拉肚子什么原因| 什么是人工智能| 乌鸦嘴是什么意思| 梅毒查血查什么项目| 临床药学是干什么的| 曩是什么意思| 撒是什么意思| 刑太岁是什么意思| 韭菜有什么功效| 静脉穿刺是什么意思| 心肌酶高是什么意思| 肤专家软膏主要治什么| 犯太岁是什么意思啊| 精索静脉曲张有什么症状| 汆是什么意思| 感统失调挂什么科| 这个梗是什么意思| 缺锌吃什么| 梦到丧尸是什么预兆| 慢性阑尾炎吃什么消炎药| 鬼剃头是因为什么原因引起的| fw什么意思| 上头了是什么意思| 老犯困是什么原因| 为什么会肌酐高| 12月出生是什么星座| 外籍是什么意思| 煲排骨汤放什么材料好| 幽灵是什么意思| 5月9号是什么星座| 为什么尿会很黄| 右上眼皮跳是什么预兆| 妊娠高血压对胎儿有什么影响| 什么水果是发物| 4是什么意思| 2006属什么生肖| 定期是什么意思| 高血压不能吃什么水果| 1月25日是什么星座| 折寿是什么意思| 什么叫有个性的人| 69年属什么| mfr是什么意思| 芦笋是什么植物| 老人头晕是什么原因引起的| 阴道干涩吃什么药| 白肺是什么| 存款准备金率是什么意思| 父亲生日送什么礼物| 吃得什么填词语| 什么是种草| 胆结石挂什么科| creative是什么意思| cartier什么牌子| 7.14日是什么日子| 11.23是什么星座| 感冒黄鼻涕吃什么药| preparing是什么意思| 甘油三酯高是什么原因造成的| 虾青素是什么| 鸿五行属什么| 吃什么减肥最快| 子宫腺肌症是什么原因引起的| 喝黄瓜汁有什么好处| 花蛤不能和什么一起吃| 1998年出生属什么生肖| 药剂师是什么专业| 拉分是什么意思| nary是什么牌子的手表| 荷花的别称是什么| 新生儿什么时候剪头发| 软文什么意思| 红细胞是什么意思| 蚂蚁长什么样子| 尿酸高吃什么| 人活一辈子到底为了什么| 2r是什么意思| 警察在古代叫什么| 7月中旬是什么时候| 尿液少是什么原因| 消化酶是什么| 有什么好看的电视剧| 牙龈疼是什么问题| 半身不遂是什么原因引起的| 什么食物嘌呤含量高| 多囊是什么原因造成的| 结肠炎吃什么药最见效| 小孩子睡觉流口水是什么原因| 手莫名其妙的肿了因为什么| 0和1什么意思| 规整是什么意思| 臁疮是什么病| cap医学上是什么意思| 为什么黑色吸热| 锦纹是什么中药| 什么时候是情人节| 月的偏旁有什么字| 谏什么意思| 抗结剂对人有什么伤害| 玮是什么意思| 性生活是什么感觉| 什么时候开始暑伏| 健身吃什么| rag是什么| 鳞状上皮细胞是什么意思| 梦见炖鱼预示什么| 左眼皮一直跳什么预兆| 豌豆的什么不能吃| 胆小怕事是什么生肖| 空气炸锅什么牌子好| bitch是什么意思| 蜘蛛痣是什么原因引起的| 左手臂发麻是什么原因| 睡觉嗓子干是什么原因| 女人脚抽筋是什么原因| 黑色车牌是什么车| 盗汗什么意思| 血液循环不好吃什么药| 芒果吃了有什么好处和坏处| 青春不散场什么意思| 痔疮有什么症状| 蚊香灰有什么作用| 容易放屁是什么原因| 身上老是痒是什么原因| 什么是尿崩症| 一个火一个宣念什么| 酸菜鱼一般加什么配菜| 溶肌症的症状是什么| 5月31日是什么星座| 胯骨在什么位置| 神经元是什么| 今年男宝宝取什么名字好| 蒲公英泡水喝有什么功效| 