This course introduces students to the next step in operating system design (after CS 241 or equivalent). Students will understand the main operating system functions in class and analyze their implementation through a series of machine problems that require modifications to operating system code. Students will also be exposed to the concepts of virtual machines and issues of distribution such distributed files systems and map-reduce operators for distributed computation. The course will conclude with a series of advanced topics.
Please contact the instructor if you have questions regarding the material or concerns about whether your background is suitable for the course.
Course Text:
Optional Reading:
You may find the Linux Kernel Development book to be helpful when completing yours MPs.
The following table outlines the schedule for the course. We will update it as the quarter progresses.
Date | Lecture | Readings | Homework | MP | C4 Reading |
---|---|---|---|---|---|
8/23 | Course Intro (slides) | CH 1, CH 2 | Reading Papers | ||
8/25 | Basic Concepts and Systems Programming (slides) | CH 4, CH 13 CH 36 | MINIX | ||
8/30 | MP0 Walkthrough, Q&A (Jinghao and Siyuan) | MP-0 Out | THE OS | ||
9/1 | The Kernel Abstraction (slides), | CH 6, | UNIX | ||
9/6 | Interrupts (slides), The Programming Interface (slides) | CH 5, CH 14 | Linux APIs | ||
9/8 | Concurrency & Threads (slides) | CH 26, CH 27 | MP-1 Out | Scheduler Activation | |
9/13 | MP1 Walkthrough, Q&A (slides) (Xuhao) | MP 0: Due | Upcalls | ||
9/15 | Synchronization I (slides) | CH 28, CH 29 | Heisenbugs | ||
9/20 | Synchronization II (slides) | CH 30, CH 31 | Ad hoc sync | ||
9/22 | Scheduling (slides) | CH 7, CH 8 | MP-2 Out | Lottery Scheduling | |
9/27 | Scheduling in Linux (slides) | CH 9, CH 10 | MP 1: Due | Scheduling bugs | |
9/29 | Learning the Kernel by Debugging -- It's not just `printf()` & `printk()` (YiFei Zhu, Google) | CH 15, CH 16, CH 17 | Translation cache | ||
10/04 | MP2 Walkthrough, Q&A (slides) (Jinghao) | Transactional memory | |||
10/6 | Memory Management I (slides) | CH 18 CH 19, CH 20 | Cuckoo page table | ||
10/11 | Memory Management II (slides) | CH 21, CH 22, CH 23 | Huge pages | ||
10/13 | Midterm Review (slides) (Siyuan) | Mesa monitors | |||
10/18 | Midterm Exam (solution) | ||||
10/20 | MP3 Walkthrough, Q&A (slides) (Siyuan) | MP 3: Out | |||
10/25 | Memory Management III (slides) | MP 2: Due | |||
10/27 | Virtualization I (slides) | Appendix B | Xen | ||
11/1 | Midterm exam walkover (Jinghao) | SW/HW-based virt | |||
11/3 | Hacker's Day | ||||
11/8 | No class on election day. | Firecracker | |||
11/10 | Virtualization II (slides) | Containers | |||
11/15 | Disks and Files (slides) | CH 37, CH 39, CH 44 | MP 3: Due, MP 4: Out | FFS | |
11/17 | MP4 Walkthrough, Q&A (Jinghao) | Log-Structured FS | |||
Fall Break | Fall Break | Food. Lots of it. | Sleep. Lots of it. | ||
11/29 | File System I (slides) | CH 40, CH 41 | Soft Updates | ||
12/1 | File System Design II (slides) | CH 42, CH 43 | GFS | ||
12/6 | Final Review, Q&A (slides) | Reflections | |||
12/11 | Final Exam | Tentative date, Take home | |||
12/13 | MP 4: Due |
The course will involve 5 machine problems, several homeworks, a midterm, and a final. Unless otherwise noted by the instructor, all work in this course is to be completed independently. If you are ever uncertain of how to complete an assignment, you can go to office hours or engage in high-level discussions about the problem with your classmates on the Piazza boards.
Grades will be assigned as follows:
The expectations for the course are that students will attend every class, do any readings assigned for class, and actively and constructively participate in class discussions. Class participation will be a measure of contributing to the discourse both in class, through discussion and questions, and outside of class through contributing and responding to the Piazza forum.
Out of respect for your classmates, I ask that you turn off all laptops, tablets, and phone screens for the duration of each class!
More information about course requirements will be made available leading up to the start of classes
This course will include topics related computer security and privacy. As part of this investigation we may cover technologies whose abuse could infringe on the rights of others. As computer scientists, we rely on the ethical use of these technologies. Unethical use includes circumvention of an existing security or privacy mechanisms for any purpose, or the dissemination, promotion, or exploitation of vulnerabilities of these services. Any activity outside the letter or spirit of these guidelines will be reported to the proper authorities and may result in dismissal from the class and possibly more severe academic and legal sanctions.
The University of Illinois at Urbana-Champaign Student Code should also be considered as a part of this syllabus. Students should pay particular attention to Article 1, Part 4: Academic Integrity. Read the Code at the following URL: http://studentcode.illinois.edu/.
Academic dishonesty may result in a failing grade. Every student is expected to review and abide by the Academic Integrity Policy: http://studentcode.illinois.edu/. Ignorance is not an excuse for any academic dishonesty. It is your responsibility to read this policy to avoid any misunderstanding. Do not hesitate to ask the instructor(s) if you are ever in doubt about what constitutes plagiarism, cheating, or any other breach of academic integrity.
To obtain disability-related academic adjustments and/or auxiliary aids, students with disabilities must contact the course instructor and the as soon as possible. To insure that disability-related concerns are properly addressed from the beginning, students with disabilities who require assistance to participate in this class should contact Disability Resources and Educational Services (DRES) and see the instructor as soon as possible. If you need accommodations for any sort of disability, please speak to me after class, or make an appointment to see me, or see me during my office hours. DRES provides students with academic accommodations, access, and support services. To contact DRES you may visit 1207 S. Oak St., Champaign, call 333-4603 (V/TDD), or e-mail a message to disability@uiuc.edu. Please refer to http://www.disability.illinois.edu/.
Emergency response recommendations can be found at the following website: http://police.illinois.edu/emergency-preparedness/. I encourage you to review this website and the campus building floor plans website within the first 10 days of class: http://police.illinois.edu/emergency-preparedness/building-emergency-action-plans/.
Any student who has suppressed their directory information pursuant to Family Educational Rights and Privacy Act (FERPA) should self-identify to the instructor to ensure protection of the privacy of their attendance in this course. See http://registrar.illinois.edu/ferpa for more information on FERPA.
All members of the Illinois Computer Science department -- faculty, staff, and students -- are expected to adhere to the CS Values and Code of Conduct. The CS CARES Committee is available to serve as a resource to help people who are concerned about or experience a potential violation of the Code. If you experience such issues, please contact the CS CARES Committee. I am also available for issues related to this class.
The course is designed by Professor Adam Bates who taught it during 2017--2019.