Chapter 15. The Process Address Space
Chapter 12 Memory Management covers how the kernel manages physical memory. In addition to managing its own memory, the kernel also has to manage the memory of user-space processes. This memory is called the process address space, which is the representation of memory given to each user-space process on the system.
Linux is a virtual memory operating system:
- The memory is virtualized among the processes on the system. An individual process's view of memory is as if it alone has full access to the system's physical memory.
- More important, the address space of even a single process can be much larger than physical memory.
This chapter discusses how the kernel manages the process address space.
Address Spaces
Flat and segmented address space *
The process address space consists of the virtual memory addressable by a process and the addresses within the virtual memory that the process is allowed to use. Each process is given a flat 32- or 64-bit address space, with the size depending on the architecture. The term flat denotes that the address space exists in a single range. (For example, a 32-bit address space extends from the address 0 to 4294967295.)
Some operating systems provide a segmented address space, with addresses existing not in a single linear range, but instead in multiple segments. Modern virtual memory operating systems generally have a flat memory model and not a segmented one.
In the flat memory model, the flat address space is unique to each process. A memory address in one process's address space is completely unrelated to that same memory address in another process's address space. Both processes can have different data at the same address in their respective address spaces. Alternatively, processes can elect to share their address space with other processes; these processes are known as as threads.
Memory areas*
A memory address is a given value within the address space, such as 4021f000. This particular value identifies a specific byte in a process's 32-bit address space. Although a process can address up to 4GB of memory (with a 32-bit address space), it doesn't have permission to access all of it.
These intervals of legal addresses (the process has permission to access), such as 08048000-0804c000 are called memory areas. The process, through the kernel, can dynamically add and remove memory areas to its address space.
The process can access a memory address only in a valid memory area. Memory areas have associated permissions, such as readable, writable, and executable, that the associated process must respect. If a process accesses a memory address not in a valid memory area, or if it accesses a valid area in an invalid manner, the kernel kills the process with the dreaded "Segmentation Fault" message.
Memory areas can contain the following things:
- A memory map of the executable file's code, called the text section.
- A memory map of the executable file's initialized global variables, called the data section.
- A memory map of the zero page (a page consisting of all zeros, used for purposes such as this) containing uninitialized global variables, called the bss section.
- The term "BSS" is historical and stands for block started by symbol.
- Uninitialized variables are not stored in the executable object because they do not have any associated value. But the C standard decrees that uninitialized global variables are assigned certain default values (all zeros), so the kernel loads the variables (without value) from the executable into memory and maps the zero page over the area, thereby giving the variables the value zero, without having to waste space in the object file with explicit initializations.
- A memory map of the zero page used for the process's user-space stack. (Do not confuse this with the process's kernel stack, which is separate and maintained and used by the kernel.)
- An additional text, data, and bss section for each shared library, such as the C library and dynamic linker, loaded into the process's address space.
- Any memory mapped files.
- Any shared memory segments.
- Any anonymous memory mappings, such as those associated with
malloc()(newer versions of glibc implementmalloc()viammap(), in addition tobrk()).
The Memory Descriptor
The kernel represents a process's address space with a data structure called the memory descriptor. This structure contains all the information related to the process address space.
The memory descriptor is represented by struct mm_struct and defined in <linux/mm_types.h> (include/linux/mm_types.h):
struct mm_struct {
struct vm_area_struct *mmap; /* list of memory areas */
struct rb_root mm_rb; /* red-black tree of VMAs */
struct vm_area_struct *mmap_cache; /* last used memory area */
unsigned long free_area_cache; /* 1st address space hole */
pgd_t *pgd; /* page global directory */
atomic_t mm_users; /* address space users */
atomic_t mm_count; /* primary usage counter */
int map_count; /* number of memory areas */
struct rw_semaphore mmap_sem; /* memory area semaphore */
spinlock_t page_table_lock; /* page table lock */
struct list_head mmlist; /* list of all mm_structs */
unsigned long start_code; /* start address of code */
unsigned long end_code; /* final address of code */
unsigned long start_data; /* start address of data */
unsigned long end_data; /* final address of data */
unsigned long start_brk; /* start address of heap */
unsigned long brk; /* final address of heap */
unsigned long start_stack; /* start address of stack */
unsigned long arg_start; /* start of arguments */
unsigned long arg_end; /* end of arguments */
unsigned long env_start; /* start of environment */
unsigned long env_end; /* end of environment */
unsigned long rss; /* pages allocated */
unsigned long total_vm; /* total number of pages */
unsigned long locked_vm; /* number of locked pages */
unsigned long saved_auxv[AT_VECTOR_SIZE]; /* saved auxv */
cpumask_t cpu_vm_mask; /* lazy TLB switch mask */
mm_context_t context; /* arch-specific data */
unsigned long flags; /* status flags */
int core_waiters; /* thread core dump waiters */
struct core_state *core_state; /* core dump support */
spinlock_t ioctx_lock; /* AIO I/O list lock */
struct hlist_head ioctx_list; /* AIO I/O list */
};- The
mm_usersfield is the number of processes using this address space.- For example, if two threads share this address space,
mm_usersis equal to two.
