© Krste Asanovic, 2014CS252, Spring 2014, Lecture 15 CS252 Graduate Computer Architecture Spring 2014 Lecture 15: Virtual Memory and Caches Krste Asanovic.

Slides:



Advertisements
Similar presentations
Virtual Memory Basics.
Advertisements

Krste Asanovic Electrical Engineering and Computer Sciences
CSE 490/590, Spring 2011 CSE 490/590 Computer Architecture Cache III Steve Ko Computer Sciences and Engineering University at Buffalo.
EECS 470 Virtual Memory Lecture 15. Why Use Virtual Memory? Decouples size of physical memory from programmer visible virtual memory Provides a convenient.
Computer Organization CS224 Fall 2012 Lesson 44. Virtual Memory  Use main memory as a “cache” for secondary (disk) storage l Managed jointly by CPU hardware.
1 A Real Problem  What if you wanted to run a program that needs more memory than you have?
CSE 490/590, Spring 2011 CSE 490/590 Computer Architecture Address Translation and Protection Steve Ko Computer Sciences and Engineering University at.
CSE 490/590, Spring 2011 CSE 490/590 Computer Architecture Virtual Memory I Steve Ko Computer Sciences and Engineering University at Buffalo.
CSE 490/590 Computer Architecture Virtual Memory II
February 25, 2010CS152, Spring 2010 CS 152 Computer Architecture and Engineering Lecture 11 - Virtual Memory and Caches Krste Asanovic Electrical Engineering.
CS 152 Computer Architecture and Engineering Lecture 11 - Virtual Memory and Caches Krste Asanovic Electrical Engineering and Computer Sciences University.
CS 152 Computer Architecture and Engineering Lecture 10 - Virtual Memory Krste Asanovic Electrical Engineering and Computer Sciences University of California.
February 23, 2011CS152, Spring 2011 CS 152 Computer Architecture and Engineering Lecture 9 - Virtual Memory Krste Asanovic Electrical Engineering and Computer.
Computer ArchitectureFall 2008 © November 10, 2007 Nael Abu-Ghazaleh Lecture 23 Virtual.
Computer ArchitectureFall 2007 © November 21, 2007 Karem A. Sakallah Lecture 23 Virtual Memory (2) CS : Computer Architecture.
February 16, 2011CS152, Spring 2011 CS 152 Computer Architecture and Engineering Lecture 8 - Address Translation Krste Asanovic Electrical Engineering.
CS 152 Computer Architecture and Engineering Lecture 9 - Address Translation Krste Asanovic Electrical Engineering and Computer Sciences University of.
February 23, 2010CS152, Spring 2010 CS 152 Computer Architecture and Engineering Lecture 10 - Virtual Memory Krste Asanovic Electrical Engineering and.
Translation Buffers (TLB’s)
CS 152 Computer Architecture and Engineering Lecture 9 - Address Translation Krste Asanovic Electrical Engineering and Computer Sciences University of.
February 18, 2010CS152, Spring 2010 CS 152 Computer Architecture and Engineering Lecture 9 - Address Translation Krste Asanovic Electrical Engineering.
CS 252 Graduate Computer Architecture Lecture 9: Address Translation and Virtual Memory Krste Asanovic Electrical Engineering and Computer Sciences University.
Lecture 19: Virtual Memory
CS 61C: Great Ideas in Computer Architecture Virtual Memory Instructors: Krste Asanovic, Randy H. Katz 1Fall.
ECE 552 / CPS 550 Advanced Computer Architecture I Lecture 14 Virtual Memory Benjamin Lee Electrical and Computer Engineering Duke University
Constructive Computer Architecture Virtual Memory: From Address Translation to Demand Paging Arvind Computer Science & Artificial Intelligence Lab. Massachusetts.
Virtual Memory Muhamed Mudawar CS 282 – KAUST – Spring 2010 Computer Architecture & Organization.
Virtual Memory: Part Deux
Virtual Memory Part 1 Li-Shiuan Peh Computer Science & Artificial Intelligence Lab. Massachusetts Institute of Technology May 2, 2012L22-1
