慶應義塾大学
2018年度 春学期

Operating Systems

担当: Rodney Van Meter
E-mail: rdv@sfc.keio.ac.jp

第5回 4月23日 メモリ管理と仮想記憶
Lecture 5, April 23: Memory Management and Virtual Memory
Lecture 6, April 27: Names, Address Translation, Paging and Reference Traces
Lecture 7, May 2 (Wednesday is Friday!): Page Faults and Page Replacement Algorithms

Outline

Today's Pictures

Keio support section sign Keio flag

Materials for First Memory Lecture

The first lecture is about addresses and memory management: the different segments, stacks and dynamic memory, etc.

Materials for Second Virtual Memory Lecture

The second lecture will pick up with the buddy system, review the basic concepts of bit fields, then study the mechanisms we use to achieve address translation, especially the data structure known as the page table. The third lecture will then study how we make decisions about virtual memory.

Materials for Third Virtual Memory Lecture

(See separate notes, linked to from the syllabus.)

Memory Hierarchy, Segments and Memory Maps

Goal of Memory Management

The primary goal of memory management is to support dynamic growth and shrinking of resources. Why?

Multi-level Memory Hierarchy

Most computer systems support a multi-level memory hierarchy:

where all of the levels are managed by the compiler and operating system together to be transparent to the application programmer, except for performance. Sometimes the transparency is partially aided by hardware, as in the case of cache memory.

Four questions on the memory hierarchy:

We will go into these four questions in more detail at the end of this lecture, and next time.

Memory Map

The most important concept tool for visualizing the location of data is the memory map. Memory maps can be drawn with high addresses at the top or the bottom.

See pointer-print.c.

Linux memory map, from NCSU

(Image is a Linux process memory map, from NCSU.)

Memory in a Unix process can be divided into several segments:

Memory Management

Goal of Memory Management (reiterate)

The primary goal of memory management is to support dynamic growth and shrinking of resources. Why?

Basic Techniques

The most important task of the memory manager is to keep track of which memory is free and which is allocated. That task can be done using bitmaps or linked lists.

Sometimes, memory is wasted due to a process known as fragmentation. Fragmentation occurs when various objects are created and deleted, leaving behind holes in the memory space. The memory manager's job is to see that applications can always get the memory they need, by using an algorithm that minimizes fragmentation and keeps holes under control.

Several different algorithms can be used to assign memory to the next request that comes in:

Probably all operating systems internally use a technique called quick fit, in which separate lists are maintained for commonly-requested sizes. 4K, 1500, and 128 bytes are common sizes. (Actually, it would be more correct to say that a multi-level memory manager is at work here; the network subsystem calls the primary memory manager to allocate a large chunk of memory, which it then manages itself and divides up into smaller chunks for buffers for various things.)

[rdv@dhcp-143-236 ~]$ more /proc/buddyinfo 
Node 0, zone      DMA      2      4      3      4      5      4      2      2      3      1      1 
Node 0, zone   Normal    242    110    156    111     78     43     20      7      7      4      3 
Node 0, zone  HighMem      2      0      0      1      1      1      0      0      0      0      0 

See this page or one in Japanese for a description of the buddyinfo output.

Simple Multiprogramming Memory Management

With base and limit registers, the base register is added to every memory request, and checked against the limit register. Thus, when the OS schedules a different process, the only those two registers have to change.

The original form of multiprogramming actually involved swapping complete processes into and out of memory, to a special reserved area of disk (or drum). This approach allowed each process to act as if it owned all of the memory in the system, without worrying about other processes. However, swapping a process out and in is not fast!

Review: Powers of Two, Bit Fields and Trees

A few weeks ago, you had bit field extraction as a homework set. This lecture is why you had that. Let's do some examples...

See the program bitwise-funzies-rdv2.c.

We have also seen tree structures. Let's take a quick look at a fixed type of non-binary tree.

Introduction to Virtual Memory

Finally, we come to virtual memory (仮想記録). With virtual memory, each process has its own address space. This concept is a very important instance of naming. Virtual memory (VM) provides several important capabilities:

In most modern microprocessors intended for general-purpose use, a memory management unit, or MMU, is built into the hardware. The MMU's job is to translate virtual addresses into physical addresses.

