how does it
    then obtain control again?

The kernel itself is threaded much like a threaded user program is. It just switches stacks (threads) and works on someone else’s process for a while.

Questions:
Answers:

To answer the last part of the question – what does the kernel do if the system call needs to sleep –

After a system call, the kernel is still logically running in the context of the same task that made the system call – it’s just in kernel mode rather than user mode – it is NOT a separate thread and most system calls do not invoke logic from another task/thread. What happens is that the system call calls wait_event, or wait_event_timeout or some other wait function, which adds the task to a list of tasks waiting for something, then puts the task to sleep, which changes its state, and calls schedule() to relinquish the current CPU.

After this the task cannot be run again until it gets woken up, typically by another task (kernel task, etc) or interrupt handler calling a wake* function which will wake up the task(s) sleeping waiting for that particular event, which means the scheduler will soon schedule them again.

It’s worth noting that userspace tasks (i.e. threads) are only one type of task and there are a few others internal to the kernel which can do work as well – these are kernel threads and bottom half handlers / tasklets / task queues etc. Work which doesn’t belong to any particular userspace process (for example network handling e.g. responding to pings) gets done in these. These tasks are allowed to go to sleep, unlike interrupts (which should not invoke the scheduler)

Questions:
Answers:

http://tldp.org/LDP/khg/HyperNews/get/syscall/syscall86.html

Questions:
Answers:

This should help people who seek for answers to what happens when the syscall instruction is executed which transfers the control to the kernel (user mode to kernel mode). This is based upon x86_64 architecture.

https://0xax.gitbooks.io/linux-insides/content/SysCall/syscall-2.html