0% found this document useful (0 votes)
15 views

Lecture 06

Uploaded by

Sen Hou
Copyright
© © All Rights Reserved
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
15 views

Lecture 06

Uploaded by

Sen Hou
Copyright
© © All Rights Reserved
Available Formats
Download as PPT, PDF, TXT or read online on Scribd
You are on page 1/ 70

SYSTEMS PROGRAMMING

Lecture topic

Memory Management

Michael Kerrisk, The LINUX Programming Interface, 1st Edition, No Starch Press ISBN-13 978-
1593272203

Lecture 6 Dr. Mansour Esmaeilpour June 27th, 2024


Agenda
2

 Logical vs. Physical Address Space


 Dynamic Loading
 Swapping
 Fragmentation
 Debug a memory leak in .NET
 Hashed Page Tables
Objectives
3

 To provide a detailed description of various ways of


organizing memory hardware
 To discuss various memory-management techniques,
including paging and segmentation
 To provide a detailed description of the Intel Pentium, which
supports both pure segmentation and segmentation with
paging
Background
4

 Program must be brought (from disk) into memory and


placed within a process for it to be run
 Main memory and registers are only storage CPU can access
directly
 Register access in one CPU clock (or less)
 Main memory can take many cycles
 Cache sits between main memory and CPU registers
 Protection of memory required to ensure correct operation
Base and Limit Registers
5

 A pair of base and limit registers define the logical address


space
Binding of Instructions and Data to Memory
6

 Address binding of instructions and data to memory addresses


can happen at three different stages
 Compile time: If memory location known a priori, absolute

code can be generated; must recompile code if starting


location changes
 Load time: Must generate relocatable code if memory location

is not known at compile time


 Execution time: Binding delayed until run time if the process

can be moved during its execution from one memory segment


to another. Need hardware support for address maps (e.g.,
base and limit registers)
Multistep Processing of a User Program
7
Logical vs. Physical Address Space
8

 The concept of a logical address space that is bound to a


separate physical address space is central to proper memory
management
 Logical address – generated by the CPU; also referred to as

virtual address
 Physical address – address seen by the memory unit

 Logical and physical addresses are the same in compile-time


and load-time address-binding schemes; logical (virtual) and
physical addresses differ in execution-time address-binding
scheme
Memory-Management Unit (MMU)
9

 Hardware device that maps virtual to physical address

 In MMU scheme, the value in the relocation register is added


to every address generated by a user process at the time it is
sent to memory

 The user program deals with logical addresses; it never sees


the real physical addresses
Dynamic relocation using a relocation register
10
Dynamic Loading
11

 Routine is not loaded until it is called


 Better memory-space utilization; unused routine is never loaded
 Useful when large amounts of code are needed to handle
infrequently occurring cases
 No special support from the operating system is required
implemented through program design
Dynamic Linking
12

 Linking postponed until execution time


 Small piece of code, stub, used to locate the appropriate
memory-resident library routine
 Stub replaces itself with the address of the routine, and
executes the routine
 Operating system needed to check if routine is in processes’
memory address
 Dynamic linking is particularly useful for libraries
 System also known as shared libraries
Swapping
13

 A process can be swapped temporarily out of memory to a backing store,


and then brought back into memory for continued execution

 Backing store – fast disk large enough to accommodate copies of all


memory images for all users; must provide direct access to these memory
images

 Roll out, roll in – swapping variant used for priority-based scheduling


algorithms; lower-priority process is swapped out so higher-priority process
can be loaded and executed

 Major part of swap time is transfer time; total transfer time is directly
proportional to the amount of memory swapped

 Modified versions of swapping are found on many systems (i.e., UNIX,


Linux, and Windows)
 System maintains a ready queue of ready-to-run processes which have
memory images on disk
Schematic View of Swapping
14
Contiguous Allocation
15

 Main memory usually into two partitions:


 Resident operating system, usually held in low memory with

interrupt vector
 User processes then held in high memory

 Relocation registers used to protect user processes from each other, and
from changing operating-system code and data
 Base register contains value of smallest physical address

 Limit register contains range of logical addresses – each logical

address must be less than the limit register


 MMU maps logical address dynamically
Hardware Support for Relocation and Limit Registers
16
Contiguous Allocation (Cont)
17

 Multiple-partition allocation
 Hole – block of available memory; holes of various size are scattered

throughout memory
 When a process arrives, it is allocated memory from a hole large

enough to accommodate it
 Operating system maintains information about:

a) allocated partitions b) free partitions (hole)