什么是姑息治疗| 坐飞机要什么证件| o型血父母是什么血型| 什么体质容易长肿瘤| 豆角和什么一起炒好吃| 五行属土缺命里缺什么| 黑糖和红糖有什么区别| 尿发黄是什么原因| seifini是什么牌子| 白蛇是什么蛇| 空气栓塞取什么卧位| 腰椎钙化是什么意思| 吃什么食物能升白细胞| 什么是沙龙| 牛子什么意思| 辣椒代表什么生肖| 东成西就是什么生肖| yp是什么| 事物是什么意思| 痛经是什么| 指甲小月牙代表什么| 生理期为什么会肚子疼| 身体出现小红点是什么原因| 墨绿色是什么颜色| 紫丁香什么时候开花| 口腔溃疡用什么药治疗| 乳糖不耐受可以喝什么奶| 上面一个日下面一个立是什么字| 蜗牛的触角有什么作用| 芙蓉什么意思| 大什么一什么| 天秤座后面是什么星座| 舌根发麻是什么原因| 背疼什么原因| 轻度脑萎缩是什么意思| 小腿发痒是什么原因| 灰姑娘叫什么名字| 梦见奶奶死了是什么意思| 胃间质瘤是什么性质的瘤| 蜻蜓为什么要点水| 梦到自己长白头发是什么意思| 10月30号什么星座| 毒奶粉是什么游戏| 器质性心脏病是什么意思| 头发里长痣代表什么| 92年的属什么生肖| 牙疼吃什么药好| 低氧血症是什么意思| 七月十日是什么星座| 积食内热吃什么药| 爆冷是什么意思| 自闭是什么意思| 棺材一般用什么木头| 耳毛念什么| 白带发黄是什么妇科病| 清华大学校长什么级别| 春天有什么动物| 焦虑吃什么药好| 流水生财是什么意思| 六扇门是什么意思| 凌晨的凌是什么意思| 昱怎么读音是什么| click什么意思| mg是什么意思| hpa是什么单位| 死心眼什么意思| zara中文叫什么| 一夫一妻制产生于什么时期| 口腔溃疡吃什么维生素| 公安局属于什么机关| 女性体寒 吃什么好| 什么叫酮症酸中毒| 九浅一深是什么意思| 高考四百分左右能上什么学校| 百合长什么样子| 禾花鱼是什么鱼| 彩蛋是什么意思| 吐鲁番为什么那么热| 喉咙咳出血是什么原因| 鸽子拉水便是什么原因| 家里为什么会进蝙蝠| 潜力是什么意思| 戊五行属什么| 排尿带血是什么原因| 靶器官是什么意思| ups是什么快递| 嗓子老有痰是什么原因| 24是什么生肖| 打嗝医学术语是什么| 红霉素软膏和红霉素眼膏有什么区别| 化纤是什么面料| 开通花呗有什么风险| 胃痛胃胀什么原因引起的| 黄酒有什么功效与作用| 圣水是什么| 眉毛白了是什么原因引起的| 什么地腐烂| 小孩子不吃饭是什么原因引起的| 钠低吃什么| 甲状腺病变是什么意思| 子宫肌瘤是什么病严重吗| 戊肝抗体igg阳性是什么意思| 吃什么蔬菜能降血脂| 外围是什么| 复方氨酚苯海拉明片是什么药| 老是嗳气是什么原因| 什么颜色防晒| 知青是什么| 蒙脱石是什么东西| 血滴子是什么意思| 男人脚底有痣代表什么| 懵逼是什么意思| 什么的小河| 毛囊炎是什么样子| 基础代谢率是什么意思| dan是什么意思| 黄盖代表什么生肖| hpv疫苗是什么| 5岁属什么生肖| 当归有什么作用| 可乐杀精是什么意思| 茜草别名又叫什么| juicy什么意思| 跛行是什么意思| 结膜炎角膜炎用什么眼药水| 低烧挂什么科| 37什么意思| 经期血块多是什么原因| 病毒性肠胃炎吃什么药| 水痘疫苗叫什么| 什么是前置胎盘| 百度Jump to content

