Page 1. Goals for Today" Virtualizing Resources" Important Aspects of Memory Multiplexing" CS162 Operating Systems and Systems Programming Lecture 20

Similar documents
Page 1. Goals for Today" Important Aspects of Memory Multiplexing" Virtualizing Resources" CS162 Operating Systems and Systems Programming Lecture 9

Midterm 1. Administrivia. Virtualizing Resources. CS162 Operating Systems and Systems Programming Lecture 12. Address Translation

CS162 Operating Systems and Systems Programming Lecture 12. Address Translation. Page 1

CS162 Operating Systems and Systems Programming Lecture 11. Protection: Address Spaces. Page 1. Review

CS162 Operating Systems and Systems Programming Lecture 12. Protection (continued) Address Translation

Introduction to Operating Systems

CS162 Operating Systems and Systems Programming Lecture 12. Protection (continued) Address Translation

Page 1. CS194-3/CS16x Introduction to Systems. Lecture 10. Protection: Address Spaces. Goals for Today

Page 1. Review: Last Time" Goals for Today" Round-Robin Discussion" CS162 Operating Systems and Systems Programming Lecture 8

Operating Systems (1DT020 & 1TT802) Lecture 9 Memory Management : Demand paging & page replacement. Léon Mugwaneza

memory management Vaibhav Bajpai

CS 162 Operating Systems and Systems Programming Professor: Anthony D. Joseph Spring Lecture 13: Address Translation

Main Memory Yi Shi Fall 2017 Xi an Jiaotong University

CS162 Operating Systems and Systems Programming Lecture 11. Thread Scheduling (con t) Protection: Address Spaces

Paging! 2/22! Anthony D. Joseph and Ion Stoica CS162 UCB Fall 2012! " (0xE0)" " " " (0x70)" " (0x50)"

CS Advanced Operating Systems Structures and Implementation Lecture 13. Two-Level Scheduling (Con t) Segmentation/Paging/Virtual Memory

Memory Management Topics. CS 537 Lecture 11 Memory. Virtualizing Resources

10/7/13! Anthony D. Joseph and John Canny CS162 UCB Fall 2013! " (0xE0)" " " " (0x70)" " (0x50)"

CS162 Operating Systems and Systems Programming Lecture 11. Thread Scheduling (con t) Protection: Address Spaces

Page 1. Review: Address Segmentation " Review: Address Segmentation " Review: Address Segmentation "

Recall: Paging. Recall: Paging. Recall: Paging. CS162 Operating Systems and Systems Programming Lecture 13. Address Translation, Caching

Principles of Operating Systems

Main Memory: Address Translation

Chapter 8: Memory- Management Strategies. Operating System Concepts 9 th Edition

CS162 Operating Systems and Systems Programming Lecture 10 Caches and TLBs"

Chapter 7: Main Memory. Operating System Concepts Essentials 8 th Edition

Chapter 8: Memory- Management Strategies. Operating System Concepts 9 th Edition

Chapter 8: Memory- Management Strategies

Chapter 8: Main Memory. Operating System Concepts 9 th Edition

How to create a process? What does process look like?

More on Address Translation. CS170 Fall T. Yang Some of slides from UCB CS162 by Kubiatowicz

CS162 - Operating Systems and Systems Programming. Address Translation => Paging"

CS162 Operating Systems and Systems Programming Lecture 11 Page Allocation and Replacement"

Recall: Address Space Map. 13: Memory Management. Let s be reasonable. Processes Address Space. Send it to disk. Freeing up System Memory

Chapter 8: Main Memory

Chapter 8: Memory Management. Operating System Concepts with Java 8 th Edition

Chapter 8: Main Memory

Page 1. Goals for Today" TLB organization" CS162 Operating Systems and Systems Programming Lecture 11. Page Allocation and Replacement"

Chapter 8: Memory-Management Strategies

Memory: Overview. CS439: Principles of Computer Systems February 26, 2018

File Systems. OS Overview I/O. Swap. Management. Operations CPU. Hard Drive. Management. Memory. Hard Drive. CSI3131 Topics. Structure.

