US20080010327A1 - Region-based memory management for object-oriented programs - Google Patents
Region-based memory management for object-oriented programs Download PDFInfo
- Publication number
- US20080010327A1 US20080010327A1 US11/843,532 US84353207A US2008010327A1 US 20080010327 A1 US20080010327 A1 US 20080010327A1 US 84353207 A US84353207 A US 84353207A US 2008010327 A1 US2008010327 A1 US 2008010327A1
- Authority
- US
- United States
- Prior art keywords
- region
- regions
- objects
- program
- shape
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Abandoned
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/02—Addressing or allocation; Relocation
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F12/00—Accessing, addressing or allocating within memory systems or architectures
- G06F12/02—Addressing or allocation; Relocation
- G06F12/0223—User address space allocation, e.g. contiguous or non contiguous base addressing
- G06F12/023—Free address space management
- G06F12/0253—Garbage collection, i.e. reclamation of unreferenced memory
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/99941—Database schema or data structure
- Y10S707/99942—Manipulating data structure, e.g. compression, compaction, compilation
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/99941—Database schema or data structure
- Y10S707/99943—Generating database or data structure, e.g. via user interface
-
- Y—GENERAL TAGGING OF NEW TECHNOLOGICAL DEVELOPMENTS; GENERAL TAGGING OF CROSS-SECTIONAL TECHNOLOGIES SPANNING OVER SEVERAL SECTIONS OF THE IPC; TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10—TECHNICAL SUBJECTS COVERED BY FORMER USPC
- Y10S—TECHNICAL SUBJECTS COVERED BY FORMER USPC CROSS-REFERENCE ART COLLECTIONS [XRACs] AND DIGESTS
- Y10S707/00—Data processing: database and file management or data structures
- Y10S707/99941—Database schema or data structure
- Y10S707/99944—Object-oriented database structure
Definitions
- the invention relates generally to memory management for object-oriented programs.
- some systems employ a region-based memory management system.
- regions are allocated in memory for objects to be placed into, and memory de-allocation happens for entire regions rather than at an object-level.
- Region-based memory management reduces overhead by reducing the number of memory allocations for which the runtime environment must keep track and consolidates memory de-allocation that a garbage collector might do in a piecemeal fashion.
- region's utility is upon a call to a method which creates data structures for its execution, but which then deletes those data structures when it returns. In this situation, each region used by the method can be created when the method is called, and then deleted at the point the method is returned.
- a runtime system using region-based memory management need only keep record of the number of references to objects in a region. This allows the runtime system to de-allocate a region immediately when the reference count reaches zero. This avoids the constant searching involved in garbage collection and reduces lag time for memory reclamation.
- a region-based memory management system employing shape graphs is described.
- a memory management system which partitions memory into a plurality of regions and uses one or more shape graphs so that given an object, the region containing the object can be found.
- a method for compiling an object-oriented program for a region based memory-management system is described. The method receives source code, and then performs a points-to analysis on the code to create one or more shape graphs. The method adds instrumentation to utilize the shape graphs for object-creation and region-deletion before generating code which can be executed.
- a computer-readable medium containing instructions which cause a computer to compile a program for a region-based memory-management system.
- the instructions cause the computer to receive source code, perform a points-to analysis on the code to create one or more shape graphs, and add instrumentation to utilize the shape graphs for object-creation and region-deletion before generating code which can be executed.
- FIG. 1 is a block diagram illustrating one implementation of a region-based memory management system employing shape graphs.
- FIG. 2 is a block diagram of an exemplary computer executing a program in a region-based memory management environment using shape graphs.
- FIG. 3 is a flowchart illustrating a process for creating and executing an object-oriented program employing shape-graphs for region-based memory management.
- FIG. 4 is a flowchart illustrating an additional process for creating an object-oriented program employing shape-graphs for region-based memory management.
- FIG. 5 is a flowchart illustrating an additional process for creating an object-oriented program employing shape-graphs for region-based memory management.
- FIG. 6 is a flowchart illustrating an additional process for creating an object-oriented program employing shape-graphs for region-based memory management.
- FIGS. 7 a and 7 b are block diagrams illustrating exemplary storage of objects in memory regions based on a common shape graph.