- For example, if two threads share this address space,
- The
mm_countfield is the primary reference count for themm_struct.- All
mm_usersequate to one increment ofmm_count. In the previous example,mm_countis only one. If nine threads shared an address space,mm_userswould be nine, but againmm_countwould be only one. Only whenmm_usersreaches zero (when all threads using an address space exit) is mm_count decremented. Whenmm_countfinally reaches zero, there are no remaining references to thismm_struct, and it is freed. - When the kernel operates on an address space and needs to bump its associated reference count, the kernel increments
mm_count.
- All
Having two counters enables the kernel to differentiate between the main usage counter (mm_count) and the number of processes using the address space (mm_users).
- The
mmapandmm_rbfields are different data structures that contain the same thing: all the memory areas in this address space.mmapstores them in a linked list.mm_rbstores them in a red-black tree. A red-black tree is a type of binary tree; like all binary trees, searching for a given element is an O(log n) operation.
This redundancy (two mmap and mm_rb data structures on the same data) are handy:
- The
mmapdata structure, as a linked list, allows for simple and efficient traversing of all elements. - The
mm_rbdata structure, as a red-black tree, is more suitable to searching for a given element.
The kernel isn't duplicating the mm_struct structures; just the containing objects. Overlaying a linked list onto a tree, and using both to access the same set of data, is sometimes called a threaded tree.
All of the mm_struct structures are strung together in a doubly linked list via the mmlist field. The initial element in the list is the init_mm memory descriptor, which describes the address space of the init process. The list is protected from concurrent access via the mmlist_lock, which is defined in kernel/fork.c.
Allocating a Memory Descriptor
The memory descriptor associated with a given task is stored in the mm field of the task's process descriptor:
- The process descriptor is represented by the
task_structstructure, defined in<linux/sched.h>. Thus,current->mmis the current process's memory descriptor. - The
copy_mm()function copies a parent's memory descriptor to its child duringfork(). - The
mm_structstructure is allocated from themm_cachepslab cache via theallocate_mm()macro in kernel/fork.c. - Each process receives a unique
mm_structand thus a unique process address space.
Processes may share their address spaces with their children via the CLONE_VM flag to clone(). The process is then called a thread. This is essentially the only difference between normal processes and so-called threads in Linux (Chapter 3); the Linux kernel does not otherwise differentiate between them. Threads are regular processes to the kernel that merely share certain resources.
When CLONE_VM is specified, allocate_mm() is not called, and the process's mm field is set to point to the memory descriptor of its parent via this logic in copy_mm():
if (clone_flags & CLONE_VM) {
/*
* current is the parent process and
* tsk is the child process during a fork()
*/
atomic_inc(¤t->mm->mm_users);
tsk->mm = current->mm;
}Destroying a Memory Descriptor
When the process associated with a specific address space exits, exit_mm(), defined in kernel/exit.c, is invoked. This function performs some housekeeping and updates some statistics. It then calls mmput(), which decrements the memory descriptor's mm_users user counter. If the user count reaches zero, mmdrop() is called to decrement the mm_count usage counter. If that counter is finally zero, the free_mm() macro is invoked to return the mm_struct to the mm_cachep slab cache via kmem_cache_free(), because the memory descriptor does not have any users.