CHAPTER 8 - MEMORY MANAGEMENT STRATEGIES

CS370 Operating Systems

CS307: Operating Systems

16 Sharing Main Memory Segmentation and Paging

Virtual Memory 1. Virtual Memory

Chapter 8: Main Memory

Chapter 8 Memory Management

Memory Management. CSCI 315 Operating Systems Design Department of Computer Science

Chapter 8: Main Memory

Memory Management. Contents: Memory Management. How to generate code? Background

Memory Management. Memory Management

CS399 New Beginnings. Jonathan Walpole

Memory management. Last modified: Adaptation of Silberschatz, Galvin, Gagne slides for the textbook Applied Operating Systems Concepts

Virtual Memory 1. Virtual Memory

Chapter 8: Memory Management Strategies

15 Sharing Main Memory Segmentation and Paging

Operating Systems. Memory Management. Lecture 9 Michael O Boyle

Chapter 9 Memory Management Main Memory Operating system concepts. Sixth Edition. Silberschatz, Galvin, and Gagne 8.1

CSE 4/521 Introduction to Operating Systems. Lecture 12 Main Memory I (Background, Swapping) Summer 2018

Classifying Information Stored in Memory! Memory Management in a Uniprogrammed System! Segments of a Process! Processing a User Program!

Memory management. Requirements. Relocation: program loading. Terms. Relocation. Protection. Sharing. Logical organization. Physical organization

Roadmap. Tevfik Koşar. CSC Operating Systems Spring Lecture - XII Main Memory - II. Louisiana State University

Lecture 4: Memory Management & The Programming Interface

CS 134: Operating Systems

CS252 S05. Main memory management. Memory hardware. The scale of things. Memory hardware (cont.) Bottleneck

12: Memory Management

Lecture 13: Address Translation

6 - Main Memory EECE 315 (101) ECE UBC 2013 W2

Virtual Memory. Jinkyu Jeong Computer Systems Laboratory Sungkyunkwan University

PROCESS VIRTUAL MEMORY. CS124 Operating Systems Winter , Lecture 18

CS162 Operating Systems and Systems Programming Lecture 13. Address Translation (con t) Caches and TLBs

Processes, Address Spaces, and Memory Management. CS449 Spring 2016

CS370: Operating Systems [Spring 2017] Dept. Of Computer Science, Colorado State University

Background. Contiguous Memory Allocation

CS162 Operating Systems and Systems Programming Lecture 13. Caches and TLBs. Page 1

CHAPTER 8: MEMORY MANAGEMENT. By I-Chen Lin Textbook: Operating System Concepts 9th Ed.

Multi-Process Systems: Memory (2) Memory & paging structures: free frames. Memory & paging structures. Physical memory

[07] SEGMENTATION 1. 1

Today: Segmentation. Last Class: Paging. Costs of Using The TLB. The Translation Look-aside Buffer (TLB)

Memory Management. Disclaimer: some slides are adopted from book authors slides with permission 1

Chapters 9 & 10: Memory Management and Virtual Memory

Memory Management. Dr. Yingwu Zhu

Virtual Memory. Today. Segmentation Paging A good, if common example

CS420: Operating Systems

Module 8: Memory Management

Frequently asked questions from the previous class survey

Virtual Memory. Kevin Webb Swarthmore College March 8, 2018

Fall 2017 :: CSE 306. Introduction to. Virtual Memory. Nima Honarmand (Based on slides by Prof. Andrea Arpaci-Dusseau)

Memory management: outline

Memory management: outline

3. Memory Management

CSE 120 Principles of Operating Systems

Chapter 9 Memory Management

Goals of Memory Management

CS370 Operating Systems

Outlook. Background Swapping Contiguous Memory Allocation Paging Structure of the Page Table Segmentation Example: The Intel Pentium

CSE 4/521 Introduction to Operating Systems. Lecture 14 Main Memory III (Paging, Structure of Page Table) Summer 2018