【徐州】司机打盹轿车失控 撞护栏又撞伤俩人

From Wikipedia, the free encyclopedia
(Redirected from Dynamic memory allocation)
百度 绿地(申花)俱乐部从6月1日起开始向社会征集新队徽,经历一番海选后,第八套方案在去掉了顶上的星星,并增加了since1993的字样之后,成为了最终的选定的方案。

Memory management (also dynamic memory management, dynamic storage allocation, or dynamic memory allocation) is a form of resource management applied to computer memory. The essential requirement of memory management is to provide ways to dynamically allocate portions of memory to programs at their request, and free it for reuse when no longer needed. This is critical to any advanced computer system where more than a single process might be underway at any time.[1]

Several methods have been devised that increase the effectiveness of memory management. Virtual memory systems separate the memory addresses used by a process from actual physical addresses, allowing separation of processes and increasing the size of the virtual address space beyond the available amount of RAM using paging or swapping to secondary storage. The quality of the virtual memory manager can have an extensive effect on overall system performance. The system allows a computer to appear as if it may have more memory available than physically present, thereby allowing multiple processes to share it.

In some operating systems, e.g. Burroughs/Unisys MCP,[2] and OS/360 and successors,[3] memory is managed by the operating system.[note 1] In other operating systems, e.g. Unix-like operating systems, memory is managed at the application level.

Memory management within an address space is generally categorized as either manual memory management or automatic memory management.

Manual memory management

[edit]
An example of external fragmentation

The task of fulfilling an allocation request consists of locating a block of unused memory of sufficient size. Memory requests are satisfied by allocating portions from a large pool[note 2] of memory called the heap[note 3] or free store. At any given time, some parts of the heap are in use, while some are "free" (unused) and thus available for future allocations. In the C language, the function which allocates memory from the heap is called malloc and the function which takes previously allocated memory and marks it as "free" (to be used by future allocations) is called free. [note 4]

Several issues complicate the implementation, such as external fragmentation, which arises when there are many small gaps between allocated memory blocks, which invalidates their use for an allocation request. The allocator's metadata can also inflate the size of (individually) small allocations. This is often managed by chunking. The memory management system must track outstanding allocations to ensure that they do not overlap and that no memory is ever "lost" (i.e. that there are no "memory leaks").

Efficiency

[edit]

The specific dynamic memory allocation algorithm implemented can impact performance significantly. A study conducted in 1994 by Digital Equipment Corporation illustrates the overheads involved for a variety of allocators. The lowest average instruction path length required to allocate a single memory slot was 52 (as measured with an instruction level profiler on a variety of software).[1]

Implementations

[edit]

Since the precise location of the allocation is not known in advance, the memory is accessed indirectly, usually through a pointer reference. The specific algorithm used to organize the memory area and allocate and deallocate chunks is interlinked with the kernel, and may use any of the following methods:

Fixed-size blocks allocation

[edit]

Fixed-size blocks allocation, also called memory pool allocation, uses a free list of fixed-size blocks of memory (often all of the same size). This works well for simple embedded systems where no large objects need to be allocated but suffers from fragmentation especially with long memory addresses. However, due to the significantly reduced overhead, this method can substantially improve performance for objects that need frequent allocation and deallocation, and so it is often used in video games.

Buddy blocks

[edit]

In this system, memory is allocated into several pools of memory instead of just one, where each pool represents blocks of memory of a certain power of two in size, or blocks of some other convenient size progression. All blocks of a particular size are kept in a sorted linked list or tree and all new blocks that are formed during allocation are added to their respective memory pools for later use. If a smaller size is requested than is available, the smallest available size is selected and split. One of the resulting parts is selected, and the process repeats until the request is complete. When a block is allocated, the allocator will start with the smallest sufficiently large block to avoid needlessly breaking blocks. When a block is freed, it is compared to its buddy. If they are both free, they are combined and placed in the correspondingly larger-sized buddy-block list.

Slab allocation

[edit]

This memory allocation mechanism preallocates memory chunks suitable to fit objects of a certain type or size.[5] These chunks are called caches and the allocator only has to keep track of a list of free cache slots. Constructing an object will use any one of the free cache slots and destructing an object will add a slot back to the free cache slot list. This technique alleviates memory fragmentation and is efficient as there is no need to search for a suitable portion of memory, as any open slot will suffice.