- FIG. 8 is a flowchart illustrating a process for adding instrumentation to an object-oriented program employing shape-graphs for region-based memory management.
- FIG. 9 is a block diagram of a suitable computing environment for implementing the region-based memory management system of FIG. 1 .
- the following description is directed to techniques and systems for a region-based memory management system using shape graphs.
- the systems and techniques allow for the creation of one or more shape graphs for an object-oriented program at compile-time. These graphs provide metadata which describes a template for region creation and object allocation within regions.
- the shape graphs are included within the compiled program, along with instrumentation which allows the program to analyze the graphs and use the graphs to place objects within regions and to create and access regions. This, combined with a reference-counting de-allocation scheme, creates a more efficient use of memory regions with less parameter-passing and fewer use limitations than exists in current techniques.
- the region-based memory management system may also be combined with a garbage collector to increase the efficiency of memory de-allocation.
- FIG. 1 illustrates one implementation of a region-based memory management system employing shape graphs.
- the illustrated embodiment shows a compiler 100 which accepts object-oriented program code 150 for compilation into a compiled program 160 .
- the object-oriented program code can comprise Java source code, C# source code, ML source code, or others.
- the illustrated embodiment depicts the compilation of a single piece of program code, in another implementation, code comprising many separate pieces of code or libraries may be used.
- the compiled program 160 comprising executable code 165 and one or more shape graphs 170 , can then be executed by an executing computer 130 containing memory 140 comprising multiple regions.
- the compiler 100 in addition to traditional compilation components (not shown), comprises two modules to facilitate region-based memory management in executing computer 130 .
- One of these illustrated modules is the shape graph generator 110 , which comprises software that analyzes the object-oriented code 150 to create at least one shape graph 170 which is included in the compiled program 160 in order to facilitate later execution in a region-based system.
- the other illustrated module of the compiler 100 is the memory management code generator 120 .
- this module comprises software which analyzes the object-oriented program code 150 and inserts additional instrumentation into the executable code 165 of the compiled program 160 to facilitate region-based memory management activities, such as region and object allocation, association between regions, and location of regions.
- the shape graph generator and memory management instrumentation generator do not comprise separate software modules but are instead incorporated into the compiler 100 .
- the memory management code generator 120 adds code to the object-oriented program code 150 directly; in another implementation, the generator 120 inserts machine or bytecode directly into the executable code 165 of the already-compiled program 160 before making it available for execution.
- FIG. 2 illustrates a block diagram showing an exemplary computer 130 utilizing region-based memory 140 .
- the memory comprises three regions 210 each containing various objects 230 .
- objects contained in a region-based memory-system may contain references to other objects, as illustrated by the thin arrows connecting the objects 230 .
- object C in region ⁇ in FIG. 2 contains both a reference to object D in region ⁇ and a reference to object E in region ⁇ .
- object A also contains a reference to object D and object B contains a references to object F.
- these references comprise fields contained in objects A, B, and C.
- references to objects may also be maintained within local method or function variables.
- the term “field” as used herein, will refer generally to any object reference, including global and local variables, not solely to fields described in object classes.
- FIG. 2 also shows associations between regions 210 , illustrated by the thick arrows 240 .
- these associations represent the existence of references between objects contained within the regions.
- these associations are not actually maintained as separate entities within the computer 130 , but rather are kept in one or more shape graphs, which are maintained along with regions to allow the computer 130 to locate objects and create region associations.
- a shape graph 250 is maintained along with region a which shows that region ⁇ has objects which are contained in the other two illustrated regions. While the illustrated example demonstrates maintaining one shape graph 250 in association with region ⁇ , in alternate implementations a plurality of shape graphs may be maintained. While in the illustrated example the region 250 is maintained along with region ⁇ , in another implementation shape graphs are maintained separately from the memory regions 210 . Alternatively, a global shape graph may be kept which describes associations between all possible regions.
- the shape graph 250 contains metadata which maintains associations between regions based on object references by containing nodes representing regions and directed edges between the nodes which demonstrate associations between regions.
- the shape graph edges represent reference names.
- the shape graph 250 could contain information that any object referenced by a field called “age” in an object in region ⁇ will be contained in region ⁇ by containing ⁇ and ⁇ nodes connected by an “age” edge.