Page Tables

multiple page tables, from
					ja.wikipedia.org

(thanks to Chishiro for spotting those excellent diagrams on Wikipedia.)

Viritual memory is usually done by dividing memory up into pages, which in Unix systems are typically, but not necessarily, four kilobytes (4KB) each. Linux, however, is set up to support page sizes of any power of two from 4KB to 4GB, though not every architecture supports them all.

The page table is the data structure that holds the mapping from virtual to physical addresses. The page frame is the actual physical storage in memory.

The simplest approach would be a large, flat page table with one entry per page. The entries are known as page table entries, or PTEs. However, this approach results in a page table that is too large to fit inside the MMU itself, meaning that it has to be in memory. In fact, for a 4GB address space, with 32-bit PTEs and 4KB pages, the page table alone is 4MB! That's big when you consider that there might be a hundred processes running on your system.

The solution is multi-level page tables. As the size of the process grows, additional pages are allocated, and when they are allocated the matching part of the page table is filled in.

The translation from virtual to physical address must be fast. This fact argues for as much of the translation as possible to be done in hardware, but the tradeoff is more complex hardware, and more expensive process switches. Since it is not practical to put the entire page table in the MMU, the MMU includes what is called the TLB: translation lookaside buffer.

Linux Page Tables

First, we're going to look at some examples from the Linux kernel source. (Similarly, the FreeBSD kernel is browsable online.)

PGD is the page global directory. PTE is page table entry, of course. PMD is page middle directory.

(Images from O'Reilly's book on Linux device drivers, and from lvsp.org.)

We don't have time to go into the details right now, but you should be aware that doing the page tables for a 64-bit processor is a lot more complicated, when performance is taken into consideration.

Linux originally used a three-level page table system, later extended to four. Each level supports 512 entries: "With Andi's patch, the x86-64 architecture implements a 512-entry PML4 directory, 512-entry PGD, 512-entry PMD, and 512-entry PTE. After various deductions, that is sufficient to implement a 128TB address space, which should last for a little while," says Linux Weekly News.

#define IA64_MAX_PHYS_BITS      50      /* max. number of physical address bits (architected) */
...
/*
 * Definitions for fourth level:
 */
#define PTRS_PER_PTE    (__IA64_UL(1) << (PTRS_PER_PTD_SHIFT))

Paging

Next time, we will discuss the process of paging, where parts of memory are stored on disk when memory pressure is high.

Performance Measurement Statistics

There really is no substitute for learning the mathematics of probability and statistics if you want to do performance analysis of computer systems, and if you're in either research or development, you probably do want to measure the performance of your work at some point. However, this class is not the right place to do comprehensive statistics. We'll take a quick look at some of the things you might expect, though.

Normal Gaussian Distribution

gnuplot's norm() function seems to give the cumulative distribution. So, to do a poor man's derivative to get a Gaussian,

gnuplot> delta=0.01
gnuplot> g(x) = (norm(x+delta)-norm(x))/delta
gnuplot> set title "Gaussian Normal Density"
gnuplot> plot [-4:4] [0:0.5] g(x) notitle lw 3
gnuplot> set term post eps "Helvetica" 24
gnuplot> set out "normal.eps"
gnuplot> replot
[rdv@localhost systems-software]$ file normal.eps
normal.eps: PostScript document text conforming at level 2.0 - type EPS
[rdv@localhost systems-software]$ convert -size 720x504 -resize 720x504 normal.eps normal.png
[rdv@localhost systems-software]$ file !$
file normal.png
normal.png: PNG image data, 720 x 504, 16-bit/color RGB, non-interlaced
[rdv@localhost systems-software]$ display !$
display normal.png

The normal distribution is a continuous function; its discrete counterpart is the Poisson distribution.

