标签:mem kernel href gem pes shared hunk htm locate
https://stackoverflow.com/questions/2688466/why-mallocmemset-is-slower-than-calloc/
The short version: Always use calloc()
instead of malloc()+memset()
. In most cases, they will be the same. In some cases, calloc()
will do less work because it can skip memset()
entirely. In other cases, calloc()
can even cheat and not allocate any memory! However, malloc()+memset()
will always do the full amount of work.
Understanding this requires a short tour of the memory system.
There are four main parts here: your program, the standard library, the kernel, and the page tables. You already know your program, so...
Memory allocators like malloc()
and calloc()
are mostly there to take small allocations (anything from 1 byte to 100s of KB) and group them into larger pools of memory. For example, if you allocate 16 bytes, malloc()
will first try to get 16 bytes out of one of its pools, and then ask for more memory from the kernel when the pool runs dry. However, since the program you‘re asking about is allocating for a large amount of memory at once, malloc()
and calloc()
will just ask for that memory directly from the kernel. The threshold for this behavior depends on your system, but I‘ve seen 1 MiB used as the threshold.
The kernel is responsible for allocating actual RAM to each process and making sure that processes don‘t interfere with the memory of other processes. This is called memory protection, it has been dirt common since the 1990s, and it‘s the reason why one program can crash without bringing down the whole system. So when a program needs more memory, it can‘t just take the memory, but instead it asks for the memory from the kernel using a system call like mmap()
or sbrk()
. The kernel will give RAM to each process by modifying the page table.
The page table maps memory addresses to actual physical RAM. Your process‘s addresses, 0x00000000 to 0xFFFFFFFF on a 32-bit system, aren‘t real memory but instead are addresses in virtual memory. The processor divides these addresses into 4 KiB pages, and each page can be assigned to a different piece of physical RAM by modifying the page table. Only the kernel is permitted to modify the page table.
Here‘s how allocating 256 MiB does not work:
Your process calls calloc()
and asks for 256 MiB.
The standard library calls mmap()
and asks for 256 MiB.
The kernel finds 256 MiB of unused RAM and gives it to your process by modifying the page table.
The standard library zeroes the RAM with memset()
and returns from calloc()
.
Your process eventually exits, and the kernel reclaims the RAM so it can be used by another process.
The above process would work, but it just doesn‘t happen this way. There are three major differences.
When your process gets new memory from the kernel, that memory was probably used by some other process previously. This is a security risk. What if that memory has passwords, encryption keys, or secret salsa recipes? To keep sensitive data from leaking, the kernel always scrubs memory before giving it to a process. We might as well scrub the memory by zeroing it, and if new memory is zeroed we might as well make it a guarantee, so mmap()
guarantees that the new memory it returns is always zeroed.
There are a lot of programs out there that allocate memory but don‘t use the memory right away. Some times memory is allocated but never used. The kernel knows this and is lazy. When you allocate new memory, the kernel doesn‘t touch the page table at all and doesn‘t give any RAM to your process. Instead, it finds some address space in your process, makes a note of what is supposed to go there, and makes a promise that it will put RAM there if your program ever actually uses it. When your program tries to read or write from those addresses, the processor triggers a page fault and the kernel steps in assign RAM to those addresses and resumes your program. If you never use the memory, the page fault never happens and your program never actually gets the RAM.
Some processes allocate memory and then read from it without modifying it. This means that a lot of pages in memory across different processes may be filled with pristine zeroes returned from mmap()
. Since these pages are all the same, the kernel makes all these virtual addresses point a single shared 4 KiB page of memory filled with zeroes. If you try to write to that memory, the processor triggers another page fault and the kernel steps in to give you a fresh page of zeroes that isn‘t shared with any other programs.
The final process looks more like this:
Your process calls calloc()
and asks for 256 MiB.
The standard library calls mmap()
and asks for 256 MiB.
The kernel finds 256 MiB of unused address space, makes a note about what that address space is now used for, and returns.
The standard library knows that the result of mmap()
is always filled with zeroes (or will beonce it actually gets some RAM), so it doesn‘t touch the memory, so there is no page fault, and the RAM is never given to your process.
Your process eventually exits, and the kernel doesn‘t need to reclaim the RAM because it was never allocated in the first place.
If you use memset()
to zero the page, memset()
will trigger the page fault, cause the RAM to get allocated, and then zero it even though it is already filled with zeroes. This is an enormous amount of extra work, and explains why calloc()
is faster than malloc()
and memset()
. If end up using the memory anyway, calloc()
is still faster than malloc()
and memset()
but the difference is not quite so ridiculous.
Not all systems have paged virtual memory, so not all systems can use these optimizations. This applies to very old processors like the 80286 as well as embedded processors which are just too small for a sophisticated memory management unit.
This also won‘t always work with smaller allocations. With smaller allocations, calloc()
gets memory from a shared pool instead of going directly to the kernel. In general, the shared pool might have junk data stored in it from old memory that was used and freed with free()
, so calloc()
could take that memory and call memset()
to clear it out. Common implementations will track which parts of the shared pool are pristine and still filled with zeroes, but not all implementations do this.
Depending on the operating system, the kernel may or may not zero memory in its free time, in case you need to get some zeroed memory later. Linux does not zero memory ahead of time, and Dragonfly BSD recently also removed this feature from their kernel. Some other kernels do zero memory ahead of time, however. Zeroing pages durign idle isn‘t enough to explain the large performance differences anyway.
The calloc()
function is not using some special memory-aligned version of memset()
, and that wouldn‘t make it much faster anyway. Most memset()
implementations for modern processors look kind of like this:
function memset(dest, c, len)
// one byte at a time, until the dest is aligned...
while (len > 0 && ((unsigned int)dest & 15))
*dest++ = c
len -= 1
// now write big chunks at a time (processor-specific)...
// block size might not be 16, it‘s just pseudocode
while (len >= 16)
// some optimized vector code goes here
// glibc uses SSE2 when available
dest += 16
len -= 16
// the end is not aligned, so one byte at a time
while (len > 0)
*dest++ = c
len -= 1
So you can see, memset()
is very fast and you‘re not really going to get anything better for large blocks of memory.
The fact that memset()
is zeroing memory that is already zeroed does mean that the memory gets zeroed twice, but that only explains a 2x performance difference. The performance difference here is much larger (I measured more than three orders of magnitude on my system between malloc()+memset()
and calloc()
).
Instead of looping 10 times, write a program that allocates memory until malloc()
or calloc()
returns NULL.
What happens if you add memset()
?
Why malloc+memset is slower than calloc?
标签:mem kernel href gem pes shared hunk htm locate
原文地址:http://www.cnblogs.com/feng9exe/p/7275525.html