The mm_struct and Kernel Threads
Kernel threads do not have a process address space and therefore do not have an associated memory descriptor. Thus, the mm field of a kernel thread's process descriptor is NULL. This is the definition of a kernel thread: processes that have no user context.
Kernel threads do not ever access any userspace memory. Because kernel threads do not have any pages in user-space, they do not deserve their own memory descriptor and page tables (discussed later in the chapter). However, kernel threads need some of the data, such as the page tables, even to access kernel memory. To provide kernel threads the needed data, without wasting memory on a memory descriptor and page tables, or wasting processor cycles to switch to a new address space whenever a kernel thread begins running, kernel threads use the memory descriptor of whatever task ran previously:
- Whenever a process is scheduled, the process address space referenced by the process's
mmfield is loaded. Theactive_mmfield in the process descriptor is then updated to refer to the new address space. - Kernel threads do not have an address space and
mmisNULL. Therefore, when a kernel thread is scheduled, the kernel notices thatmmisNULLand keeps the previous process's address space loaded. The kernel then updates theactive_mmfield of the kernel thread's process descriptor to refer to the previous process's memory descriptor. - The kernel thread can then use the previous process's page tables as needed. Because kernel threads do not access user-space memory, they make use of only the information in the address space pertaining to kernel memory, which is the same for all processes.
Virtual Memory Areas
The memory area structure vm_area_struct represents memory areas, defined in <linux/mm_types.h>. In the Linux kernel, memory areas are often called virtual memory areas (VMAs).
The vm_area_struct structure describes a single memory area over a contiguous interval in a given address space:
- The kernel treats each memory area as a unique memory object.
- Each memory area possesses certain properties, such as permissions and a set of associated operations.
In this manner, each VMA structure can represent different types of memory areas, e.g. memory-mapped files or the process's user-space stack. This is similar to the object-oriented approach taken by the VFS layer (Chapter 13).
struct vm_area_struct {
struct mm_struct *vm_mm; /* associated mm_struct */
unsigned long vm_start; /* VMA start, inclusive */
unsigned long vm_end; /* VMA end , exclusive */
struct vm_area_struct *vm_next; /* list of VMA's */
pgprot_t vm_page_prot; /* access permissions */
unsigned long vm_flags; /* flags */
struct rb_node vm_rb; /* VMA's node in the tree */
union { /* links to address_space->i_mmap or i_mmap_nonlinear */
struct {
struct list_head list;
void *parent;
struct vm_area_struct *head;
} vm_set;
struct prio_tree_node prio_tree_node;
} shared;
struct list_head anon_vma_node; /* anon_vma entry */
struct anon_vma *anon_vma; /* anonymous VMA object */
struct vm_operations_struct *vm_ops; /* associated ops */
unsigned long vm_pgoff; /* offset within file */
struct file *vm_file; /* mapped file, if any */
void *vm_private_data; /* private data */
};Each memory descriptor is associated with a unique interval in the process's address space.
- The
vm_startfield is the initial (lowest) address in the interval. (inclusive start) - The
vm_endfield is the first byte after the final (highest) address in the interval. (exclusive end)
vm_end - vm_start is the length in bytes of the memory area, which exists over the interval [vm_start, vm_end). Intervals in different memory areas in the same address space cannot overlap.
The vm_mm field points to this VMA's associated mm_struct. Each VMA is unique to the mm_struct with which it is associated:
- Therefore, even if two separate processes map the same file into their respective address spaces, each has a unique
vm_area_structto identify its unique memory area. - Conversely, two threads that share an address space also share all the
vm_area_structstructures therein.
VMA Flags
The vm_flags field contains bit flags, defined in <linux/mm.h>, that specify the behavior of and provide information about the pages contained in the memory area. Unlike permissions associated with a specific physical page, the VMA flags specify behavior for which the kernel is responsible, not the hardware. vm_flags contains information that relates to the memory area as a whole (each page), not specific individual pages.