Stack allocation

[edit]

Many Unix-like systems as well as Microsoft Windows implement a function called alloca for dynamically allocating stack memory in a way similar to the heap-based malloc. A compiler typically translates it to inlined instructions manipulating the stack pointer.[6] Although there is no need of manually freeing memory allocated this way as it is automatically freed when the function that called alloca returns, there exists a risk of overflow. And since alloca is an ad hoc expansion seen in many systems but never in POSIX or the C standard, its behavior in case of a stack overflow is undefined.

A safer version of alloca called _malloca, which reports errors, exists on Microsoft Windows. It requires the use of _freea.[7] gnulib provides an equivalent interface, albeit instead of throwing an SEH exception on overflow, it delegates to malloc when an overlarge size is detected.[8] A similar feature can be emulated using manual accounting and size-checking, such as in the uses of alloca_account in glibc.[9]

Automated memory management

[edit]

The proper management of memory in an application is a difficult problem, and several different strategies for handling memory management have been devised.

Automatic management of call stack variables

[edit]

In many programming language implementations, the runtime environment for the program automatically allocates memory in the call stack for non-static local variables of a subroutine, called automatic variables, when the subroutine is called, and automatically releases that memory when the subroutine is exited. Special declarations may allow local variables to retain values between invocations of the procedure, or may allow local variables to be accessed by other subroutines. The automatic allocation of local variables makes recursion possible, to a depth limited by available memory.

Garbage collection

[edit]

Garbage collection is a strategy for automatically detecting memory allocated to objects that are no longer usable in a program, and returning that allocated memory to a pool of free memory locations. This method is in contrast to "manual" memory management where a programmer explicitly codes memory requests and memory releases in the program. While automatic garbage collection has the advantages of reducing programmer workload and preventing certain kinds of memory allocation bugs, garbage collection does require memory resources of its own, and can compete with the application program for processor time.

Reference counting

[edit]

Reference counting is a strategy for detecting that memory is no longer usable by a program by maintaining a counter for how many independent pointers point to the memory. Whenever a new pointer points to a piece of memory, the programmer is supposed to increase the counter. When the pointer changes where it points, or when the pointer is no longer pointing to any area or has itself been freed, the counter should decrease. When the counter drops to zero, the memory should be considered unused and freed. Some reference counting systems require programmer involvement and some are implemented automatically by the compiler. A disadvantage of reference counting is that circular references can develop which cause a memory leak to occur. This can be mitigated by either adding the concept of a "weak reference" (a reference that does not participate in reference counting, but is notified when the area it is pointing to is no longer valid) or by combining reference counting and garbage collection together.

Memory pools

[edit]

A memory pool is a technique of automatically deallocating memory based on the state of the application, such as the lifecycle of a request or transaction. The idea is that many applications execute large chunks of code which may generate memory allocations, but that there is a point in execution where all of those chunks are known to be no longer valid. For example, in a web service, after each request the web service no longer needs any of the memory allocated during the execution of the request. Therefore, rather than keeping track of whether or not memory is currently being referenced, the memory is allocated according to the request or lifecycle stage with which it is associated. When that request or stage has passed, all associated memory is deallocated simultaneously.

Systems with virtual memory

[edit]

Virtual memory is a method of decoupling the memory organization from the physical hardware. The applications operate on memory via virtual addresses. Each attempt by the application to access a particular virtual memory address results in the virtual memory address being translated to an actual physical address.[10] In this way the addition of virtual memory enables granular control over memory systems and methods of access.

In virtual memory systems the operating system limits how a process can access the memory. This feature, called memory protection, can be used to disallow a process to read or write to memory that is not allocated to it, preventing malicious or malfunctioning code in one program from interfering with the operation of another.

Even though the memory allocated for specific processes is normally isolated, processes sometimes need to be able to share information. Shared memory is one of the fastest techniques for inter-process communication.

Memory is usually classified by access rate into primary storage and secondary storage. Memory management systems, among other operations, also handle the moving of information between these two levels of memory.

Memory management in Burroughs/Unisys MCP systems[2]

[edit]

An operating system manages various resources in the computing system. The memory subsystem is the system element for managing memory. The memory subsystem combines the hardware memory resource and the MCP OS software that manages the resource.