Other Distributions

As I have mentioned, other distributions of times are possible. Two of the most commonly seen ones are a long-tailed distribution and a bimodal distribution. Cauchy is the name of one form of long-tailed distribution. Long-tailed distributions are common on the Internet as a description of e.g. connection lifetimes.
long tail distribution, from Wikipedia

Clock Granularity Artifacts

In order to measure something very short, you need to do
startclock();
for ( i = 0 ; i < NUMREPS ; i++ )
  do_short_operation();
stopclock();
for some value of NUMREPS like 100 or 1000. This still doesn't tell you about the exact distribution of the time for the short operations, but it can tell you about the mean.

A few of you have already hit on using the Intel processor Time Stamp Counter (TSC). That's an excellent idea, but it does have drawbacks:

Error Bars

All data should have error bars. The error bars may be the standard deviation, 90% confidence interval, 95% confidence interval, or, in rare cases, the high and low values.

Linear Fit

There are many packages for doing fitting and other statistics available on the Internet and in any sort of mathematics-oriented language, such as Mathematica, Matlab or Octave. My personal recommendation is that you use John Heidemann's JDB to hold your experimental results and do the processing and fitting for you, but you are free to do whatever you want.

Recently, for a project, I adapted the function gsl_fit_linear for some code. The adaptation was actually a hassle, so I don't recommend you do it, but for what it's worth, here's the code itself from the GNU Scientific Library (GSL).

/* Fit the data (x_i, y_i) to the linear relationship 

   Y = c0 + c1 x

   returning, 

   c0, c1  --  coefficients
   cov00, cov01, cov11  --  variance-covariance matrix of c0 and c1,
   sumsq   --   sum of squares of residuals 

   This fit can be used in the case where the errors for the data are
   uknown, but assumed equal for all points. The resulting
   variance-covariance matrix estimates the error in the coefficients
   from the observed variance of the points around the best fit line.
*/

int
gsl_fit_linear (const double *x, const size_t xstride,
                const double *y, const size_t ystride,
                const size_t n,
                double *c0, double *c1,
                double *cov_00, double *cov_01, double *cov_11, double *sumsq)
{
  double m_x = 0, m_y = 0, m_dx2 = 0, m_dxdy = 0;

  size_t i;

  for (i = 0; i < n; i++)
    {
      m_x += (x[i * xstride] - m_x) / (i + 1.0);
      m_y += (y[i * ystride] - m_y) / (i + 1.0);
    }

  for (i = 0; i < n; i++)
    {
      const double dx = x[i * xstride] - m_x;
      const double dy = y[i * ystride] - m_y;

      m_dx2 += (dx * dx - m_dx2) / (i + 1.0);
      m_dxdy += (dx * dy - m_dxdy) / (i + 1.0);
    }

  /* In terms of y = a + b x */

  {
    double s2 = 0, d2 = 0;
    double b = m_dxdy / m_dx2;
    double a = m_y - m_x * b;

    *c0 = a;
    *c1 = b;

    /* Compute chi^2 = \sum (y_i - (a + b * x_i))^2 */

    for (i = 0; i < n; i++)
      {
        const double dx = x[i * xstride] - m_x;
        const double dy = y[i * ystride] - m_y;
        const double d = dy - b * dx;
        d2 += d * d;
      }

    s2 = d2 / (n - 2.0);        /* chisq per degree of freedom */

    *cov_00 = s2 * (1.0 / n) * (1 + m_x * m_x / m_dx2);
    *cov_11 = s2 * 1.0 / (n * m_dx2);

    *cov_01 = s2 * (-m_x) / (n * m_dx2);

    *sumsq = d2;
  }

  return GSL_SUCCESS;
}

Sometimes, a line is a good fit for only part of your total data. Sometimes, a different line will fit a later portion of your data; such a case is called a multi-linear fit.

Homework

  1. Implement a simple simulation of a buddy system memory allocator, as in Exercise 5.3 of the "Fundamentals of System Software" lecture notes, uploaded into SFS or available here.

Next Lecture

Next lecture (after this set of three):

第8回 5月7日 ページ置換アルゴリズム
Lecture 8, May 7: Hypervisors and System Virtualization

Readings for Next Time and Followup for This Time

An old set of readings I used to recommend:

Followup from this time:

その他 Additional Information