The following table is a listing of the possible vm_flags values.
| Flag | Effect on the VMA and Its Pages |
|---|---|
VM_READ |
Pages can be read from. |
VM_WRITE |
Pages can be written to. |
VM_EXEC |
Pages can be executed. |
VM_SHARED |
Pages are shared. |
VM_MAYREAD |
The VM_READ flag can be set. |
VM_MAYWRITE |
The VM_WRITE flag can be set. |
VM_MAYEXEC |
The VM_EXEC flag can be set. |
VM_MAYSHARE |
The VM_SHARE flag can be set. |
VM_GROWSDOWN |
The area can grow downward. |
VM_GROWSUP |
The area can grow upward. |
VM_SHM |
The area is used for shared memory. |
VM_DENYWRITE |
The area maps an unwritable file. |
VM_EXECUTABLE |
The area maps an executable file. |
VM_LOCKED |
The pages in this area are locked. |
VM_IO |
The area maps a device's I/O space. |
VM_SEQ_READ |
The pages seem to be accessed sequentially. |
VM_RAND_READ |
The pages seem to be accessed randomly. |
VM_DONTCOPY |
This area must not be copied on fork(). |
VM_DONTEXPAND |
This area cannot grow via mremap(). |
VM_RESERVED |
This area must not be swapped out. |
VM_ACCOUNT |
This area is an accounted VM object. |
VM_HUGETLB |
This area uses hugetlb pages. |
VM_NONLINEAR |
This area is a nonlinear mapping. |
- The
VM_READ,VM_WRITE, andVM_EXECflags specify the usual read, write, and execute permissions for the pages in this particular memory area. They are combined as needed to form the appropriate access permissions that a process accessing this VMA must respect. For example:- The object code for a process might be mapped with
VM_READandVM_EXECbut notVM_WRITE. - The data section from an executable object would be mapped
VM_READandVM_WRITE, butVM_EXECwould make little sense. - A read-only memory mapped data file would be mapped with only the
VM_READflag.
- The object code for a process might be mapped with
- The
VM_SHAREDflag specifies whether the memory area contains a mapping that is shared among multiple processes.- If the flag is set, it is intuitively called a shared mapping.
- If the flag is not set, only a single process can view this particular mapping, and it is called a private mapping.
- The
VM_IOflag specifies that this memory area is a mapping of a device's I/O space. This field is typically set by device drivers whenmmap()is called on their I/O space. It specifies, among other things, that the memory area must not be included in any process's core dump. - The
VM_RESERVEDflag specifies that the memory region must not be swapped out. It is also used by device driver mappings. - The
VM_SEQ_READflag indicates that the application is performing sequential (i.e. linear and contiguous) reads in this mapping. The kernel can then opt to increase the read-ahead performed on the backing file. - The
VM_RAND_READflag specifies that the application is performing relatively random (i.e. not sequential) reads in this mapping. The kernel can then opt to decrease or disable read-ahead on the backing file.
These flags (VM_SEQ_READ and VM_RAND_READ flags) are set via the madvise() system call with the MADV_SEQUENTIAL and MADV_RANDOM flags, respectively:
- Read-ahead is the act of reading sequentially ahead of requested data, in hopes that the additional data will be needed soon. This is beneficial if applications are reading data sequentially.
- If data access patterns are random, however, read-ahead is not effective.
VMA Operations
The vm_ops field in the vm_area_struct structure points to the table of operations associated with a given memory area, which the kernel can invoke to manipulate the VMA. The vm_area_struct acts as a generic object for representing any type of memory area, and the operations table describes the specific methods that can operate on this particular instance of the object.
The operations table is represented by struct vm_operations_struct and is defined in <linux/mm.h>:
struct vm_operations_struct {
void (*open) (struct vm_area_struct *);
void (*close) (struct vm_area_struct *);
int (*fault) (struct vm_area_struct *, struct vm_fault *);
int (*page_mkwrite) (struct vm_area_struct *vma, struct vm_fault *vmf);
int (*access) (struct vm_area_struct *, unsigned long ,
void *, int, int);
};void open(struct vm_area_struct *area). This function is invoked when the given memory area is added to an address space.void close(struct vm_area_struct *area). This function is invoked when the given memory area is removed from an address space.int fault(struct vm_area_sruct *area, struct vm_fault *vmf). This function is invoked by the page fault handler when a page that is not present in physical memory is accessed.int page_mkwrite(struct vm_area_sruct *area, struct vm_fault *vmf). This function is invoked by the page fault handler when a page that was read-only is being made writable.int access(struct vm_area_struct *vma, unsigned long address, void *buf, int len, int write). This function is invoked byaccess_process_vm()whenget_user_pages()fails.