- shape graphs may associate regions by different or additional information, such as object type, level of protection of the reference, or by utilizing unique field identifiers.
- shape graphs are maintained as data structures describing nodes and edges. In alternate implementations, different data structures may be used, as long as the structures comprise metadata which maintains associations between regions.
- regions are allocated and associated with each other based on information in the shape graph 170 during the execution of the program. This is performed by using shape graphs as a templates for runtime region creation and association. In one implementation, regions are created during execution when they are first used. In another, when one region is created, if that region is described in a reachable subset of the shape graph then all other regions represented in the subset are created as well.
- FIG. 2 also illustrates a runtime shape graph handler module 270 , running within the executing program 260 , which can analyze the shape graph 250 to determine the region associations, allocate objects properly, and provide for region allocation and de-allocation. For instance, if at a particular point in the execution of a program on computer 130 the object D was not yet created, the shape graph handler module 270 would be able to create the memory region ⁇ and allocate the object D within it at the time the object was to be created.
- the shape graph handler 270 comprises a discrete module within the executing program 260 .
- a separate runtime environment does not exist, and the functions of the shape graph handler are included in the compiled program 160 at compilation.
- the shape graph handler is incorporated into the runtime environment in which the executing program runs.
- FIG. 3 illustrates, in one embodiment, a process for creating a program using region-based memory management employing shape graphs.
- the process represented in FIG. 3 may be modified; blocks may be performed in a different order, may be combined, or may be broken into sub-blocks.
- the process starts at block 310 , where the program code 150 is analyzed to create one or more shape graphs 170 .
- the process of shape graph creation is described in more detail with respect to FIGS. 4, 5 , and 6 .
- the process of FIG. 3 continues to block 320 where instrumentation is added to the object-oriented program code 150 by the memory management code generator 120 to allow the computer 130 to utilize the shape graphs at runtime.
- executable code is generated from the modified object-oriented program code 150 .
- shape graph 170 created in the process of block 310 is included with the executable code 165 generated in the process of block 330 to create the completed compiled program 160 .
- FIG. 4 illustrates one example of the process of block 310 of FIG. 3 performed by the shape graph generator 110 for creating shape graphs.
- the process represented in FIG. 4 may be modified; blocks may be performed in a different order, may be combined, or may be broken into sub-blocks.
- the process of FIG. 4 is a modified version of the context sensitive points-to analysis for locating synchronizations by Erik Ruf in “Effective Synchronization Removal for Java,” (2000) (“Ruf”), which is hereby incorporated by reference.
- Alternate implementations may employ different shape graph creation processes which are context sensitive or context-insensitive.
- the process starts at block 410 , where the program is analyzed to compute a static call graph, which indicates, for every method, which methods are called by that method. Subsequent blocks are concerned with the creation and manipulation of alias sets, from which shape graph nodes and edges are created.
- An alias set as described in Ruf, is a data structure used to represent a set of object references, along with mappings from field names to other alias sets. In one implementation, the field names come from fields of the objects represented by the alias set when they are used in the program code 150 .
- alias sets support unification operations, detailed by Ruf, which combine existing alias sets. Unification operations are performed according to statements contained in the program code 150 .
- the process of FIG. 4 will utilize alias set creation and unification to result in alias sets which together represent object references in the program.
- the process of FIG. 4 will have created alias sets which together represent every object reference in the program.
- shape graphs are created. In different implementations the shape graph may be maintained in various data structures, as long as the directed graph nature of the shape graph is maintained.
- an alias set comprises only a field map and an indication of whether one of the object references the alias set refers to can be reached from a global variable.
- the alias set for a reference to an object which has fields “name” and “age” could comprise ⁇ name ⁇ 1 , age ⁇ 2 >, no>, where ⁇ 1 and ⁇ 2 are other alias sets representing the references made by the object's “name” and “age” fields, respectively, and the “no” indicates that the variable cannot be reached from a static global variable are other alias sets representing the references made by the object's “name” and “age” fields, respectively, and the “no” indicates that the variable cannot be reached from a global variable.
- the reachability information may be discarded before final creation of shape graph.
- an alias set is computed for each object reference in the object-oriented program code. Because alias sets as described by Ruf are initially created with empty field maps, the alias sets created for each field in block 420 will be created empty.
