Garbage Collection Mooly Sagiv

Slides:



Advertisements
Similar presentations
An Implementation of Mostly- Copying GC on Ruby VM Tomoharu Ugawa The University of Electro-Communications, Japan.
Advertisements

Garbage collection David Walker CS 320. Where are we? Last time: A survey of common garbage collection techniques –Manual memory management –Reference.
Garbage collection (& Midterm Topics) David Walker COS 320.
Automatic Memory Management Noam Rinetzky Schreiber 123A /seminar/seminar1415a.html.
Compilation /15a Lecture 13 Compiling Object-Oriented Programs Noam Rinetzky 1.
Lecture 10: Heap Management CS 540 GMU Spring 2009.
Garbage Collection What is garbage and how can we deal with it?
CSE 5317/4305 L11: Storage Allocation1 Storage Allocation Leonidas Fegaras.
Garbage Collection  records not reachable  reclaim to allow reuse  performed by runtime system (support programs linked with the compiled code) (support.
Compiler construction in4020 – lecture 12 Koen Langendoen Delft University of Technology The Netherlands.
5. Memory Management From: Chapter 5, Modern Compiler Design, by Dick Grunt et al.
Run-time organization  Data representation  Storage organization: –stack –heap –garbage collection Programming Languages 3 © 2012 David A Watt,
Garbage Collection CSCI 2720 Spring Static vs. Dynamic Allocation Early versions of Fortran –All memory was static C –Mix of static and dynamic.
By Jacob SeligmannSteffen Grarup Presented By Leon Gendler Incremental Mature Garbage Collection Using the Train Algorithm.
CS 326 Programming Languages, Concepts and Implementation Instructor: Mircea Nicolescu Lecture 18.
CPSC 388 – Compiler Design and Construction
Ceg860 (Prasad)L9GC1 Memory Management Garbage Collection.
CS 536 Spring Automatic Memory Management Lecture 24.
Chapter 8 Runtime Support. How program structures are implemented in a computer memory? The evolution of programming language design has led to the creation.
Memory Management. History Run-time management of dynamic memory is a necessary activity for modern programming languages Lisp of the 1960’s was one of.
1 The Compressor: Concurrent, Incremental and Parallel Compaction. Haim Kermany and Erez Petrank Technion – Israel Institute of Technology.
Garbage Collection Mooly Sagiv html://
Memory Management Professor Yihjia Tsai Tamkang University.
MOSTLY PARALLEL GARBAGE COLLECTION Authors : Hans J. Boehm Alan J. Demers Scott Shenker XEROX PARC Presented by:REVITAL SHABTAI.
Memory Management Chapter 5 Mooly Sagiv
Memory Allocation. Three kinds of memory Fixed memory Stack memory Heap memory.
Runtime The optimized program is ready to run … What sorts of facilities are available at runtime.
Garbage collection David Walker CS 320. Where are we? Last time: A survey of common garbage collection techniques –Manual memory management –Reference.
Run time vs. Compile time
Incremental Garbage Collection
Compilation 2007 Garbage Collection Michael I. Schwartzbach BRICS, University of Aarhus.
JVM-1 Introduction to Java Virtual Machine. JVM-2 Outline Java Language, Java Virtual Machine and Java Platform Organization of Java Virtual Machine Garbage.
Garbage collection (& Midterm Topics) David Walker COS 320.
Uniprocessor Garbage Collection Techniques Paul R. Wilson.
UniProcessor Garbage Collection Techniques Paul R. Wilson University of Texas Presented By Naomi Sapir Tel-Aviv University.