Lists and Trees of Memory Areas
As discussed earlier, memory areas are accessed via both the mmap and the mm_rb fields of the memory descriptor. These two data structures independently point to all the memory area objects associated with the memory descriptor. They both contain pointers to the same vm_area_struct structures, represented in different ways.
The first field, mmap, links together all the memory area objects in a singly linked list:
- Each
vm_area_structstructure is linked into the list via itsvm_nextfield. - The areas are sorted by ascending address.
- The first memory area is the
vm_area_structstructure to whichmmappoints. - The last structure points to
NULL.
The second field, mm_rb, links together all the memory area objects in a red-black tree.
- The root of the red-black tree is
mm_rb - Each
vm_area_structstructure in this address space is linked to the tree via itsvm_rbfield.
A red-black tree is a type of balanced binary tree.
- Each element in a red-black tree is called a node.
- The initial node is called the root of the tree.
- Most nodes have two children: a left child and a right child. Some nodes have only one child, and the final nodes, called leaves, have no children. For any node, the elements to the left are smaller in value, whereas the elements to the right are larger in value. Furthermore, each node is assigned a color (red or black) according to two rules: The children of a red node are black, and every path through the tree from a node to a leaf must contain the same number of black nodes. The root node is always red.
- Searching of, insertion to, and deletion from the tree is an O(log(n)) operation.
The kernel uses the redundant data structures to provide optimal performance regardless of the operation performed on the memory areas:
- The linked list is used when every node needs to be traversed.
- The red-black tree is used when locating a specific memory area in the address space.
Memory Areas in Real Life
This section discusses a particular process's address space and the memory areas inside, with the useful /proc filesystem and the pmap(1) utility. The example is a simple userspace program which does nothing:
int main(int argc, char *argv[])
{
return 0;
}Memory areas in this process's address space include:
- The text section, data section, and bss.
- Assuming this process is dynamically linked with the C library, these three memory areas also exist for
libc.soand again forld.so. - The process's stack.
The output from /proc/<pid>/maps lists the memory areas in this process's address space:
$ cat /proc/1426/maps
00e80000-00faf000 r-xp 00000000 03:01 208530 /lib/tls/libc-2.5.1.so
00faf000-00fb2000 rw-p 0012f000 03:01 208530 /lib/tls/libc-2.5.1.so
00fb2000-00fb4000 rw-p 00000000 00:00 0
08048000-08049000 r-xp 00000000 03:03 439029 /home/rlove/src/example
08049000-0804a000 rw-p 00000000 03:03 439029 /home/rlove/src/example
40000000-40015000 r-xp 00000000 03:01 80276 /lib/ld-2.5.1.so
40015000-40016000 rw-p 00015000 03:01 80276 /lib/ld-2.5.1.so
4001e000-4001f000 rw-p 00000000 00:00 0
bfffe000-c0000000 rwxp fffff000 00:00 0
The data is in the form:
start-end permission offset major:minor inode file
The pmap(1) utility (of the procps package) formats this information in a bit more readable manner:
$ pmap 1426
example[1426]
00e80000 (1212 KB) r-xp (03:01 208530) /lib/tls/libc-2.5.1.so
00faf000 (12 KB) rw-p (03:01 208530) /lib/tls/libc-2.5.1.so
00fb2000 (8 KB) rw-p (00:00 0)
08048000 (4 KB) r-xp (03:03 439029) /home/rlove/src/example
08049000 (4 KB) rw-p (03:03 439029) /home/rlove/src/example
40000000 (84 KB) r-xp (03:01 80276) /lib/ld-2.5.1.so
40015000 (4 KB) rw-p (03:01 80276) /lib/ld-2.5.1.so
4001e000 (4 KB) rw-p (00:00 0)
bfffe000 (8 KB) rwxp (00:00 0) [ stack ]
mapped: 1340 KB writable/private: 40 KB shared: 0 KB
Description of the above output:
- The first three rows are the text section, data section, and bss of
libc.so, the C library. - The next two rows are the text and data section of our executable object.
- The following three rows are the text section, data section, and bss for
ld.so, the dynamic linker. - The last row is the process's stack.
Permissions:
- The text sections are all readable and executable, which is what you expect for object code.
