Memory management

Memory management (also dynamic memory management, dynamic storage allocation, or dynamic memory allocation) is a form of resource management applied to computer memory. The essential requirement of memory management is to provide ways to dynamically allocate portions of memory to programs at their request, and free it for reuse when no longer needed. This is critical to any advanced computer system where more than a single process might be underway at any time.[1]

Several methods have been devised that increase the effectiveness of memory management. Virtual memory systems separate the memory addresses used by a process from actual physical addresses, allowing separation of processes and increasing the size of the virtual address space beyond the available amount of RAM using paging or swapping to secondary storage. The quality of the virtual memory manager can have an extensive effect on overall system performance. The system allows a computer to appear as if it may have more memory available than physically present, thereby allowing multiple processes to share it.

In some operating systems, e.g. Burroughs/Unisys MCP,[2] and OS/360 and successors,[3] memory is managed by the operating system.[note 1] In other operating systems, e.g. Unix-like operating systems, memory is managed at the application level.

Memory management within an address space is generally categorized as either manual memory management or automatic memory management.

Manual memory management

An example of external fragmentation

The task of fulfilling an allocation request consists of locating a block of unused memory of sufficient size. Memory requests are satisfied by allocating portions from a large pool[note 2] of memory called the heap[note 3] or free store. At any given time, some parts of the heap are in use, while some are "free" (unused) and thus available for future allocations. In the C language, the function which allocates memory from the heap is called malloc and the function which takes previously allocated memory and marks it as "free" (to be used by future allocations) is called free. [note 4]

Several issues complicate the implementation, such as external fragmentation, which arises when there are many small gaps between allocated memory blocks, which invalidates their use for an allocation request. The allocator's metadata can also inflate the size of (individually) small allocations. This is often managed by chunking. The memory management system must track outstanding allocations to ensure that they do not overlap and that no memory is ever "lost" (i.e. that there are no "memory leaks").

Efficiency

The specific dynamic memory allocation algorithm implemented can impact performance significantly. A study conducted in 1994 by Digital Equipment Corporation illustrates the overheads involved for a variety of allocators. The lowest average instruction path length required to allocate a single memory slot was 52 (as measured with an instruction level profiler on a variety of software).[1]

Implementations

Since the precise location of the allocation is not known in advance, the memory is accessed indirectly, usually through a pointer reference. The specific algorithm used to organize the memory area and allocate and deallocate chunks is interlinked with the kernel, and may use any of the following methods:

Fixed-size blocks allocation

Fixed-size blocks allocation, also called memory pool allocation, uses a free list of fixed-size blocks of memory (often all of the same size). This works well for simple embedded systems where no large objects need to be allocated but suffers from fragmentation especially with long memory addresses. However, due to the significantly reduced overhead, this method can substantially improve performance for objects that need frequent allocation and deallocation, and so it is often used in video games.

Buddy blocks

In this system, memory is allocated into several pools of memory instead of just one, where each pool represents blocks of memory of a certain power of two in size, or blocks of some other convenient size progression. All blocks of a particular size are kept in a sorted linked list or tree and all new blocks that are formed during allocation are added to their respective memory pools for later use. If a smaller size is requested than is available, the smallest available size is selected and split. One of the resulting parts is selected, and the process repeats until the request is complete. When a block is allocated, the allocator will start with the smallest sufficiently large block to avoid needlessly breaking blocks. When a block is freed, it is compared to its buddy. If they are both free, they are combined and placed in the correspondingly larger-sized buddy-block list.

Slab allocation

This memory allocation mechanism preallocates memory chunks suitable to fit objects of a certain type or size.[5] These chunks are called caches and the allocator only has to keep track of a list of free cache slots. Constructing an object will use any one of the free cache slots and destructing an object will add a slot back to the free cache slot list. This technique alleviates memory fragmentation and is efficient as there is no need to search for a suitable portion of memory, as any open slot will suffice.

Stack allocation

Many Unix-like systems as well as Microsoft Windows implement a function called alloca for dynamically allocating stack memory in a way similar to the heap-based malloc. A compiler typically translates it to inlined instructions manipulating the stack pointer.[6] Although there is no need of manually freeing memory allocated this way as it is automatically freed when the function that called alloca returns, there exists a risk of overflow. And since alloca is an ad hoc expansion seen in many systems but never in POSIX or the C standard, its behavior in case of a stack overflow is undefined.