The memory subsystem manages the physical memory and the virtual memory of the system (both part of the hardware resource). The virtual memory extends physical memory by using extra space on a peripheral device, usually disk. The memory subsystem is responsible for moving code and data between main and virtual memory in a process known as overlaying. Burroughs was the first commercial implementation of virtual memory (although developed at Manchester University for the Ferranti Atlas computer) and integrated virtual memory with the system design of the B5000 from the start (in 1961) needing no external memory management unit (MMU).[11]:?48?

The memory subsystem is responsible for mapping logical requests for memory blocks to physical portions of memory (segments) which are found in the list of free segments. Each allocated block is managed by means of a segment descriptor,[12] a special control word containing relevant metadata about the segment including address, length, machine type, and the p-bit or ‘presence’ bit which indicates whether the block is in main memory or needs to be loaded from the address given in the descriptor.

Descriptors are essential in providing memory safety and security so that operations cannot overflow or underflow the referenced block (commonly known as buffer overflow). Descriptors themselves are protected control words that cannot be manipulated except for specific elements of the MCP OS (enabled by the UNSAFE block directive in NEWP).

Donald Knuth describes a similar system in Section 2.5 ‘Dynamic Storage Allocation’ of ‘Fundamental Algorithms’.[disputeddiscuss]

Memory management in OS/360 and successors

[edit]

IBM System/360 does not support virtual memory.[note 5] Memory isolation of jobs is optionally accomplished using protection keys, assigning storage for each job a different key, 0 for the supervisor or 1–15. Memory management in OS/360 is a supervisor function. Storage is requested using the GETMAIN macro and freed using the FREEMAIN macro, which result in a call to the supervisor (SVC) to perform the operation.

In OS/360 the details vary depending on how the system is generated, e.g., for PCP, MFT, MVT.

In OS/360 MVT, suballocation within a job's region or the shared System Queue Area (SQA) is based on subpools, areas a multiple of 2 KB in size—the size of an area protected by a protection key. Subpools are numbered 0–255.[13] Within a region subpools are assigned either the job's storage protection or the supervisor's key, key 0. Subpools 0–127 receive the job's key. Initially only subpool zero is created, and all user storage requests are satisfied from subpool 0, unless another is specified in the memory request. Subpools 250–255 are created by memory requests by the supervisor on behalf of the job. Most of these are assigned key 0, although a few get the key of the job. Subpool numbers are also relevant in MFT, although the details are much simpler.[14] MFT uses fixed partitions redefinable by the operator instead of dynamic regions and PCP has only a single partition.

Each subpool is mapped by a list of control blocks identifying allocated and free memory blocks within the subpool. Memory is allocated by finding a free area of sufficient size, or by allocating additional blocks in the subpool, up to the region size of the job. It is possible to free all or part of an allocated memory area.[15]

The details for OS/VS1 are similar[16] to those for MFT and for MVT; the details for OS/VS2 are similar to those for MVT, except that the page size is 4 KiB. For both OS/VS1 and OS/VS2 the shared System Queue Area (SQA) is nonpageable.

In MVS the address space[17] includes an additional pageable shared area, the Common Storage Area (CSA), and two additional private areas, the nonpageable local system queue area (LSQA) and the pageable System Work area (SWA). Also, the storage keys 0–7 are all reserved for use by privileged code.

See also

[edit]

Notes

[edit]
  1. ^ However, the run-time environment for a language processor may subdivide the memory dynamically acquired from the operating system, e.g., to implement a stack.
  2. ^ In some operating systems, e.g., OS/360, the free storage may be subdivided in various ways, e.g., subpools in OS/360, below the line, above the line and above the bar in z/OS.
  3. ^ Not to be confused with the unrelated heap data structure.
  4. ^ A simplistic implementation of these two functions can be found in the article "Inside Memory Management".[4]
  5. ^ Except on the Model 67