- The data section and bss (which both contain global variables) are marked readable and writable, but not executable.
- The stack is readable, writable, and executable.
Sizes:
The entire address space takes up about 1340KB, but only 40KB are writable and private. If a memory region is shared or nonwritable, the kernel keeps only one copy of the backing file in memory. Since a nonwritable mapping can never be changed (the mapping is only read from), it is safe to load the image only once into memory. Therefore, the C library needs to occupy only 1212KB in physical memory (not 1212KB multiplied by every process using the library). Because this process has access to about 1340KB worth of data and code, yet consumes only about 40KB of physical memory, the space savings from such sharing is substantial.
The memory areas without a mapped file on device 00:00 and inode zero are the zero pages, each of which is a mapping that consists of all zeros. By mapping the zero page over a writable memory area, the area is in effect "initialized" to all zeros. This is important in that it provides a zeroed memory area, which is expected by the bss and stack. Because the mapping is not shared, as soon as the process writes to this data, a copy is made (à la copy-on-write) and the value updated from zero.
Each of the memory areas associated with the process corresponds to a vm_area_struct structure. Because the process was not a thread, it has a unique mm_struct structure referenced from its task_struct.
Manipulating Memory Areas
The kernel often has to perform operations on a memory area, e.g. checking whether a given address exists in a given VMA. These operations are frequent and form the basis of the mmap() routine (discussed later). Helper functions are defined to assist these jobs.
These functions are all declared in <linux/mm.h>.
find_vma()
The kernel provides a function find_vma() (include/linux/mm.h#L1335) for searching for the VMA in which a given memory address resides. It is defined in mm/mmap.c:
struct vm_area_struct * find_vma(struct mm_struct *mm, unsigned long addr);- This function searches the given address space for the first memory area whose
vm_endfield is greater thanaddr. In other words, this function finds the first memory area that containsaddror begins at an address greater thanaddr. - If no such memory area exists, the function returns
NULL. Otherwise, a pointer to thevm_area_structstructure is returned. - Because the returned VMA may start at an address greater than
addr, the given address does not necessarily lie inside the returned VMA. - The result of the
find_vma()function is cached in themmap_cachefield of the memory descriptor. - Because of the probability of an operation on one VMA being followed by more operations on that same VMA, the cached results have a decent hit rate (about 30–40% in practice). Checking the cached result is quick. If the given address is not in the cache, you must search the memory areas associated with this memory descriptor for a match, which is done via the red-black tree:
struct vm_area_struct *find_vma(struct mm_struct *mm, unsigned long addr)
{
struct vm_area_struct *vma = NULL;
if (mm) {
/* Check the cache first. */
/* (Cache hit rate is typically around 35%.) */
vma = mm->mmap_cache;
if (!(vma && vma->vm_end > addr && vma->vm_start <= addr)) {
struct rb_node * rb_node;
rb_node = mm->mm_rb.rb_node;
vma = NULL;
while (rb_node) {
struct vm_area_struct * vma_tmp;
vma_tmp = rb_entry(rb_node,
struct vm_area_struct, vm_rb);
if (vma_tmp->vm_end > addr) {
vma = vma_tmp;
if (vma_tmp->vm_start <= addr)
break;
rb_node = rb_node->rb_left;
} else
rb_node = rb_node->rb_right;
}
if (vma)
mm->mmap_cache = vma;
}
}
return vma;- The initial check of
mmap_cachetests whether the cached VMA contains the desired address. Note that simply checking whether the VMA'svm_endfield is bigger thanaddrwould not ensure that this is the first such VMA that is larger thanaddr. Thus, for the cache to be useful here, the givenaddrmust lie in (vma->vm_end > addr && vma->vm_start <= addr) the VMA. - If the cache does not contain the desired VMA, the function must search the red-black tree:
- If the current VMA's
vm_endis larger thanaddr, the function follows the left child; otherwise, it follows the right child. - The function terminates as soon as a VMA is found that contains
addr. - If such a VMA is not found, the function continues traversing the tree and returns the first VMA it found that starts after
addr. If no VMA is ever found,NULLis returned.