A safer version of alloca called _malloca, which reports errors, exists on Microsoft Windows. It requires the use of _freea.[7] gnulib provides an equivalent interface, albeit instead of throwing an SEH exception on overflow, it delegates to malloc when an overlarge size is detected.[8] A similar feature can be emulated using manual accounting and size-checking, such as in the uses of alloca_account in glibc.[9]

Automated memory management

The proper management of memory in an application is a difficult problem, and several different strategies for handling memory management have been devised.

Automatic management of call stack variables

In many programming language implementations, the runtime environment for the program automatically allocates memory in the call stack for non-static local variables of a subroutine, called automatic variables, when the subroutine is called, and automatically releases that memory when the subroutine is exited. Special declarations may allow local variables to retain values between invocations of the procedure, or may allow local variables to be accessed by other subroutines. The automatic allocation of local variables makes recursion possible, to a depth limited by available memory.

Garbage collection

Garbage collection is a strategy for automatically detecting memory allocated to objects that are no longer usable in a program, and returning that allocated memory to a pool of free memory locations. This method is in contrast to "manual" memory management where a programmer explicitly codes memory requests and memory releases in the program. While automatic garbage collection has the advantages of reducing programmer workload and preventing certain kinds of memory allocation bugs, garbage collection does require memory resources of its own, and can compete with the application program for processor time.

Reference counting

Reference counting is a strategy for detecting that memory is no longer usable by a program by maintaining a counter for how many independent pointers point to the memory. Whenever a new pointer points to a piece of memory, the programmer is supposed to increase the counter. When the pointer changes where it points, or when the pointer is no longer pointing to any area or has itself been freed, the counter should decrease. When the counter drops to zero, the memory should be considered unused and freed. Some reference counting systems require programmer involvement and some are implemented automatically by the compiler. A disadvantage of reference counting is that circular references can develop which cause a memory leak to occur. This can be mitigated by either adding the concept of a "weak reference" (a reference that does not participate in reference counting, but is notified when the area it is pointing to is no longer valid) or by combining reference counting and garbage collection together.

Memory pools

A memory pool is a technique of automatically deallocating memory based on the state of the application, such as the lifecycle of a request or transaction. The idea is that many applications execute large chunks of code which may generate memory allocations, but that there is a point in execution where all of those chunks are known to be no longer valid. For example, in a web service, after each request the web service no longer needs any of the memory allocated during the execution of the request. Therefore, rather than keeping track of whether or not memory is currently being referenced, the memory is allocated according to the request or lifecycle stage with which it is associated. When that request or stage has passed, all associated memory is deallocated simultaneously.

Systems with virtual memory

Virtual memory is a method of decoupling the memory organization from the physical hardware. The applications operate on memory via virtual addresses. Each attempt by the application to access a particular virtual memory address results in the virtual memory address being translated to an actual physical address.[10] In this way the addition of virtual memory enables granular control over memory systems and methods of access.

In virtual memory systems the operating system limits how a process can access the memory. This feature, called memory protection, can be used to disallow a process to read or write to memory that is not allocated to it, preventing malicious or malfunctioning code in one program from interfering with the operation of another.

Even though the memory allocated for specific processes is normally isolated, processes sometimes need to be able to share information. Shared memory is one of the fastest techniques for inter-process communication.

Memory is usually classified by access rate into primary storage and secondary storage. Memory management systems, among other operations, also handle the moving of information between these two levels of memory.

Memory management in Burroughs/Unisys MCP systems[2]

An operating system manages various resources in the computing system. The memory subsystem is the system element for managing memory. The memory subsystem combines the hardware memory resource and the MCP OS software that manages the resource.