- the process continues to block 430 where the static call graph created in block 410 is divided into a set of strongly-connected components, which are to be analyzed individually. This process allows the shape graph generator module 110 to analyze the program code 150 in smaller segments and to ignore methods and fields which are not referenced within a strongly-connected component, increasing the efficiency of the analysis. In another implementation, the call graph is not divided into strongly-connected components. Additionally, at block 430 the strongly-connected components are placed in order. In the preferred implementation this is done in bottom-up topological order although in other implementations other orderings may be utilized.
- the first strongly-connected component is analyzed to create and unify alias sets based on statements in the program code 150 .
- This analysis process is described in greater detail below with respect to FIGS. 5 and 6 .
- the process continues to decision block 460 , where the shape graph generator 110 determines if there is an additional strongly-connected component. If so, the process continues to block 450 , where the next strongly-connected component is analyzed and the process is repeated. If not, the process continues to block 470 , where the alias sets, which have been modified and enriched by the analysis of blocks 440 and 450 are converted into shape graphs. In one implementation, information contained in the alias sets about global reachability is discarded before creation of shape graphs. The process then ends.
- FIG. 5 illustrates one example of the process of blocks 440 and 450 of FIG. 4 performed by the shape graph generator 110 of compiler 100 for analyzing the strongly-connected components (“SCCs”) of the program code 150 to create shape graphs.
- SCCs strongly-connected components
- the process represented in FIG. 5 may be modified; blocks may be performed in a different order, may be combined, or may be broken into sub-blocks.
- the process starts at block 505 , where an initial method context is created for each method in the strongly-connected component being analyzed.
- a method context is a tuple of the form ⁇ 0 , . . .
- each of the ⁇ i 's, r, and e are alias sets corresponding to the formal values received by the caller of the method, the return value, and the exception value for that method. In alternate implementations more than one exception value may be used, or none at all may be used.
- Method contexts are created in order to allow alias sets created in called methods to be systematically reflected by alias sets created for the context where the method is called, making a more complete and context-sensitive shape graph template analysis. Next, each method in the SCC is analyzed in turn.
- each parameter variable in the first analyzed method is associated with its corresponding alias set from the method context.
- the process then analyzes the first statement at block 515 to determine the process that is performed in the statement. As Ruf describes, if the statement modifies references variables, processes a value, or calls a method, alias sets may need to be unified.
- the shape graph template generator 110 determines whether the statement analyzed is a method call. If it is, the process continues to block 525 , where unification of alias sets is performed according to particular method call rules. The process of unifying alias sets over method calls is described in greater detail below with respect to the process of FIG. 6 .
- alias sets are unified according to alias set analysis rules.
- ⁇ 0 ⁇ 1 . ⁇
- ⁇ 0 and ⁇ 1 are local object references and f is a field name
- a unification will take place.
- the rule causes the alias set associated with ⁇ 0 and the alias set mapped to by ⁇ in the alias set for ⁇ 1 to be unified.
- the practical effect of this unification is to cause references to ⁇ 0 to lead to the same alias set as references from the ⁇ field of ⁇ 1 .
- objects that are referred to by the ⁇ 0 variable and by the ⁇ field of ⁇ 1 will be allocated in the same region.
- An example list of analysis rules can be found in Ruf.
- the process then continues to decision block 540 , where the shape graph generator determines whether other statements exist in the currently-analyzed method. If other statements do exist, the process continues to block 550 where the next statement in the method is analyzed. If there are no more statements in the method, the process continues to decision block 545 where the shape graph generator determines if other methods exist in the SCC. If so, the process continues to block 555 where parameter variables in the next method are associated with alias sets from that method's method context. If, however, there are no more methods in the SCC, the process of FIG. 5 ends.
- FIG. 6 illustrates one example of the process of block 525 of FIG. 5 performed by the shape graph generator 110 of compiler 100 for performing alias set unification or instantiation due to a method call.
- method calls which undergo the process represented in FIG. 6 include not only specially-defined class methods but also constructors and destructor methods.
- the process represented in FIG. 6 may be modified; blocks may be performed in a different order, may be combined, or may be broken into sub-blocks.
- the process begins at block 610 , where a site context is created for the method call.
- a site context takes the same ⁇ 0 , . . .