Chapter 8: Memory Management

8.1 Background. Part Four - Memory Management. Chapter 8: Memory-Management Management Strategies. Chapter 8: Memory Management

Transcription:

Goals for Today" CS162 Operating Systems and Systems Programming Lecture 20 Address Translation" November 7, 2011 Anthony D. Joseph and Ion Stoica http://inst.eecs.berkeley.edu/~cs162 Address Translation Schemes Segmentation Paging Multi-level translation Paged page tables Inverted page tables Note: Some slides and/or pictures in the following are adapted from slides 2005 Silberschatz, Galvin, and Gagne. Many slides generated from lecture notes by Kubiatowicz." 20.2 Virtualizing Resources" Important Aspects of Memory Multiplexing" Controlled overlap: Processes should not collide in physical memory Conversely, would like the ability to share memory when desired (for communication) Physical Reality: Processes/Threads share the same hardware Need to multiplex CPU (CPU Scheduling) Need to multiplex use of Memory (Today) Why worry about memory multiplexing? The complete working state of a process and/or kernel is defined by its data in memory (and registers) Consequently, cannot just let different processes use the same memory Probably donʼt want different processes to even have access to each otherʼs memory (protection) Protection: Prevent access to private memory of other processes» Different pages of memory can be given special behavior (Read Only, Invisible to user programs, etc)» Kernel data protected from User programs Translation: Ability to translate accesses from one address space (virtual) to a different one (physical) When translation exists, process uses virtual addresses, physical memory uses physical addresses 20.3 20.4 Page 1

Binding of Instructions and Data to Binding of Instructions and Data to Physical Memory Process view of memory data1: dw 32 start: lw r1,0(data1) jal checkit loop: addi r1, r1, -1 bnz r1, r0, loop checkit: Assume 4byte words 0x300 = 4 * 0x0C0 Physical 0x0C0 addresses = 0000 1100 0000 0x300 = 0011 0000 0000 0x0300 00000020 0x0900 8C2000C0 0x0904 0C000280 0x0908 2021FFFF 0x090C 14200242 0x0A00 Process view of memory data1: dw 32 start: lw r1,0(data1) jal checkit loop: addi r1, r1, -1 bnz r1, r0, loop checkit: 0x0300" 00000020 Physical addresses 0x0300 00000020 0x0900 8C2000C0 0x0904 0C000280 0x0908 2021FFFF 0x090C 14200242 0x0A00 0x0900" 8C2000C0 0C000340 2021FFFF 14200242 0xFFFF" 20.5 20.6 Binding of Instructions and Data to Physical Memory Binding of Instructions and Data to Memory Process view of memory data1: dw 32 start: lw r1,0(data1) jal checkit loop: addi r1, r1, -1 bnz r1, r0, loop checkit: 0x0300" Physical addresses 0x300 00000020 0x900 8C2000C0 0x904 0C000280 0x908 2021FFFF 0x90C 14200242 0x0A00 Need address translation 0x0900"? 0xFFFF" App X 20.7 Process view of memory data1: dw 32 start: lw r1,0(data1) jal checkit loop: addi r1, r1, -1 bnz r1, r0, loop checkit: 0x0300" Processor view of memory 0x1300 00000020 0x1900 8C2004C0 0x1904 0C000680 0x1908 2021FFFF 0x190C 14200642 0x1A00 0x0900" App X 0x1300" 00000020 0x1900" One Possible Translation Where does translation take place? 0xFFFF" Compile time, Load time, or Execution time? 11/7/2011 Anthony D. Joseph and Ion Stoica CS162 UCB Fall 2011 8C2004C0 0C000680 2021FFFF 14200642 20.8 Page 2