2/14/2013 CS152, Spring 2013 CS 152 Computer Architecture and Engineering Lecture 8 - Address Translation Krste Asanovic Electrical Engineering and Computer.
ECE 252 / CPS 220 Advanced Computer Architecture I Lecture 14 Virtual Memory Benjamin Lee Electrical and Computer Engineering Duke University
1 Some Real Problem  What if a program needs more memory than the machine has? —even if individual programs fit in memory, how can we run multiple programs?
February 21, 2012CS152, Spring 2012 CS 152 Computer Architecture and Engineering Lecture 9 - Virtual Memory Krste Asanovic Electrical Engineering and Computer.
1 Memory Management. 2 Fixed Partitions Legend Free Space 0k 4k 16k 64k 128k Internal fragmentation (cannot be reallocated) Divide memory into n (possible.
Constructive Computer Architecture Virtual Memory and Interrupts Arvind Computer Science & Artificial Intelligence Lab. Massachusetts Institute of Technology.
CS2100 Computer Organisation Virtual Memory – Own reading only (AY2015/6) Semester 1.
Constructive Computer Architecture Virtual Memory: From Address Translation to Demand Paging Arvind Computer Science & Artificial Intelligence Lab. Massachusetts.
© Krste Asanovic, 2014CS252, Spring 2014, Lecture 14 CS252 Graduate Computer Architecture Spring 2014 Lecture 14: Memory Protection and Address Translation.
Virtual Memory CENG331 - Computer Organization Instructor: Murat Manguoglu(Section 1) Adapted from:
LECTURE 12 Virtual Memory. VIRTUAL MEMORY Just as a cache can provide fast, easy access to recently-used code and data, main memory acts as a “cache”
CENG709 Computer Architecture and Operating Systems Lecture 8 - Address Translation Murat Manguoglu Department of Computer Engineering Middle East Technical.
CS 61C: Great Ideas in Computer Architecture Virtual Memory Cont.
CMSC 611: Advanced Computer Architecture
Memory COMPUTER ARCHITECTURE
Memory Caches & TLB Virtual Memory
From Address Translation to Demand Paging
From Address Translation to Demand Paging
Page Table Implementation
CS 704 Advanced Computer Architecture
Virtual Memory Use main memory as a “cache” for secondary (disk) storage Managed jointly by CPU hardware and the operating system (OS) Programs share main.
Some Real Problem What if a program needs more memory than the machine has? even if individual programs fit in memory, how can we run multiple programs?
Dr. George Michelogiannakis EECS, University of California at Berkeley
Lecture 14 Virtual Memory and the Alpha Memory Hierarchy
From Address Translation to Demand Paging
CS 105 “Tour of the Black Holes of Computing!”
Morgan Kaufmann Publishers Memory Hierarchy: Virtual Memory
CSE 451: Operating Systems Autumn 2005 Memory Management
Translation Buffers (TLB’s)
CS 152 Computer Architecture and Engineering CS252 Graduate Computer Architecture Lecture 8 – Address Translation Krste Asanovic Electrical Engineering.
CS 152 Computer Architecture and Engineering CS252 Graduate Computer Architecture Lecture 9 – Virtual Memory Krste Asanovic Electrical Engineering and.
CSE 451: Operating Systems Autumn 2003 Lecture 9 Memory Management
Translation Buffers (TLB’s)
CSC3050 – Computer Architecture
CS 105 “Tour of the Black Holes of Computing!”
CSE 451: Operating Systems Autumn 2003 Lecture 9 Memory Management
Address Translation and Virtual Memory CENG331 - Computer Organization
CS 105 “Tour of the Black Holes of Computing!”
Dr. George Michelogiannakis EECS, University of California at Berkeley
Translation Buffers (TLBs)
Review What are the advantages/disadvantages of pages versus segments?
Presentation transcript:

© Krste Asanovic, 2014CS252, Spring 2014, Lecture 15 CS252 Graduate Computer Architecture Spring 2014 Lecture 15: Virtual Memory and Caches Krste Asanovic

© Krste Asanovic, 2014CS252, Spring 2014, Lecture 15 Last Time in Lecture 14  Address translation  Protection  Virtual Memory 2

© Krste Asanovic, 2014CS252, Spring 2014, Lecture 15 Address Translation in CPU Pipeline  Need to cope with additional latency of TLB: - slow down the clock? - pipeline the TLB and cache access? - virtual address caches - parallel TLB/cache access 3 PC Inst TLB Inst. Cache D Decode EM Data TLB Data Cache W + TLB miss? Page Fault? Protection violation? TLB miss? Page Fault? Protection violation?

© Krste Asanovic, 2014CS252, Spring 2014, Lecture 15 Virtual-Address Caches 4  one-step process in case of a hit (+)  cache needs to be flushed on a context switch unless address space identifiers (ASIDs) included in tags (-)  aliasing problems due to the sharing of pages (-)  maintaining cache coherence (-) CPU Physical Cache TLB Primary Memory VA PA Alternative: place the cache before the TLB Virtual Cache CPU VA (StrongARM) PA TLB Primary Memory VA

© Krste Asanovic, 2014CS252, Spring 2014, Lecture 15 Virtually Addressed Cache (Virtual Index/Virtual Tag) 5 PC Inst. TLB Inst. Cache D Decode EM Data Cache W + Data TLB Main Memory (DRAM) Memory Controller Physical Address Instruction data Physical Address Page-Table Base Register Virtual Address Hardware Page Table Walker Miss? Translate on miss

© Krste Asanovic, 2014CS252, Spring 2014, Lecture 15 Aliasing in Virtual-Address Caches 6 VA 1 VA 2 Page Table Data Pages PA VA 1 VA 2 1st Copy of Data at PA 2nd Copy of Data at PA TagData Two virtual pages share one physical page Virtual cache can have two copies of same physical data. Writes to one copy not visible to reads of other! General Solution: Prevent aliases coexisting in cache Software (i.e., OS) solution for direct-mapped cache VAs of shared pages must agree in cache index bits; this ensures all VAs accessing same PA will conflict in direct-mapped cache (early SPARCs)

© Krste Asanovic, 2014CS252, Spring 2014, Lecture 15 Concurrent Access to TLB & Cache (Virtual Index/Physical Tag) 7 Index L is available without consulting the TLB  cache and TLB accesses can begin simultaneously! Tag comparison is made after both accesses are completed Cases: L + b = k, L + b k VPN L b TLB Direct-map Cache 2 L blocks 2 b -byte block PPN Page Offset = hit? DataPhysical Tag Tag VA PA Virtual Index k

© Krste Asanovic, 2014CS252, Spring 2014, Lecture 15 Virtual-Index Physical-Tag Caches: Associative Organization 8 How does this scheme scale to larger caches? VPN a L = k-b b TLB Direct-map 2 L blocks PPN Page Offset = hit? Data Phy. Tag VA PA Virtual Index k Direct-map 2 L blocks 2a2a = 2a2a After the PPN is known, 2 a physical tags are compared

© Krste Asanovic, 2014CS252, Spring 2014, Lecture 15 Concurrent Access to TLB & Large L1 The problem with L1 > Page size 9 Can VA 1 and VA 2 both map to PA ? VPN a Page Offset b TLB PPN Page Offset b Tag VA PA Virtual Index L1 PA cache Direct-map = hit? PPN a Data VA 1 VA 2

© Krste Asanovic, 2014CS252, Spring 2014, Lecture 15 A solution via Second Level Cache 10 Usually a common L2 cache backs up both Instruction and Data L1 caches L2 is “inclusive” of both Instruction and Data caches Inclusive means L2 has copy of any line in either L1 CPU L1 Data Cache L1 Instruction Cache Unified L2 Cache RF Memory

© Krste Asanovic, 2014CS252, Spring 2014, Lecture 15 Anti-Aliasing Using L2 [ MIPS R10000,1996] 11  Suppose VA1 and VA2 both map to PA and VA1 is already in L1, L2 (VA1  VA2)  After VA2 is resolved to PA, a collision will be detected in L2.  VA1 will be purged from L1 and L2, and VA2 will be loaded  no aliasing ! VPN a Page Offset b TLB PPN Page Offset b Tag VA PA Virtual Index L1 PA cache Direct-map = hit? PPN a Data VA 1 VA 2 Direct-Mapped L2 PA a 1 Data PPN into L2 tag