- ⁇ n >, r, e> form as a method context, but instead of representing values received from a caller or returned to a caller, the ⁇ i 's represent actual values transmitted to the callee, and r and e represent values returned by the callee.
- the shape graph generator 110 determines whether the method call is recursive. If the call is not recursive, the process continues to block 630 , where a new instance of the method context for the called method is created.
- the creation of a new method context creates a method context with alias sets that are isomorphic to the original ones.
- the isomorphic alias sets used in the new instance are newly-created instances of alias sets, unless the alias set being copied from is available from a global variable, in which case the original alias set is used in the new method context instance.
- the site context is unified with the new instance of the method context by unifying each alias set of the site context with its corresponding alias set in the new method context.
- the creation of a new instance of the method context allows a context-sensitive analysis. After this unification, the process then ends.
- the effects of the processes described by blocks 630 and 640 are achieved by an instantiation process using polymorphic type inference similar to the kind described in Steensgaard.
- the call site context is unified with the existing method context for the called method without creating a new method context. While in one implementation the different treatment of recursive method calls creates context insensitivity, it prevents the performance costs of having to iterate over the entire SCC until a fixed point is reached for the recursive call. After this unification, the process then ends. In an alternative implementation, the effects of the process described by block 650 are achieved by an instantiation process using polymorphic type inference similar to the kind described in Steensgaard.
- FIGS. 7 a and 7 b illustrate two examples of objects stored in regions according to a common shape graph.
- the shape graph is not shown as a separate entity, but is illustrated through the illustrated edges connecting regions.
- the two examples show differences in the type and number of objects located in the regions which depend on the execution of the program.
- the two possible executions of the example code are parameterized by argument length.
- An analysis of the code creates a shape graph which comprises a template for the creation of five memory regions, as FIGS. 7 a and 7 b illustrate.
- the first memory region, region 700 will always, after execution, contain a Table object referred to by the local field “table.”
- the second, region 710 will always contain a Pair object referred to by the “One” field of the Table of region 700 .
- Region 720 may contain different types of objects.
- the shape graph describes region 720 as containing a objects referred to by the “two” field of objects of region 700 .
- FIG. 7 a, and FIG. 7 b illustrate, in one execution of the code a Pair object is allocated in region 720 and in another execution of the code a Triple object is located in region 720 . This is done because Triple is a subclass of Pair and either the Pair of FIG. 7 a or the Triple of FIG. 7 b ends up referred to by the “two” field of the object in region 700 .
- FIGS. 7 a and 7 b illustrate, a region can contain objects of different classes.
- FIGS. 7 a and 7 b illustrate, a region can contain objects of different classes. FIGS.
- the “One” field is a public field and the “two” field is private, but because both refer to objects, both are included in the shape graph.
- the shape graph from which both FIGS. 7 a and 7 b are formed describes region 730 as containing objects referred to by the “left” field of the objects of region 720 and describes region 740 as containing objects referred to by the “right” field of objects in region 720 .
- Region 740 has different contents depending on the execution of the program.
- FIG. 7 a which illustrates the program execution where the length of the program arguments is greater than 1
- the “two” field refers to a Pair object, which has only “left” and “right” fields.
- FIG. 7 a which illustrates the program execution where the length of the program arguments is greater than 1
- the “two” field refers to a Pair object, which has only “left” and “right” fields.
- the “two” field refers to a Triple object, which contains not only the “left” and “right” fields of a Pair, but additionally contains a “middle” field.
- region 740 contains the two objects referred to by the “middle” and “right” fields.
- the shape graph describes the referents of both the “middle” and “right” fields as being in the same region rather than putting them in separate regions. In one implementation, this is a direct result of the use of alias sets as described by Ruf for shape graph creation.
- the reason for this in the example of FIGS. 7 a and 7 b is the existence of the “shared” reference in the main method. Under the two possible executions of the program, “shared” may be assigned to either the “right” field of a Pair object in region 720 or the “middle” field of a Triple object in region 720 . As a consequence of the assignment to the “right” field, objects referenced by the “shared” and “right” fields must be in the same region.
- FIG. 8 describes one implementation of the process performed in block 320 by the memory management code generator 120 for adding instrumentation to utilize shape graphs.
- the process represented in FIG. 3 may be modified; blocks may be performed in a different order, may be combined, or may be broken into sub-blocks.