The memory subsystem manages the physical memory and the virtual memory of the system (both part of the hardware resource). The virtual memory extends physical memory by using extra space on a peripheral device, usually disk. The memory subsystem is responsible for moving code and data between main and virtual memory in a process known as overlaying. Burroughs was the first commercial implementation of virtual memory (although developed at Manchester University for the Ferranti Atlas computer) and integrated virtual memory with the system design of the B5000 from the start (in 1961) needing no external memory management unit (MMU).[11]: 48 

The memory subsystem is responsible for mapping logical requests for memory blocks to physical portions of memory (segments) which are found in the list of free segments. Each allocated block is managed by means of a segment descriptor,[12] a special control word containing relevant metadata about the segment including address, length, machine type, and the p-bit or ‘presence’ bit which indicates whether the block is in main memory or needs to be loaded from the address given in the descriptor.

Descriptors are essential in providing memory safety and security so that operations cannot overflow or underflow the referenced block (commonly known as buffer overflow). Descriptors themselves are protected control words that cannot be manipulated except for specific elements of the MCP OS (enabled by the UNSAFE block directive in NEWP).

Donald Knuth describes a similar system in Section 2.5 ‘Dynamic Storage Allocation’ of ‘Fundamental Algorithms’.[disputeddiscuss]

Memory management in OS/360 and successors

IBM System/360 does not support virtual memory.[note 5] Memory isolation of jobs is optionally accomplished using protection keys, assigning storage for each job a different key, 0 for the supervisor or 1–15. Memory management in OS/360 is a supervisor function. Storage is requested using the GETMAIN macro and freed using the FREEMAIN macro, which result in a call to the supervisor (SVC) to perform the operation.

In OS/360 the details vary depending on how the system is generated, e.g., for PCP, MFT, MVT.

In OS/360 MVT, suballocation within a job's region or the shared System Queue Area (SQA) is based on subpools, areas a multiple of 2 KB in size—the size of an area protected by a protection key. Subpools are numbered 0–255.[13] Within a region subpools are assigned either the job's storage protection or the supervisor's key, key 0. Subpools 0–127 receive the job's key. Initially only subpool zero is created, and all user storage requests are satisfied from subpool 0, unless another is specified in the memory request. Subpools 250–255 are created by memory requests by the supervisor on behalf of the job. Most of these are assigned key 0, although a few get the key of the job. Subpool numbers are also relevant in MFT, although the details are much simpler.[14] MFT uses fixed partitions redefinable by the operator instead of dynamic regions and PCP has only a single partition.

Each subpool is mapped by a list of control blocks identifying allocated and free memory blocks within the subpool. Memory is allocated by finding a free area of sufficient size, or by allocating additional blocks in the subpool, up to the region size of the job. It is possible to free all or part of an allocated memory area.[15]

The details for OS/VS1 are similar[16] to those for MFT and for MVT; the details for OS/VS2 are similar to those for MVT, except that the page size is 4 KiB. For both OS/VS1 and OS/VS2 the shared System Queue Area (SQA) is nonpageable.

In MVS the address space[17] includes an additional pageable shared area, the Common Storage Area (CSA), and two additional private areas, the nonpageable local system queue area (LSQA) and the pageable System Work area (SWA). Also, the storage keys 0–7 are all reserved for use by privileged code.

See also

Notes

  1. ^ However, the run-time environment for a language processor may subdivide the memory dynamically acquired from the operating system, e.g., to implement a stack.
  2. ^ In some operating systems, e.g., OS/360, the free storage may be subdivided in various ways, e.g., subpools in OS/360, below the line, above the line and above the bar in z/OS.
  3. ^ Not to be confused with the unrelated heap data structure.
  4. ^ A simplistic implementation of these two functions can be found in the article "Inside Memory Management".[4]
  5. ^ Except on the Model 67