- If the current VMA's
find_vma_prev()
The find_vma_prev() function works the same as find_vma(), but it also returns the last VMA before addr. The function is also defined in mm/mmap.c and declared in <linux/mm.h>:
struct vm_area_struct * find_vma_prev(struct mm_struct *mm, unsigned long addr,
struct vm_area_struct **pprev)The pprev argument stores a pointer to the VMA preceding addr.
find_vma_intersection()
The find_vma_intersection() function returns the first VMA that overlaps a given address interval. The function is defined in <linux/mm.h> because it is inline:
static inline struct vm_area_struct *
find_vma_intersection(struct mm_struct *mm,
unsigned long start_addr,
unsigned long end_addr)
{
struct vm_area_struct *vma;
vma = find_vma(mm, start_addr);
if (vma && end_addr <= vma->vm_start)
vma = NULL;
return vma;
}The first parameter is the address space to search, start_addr is the start of the interval, and end_addr is the end of the interval.
If find_vma() returns NULL, so would find_vma_intersection(). If find_vma() returns a valid VMA, however, find_vma_intersection() returns the same VMA only if it does not start after the end of the given address range. If the returned memory area does start after the end of the given address range, the function returns NULL.
mmap() and do_mmap(): Creating an Address Interval
The do_mmap() function creates a new linear address interval. This function does not technically create a new VMA, because:
- If the created address interval is adjacent to an existing address interval, and if they share the same permissions, the two intervals are merged into one.
- If this is not possible, a new VMA is created.
In any case, do_mmap() is the function used to add an address interval to a process's address space, whether that means expanding an existing memory area or creating a new one.
The do_mmap() function is declared in <linux/mm.h>:
unsigned long do_mmap(struct file *file, unsigned long addr,
unsigned long len, unsigned long prot,
unsigned long flag, unsigned long offset)- This function maps the file specified by
fileat offsetoffsetfor lengthlen.- The
fileparameter can beNULLandoffsetcan be zero, in which case the mapping will not be backed by a file. In that case, this is called an anonymous mapping. - If a
fileandoffsetare provided, the mapping is called a file-backed mapping.
- The
- The
addrfunction optionally specifies the initial address from which to start the search for a free interval. - The
protparameter specifies the access permissions for pages in the memory area. The possible permission flags are defined in<asm/mman.h>and are unique to each supported architecture, although in practice each architecture defines the flags listed in the following table:
| Flag | Effect on the Pages in the New Interval |
|---|---|
PROT_READ |
Corresponds to VM_READ |
PROT_WRITE |
Corresponds to VM_WRITE |
PROT_EXEC |
Corresponds to VM_EXEC |
PROT_NONE |
Cannot access page |
- The
flagsparameter specifies flags that correspond to the remaining VMA flags. These flags specify the type and change the behavior of the mapping. They are also defined in<asm/mman.h>:
| Flag | Effect on the New Interval |
|---|---|
MAP_SHARED |
The mapping can be shared. |
MAP_PRIVATE |
The mapping cannot be shared. |
MAP_FIXED |
The new interval must start at the given address addr. |
MAP_ANONYMOUS |
The mapping is not file-backed, but is anonymous. |
MAP_GROWSDOWN |
Corresponds to VM_GROWSDOWN. |
MAP_DENYWRITE |
Corresponds to VM_DENYWRITE. |
MAP_EXECUTABLE |
Corresponds to VM_EXECUTABLE. |
MAP_LOCKED |
Corresponds to VM_LOCKED. |
MAP_NORESERVE |
No need to reserve space for the mapping. |
MAP_POPULATE |
Populate (prefault) page tables. |
MAP_NONBLOCK |
Do not block on I/O. |
- If any of the parameters are invalid,
do_mmap()returns a negative value. Otherwise, a suitable interval in virtual memory is located. - If possible, the interval is merged with an adjacent memory area. Otherwise:
- A new
vm_area_structstructure is allocated from thevm_area_cachepslab cache, and the new memory area is added to the address space's linked list and red-black tree of memory areas via thevma_link()function. - Next, the
total_vmfield in the memory descriptor is updated. - Finally, the function returns the initial address of the newly created address interval.