© Krste Asanovic, 2014CS252, Spring 2014, Lecture 15 Anti-Aliasing using L2 for a Virtually Addressed L1 12 VPN Page Offset b TLB PPN Page Offset b Tag VA PA Virtual Index & Tag Physical Index & Tag L1 VA Cache L2 PA Cache L2 “contains” L1 PA VA 1 Data VA 1 Data VA 2 Data “Virtual Tag” Physically-addressed L2 can also be used to avoid aliases in virtually- addressed L1

© Krste Asanovic, 2014CS252, Spring 2014, Lecture 15 Atlas Revisited 13  One PAR for each physical page  PAR’s contain the VPN’s of the pages resident in primary memory  Advantage: The size is proportional to the size of the primary memory  What is the disadvantage ? VPN PAR’s PPN

© Krste Asanovic, 2014CS252, Spring 2014, Lecture 15 Hashed Page Table: Approximating Associative Addressing 14  Hashed Page Table is typically 2 to 3 times larger than the number of PPN’s to reduce collision probability  It can also contain DPN’s for some non-resident pages (not common)  If a translation cannot be resolved in this table then the software consults a data structure that has an entry for every existing page (e.g., full page table) hash Offset Base of Table + PA of PTE Primary Memory VPN PID PPN Page Table VPNd Virtual Address VPN PID DPN VPN PID PID

© Krste Asanovic, 2014CS252, Spring 2014, Lecture 15 Power PC: Hashed Page Table 15  Each hash table slot has 8 PTE's that are searched sequentially  If the first hash slot fails, an alternate hash function is used to look in another slot All these steps are done in hardware!  Hashed Table is typically 2 to 3 times larger than the number of physical pages  The full backup Page Table is managed in software Base of Table hash Offset + PA of Slot Primary Memory VPN PPN Page Table VPN d80-bit VA VPN

© Krste Asanovic, 2014CS252, Spring 2014, Lecture 15 VM features track historical uses:  Bare machine, only physical addresses -One program owned entire machine  Batch-style multiprogramming -Several programs sharing CPU while waiting for I/O -Base & bound: translation and protection between programs (supports swapping entire programs but not demand-paged virtual memory) -Problem with external fragmentation (holes in memory), needed occasional memory defragmentation as new jobs arrived  Time sharing -More interactive programs, waiting for user. Also, more jobs/second. -Motivated move to fixed-size page translation and protection, no external fragmentation (but now internal fragmentation, wasted bytes in page) -Motivated adoption of virtual memory to allow more jobs to share limited physical memory resources while holding working set in memory  Virtual Machine Monitors -Run multiple operating systems on one machine -Idea from 1970s IBM mainframes, now common on laptops -e.g., run Windows on top of Mac OS X -Hardware support for two levels of translation/protection -Guest OS virtual -> Guest OS physical -> Host machine physical 16

© Krste Asanovic, 2014CS252, Spring 2014, Lecture 15 Virtual Memory Use Today - 1  Servers/desktops/laptops/smartphones have full demand-paged virtual memory -Portability between machines with different memory sizes -Protection between multiple users or multiple tasks -Share small physical memory among active tasks -Simplifies implementation of some OS features  Vector supercomputers have translation and protection but rarely complete demand-paging  (Older Crays: base&bound, Japanese & Cray X1/X2: pages) -Don’t waste expensive CPU time thrashing to disk (make jobs fit in memory) -Mostly run in batch mode (run set of jobs that fits in memory) -Difficult to implement restartable vector instructions 17

© Krste Asanovic, 2014CS252, Spring 2014, Lecture 15 Virtual Memory Use Today - 2  Most embedded processors and DSPs provide physical addressing only -Can’t afford area/speed/power budget for virtual memory support -Often there is no secondary storage to swap to! -Programs custom written for particular memory configuration in product -Difficult to implement restartable instructions for exposed architectures 18

© Krste Asanovic, 2014CS252, Spring 2014, Lecture 15 Acknowledgements  This course is partly inspired by previous MIT and Berkeley CS252 computer architecture courses created by my collaborators and colleagues: -Arvind (MIT) -Joel Emer (Intel/MIT) -James Hoe (CMU) -John Kubiatowicz (UCB) -David Patterson (UCB) 19