87 lines
4.3 KiB
Perl
87 lines
4.3 KiB
Perl
|
.\" Copyright (c) 1986 The Regents of the University of California.
|
||
|
.\" All rights reserved.
|
||
|
.\"
|
||
|
.\" Redistribution and use in source and binary forms, with or without
|
||
|
.\" modification, are permitted provided that the following conditions
|
||
|
.\" are met:
|
||
|
.\" 1. Redistributions of source code must retain the above copyright
|
||
|
.\" notice, this list of conditions and the following disclaimer.
|
||
|
.\" 2. Redistributions in binary form must reproduce the above copyright
|
||
|
.\" notice, this list of conditions and the following disclaimer in the
|
||
|
.\" documentation and/or other materials provided with the distribution.
|
||
|
.\" 3. All advertising materials mentioning features or use of this software
|
||
|
.\" must display the following acknowledgement:
|
||
|
.\" This product includes software developed by the University of
|
||
|
.\" California, Berkeley and its contributors.
|
||
|
.\" 4. Neither the name of the University nor the names of its contributors
|
||
|
.\" may be used to endorse or promote products derived from this software
|
||
|
.\" without specific prior written permission.
|
||
|
.\"
|
||
|
.\" THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
|
||
|
.\" ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
||
|
.\" IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
||
|
.\" ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
|
||
|
.\" FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
||
|
.\" DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
||
|
.\" OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
||
|
.\" HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
||
|
.\" LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
||
|
.\" OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
||
|
.\" SUCH DAMAGE.
|
||
|
.\"
|
||
|
.\" @(#)0.t 5.1 (Berkeley) 4/16/91
|
||
|
.\"
|
||
|
.rm CM
|
||
|
.TL
|
||
|
A New Virtual Memory Implementation for Berkeley
|
||
|
.UX
|
||
|
.AU
|
||
|
Marshall Kirk McKusick
|
||
|
Michael J. Karels
|
||
|
.AI
|
||
|
Computer Systems Research Group
|
||
|
Computer Science Division
|
||
|
Department of Electrical Engineering and Computer Science
|
||
|
University of California, Berkeley
|
||
|
Berkeley, California 94720
|
||
|
.AB
|
||
|
With the cost per byte of memory approaching that of the cost per byte
|
||
|
for disks, and with file systems increasingly distant from the host
|
||
|
machines, a new approach to the implementation of virtual memory is
|
||
|
necessary. Rather than preallocating swap space which limits the
|
||
|
maximum virtual memory that can be supported to the size of the swap
|
||
|
area, the system should support virtual memory up to the sum of the
|
||
|
sizes of physical memory plus swap space. For systems with a local swap
|
||
|
disk, but remote file systems, it may be useful to use some of the memory
|
||
|
to keep track of the contents of the swap space to avoid multiple fetches
|
||
|
of the same data from the file system.
|
||
|
.PP
|
||
|
The new implementation should also add new functionality. Processes
|
||
|
should be allowed to have large sparse address spaces, to map files
|
||
|
into their address spaces, to map device memory into their address
|
||
|
spaces, and to share memory with other processes. The shared address
|
||
|
space may either be obtained by mapping a file into (possibly
|
||
|
different) parts of their address space, or by arranging to share
|
||
|
``anonymous memory'' (that is, memory that is zero fill on demand, and
|
||
|
whose contents are lost when the last process unmaps the memory) with
|
||
|
another process as is done in System V.
|
||
|
.PP
|
||
|
One use of shared memory is to provide a high-speed
|
||
|
Inter-Process Communication (IPC) mechanism between two or more
|
||
|
cooperating processes. To insure the integrity of data structures
|
||
|
in a shared region, processes must be able to use semaphores to
|
||
|
coordinate their access to these shared structures. In System V,
|
||
|
these semaphores are provided as a set of system calls. Unfortunately,
|
||
|
the use of system calls reduces the throughput of the shared memory
|
||
|
IPC to that of existing IPC mechanisms. We are proposing a scheme
|
||
|
that places the semaphores in the shared memory segment, so that
|
||
|
machines that have a test-and-set instruction can handle the usual
|
||
|
uncontested lock and unlock without doing a system call. Only in
|
||
|
the unusual case of trying to lock an already-locked lock or in
|
||
|
releasing a wanted lock will a system call be required. The
|
||
|
interface will allow a user-level implementation of the System V
|
||
|
semaphore interface on most machines with a much lower runtime cost.
|
||
|
.AE
|
||
|
.LP
|
||
|
.bp
|