- A new
The do_mmap() functionality is exported to user-space via the mmap() system call, defined as:
void * mmap2(void *start,
size_t length,
int prot,
int flags,
int fd,
off_t pgoff)This system call is named mmap2() because it is the second variant of mmap():
- The original
mmap()took an offset in bytes as the last parameter; the currentmmap2()receives the offset in pages. This enables larger files with larger offsets to be mapped. - The original
mmap(), as specified by POSIX, is available from the C library asmmap(), but is no longer implemented in the kernel proper, whereas the new version is available asmmap2(). Both library calls use themmap2()system call, with the originalmmap()converting the offset from bytes to pages.
munmap() and do_munmap(): Removing an Address Interval
The do_munmap() function removes an address interval from a specified process address space. The function is declared in <linux/mm.h>:
int do_munmap(struct mm_struct *mm, unsigned long start, size_t len)The first parameter mm specifies the address space from which the interval starting at address start of length len bytes is removed. On success, zero is returned. Otherwise, a negative error code is returned.
As the complement of the mmap(), the munmap() system call is exported to user-space as a means to enable processes to remove address intervals from their address space:
int munmap(void *start, size_t length)The system call is defined in mm/mmap.c and acts as a simple wrapper to do_munmap():
asmlinkage long sys_munmap(unsigned long addr, size_t len)
{
int ret;
struct mm_struct *mm;
mm = current->mm;
down_write(&mm->mmap_sem);
ret = do_munmap(mm, addr, len);
up_write(&mm->mmap_sem);
return ret;
}Page Tables
Although applications operate on virtual memory mapped to physical addresses, processors operate directly on those physical addresses. Consequently, when an application accesses a virtual memory address, it must first be converted to a physical address before the processor can resolve the request. Performing this lookup is done via page tables. Page tables work by splitting the virtual address into chunks. Each chunk is used as an index into a table. The table points to either another table or the associated physical page.
In Linux, the page tables consist of three levels. The multiple levels enable a sparsely populated address space, even on 64-bit machines. If the page tables were implemented as a single static array, their size on even 32-bit architectures would be enormous. Linux uses three levels of page tables even on architectures that do not support three levels in hardware. (For example, some hardware uses only two levels or implements a hash in hardware.) Using three levels is a sort of "greatest common denominator": architectures with a less complicated implementation can simplify the kernel page tables as needed with compiler optimizations.
- The top-level page table is the page global directory (PGD), which consists of an array of
pgd_ttypes. On most architectures, thepgd_ttype is anunsigned long. The entries in the PGD point to entries in the second-level directory, the PMD. - The second-level page table is the page middle directory (PMD), which is an array of
pmd_ttypes. The entries in the PMD point to entries in the PTE. - The final level is called simply the page table and consists of page table entries of type
pte_t. Page table entries point to physical pages.- In most architectures, page table lookups are handled (at least to some degree) by hardware.
- In normal operation, hardware can handle much of the responsibility of using the page tables. [p321]
The following figure diagrams the flow of a virtual to physical address lookup using page tables.
[UTLK p57-58]
Up to version 2.6.10, the Linux paging model consisted of three paging levels. Starting with version 2.6.11, a four-level paging model has been adopted. The four types of page tables illustrated in the figure below:
- Each process has its own page tables (threads share them). The
pgdfield of the memory descriptor points to the process's page global directory. Manipulating and traversing page tables requires thepage_table_lock, which is located inside the associated memory descriptor. - Page table data structures are quite architecture-dependent and thus are defined in
<asm/page.h>.
Translation Lookaside Buffer *
Because nearly every access of a page in virtual memory must be resolved to its corresponding address in physical memory, the performance of the page tables is very critical. Unfortunately, looking up all these addresses in memory can not be done so quickly. To facilitate this, most processors implement a translation lookaside buffer (TLB), which acts as a hardware cache of virtual-to-physical mappings. When accessing a virtual address, the processor first checks whether the mapping is cached in the TLB:
- If there is a hit, the physical address is immediately returned.
- If there is a miss, the page tables are consulted for the corresponding physical address.
Future work of page tables *
Page table management is still a critical and evolving part of the kernel. Changes to this area in 2.6 include allocating parts of the page table out of high memory. Future possibilities include shared page tables with copy-on-write semantics. In that scheme, page tables would be shared between parent and child across a fork(). When the parent or the child attempted to modify a particular page table entry, a copy would be created, and the two processes would no longer share that entry. Sharing page tables would remove the overhead of copying the page table entries on fork().