Garbage Collection Memory Management Garbage Collection –Language requirement –VM service –Performance issue in time and space.
A Parallel, Real-Time Garbage Collector Author: Perry Cheng, Guy E. Blelloch Presenter: Jun Tao.
8/14/2015© Hal Perkins & UW CSEW-1 CSE P 501 – Compilers Memory Management & Garbage Collection Hal Perkins Winter 2008.
SEG Advanced Software Design and Reengineering TOPIC L Garbage Collection Algorithms.
Chapter 7 Run-Time Environments
Lecture 10 : Introduction to Java Virtual Machine
1 Real-Time Replication Garbage Collection Scott Nettles and James O’Toole PLDI 93 Presented by: Roi Amir.
Runtime Environments. Support of Execution  Activation Tree  Control Stack  Scope  Binding of Names –Data object (values in storage) –Environment.
Memory Management II: Dynamic Storage Allocation Mar 7, 2000 Topics Segregated free lists –Buddy system Garbage collection –Mark and Sweep –Copying –Reference.
OOPLs /FEN March 2004 Object-Oriented Languages1 Object-Oriented Languages - Design and Implementation Java: Behind the Scenes Finn E. Nordbjerg,
Compilation (Semester A, 2013/14) Lecture 13b: Memory Management Noam Rinetzky Slides credit: Eran Yahav 1.
CS 326 Programming Languages, Concepts and Implementation Instructor: Mircea Nicolescu Lecture 9.
11/26/2015IT 3271 Memory Management (Ch 14) n Dynamic memory allocation Language systems provide an important hidden player: Runtime memory manager – Activation.
Runtime System CS 153: Compilers. Runtime System Runtime system: all the stuff that the language implicitly assumes and that is not described in the program.
Garbage Collection and Memory Management CS 480/680 – Comparative Languages.
UniProcessor Garbage Collection Techniques Paul R. Wilson University of Texas Presented By Naomi Sapir Tel-Aviv University.
Runtime The optimized program is ready to run … What sorts of facilities are available at runtime.
2/4/20161 GC16/3011 Functional Programming Lecture 20 Garbage Collection Techniques.
® July 21, 2004GC Summer School1 Cycles to Recycle: Copy GC Without Stopping the World The Sapphire Collector Richard L. Hudson J. Eliot B. Moss Originally.
The Metronome Washington University in St. Louis Tobias Mann October 2003.
CS412/413 Introduction to Compilers and Translators April 21, 1999 Lecture 30: Garbage collection.
Reference Counting. Reference Counting vs. Tracing Advantages ✔ Immediate ✔ Object-local ✔ Overhead distributed ✔ Very simple Trivial implementation for.
Simple Generational GC Andrew W. Appel (Practice and Experience, February 1989) Rudy Kaplan Depena CS 395T: Memory Management February 9, 2009.
Runtime Environments Chapter 7. Support of Execution  Activation Tree  Control Stack  Scope  Binding of Names –Data object (values in storage) –Environment.
Eliminating External Fragmentation in a Non-Moving Garbage Collector for Java Author: Fridtjof Siebert, CASES 2000 Michael Sallas Object-Oriented Languages.
Dynamic Memory Allocation
CS 153: Concepts of Compiler Design November 28 Class Meeting
Concepts of programming languages
Strategies for automatic memory management
Memory Management Kathryn McKinley.
RUN-TIME STORAGE Chuen-Liang Chen Department of Computer Science
Reference Counting.
CMPE 152: Compiler Design May 2 Class Meeting
Mooly Sagiv html:// Garbage Collection Mooly Sagiv html://
Presentation transcript:

Garbage Collection Mooly Sagiv

Garbage Collection HEAP ROOT SET a b c d e f Stack+Machine Registers

What is garbage collection The runtime environment reuse records that were allocated but are not subsequently used garbage records –not live It is undecidable to find the garbage records: –Decidability of liveness –Decidability of type information conservative collection –every live record is identified –some garbage run-time records are not identified Find the reachable records via pointer chains Often done in the allocation function

stackheap 7 link xyxy 9 typedef struct list {struct list *link; int key} *List; typedef struct tree {int key; struct tree *left: struct tree *right} *Tree; foo() { List x = cons(NULL, 7); List y = cons(x, 9); x->link = y; } void main() { Tree p, r; int q; foo(); p = maketree(); r = p->right; q= r->key; showtree(r);}

stackheap 7 link key xyxy link 9 typedef struct list {struct list *link; int key} *List; typedef struct tree {int key; struct tree *left: struct tree *right} *Tree; foo() { List x = cons(NULL, 7); List y = cons(x, 9); x->link = y; } void main() { Tree p, r; int q; foo(); p = maketree(); r = p->right; q= r->key; showtree(r);} pqrpqr

typedef struct list {struct list *link; int key} *List; typedef struct tree {int key; struct tree *left: struct tree *right} *Tree; foo() { List x = create_list(NULL, 7); List y = create_list(x, 9); x->link = y; } void main() { Tree p, r; int q; foo(); p = maketree(); r = p->right; q= r->key; showtree(r);} 7 link 9 p q r 37 right 12 left right 15 left 20 left right left right

Outline Why is it needed? Importance of GC? Mark-and-Sweep Collection Reference Counts Copying Collection Generational Collection Incremental Collection Interfaces to the Compiler

A Pathological C Program a = malloc(…) ; b = a; free (a); c = malloc (…); c->data = 5; printf(“%d”, b->data);

Garbage Collection vs. Explicit Memory Deallocation Faster program development Less error prone Can lead to faster programs Support very general programming styles, e.g. higher order and OO programming Standard in ML and Java Supported in C and C++ via separate libraries Can improve locality of references May require more space Needs a large memory Can lead to long pauses Can change locality of references Effectiveness depends on programming language and style Hides documentation More trusted code

Interesting Aspects of Garbage Collection Data structures Non constant time costs Amortized algorithms Constant factors matter Interfaces between compilers and run-time environments Interfaces between compilers and virtual memory management

Mark-and-Sweep Collection Mark the records reachable from the roots (stack and static variables and machine registers) Sweep the heap space by moving unreachable records to the freelist

The Mark Phase for each root v DFS(v) function DFS(x) if x is a pointer and record x is not marked mark x for each field f i of record x DFS(x.f i )

The Sweep Phase p := first address in heap while p < last address in the heap if record p is marked unmark p else let f 1 be the first pointer field in p p.f 1 := freelist freelist := p p := p + size of record p

7 link 9 p q r 37 right 12 left right 15 left 20 left right left right Mark

7 link 9 p q r 37 right 12 left right 15 left 20 left right left right freelist Sweep

7 link 9 p q r 37 right 12 left right 15 left 20 left right left right freelist

Cost of GC The cost of a single garbage collection can be linear in the size of the store –may cause quadratic program slowdown Amortized cost –collection-time/storage reclaimed –Cost of one garbage collection c 1 R + c 2 H –H - R Reclaimed records –Cost per reclaimed record (c 1 R + c 2 H)/ (H - R) –If R/H > 0.5 increase H –if R/H < 0.5 cost per reclaimed word is c 1 + 2c 2 ~16 –There is no lower bound

Efficient implementation of DFS Explicit stack Pointer reversal Other data structures

Fragmentation External –Too many small records Internal – A use of too big record without splitting the record Freelist may be implemented as an array of lists

Reference Counts Maintain a counter per record The compiler generates code to update counter Constant overhead per instruction Cannot reclaim cyclic elements Many instructions for destructive updates z := x.f i ; c := z.count; if (--c = 0) goto putonFreeList x.f i := p ; p.count++; x.f i := p

7 link 9 p q r 37 right 12 left right 15 left 20 left right left right

Copying Collection Maintains two separate heaps from-space and to-space pointer next to the next free record in from-space A pointer limit to the last record in from-space If next = limit copy the reachable records from from-space into to-space –set next and limit –Switch from-space and to-space Requires type information

Breadth-first Copying Garbage Collection next := beginning of to-space scan := next for each root r r := Forward(r) while scan < next for each field f i of record at scan scan.f i := Forward(scan.f i ) scan := scan + size of record at scan

The Forwarding Procedure function Forward(p) if p points to from-space then if p.f 1 points to to-space return p.f 1 else for each field f i of p next.f i := p.f i p.f 1 := next next := next size of record p return p.f 1 else return p