OS OS OS OS
process process process process
5 5 5 5
process process
9 9
process process
8 10

process process process process


2 2 2 2
Dynamic Storage-Allocation Problem
18

How to satisfy a request of size n from a list of free holes

 First-fit: Allocate the first hole that is big enough


 Best-fit: Allocate the smallest hole that is big enough; must
search entire list, unless ordered by size
 Produces the smallest leftover hole

 Worst-fit: Allocate the largest hole; must also search entire


list
 Produces the largest leftover hole

First-fit and best-fit better than worst-fit in terms of speed and


storage utilization
Fragmentation
19

 External Fragmentation – total memory space exists to satisfy a request,


but it is not contiguous
 Internal Fragmentation – allocated memory may be slightly larger than
requested memory; this size difference is memory internal to a partition,
but not being used
 Reduce external fragmentation by compaction
 Shuffle memory contents to place all free memory together in one

large block
 Compaction is possible only if relocation is dynamic, and is done at

execution time
 I/O problem

 Latch job in memory while it is involved in I/O


 Do I/O only into OS buffers
Paging
20

 Logical address space of a process can be noncontiguous; process is


allocated physical memory whenever the latter is available
 Divide physical memory into fixed-sized blocks called frames (size is
power of 2, between 512 bytes and 8,192 bytes)
 Divide logical memory into blocks of same size called pages
 Keep track of all free frames
 To run a program of size n pages, need to find n free frames and load
program
 Set up a page table to translate logical to physical addresses
 Internal fragmentation
Address Translation Scheme
21

 Address generated by CPU is divided into:

 Page number (p) – used as an index into a page table which contains
base address of each page in physical memory

 Page offset (d) – combined with base address to define the physical
memory address that is sent to the memory unit

page number page offset


p d
m-n n
 For given logical address space 2m and page size 2n
Paging Hardware
22
Paging Model of Logical and Physical Memory
23
Paging Example
24

32-byte memory and 4-byte pages


Free Frames
25

Before allocation After allocation


Implementation of Page Table
26

 Page table is kept in main memory


 Page-table base register (PTBR) points to the page table
 Page-table length register (PRLR) indicates size of the page table
 In this scheme every data/instruction access requires two memory accesses.
One for the page table and one for the data/instruction.
 The two memory access problem can be solved by the use of a special fast-
lookup hardware cache called associative memory or translation look-
aside buffers (TLBs)
 Some TLBs store address-space identifiers (ASIDs) in each TLB entry –
uniquely identifies each process to provide address-space protection for
that process
Associative Memory
27

 Associative memory – parallel search


Page # Frame #

Address translation (p, d)


 If p is in associative register, get frame # out

 Otherwise get frame # from page table in memory


Paging Hardware With TLB
28
Effective Access Time
29

 Associative Lookup =  time unit


 Assume memory cycle time is 1 microsecond
 Hit ratio – percentage of times that a page number is found in
the associative registers; ratio related to number of associative
registers
 Hit ratio = 
 Effective Access Time (EAT)
EAT = (1 + )  + (2 + )(1 – )
=2+–
Debug a memory leak in .NET
30

Memory can leak when your app references objects that it no longer needs to
perform the desired task. Referencing these objects prevents the garbage
collector from reclaiming the memory used.

•Examine managed memory usage with dotnet-counters


•Generate a dump file.
•Analyze the memory usage using the dump file.

• .NET Core 8.0 SDK

• dotnet-counters to check managed memory usage.


• dotnet-dump to collect and analyze a dump file (includes the SOS debugging extension
).
• A sample debug target app to diagnose.
.NET Core SDK
31
Examine managed memory usage
32

Create a consoleApp and navigate to the directory where you created it

dotnet tool install --global dotnet-counters


Examine managed memory usage
33

dotnet-counters ps
Examine managed memory usage
34

dotnet-counters monitor --refresh-interval 1 -p 10096


Examine managed memory usage
35

dotnet tool install --global dotnet-dump


Examine managed memory usage
36

When analyzing possible memory leaks, you need access to the app's memory
heap to analyze the memory contents. Looking at relationships between
objects, you create theories as to why memory isn't being freed. A common
diagnostic data source is a memory dump on Windows or the equivalent core
dump on Linux.
Generate memory dump
37

When analyzing possible memory leaks, you need access to the app's memory heap to
analyze the memory contents.

dotnet-dump collect –p 10096


Restart the failed process
38

Once the dump is collected, you should have sufficient information to diagnose the failed
process. If the failed process is running on a production server, now it's the ideal time for
short-term remediation by restarting the process.

