In computer systems, oftentimes components having different capabilities with respect to speed, size, addressing schemes and so forth, are combined in a single system. For example, a chipset, which is a semiconductor device that acts as an interface between a processor and other system components such as memory and input/output devices, may have the capability to address more memory than its paired processor. While this does not prevent the processor/chipset combination from functioning normally, it limits the total maximum system memory to that which is addressable by the processor, versus the larger amount addressable by the chipset (e.g., memory controller). Accordingly, more limited performance occurs than would be available if a larger portion of the memory were accessible to the processor.
In various embodiments, a system may include a processor that can address a smaller memory address space than an associated chipset. To enable improved performance, a virtual machine monitor (VMM) may be used to transparently make a larger, total chipset addressable memory accessible to the processor (without adding any additional hardware). That is, this accessible memory space may be expanded without additional hardware in the nature of bridge chips, segmentation registers or so forth.
Referring now to
Still referring to
In the embodiment of
Thus by providing VMM 30 with mapping tables 35 and memory space allocator 40, embodiments may allow system 10, and more particularly the combination of processor 20 and chipset 50 to support the entire 16 GB capability of both chipset 50 and memory 60. Furthermore, such support may be provided without any additional hardware, other than the native processor, chipset and memory itself.
In one embodiment, VMM 30 may use DMA controller 52 of chipset 50 to transparently move data from physical memory within memory 60 that is not directly accessible by either of cores 25 and 26 (i.e., the address space between 4 GB and 16 GB in the
Still further, assuming that chipset 50 supports 16 GB of total memory, VMM 30 may act to evenly provide each core with 8 GB of physical memory, or divide the total 16 GB of physical memory unevenly as dictated by various dynamic parameters, such as priority levels, core usage, thread priorities and so forth. For example, one core could have access to 1 GB, while the second core is given access to 15 GB. In this way, processor privilege levels or processes/tasks may be used to allocate the total 16 GB of physical memory.
As stated above, this method can be used with a software VMM or other virtualization technology without requiring any additional hardware. Furthermore, processor 20 may remain unaware that more than its address space capability is present. That is, processor 20 and the cores therein continue to operate using its standard 32-bit addressing scheme. Accordingly, applications running in various threads on cores 25 and 26 may execute in their original binary form, as no patching or revision to the code is needed to take advantage of the full address space of the physical memory. Accordingly, the full physical memory space is not visible to processor 20 in cores 25 and 26, although it may take full advantage of the entire physical memory by operation of VMM 30.
Embodiments thus enable a processor to access physical memory beyond its native addressability limitations without any additional hardware, providing increased platform performance with no added costs (other than the cost of extra memory). Still further, processor cycles are not needed for moving memory blocks in and out of the processor's physical address space. Instead, the associated chipset, e.g., by way of a memory controller therein, and more particularly a DMA controller such as an EDMA controller, may perform the swapping of memory blocks (which may be as small as page size) from the full physical memory space of the associated memory to the address space accessible to the processor. Thus a processor in a system configuration such as described above may support more memory than its address bus supports natively, without additional hardware.
Referring now to
Referring now to
Then during operation, the VMM may receive requests from a given processing engine for a particular memory access (block 230). Responsive thereto, the VMM may instruct a DMA controller to move the requested memory block that includes the requested data into a portion of the physical memory that is visible to the processor (block 240). Then the memory request may be performed such that the memory may provide via a chipset, the requested data to the processor, for example (block 250).
After handling the memory request, it may be determined whether there is a change in a privilege or priority level of at least one of the processing engines (diamond 260). If not, control may pass to block 230 for handling of another memory request, otherwise control may pass to block 270 for a re-allocation of memory based on the change. For example, different amounts of the physical memory may be allocated to the engines as a result of the change. While shown with the particular implementation in the embodiment of
While the present invention has been described with respect to a limited number of embodiments, those skilled in the art will appreciate numerous modifications and variations therefrom. It is intended that the appended claims cover all such modifications and variations as fall within the true spirit and scope of this present invention.