References

[edit]
  1. ^ a b Detlefs, D.; Dosser, A.; Zorn, B. (June 1994). "Memory allocation costs in large C and C++ programs" (PDF). Software: Practice and Experience. 24 (6): 527–542. CiteSeerX 10.1.1.30.3073. doi:10.1002/spe.4380240602. S2CID 14214110.
  2. ^ a b "Unisys MCP Managing Memory". System Operations Guid. Unisys.
  3. ^ "Main Storage Allocation" (PDF). IBM Operating System/360 Concepts and Facilities (PDF). IBM Systems Reference Library (First ed.). IBM Corporation. 1965. p. 74. Retrieved Apr 3, 2019.
  4. ^ Jonathan Bartlett. "Inside Memory Management". IBM DeveloperWorks.
  5. ^ Silberschatz, Abraham; Galvin, Peter B. (2004). Operating system concepts. Wiley. ISBN 0-471-69466-5.
  6. ^ alloca(3) – Linux Programmer's Manual – Library Functions
  7. ^ "_malloca". Microsoft CRT Documentation. 26 October 2022.
  8. ^ "gnulib/malloca.h". GitHub. Retrieved 24 November 2019.
  9. ^ "glibc/include/alloca.h". Beren Minor's Mirrors. 23 November 2019.
  10. ^ Tanenbaum, Andrew S. (1992). Modern Operating Systems. Englewood Cliffs, N.J.: Prentice-Hall. p. 90. ISBN 0-13-588187-0.
  11. ^ Waychoff, Richard. "Stories About the B5000 and People Who Were There" (PDF). Computer History Museum.
  12. ^ The Descriptor (PDF). Burroughs Corporation. February 1961.
  13. ^ OS360Sup, pp. 82–85.
  14. ^ OS360Sup, pp. 82.
  15. ^ Program Logic: IBM System/360 Operating System MVT Supervisor (PDF). IBM Corporation. May 1973. pp. 107–137. Retrieved Apr 3, 2019.
  16. ^ OSVS1Dig, p. 2.37-2.39.
  17. ^ "Virtual Storage Layout" (PDF). Introduction to OS/VS2 Release 2 (PDF). Systems (first ed.). IBM. March 1973. p. 37. GC28-0661-1. Retrieved July 15, 2024.

Bibliography

[edit]
OS360Sup
OS Release 21 IBM System/360 Operating System Supervisor Services and Macro Instructions (PDF). IBM Systems Reference Library (Eighth ed.). IBM. September 1974. GC28-6646-7.
OSVS1Dig
OS/VS1 Programmer's Reference Digest Release 6 (PDF). Systems (Sixth ed.). IBM. September 15, 1976. GC24-5091-5 with TNLs.
[edit]
胃顶的难受是什么原因 拔罐有什么好处 黑布林是什么水果 前额头痛吃什么药 借什么不用还
什么时候最容易怀孕 农历五月二十八是什么日子 兵马俑什么时候发现的 波司登是什么档次 三唑仑是什么
淀粉和面粉有什么区别 有湿热吃什么中成药 下面有炎症用什么药 什么是otc 肚脐眼下面是什么部位
河南是什么气候 拔完智齿后需要注意什么 什么有什么 中考报名号是什么 二刷是什么意思
女人做春梦预示着什么jinxinzhichuang.com 梦到头发白了是什么意思hcv8jop9ns0r.cn 金灿灿的什么hcv9jop6ns0r.cn 女人代谢慢吃什么效果最快hcv8jop8ns2r.cn 寓言故事有什么hcv8jop8ns2r.cn
金骏眉属于什么茶类hcv7jop6ns7r.cn 伤情鉴定需要什么材料hcv7jop7ns1r.cn 如字五行属什么wuhaiwuya.com 高手过招下一句是什么hcv8jop8ns5r.cn 什么药治便秘最好最快hcv8jop3ns5r.cn
煨是什么意思hcv9jop2ns1r.cn 什么花适合送老师cl108k.com 马蹄南去人北望是什么歌hcv9jop0ns9r.cn 附件炎用什么药最好hcv8jop2ns2r.cn 前列腺在哪里男人的什么部位hcv7jop4ns8r.cn
饭前吃药和饭后吃药有什么区别hcv7jop7ns4r.cn 白带正常是什么样子hcv8jop7ns6r.cn 羊水指数和羊水深度有什么区别fenrenren.com 夏至未至是什么意思hcv8jop0ns5r.cn 龙的本命佛是什么佛hcv8jop1ns5r.cn
百度