References

  1. ^ a b Detlefs, D.; Dosser, A.; Zorn, B. (June 1994). "Memory allocation costs in large C and C++ programs" (PDF). Software: Practice and Experience. 24 (6): 527–542. CiteSeerX 10.1.1.30.3073. doi:10.1002/spe.4380240602. S2CID 14214110.
  2. ^ a b "Unisys MCP Managing Memory". System Operations Guid. Unisys.
  3. ^ "Main Storage Allocation" (PDF). IBM Operating System/360 Concepts and Facilities (PDF). IBM Systems Reference Library (First ed.). IBM Corporation. 1965. p. 74. Retrieved Apr 3, 2019.
  4. ^ Jonathan Bartlett. "Inside Memory Management". IBM DeveloperWorks.
  5. ^ Silberschatz, Abraham; Galvin, Peter B. (2004). Operating system concepts. Wiley. ISBN 0-471-69466-5.
  6. ^ alloca(3) – Linux Programmer's Manual – Library Functions
  7. ^ "_malloca". Microsoft CRT Documentation. 26 October 2022.
  8. ^ "gnulib/malloca.h". GitHub. Retrieved 24 November 2019.
  9. ^ "glibc/include/alloca.h". Beren Minor's Mirrors. 23 November 2019.
  10. ^ Tanenbaum, Andrew S. (1992). Modern Operating Systems. Englewood Cliffs, N.J.: Prentice-Hall. p. 90. ISBN 0-13-588187-0.
  11. ^ Waychoff, Richard. "Stories About the B5000 and People Who Were There" (PDF). Computer History Museum.
  12. ^ The Descriptor (PDF). Burroughs Corporation. February 1961.
  13. ^ OS360Sup, pp. 82-85.
  14. ^ OS360Sup, pp. 82.
  15. ^ Program Logic: IBM System/360 Operating System MVT Supervisor (PDF). IBM Corporation. May 1973. pp. 107–137. Retrieved Apr 3, 2019.
  16. ^ OSVS1Dig, p. 2.37-2.39.
  17. ^ "Virtual Storage Layout" (PDF). Introduction to OS/VS2 Release 2 (PDF). Systems (first ed.). IBM. March 1973. p. 37. GC28-0661-1. Retrieved July 15, 2024.

Bibliography

OS360Sup
OS Release 21 IBM System/360 Operating System Supervisor Services and Macro Instructions (PDF). IBM Systems Reference Library (Eighth ed.). IBM. September 1974. GC28-6646-7.
OSVS1Dig
OS/VS1 Programmer's Reference Digest Release 6 (PDF). Systems (Sixth ed.). IBM. September 15, 1976. GC24-5091-5 with TNLs.

Read other articles:

American ice hockey player and coach Ice hockey player Peter Laviolette Laviolette in 2014Born (1964-12-07) December 7, 1964 (age 59)Franklin, Massachusetts, U.S.Height 6 ft 2 in (188 cm)Weight 200 lb (91 kg; 14 st 4 lb)Position DefenseShot LeftPlayed for New York RangersCurrent NHL coach New York RangersCoached for New York IslandersCarolina HurricanesPhiladelphia FlyersNashville PredatorsWashington CapitalsNational team  United StatesNHL Draft Un...

 

 

Artikel ini tidak memiliki referensi atau sumber tepercaya sehingga isinya tidak bisa dipastikan. Tolong bantu perbaiki artikel ini dengan menambahkan referensi yang layak. Tulisan tanpa sumber dapat dipertanyakan dan dihapus sewaktu-waktu.Cari sumber: 7 Kurcaci – berita · surat kabar · buku · cendekiawan · JSTOR 7 KurcaciLahir1998Bandung, Jawa BaratGenreNu metal, Rap rock, Alternative metalTahun aktif2000 - sekarangLabelIndie Label (2008-sekarang) Mus...

 

 

Campionato Nazionale Dante Berretti 2018-2019 Competizione Campionato nazionale Dante Berretti Sport Calcio Edizione 53ª Organizzatore Lega Italiana Calcio Professionistico Date dal 6 ottobre 2018al 7 giugno 2019 Luogo  Italia Partecipanti 63 Risultati Vincitore Torino (Serie A-B)Virtus Entella (Serie C)(11º e 2º titolo) Finalista Inter (Serie A-B)Ternana (Serie C) Cronologia della competizione 2017-2018 2019-2020 Manuale Il Campionato Nazionale Dante Berretti 2018-2019 è st...

Walter Chaffe Nazionalità  Regno Unito Tiro alla fune Palmarès Competizione Ori Argenti Bronzi Giochi olimpici 0 1 1 Per maggiori dettagli vedi qui Statistiche aggiornate al 15 giugno 2010 Modifica dati su Wikidata · Manuale Walter Chaffe (Dunsford, 2 aprile 1870 – Plaistow, 22 aprile 1918) è stato un tiratore di fune britannico. Biografia Ha partecipato ai giochi olimpici di Londra del 1908, dove ha vinto, con la squadra della K Division Metropolitan Police Team, la meda...