7 link 9 p q r 37 right 12 left right 15 left 20 left right left right

7 link 9 p q r 37 right 12 left right left 20 left right left right 15 left scan next

7 link 9 p q r 37 right 12 left right left 20 left right 59 left right 1 15 left right 37 left scan next

7 link 9 p q r 37 right left right left 20 left right 59 left right 15 left right 37 left scan next 12 left right

7 link 9 p q r 37 right 12 left right left 20 left right 59 left right 15 left right 37 left scan next 12 left right

Amortized Cost of Copy Collection c 3 R / (H/2 - R)

Locality of references Copy collection does not create fragmentation Cheney's algorithm may lead to subfields that point to far away records –poor virtual memory and cache performance DFS normally yields better locality but is harder to implement DFS may also be bad for locality for records with more than one pointer fields A compromise is a hybrid breadth first search with two levels down (Semi-depth first forwarding) Results can be improved using dynamic information

The New Forwarding Procedure function Forward(p) if p points to from-space then if p.f 1 points to to-space return p.f 1 else Chase(p); return p.f 1 else return p function Chase(p) repeat q := next next := next +size of record p r := nil for each field f i of p q.f i := p.f i if q.f i points to from-space and q.f i.f 1 does not point to to-space then r := q.f i p.f 1 := q p := r until p = nil

Generational Garbage Collection Newly created objects contain higher percentage of garbage Partition the heap into generations G 1 and G 2 First garbage collect the G 1 heap –records which are reachable After two or three collections records are promoted to G 2 Once a while garbage collect G 2 Can be generalized to more than two heaps But how can we garbage collect in G 1 ?

Scanning roots from older generations remembered list –The compiler generates code after b.f i := a to put b into vector of updated objects scanned by the garbage collector remembered set –remembered-list + “set-bit”' Card marking –Divide the memory into 2 k cards Page marking –k = page size –virtual memory system catches updates to old- generations using the dirty-bit

Incremental Collection Even the most efficient garbage collection can interrupt the program for quite a while Under certain conditions the collector can run concurrently with the program (mutator) Need to guarantee that mutator leaves the records in consistent state, e.g., may need to restart collection Two solutions –compile-time Generate extra instructions at store/load –virtual-memory Mark certain pages as read(write)-only a write into (read from) this page by the program restart mutator

Tricolor marking Generalized GC Three kinds of records –White Not visited (not marked or not copied) –Grey Marked or copied but children have not been examined –Black Marked and their children are marked

Basic Tricolor marking while there are any grey objects select a grey record p for each field f i of record p if record p.f i is white color record p.f i grey color record p black Invariants No black points to white Every grey is on the collector's (stack or queue) data structure

Establishing the invariants Dijkstra, Lamport, et al – Mutator stores a white pointer a into a black pointer b color a grey (compile-time) Steele –Mutator stores a white pointer a into a black pointer b color b grey (compile-time) Boehm, Demers, Shenker –All black pages are marked read-only –A store into black page mark all the objects in this page grey (virtual memory system) Baker –Whenever the mutator fetches a pointer b to a grey or white object color b grey (compile-time) Appel, Ellis, Li –Whenever the mutator fetches a pointer b from a page containing a non black object color every object on this page black and children grey (virtual memory system)

Interfaces to the Compiler The semantic analysis identifies record fields which are pointers and their size Generate runtime descriptors at the beginning of the records Pass the descriptors to the allocation function The compiler also passes pointer-map –the set of live pointer locals, temporaries, and registers Recorded at ?-time for every procedure Pointer-map can be keyed by return-address

Allocation of a Records Call the allocate function Test next + N < limit and maybe call garbage collector Move next into result Clear M[next], M[next+1],…, M[next+N-1] next := next + N Return from the allocate function Move result into some computationally useful place Store useful values into the record

Summary Garbage collection is an effective technique Leads to more secure programs Tolerable cost But is not used in certain applications –Realtime May be improved