Multi-step Processing of a Program for Execution" Preparation of a program for execution involves components at: Compile time (i.e., gcc ) Link/Load time (unix ld does link) Execution time (e.g. dynamic libs) Addresses can be bound to final values anywhere in this path Depends on hardware support Also depends on operating system Dynamic Libraries Linking postponed until execution Small piece of code, stub, used to locate appropriate memory-resident library routine Stub replaces itself with the address of the routine, and executes routine 20.9 Example of General Address Translation" Code" Data" Heap" Stack" Prog 1" Space 1" Data 2" Stack 1" Heap 1" Code 1" Stack 2" Data 1" Heap 2" Code 2" OS code" OS heap & " Stacks" Code" Data" Heap" Stack" Prog 2" Space 2" OS data" Translation Map 1" Translation Map 2" Physical Address Space" 20.10 CPU" Two Views of Addresses" MMU" Addresses" Untranslated read or write" Address Space: All the addresses and state a process can touch Each process and kernel has different address space Consequently, two views of memory: View from the CPU (what program sees, virtual memory) View from memory (physical memory) Translation box (MMU) converts between the two views Translation helps to implement protection If task A cannot even gain access to task Bʼs data, no way for A to adversely affect B With translation, every program can be linked/loaded into same region of user address space 20.11 Uniprogramming (MS-DOS)" Uniprogramming (no Translation or Protection) Application always runs at same place in physical memory since only one application at a time Application can access any physical address Operating" System" Application" 0xFFFFFFFF" Valid 32-bit" Addresses" 0x00000000" Application given illusion of dedicated machine by giving it reality of a dedicated machine 20.12 Page 3

Multiprogramming (First Version)" Multiprogramming without Translation or Protection Must somehow prevent address overlap between threads Operating" System" 0xFFFFFFFF" Multiprogramming (Version with Protection)" Can we protect programs from each other without translation? Operating" System" 0xFFFFFFFF" LimitAddr=0x10000" Application2" 0x00020000" Application2" 0x00020000" BaseAddr=0x20000" Application1" 0x00000000" Trick: Use Loader/Linker: Adjust addresses while program loaded into memory (loads, stores, jumps)» Everything adjusted to memory location of program» Translation done by a linker-loader» Was pretty common in early days With this solution, no protection: bugs in any program can cause other programs to crash or even the OS 20.13 Application1" 0x00000000" Yes: use two special registers BaseAddr and LimitAddr to prevent user from straying outside designated area» If user tries to access an illegal address, cause an error During switch, kernel loads new base/limit from TCB (Thread Control Block)» User not allowed to change base/limit registers 20.14 Simple Base and Bounds (CRAY-1)" CPU" Limit" <?" Base" +" DRAM" No: Error" Could use base/limit for dynamic address translation (often called segmentation ) translation happens at execution: Alter address of every load/store by adding base Generate error if address bigger than limit This gives program the illusion that it is running on its own dedicated machine, with memory starting at 0 Program gets continuous region of memory Addresses within program do not have to be relocated when program placed in different region of DRAM 20.15 More Flexible Segmentation" Logical View: multiple separate segments Typical: Code, Data, Stack Others: memory sharing, etc Each segment is given region of contiguous memory Has a base and limit Can reside anywhere in physical memory 3 1 4 2 user view of memory space 1 1 4 2 2 3 physical memory space 20.16 Page 4