- the instrumentation added by the processes of FIG. 8 in one implementation may be added as source code, such as method calls or inlined code, prior to compilation. Alternately, the instrumentation is added to code on which compilation has begun or is completed, such as in the form of bytecode or machine code. Additionally, the inclusion of some instrumentation may involve the manipulation or transformation of existing program code rather than only the addition of new code. While one implementation consolidates region and shape graph handling routines into the shape graph handler 270 of the executing program 260 , in other implementations the routines are generally incorporated into the code of the object-oriented program.
- the process beings at block 810 , where region-creating instrumentation is added.
- the instrumentation accepts a global shape graph and allocates a region based on an indication of which region from the shape graph is needed.
- only the section of the shape graph necessary to describe the region is given to the region-creating instrumentation.
- different implementations may create regions at different times during execution. In one implementation, all regions corresponding to a reachable subset of a shape graph are created at the same time. In another, regions are created as-needed by the program.
- Region-creation instrumentation may also, in one implementation, include instrumentation for the simultaneous creation of sets of regions which are strongly-connected in the shape graph. This is useful because, in one implementation, reference counters are used to keep track of which regions are still being used in during the execution of the program. If separate counters were kept for each region in a strongly-connected set a condition could develop during program execution where no references exist from any regions outside the set, yet because of the strongly-connected nature of the set, references could still exist inside. Thus, the reference counter for the regions might never reach zero, even though, relative to the rest of the program, the set is “dead” and cannot be referenced again by any object outside the set. This would keep the regions artificially alive, rather than being de-allocated and having their memory returned to the system.
- the shape graph is determined to describe a set of strongly-connected regions, instrumentation is added creating all the regions at once rather than separately.
- strongly-connected region sets are not created simultaneously, although in order to avoid the problem described above different instrumentation with regard to reference counters is useful.
- strongly connected components in the points-to graph are reduced to single nodes in the shape graph, which ensures that the shape graph is a directed acyclic graph.
- the process then continues to block 820 , where instrumentation is added allowing the program to count region references.
- this involves the creation of reference count variables for every region.
- the reference count variables for strongly-connected region sets are combined into a single count which counts only references from regions outside the strongly-connected set.
- the use of a single count for strongly-connected region sets prevents the problem mentioned above by ignoring references among regions inside the set.
- a single count may be kept for each subset of a strongly-connected set that is strongly-connected at each point during execution. When subsets of the larger strongly-connected set are linked by a reference during runtime, the counts can then be merged into a single count.
- the memory-management code generator 120 also adds instrumentation to increment and decrement reference counts.
- code is added before references are created to add to the reference count for the region for which the reference is created. Thus, every time a reference to an object is created, the reference count for that object's region is increased by one.
- the decrementing instrumentation a last-use analysis is performed on the code during compile-time by the memory-management code generator 120 to determine when the reference counts may be decremented.
- the instrumentation for decrementing reference counters additionally includes instrumentation to de-allocate regions and the objects contained in them. Additionally, in implementations described above, the addition of a reference to an object in a region from a strongly-connected set of regions may cause a single count for the entire set to increment, or may cause the merger of counts.
- object allocation instrumentation is added to the program.
- this instrumentation comprises an object allocation routine or method which takes an indication of a region and the type or size of an object and allocates the object within the region.
- this instrumentation comprises a routine or method which takes an indication of two existing regions and a field and populates the template provided by the shape graph by setting the edge corresponding to the field to the second region. This allows regions which are created lazily during the course of execution to be associated with already-existing regions when the program deems necessary. This can be done both for setting fields that refer to a new object and for setting fields in a new object to refer to objects in older regions.
- instrumentation is added which allows regions to be looked up. This can be done in multiple ways.
- a lookup routine or method is used which, given an indication of a region and a field used by an object in that region, finds the region containing the object referred-to by the given field.
- instrumentation is added to allow regions to be found in particular circumstances so that the field-setting routine described above with respect to block 840 may be used. In particular this is done for methods which take an input object and create a new object in a region reachable from the region containing the input object. The situation exists when the region containing the new object is only indirectly reachable from the region containing the input object.