 

 

Species of tree Black hickory Scientific classification Kingdom: Plantae Clade: Tracheophytes Clade: Angiosperms Clade: Eudicots Clade: Rosids Order: Fagales Family: Juglandaceae Genus: Carya Section: Carya sect. Carya Species: C. texana Binomial name Carya texanaBuckley (1861) Natural range of Carya texana Synonyms[1] List Carya arkansana Sarg. Carya buckleyi Durand Carya glabra var. villosa (Sarg.) B.L.Rob. Carya texana var. arkansana (Sarg.) Little Carya texana f. glabra (E.J....

 

 

Artikel ini sedang dikembangkan sehingga isinya mungkin kurang lengkap atau belum diwikifikasi. Mohon untuk sementara jangan menyunting halaman ini untuk menghindari konflik penyuntingan. Pesan ini dapat dihapus jika halaman ini sudah tidak disunting dalam beberapa jam. Jika Anda adalah penyunting yang menambahkan templat ini, harap diingat untuk menghapusnya setelah selesai atau menggantikannya dengan {{Under construction}} di antara masa-masa menyunting Anda. Halaman ini...

نادي الفرسان السعودي الأسماء السابقة نادي صقر الجزيرة الألوان الأخضر و الأبيض تأسس عام 1401 هـ الملعب سراة عبيدة  السعودية(السعة: 2500) البلد السعودية  الدوري دوري الدرجة الثالثة السعودي 2016-2017 2016-2017 الإدارة المالك الهيئة العامة للرياضة مدير إدارة كلية العلوم والاداب بسر�...

 

 

Uchi no Maid ga Uzasugiru!Sampul manga volume pertamaうちのメイドがウザすぎる!(Uchi no Maid ga Uzasugiru!)GenreKomedi[1] MangaPengarangKanko NakamuraPenerbitFutabashaPenerbit bahasa InggrisNA Kaiten BooksMajalahManga ActionDemografiSeinenTerbit25 Agustus 2016 – 25 Januari 2023Volume10 Seri animeSutradaraMasahiko OhtaProduserNoritomo IsogaiMieko TsurutaShinpei YamashitaTaisuke HashirayamaToyokazu NakahigashiSoujirou ArimizuSkenarioTakashi AoshimaMusikYasuhiro MisawaStudio...

 

 

This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these template messages) This article does not cite any sources. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.Find sources: Tourism in Somaliland – news · newspapers · books · scholar · JSTOR (June 2017) (Learn how and when to remove this message) ...

Basketball award Omar Strong won the award in 2015 The NBL Canada Sixth Man of the Year Award, is an annual National Basketball League of Canada award given since the 2011–12 season. It is awarded to the league's best performing player for his team coming off the bench as a substitute (or sixth man). All award winners up to the 2017–18 season have been born in the United States. Winners Season Player Position Nationality Team Reference 2011–12 Eddie Smith Guard  United States Londo...

 

 

County in Delaware, United States County of Delaware in DelawareSussex CountyCounty of DelawareSussex County Courthouse in Georgetown FlagSealLocation within the U.S. state of DelawareDelaware's location within the U.S.Coordinates: 38°41′N 75°20′W / 38.68°N 75.34°W / 38.68; -75.34Country United StatesState DelawareFoundedAugust 8, 1683Named forSussex, EnglandSeatGeorgetownLargest citySeafordArea • Total1,196 sq mi (3,100 km2...

 

 

Figure of speech in which something is referred to by the name of an associated thing Not to be confused with meronymy or meronomy. This article's lead section may be too short to adequately summarize the key points. Please consider expanding the lead to provide an accessible overview of all important aspects of the article. (August 2023) The Pentagon is the headquarters building of the United States Department of Defense, and is a common metonym used to refer to the U.S. military and its lea...