Implementation of Multi-Segment Model" Seg #" offset" Base0"Limit0" V" Base1"Limit1" V" Base2"Limit2" V" Base3"Limit3" Base4"Limit4" V" Base5"Limit5" Base6"Limit6" Base7"Limit7" V" Segment map resides in processor Segment number mapped into base/limit pair Base added to offset to generate physical address Error check catches offset out of range As many chunks of physical memory as entries Segment addressed by portion of virtual address However, could be included in instruction instead:» x86 Example: mov [es:bx],ax. What is V/N (valid / not valid)? Can mark segments as invalid; requires check as well >" Error" +" 20.17 Example: Four Segments (16 bit addresses)" Seg" 15" 14"13" Virtual Address Format" 0x4000" 0x8000" 0xC000" SegID = 0" SegID = 1" Seg ID #" Base" Limit" 0 (code)" 0x4000" 0x0800" 1 (data)" 0x4800" 0x1400" 2 (shared)" 0xF000" 0x1000" 3 (stack)" 0x3000" Address Space" Address Space" 0" 0x4000" 0x4800" 0x5C00" 0xF000" Might " be shared" Space for" Other Apps" Shared with" Other Apps" 20.18 Issues with simple segmentation method" process 6 process 5 process 6 process 5 process 6 process 5 process 9 process 6 process 5 process 9 process 2 process 10 Schematic View of Swapping" Q: What if not all processes fit in memory? A: Swapping: Extreme form of Context Switch In order to make room for next process, some or all of the previous process is moved to disk This greatly increases the cost of context-switching OS OS OS OS Fragmentation problem Not every process is the same size Over time, memory space becomes fragmented Hard to do inter-process sharing Want to share code segments when possible Want to share memory between processes Helped by providing multiple segments per process 20.19 Desirable alternative? Some way to keep only active portions of a process in memory at any one time Need finer granularity control over physical memory 20.20 Page 5

Problems with Segmentation" Must fit variable-sized chunks into physical memory May move processes multiple times to fit everything Limited options for swapping to disk Fragmentation: wasted space External: free gaps between allocated chunks Internal: donʼt need all memory within allocated chunks Paging: Physical Memory in Fixed Size Chunks" Solution to fragmentation from segments? Allocate physical memory in fixed size chunks ( pages ) Every chunk of physical memory is equivalent» Can use simple vector of bits to handle allocation: 00110001110001101 110010» Each bit represents page of physical memory 1 allocated, 0 free Should pages be as big as our previous segments? No: Can lead to lots of internal fragmentation» Typically have small pages (1K-16K) Consequently: need multiple pages/segment 20.21 20.22 Virtual Address:" How to Implement Paging?" PageTablePtr" page #0" PageTableSize" >" page #3" Access" Physical Check Perm" Access" Error" Error" Page Table (One per process) Resides in physical memory Contains physical page and permission for each virtual page» Permissions include: Valid bits, Read, Write, etc Virtual address mapping Offset from Virtual address copied to Physical Address» Example: 10 bit offset 1024-byte pages Virtual page # is all remaining bits» Example for 32-bits: 32-10 = 22 bits, i.e. 4 million entries» Physical page # copied from table into physical address Check Page Table bounds and permissions 20.23 5min Break" 20.24 Page 6

Virtual (Process A):" What about Sharing?" PageTablePtrA" page #0" page #3" PageTablePtrB" page #0" page #3" Virtual (Process B):" Shared" Page" This physical page" appears in address" space of both processes" 20.25 Example (4 byte pages)" 0x00" 0x04" 0x08" a" b" c" d" e" f" g" h" i" j" k" l" Simple Page Table Example" 0000 0000" 0001 0000" 0" 4" 0000 0100" 1" 0000 1100" 3" 2" 1" 0000 0100" 0000 1000" Page" Table" 0x00" 0x04" 0x08" i" j" k" l" 0x0C" e" f" g" h" 0x10" a" b" c" d" 20.26 Page Table Discussion" What needs to be switched on a context switch? Page table pointer and limit Analysis Pros» Simple memory allocation» Easy to Share Con: What if address space is sparse?» E.g. on UNIX, code starts at 0, stack starts at (2 31-1).» With 1K pages, need 4 million page table entries Con: What if table really big?» Not all pages used all the time would be nice to have working set of page table in memory How about combining paging and segmentation? 20.27 Multi-level Translation" What about a tree of tables? Lowest level page table memory still allocated with bitmap Higher levels often segmented Could have any number of levels. Example (top segment): Virtual " Address:" Seg #" Base0"Limit0" V" Base1"Limit1" V" Base2"Limit2" V" Base3"Limit3" Base4"Limit4" V" Base5"Limit5" Base6"Limit6" Base7"Limit7" V" >" page #0" page #3" Access" Error" Error" What must be saved/restored on context switch? Contents of top-level segment registers (for this example) Pointer to top-level table (page table) Physical Check Perm" Access" 20.28 Page 7

