Assignment 8, due Oct. 25

Solutions

Part of the homework for 22C:112, Fall 2013
by Douglas W. Jones
THE UNIVERSITY OF IOWA Department of Computer Science

On all assignments, your name must be legible as it appears on your University ID card! Assignments are due at the start of class on the day indicated (usually Friday). Exceptions will be by advance arrangement unless there is what lawyers call "an act of God" (something outside your control). Homework must be turned in on paper, either in class or in the teaching assistant's mailbox. Never push late work under someone's door!

  1. Background: Consider the problem of writing a file system for a flash memory device with the following characteristics:

    A file system designed for this device must do wear leveling -- that is, it must not focus write operations on any one block, but must, instead, try to spread the wear uniformly over all blocks.

    a) One way to deal with this is to use a disk driver that agressively caches things, keeping all changes in RAM until you ask to dismount the flash drive, and only then making any changes on the drive. This means that typically, you will only change each sector a few times a day. 5000 days is over a decade, so most users will be satisfied. Or will they? What is the biggest risk of this scheme? (Consider the impact of USB devices and power failures.) (0.5 points)

    If there is a power failure, all changes that are currently only stored in cache will be lost because changes recorded in cache are only recorded on the flash memory when you do a clean dismount of the device. Furthermore, if someone yanks the flash drive from the USB port, it is unlikely that any changes will have been recorded.

    b) Another alternative is to avoid storing any indices. Instead, we use the extra space in each data sector of each file or directory to store: i) the sector number in file, and ii) the i-number of the file. In sector number -1 of each file, we put the administrative contents of the i-node (date of last modification, file size, etc.). Now, a simple linear search of the entire flash device suffices to find any sector of any file, but the performance of that would be awful unless we build auxiliary index structures in RAM when we mount the flash file system. When it comes time to change the data in a sector of a file, what sector do we write that data into in order to level out the wear on the flash memory? (0.5 points)

    We simply do a linear search through the flash memory for the next block that is currently unused and write that sector. When we do this, we also need to invalidate the previous block that held the sector we are writing. We can do this, for example, by overwriting the extension on that block with all ones, this is the value we reserve to indicate a free block that needs to be flash erased before it can be reused.

  2. Background: Many MMUs have had user (well, system programmer) interfaces that present two registers to the outside world:

    Suppose the virtual address is 32 bits, composed of a 20 bit page number and a 12-bit byte-in-page field, while page-table entries consist of one word each, with the frame number in the top 20 bits of each word and access rights in the bottom 3 bits (with many unused bits). If virtual address translation were done in software, the algorithm might look like this when written in C (using the type intptr_t to hold the integer representations of both virtual and physical addresses):

    intptr_t MMU( intptr_t va, int use ) {
            intptr_t byte_in_page = va & 0x00000FFF;
            intptr_t page_number = va >> 12;
            if ( page_number >= MMUPTS ) throw_page_out_of_bounds();
            intptr_t page_table_entry = MMUPTA[ page_number ];
            intptr_t rights = page_table_entry & 0x00000007;
            if ( check_rights( rights, use ) ) access_rights_violation();
    	intptr_t frame_number = page_table_entry & 0xFFFFF000;
            intptr_t physical_address = frame_number | byte_in_page;
    	return physical_address;
    }
    

    Both use and rights are 3-bit values where the top bit indicates read, the middle bit indicates write, and the bottom bit indicates execute. In use just one of these is set, indicating the use the CPU is making of the memory address, while in rights one bit is set for each permitted operation.

    a) Give appropriate C code for check_rights(). This may be in the form of a #define or a function of type bool. (0.5 points)

    #define check_rights( rights, use ) ((rights) & (use)) == 0)

    Note the extensive use of parentheses in the definition. This is in keeping with the C stile guidelines, their purpose is to defend against a number of problems that can arise with insufficiently parenthesized C defines.

    b) An MMU built this way wouldn't perform well because it would take one memory cycle to access the page table for each useful memory cycle -- doubling the cost of every memory access. To speed things up, most MMUs contain a cache (the translation lookaside buffer or TLB) holding recently used page table entries. Only when there is a cache miss is there any need for the MMU to actually look at the page table in RAM. Why do we need a special MMU control to invalidate the TLB? (0.5 points)

    Consider what happens if the cache currently holds the value of page table entry i, at the time when the trap handler changes the copy of that page table entry in RAM. On return from trap, the unchanged copy in the cache will still be used, and the update made by the trap handler will be ignored.

  3. Background: Suppose we have a computer with an MMU and a fast I/O device like a disk or Ethernet connection. Fast devices typically used direct memory access or DMA input/output. This means that the device interface has a memory address register which the I/O driver loads with the buffer address before starting the I/O operation.

    Since the MMU is typically part of the CPU chip in a modern computer, while the DMA I/O devices are outside the CPU chip, the memory address used by the DMA interface is typically the physical address of the buffer.

    Some DMA devices have what is called scatter-read gather-write capability. Instead of just having a single buffer-address register and a single buffer-size register, they allow a single DMA transfer to span multiple buffers, for example, reading 100 bytes into memory starting at location X and then 412 bytes into memory starting at location Y (using a device with a 512-byte sector size). Most of these devices allow an arbitrary array of buffer chunks to be specified, with an entry with a byte-count of zero marking the end of the array.

    a) Suppose the user calls read( fd, buf, 512 ) where the device has 512-byte sectors, and where the file position is a multiple of 512. If we didn't have virtual memory, we could just load the buffer address into the DMA address register and 512 into the byte count register and then start the transfer. What extra work must the software do because we are using virtual memory? For this part, assume the buffer is entirely contained in one page of RAM. (0.5 points)

    We must make sure that the page holding the buffer is in RAM and not on disk, and we must translate the virtual address of the buffer into the physical address before we load it in the DMA address register.

    b) Now, assume that the buffer spans a page boundary. Explain how scatter-read gather-write can be used to simplify the work done by the I/O software. (0.5 points)

    In this case, part of the buffer will be in one page and part in another. The virtual addresses of these pages were consecutive, but they may be in non-consecutive physical addresses. If we have scatter-read gather-write DMA, we can describe the user's buffer as being constructed of two chunks at different physical addresses. Without scatter-read gather-write, we would have to read the data into a single buffer supplied by the operating system and then copy it from there to the pieces of the user's buffer.