1867 Iowa Senate election ← 1865 October 8, 1867 1869 → 34 out of 49 seats in the Iowa State Senate25 seats needed for a majority   Majority party Minority party Third party   Party Republican Democratic Populist Last election 42 6 0 Seats after 40[a] 8[a] 1[a] Seat change 2 2 1 President of the Iowa Senate[b] before election Benjamin F. Gue[c] Republican Elected President of the Iowa Senate[b] Joh...

 

 

Hiroshi AkutagawaHiroshi Akutagawa dalam The Wild GeeseLahir(1920-03-30)30 Maret 1920Tokyo, JepangMeninggal28 Oktober 1981(1981-10-28) (umur 61)Tokyo, JepangNama lainKiyoaki IkehataPekerjaanPemeran, sutradaraTahun aktif1947–1979Suami/istriRuriko Akutagawa Hiroshi Akutagawa (芥川比呂志code: ja is deprecated , Akutagawa Hiroshi, 30 Maret 1920 – 28 Oktober 1981) adalah pemeran film dan panggung serta sutradara asal Jepang.[1][2] Dalam 30 tah...

 

 

Pour les articles homonymes, voir Amplification. Exemple de gel de RAPD. L'amplification aléatoire d'ADN polymorphe, plus connue sous le nom de RAPD (pour random amplified polymorphic DNA) est une technique d'analyse de l'ADN utilisée en biologie moléculaire. Principes Il s'agit d'une réaction de PCR dans laquelle les segments d'ADN amplifiés ne sont pas choisis par l'expérimentateur, mais amplifiés au hasard. Dans cette technique l'expérimentateur crée plusieurs amorces courtes de ...

Indonesian mythological figure HainuweleDeity that gave origin to the main vegetable cropsHainuwele defecating valuable objects.AffiliationOrigin myths, PhosopAbodeSeramSymbolCoconut flowerMountnoneParentsAmeta (Father) Coconut flower Hainuwele, The Coconut Girl, is a figure from the Wemale and Alune folklore of the island of Seram in the Maluku Islands, Indonesia. Her story is an origin myth.[1] The myth of Hainuwele was recorded by German ethnologist Adolf E. Jensen following the Fr...

 

 

この項目は画像改訂依頼に出されており、ヘッダ画像を2020年以降の顔写真とするよう画像改訂が求められています。(2023年10月) かえで楓 E-girls時代のVMAJでの楓(2018年10月)プロフィール別名義 KAEDE生年月日 1996年1月11日現年齢 28歳出身地 日本・神奈川県横須賀市血液型 O型公称サイズ(2024年[1]時点)身長 / 体重 168 cm / ― kgスリーサイズ 80 - 64 - 89 cm靴のサイズ 25 c...

 

 

Gunboat of the United States Navy For other ships with the same name, see USS Gemsbok. History United States Acquired7 September 1861 Commissioned30 August 1861 Decommissioned11 July 1865 Stricken1865 (est.) FateSold, circa 11 July 1865 General characteristics Length141 ft 7 in (43.15 m) Beam31 ft (9.4 m) Draft17 ft (5.2 m) Propulsionsail SpeedUnknown Armament 4 × 8 in (200 mm) guns 2 × 32-pounders USS Gemsbok was a bark acquired by the Union Nav...

هذه المقالة بحاجة لصندوق معلومات. فضلًا ساعد في تحسين هذه المقالة بإضافة صندوق معلومات مخصص إليها. يفتقر محتوى هذه المقالة إلى الاستشهاد بمصادر. فضلاً، ساهم في تطوير هذه المقالة من خلال إضافة مصادر موثوق بها. أي معلومات غير موثقة يمكن التشكيك بها وإزالتها. (يناير 2022) برج حار...

 

 

Map all coordinates using OpenStreetMap Download coordinates as: KML GPX (all coordinates) GPX (primary coordinates) GPX (secondary coordinates) Suburb of Brisbane, Queensland, AustraliaNorthgateBrisbane, QueenslandA view of Northgate in 2014NorthgateCoordinates27°23′24″S 153°04′24″E / 27.39°S 153.0733°E / -27.39; 153.0733 (Northgate (centre of suburb))Population4,876 (2021 census)[1] • Density1,478/km2 (3,830/sq mi)Po...