What about Sharing (Complete Segment)?" Process A" Process B" Seg #" Base0"Limit0" V" Base1"Limit1" V" Base2"Limit2" V" Base3"Limit3" Base4"Limit4" V" Base5"Limit5" Base6"Limit6" Base7"Limit7" V" Seg #" Base0"Limit0" V" Base1"Limit1" V" Base2"Limit2" V" Base3"Limit3" Base4"Limit4" V" Base5"Limit5" Base6"Limit6" Base7"Limit7" V" page #0" page #3" Shared Segment" 20.29 Another common example: two-level page table Virtual " Address:" PageTablePtr" 10 bits" 10 bits" 12 bits" P1 index" P2 index" Address:" 4 bytes" Tree of Page Tables Tables fixed size (1024 entries) On context-switch: save single PageTablePtr register Valid bits on Page Table Entries Donʼt need every 2 nd -level table Even when exist, 2 nd -level tables can 4 bytes reside on disk if not in use 20.30 4KB Multi-level Translation Analysis" Pros: Only need to allocate as many page table entries as we need for application» In other words, sparse address spaces are easy Easy memory allocation Easy Sharing» Share at segment or page level (need additional reference counting) Cons: One pointer per page (typically 4K 16K pages today) Page tables need to be contiguous» However, previous example keeps tables to exactly one page in size Two (or more, if >2 levels) lookups per reference» Seems very expensive 20.31 With all previous examples ( Forward Page Tables ) Size of page table is at least as large as amount of virtual memory allocated to processes Physical memory may be much less» Much of process space may be out on disk or not in use Hash" Table" Inverted Page Table" Answer: use a hash table Called an Inverted Page Table Size is independent of virtual address space Directly related to amount of physical memory Very attractive option for 64-bit address spaces Cons: Complexity of managing hash changes Often in hardware 20.32 Page 8

Communication" Now that we have isolated processes, how can they communicate? Shared memory: common mapping to physical page» As long as place objects in shared memory address range, threads from each process can communicate» Note that processes A and B can talk to shared memory through different addresses» In some sense, this violates the whole notion of protection that we have been developing If address spaces donʼt share memory, all inter-address space communication must go through kernel (via system calls)» Byte stream producer/consumer (put/get): Example, communicate through pipes connecting stdin/stdout» Message passing (send/receive): Can use this to build remote procedure call (RPC) abstraction so that you can have one program make procedure calls to another» File System (read/write): File system is shared state 20.33 Closing thought: Protection without Hardware" Does protection require hardware support for translation and dual-mode behavior? No: Normally use hardware, but anything you can do in hardware can also do in software (possibly expensive) Protection via Strong Typing Restrict programming language so that you canʼt express program that would trash another program Loader needs to make sure that program produced by valid compiler or all bets are off Example languages: LISP, Ada, Modula-3 and Java Protection via software fault isolation: Language independent approach: have compiler generate object code that provably canʼt step out of bounds» Compiler puts in checks for every dangerous operation (loads, stores, etc). Again, need special loader.» Alternative, compiler generates proof that code cannot do certain things (Proof Carrying Code) 20.34 Summary (1)" Memory is a resource that must be multiplexed Controlled Overlap: only shared when appropriate Translation: Change virtual addresses into physical addresses Protection: Prevent unauthorized sharing of resources Simple Protection through segmentation Base+limit registers restrict memory accessible to user Can be used to translate as well Full translation of addresses through Memory Management Unit (MMU) Every Access translated through page table Changing of page tables only available to user Summary (2)" Page Tables Memory divided into fixed-sized chunks of memory Virtual page number from virtual address mapped through page table to physical page number Offset of virtual address same as physical address Multi-Level Tables Virtual address mapped to series of tables Permit sparse population of address space Inverted page table Size of page table related to physical memory size 20.35 20.36 Page 9