dotnet-dump analyze dump-20240620_110237.dmp


Restart the failed process
39

dumpheap -stat
Restart the failed process
40

dumpheap -mt 7ff82f1fec08


Restart the failed process
41

gcroot 00007f6ad09421f8
how and why the object is rooted:
Class assignment
42

Compare the two processes in terms of memory leak and present


your analysis.
Memory Protection
43

 Memory protection implemented by associating protection bit


with each frame

 Valid-invalid bit attached to each entry in the page table:


 “valid” indicates that the associated page is in the process’

logical address space, and is thus a legal page


 “invalid” indicates that the page is not in the process’

logical address space


Valid (v) or Invalid (i) Bit In A Page Table
44
Shared Pages
45

 Shared code
 One copy of read-only (Reentrant) code shared among processes

(i.e., text editors, compilers, window systems).


 Shared code must appear in same location in the logical address

space of all processes

 Private code and data


 Each process keeps a separate copy of the code and data

 The pages for the private code and data can appear anywhere in

the logical address space


Shared Pages Example
46
Structure of the Page Table
47

 Hierarchical Paging

 Hashed Page Tables

 Inverted Page Tables


Hierarchical Page Tables
48

 Break up the logical address space into multiple page tables

 A simple technique is a two-level page table


Two-Level Page-Table Scheme
49
Two-Level Paging Example

50

 A logical address (on 32-bit machine with 1K page size) is divided into:
 a page number consisting of 22 bits
 a page offset consisting of 10 bits

 Since the page table is paged, the page number is further divided into:
 a 12-bit page number
 a 10-bit page offset

 Thus, a logical address is as follows:

page number page offset


pi p2 d

12 10 10
where pi is an index into the outer page table, and p2 is the displacement within the
page of the outer page table
Address-Translation Scheme
51
Three-level Paging Scheme
52
Hashed Page Tables
53

 Common in address spaces > 32 bits

 The virtual page number is hashed into a page table


 This page table contains a chain of elements hashing to the

same location

 Virtual page numbers are compared in this chain searching for


a match
 If a match is found, the corresponding physical frame is

extracted
Hashed Page Table
54
Inverted Page Table
55

 One entry for each real page of memory


 Entry consists of the virtual address of the page stored in that
real memory location, with information about the process that
owns that page
 Decreases memory needed to store each page table, but
increases time needed to search the table when a page
reference occurs
 Use hash table to limit the search to one — or at most a few —
page-table entries
Inverted Page Table Architecture
56
Segmentation
57

 Memory-management scheme that supports user view of memory


 A program is a collection of segments
 A segment is a logical unit such as:

main program
procedure
function
method
object
local variables, global variables
common block
stack
symbol table
arrays
User’s View of a Program
58
Logical View of Segmentation
59

4
1

3 2
4

user space physical memory space


Segmentation Architecture
60

 Logical address consists of a two tuple:


<segment-number, offset>,
 Segment table – maps two-dimensional physical addresses; each table
entry has:
 base – contains the starting physical address where the segments

reside in memory
 limit – specifies the length of the segment

 Segment-table base register (STBR) points to the segment table’s


location in memory
 Segment-table length register (STLR) indicates number of segments
used by a program;
segment number s is legal if s < STLR
Segmentation Architecture (Cont.)
61

 Protection
 With each entry in segment table associate:

 validation bit = 0  illegal segment


 read/write/execute privileges
 Protection bits associated with segments; code sharing
occurs at segment level
 Since segments vary in length, memory allocation is a
dynamic storage-allocation problem
Segmentation Hardware
62
Example of Segmentation
63
Example: The Intel Pentium
64

 Supports both segmentation and segmentation with paging


 CPU generates logical address
 Given to segmentation unit

 Which produces linear addresses


 Linear address given to paging unit

 Which generates physical address in main memory


 Paging units form equivalent of MMU
Logical to Physical Address Translation in Pentium
65
Intel Pentium Segmentation
66
Linear Address in Linux
67

• Broken into four parts:


Three-level Paging in Linux
68
Class grouping for presentation
69

• Each group consists of 3 students


Presentation Date
• Each group has a one group leader
July 18th
Presentation title
Building the Linux OS using Buildroot
•Install the Linux
•Install a default Buildroot configuration
•Make linux-menuconfig to configure the Linux kernel

Group1 Group2 Group3 Group4

Group5 Group6 Group7 Group8

Group9 Group10
Reference
70

Michael Kerrisk, The LINUX Programming Interface, 1st Edition, No Starch Press
ISBN-13 978-1593272203

You might also like