- instrumentation is added which allows the program at runtime to identify the region containing the input object from the shape graph and traverse the shape graph to find the region of the new object while creating regions and region edges as necessary to establish a path or a plurality of paths from the region containing the input object to the region containing the new object.
- This instrumentation is not limited to this particular example; other situations may arise depending on the structure of the program code which require addition of instrumentation to traverse shape graphs and resolve references to regions which are not directly available.
- instrumentation is added so that regions can be found during method execution.
- this comprises a different lookup routine which, given an object will provide the region in which that object is contained.
- This implementation would allow the program to execute with a reduced set of shape graphs available, because regions could be directly found from the objects inside them.
- objects could be passed into methods with no additional parameters.
- this implementation may provide additional overhead because of the necessity of keeping many object-region associations in runtime memory.
- another implementation uses shape graphs to find the regions containing objects when those objects are passed into methods. This is done by adding instrumentation so that when an object is passed to a method, the region for the object is found using the shape graph, and passed to the method as well, allowing the region to be maintained properly during method execution. This is similar to the techniques described by Christiansen and Velschow, where many regions where passed with each object. But because in the techniques described herein at most one region is passed per object passed, the overhead implicit in Christiansen and Velschow's techniques is sharply reduced. Additionally, the passing of only the regions that contain a method's input objects prevents out-of-context region information from being incorporated into methods, allowing a programmer studying the method to examine it without reference to the method calling it or methods that it calls.
- regions containing argument objects area always passed along with the argument objects when doing a method call.
- regions are only passed to methods that analysis of the object-oriented code identified as potentially allocating objects in the argument objects' regions or in regions reachable from the argument objects' regions.
- regions are also passed to methods that analysis identifies as potentially deallocating one or more argument regions or one or more regions reachable from the argument objects' regions.
- a globally-maintained shape graph is considered for all method calls.
- sub-graphs of the global shape graph are associated with regions, as illustrated in FIG. 2 , so that only the necessary parts of the shape graph are consulted before a method call.
- the above described compiler 100 and executing computer 130 can be implemented on any of a variety of computing devices and environments, including computers of various form factors (personal, workstation, server, handheld, laptop, tablet, or other mobile), distributed computing networks, and Web services, as a few general examples.
- the compiler 100 and runtime environment 260 can be implemented in hardware circuitry, as well as in compiling or runtime software executing within a computer or other computing environment, such as shown in FIG. 9 .
- FIG. 9 illustrates a generalized example of a suitable computing environment 900 in which the described techniques can be implemented.
- the computing environment 900 is not intended to suggest any limitation as to scope of use or functionality of the invention, as the present invention may be implemented in diverse general-purpose or special-purpose computing environments.
- the computing environment 900 includes at least one processing unit 910 and memory 920 .
- the processing unit 910 executes computer-executable instructions and may be a real or a virtual processor. In a multi-processing system, multiple processing units execute computer-executable instructions to increase processing power.
- the memory 920 may be volatile memory (e.g., registers, cache, RAM), non-volatile memory (e.g., ROM, EEPROM, flash memory, etc.), or some combination of the two. In one implementation, the memory 920 stores software 980 implementing the compiler 100 or the runtime environment 260 .
- a computing environment may have additional features.
- the computing environment 900 includes storage 940 , one or more input devices 950 , one or more output devices 960 , and one or more communication connections 970 .
- An interconnection mechanism such as a bus, controller, or network interconnects the components of the computing environment 900 .
- operating system software provides an operating environment for other software executing in the computing environment 900 , and coordinates activities of the components of the computing environment 900 .
- the storage 940 may be removable or non-removable, and includes magnetic disks, magnetic tapes or cassettes, CD-ROMs, CD-RWs, DVDs, or any other medium which can be used to store information and which can be accessed within the computing environment 900 .
- the storage 940 stores instructions for the compiling and runtime software.
- the input device(s) 950 may be a touch input device such as a keyboard, mouse, pen, or trackball, a voice input device, a scanning device, or another device that provides input to the computing environment 900 .
- the input device(s) 950 may be a sound card or similar device that accepts audio input in analog or digital form, or a CD-ROM reader that provides audio samples to the computing environment.
- the output device(s) 960 may be a display, printer, speaker, CD-writer, or another device that provides output from the computing environment 900 .
- the communication connection(s) 970 enable communication over a communication medium to another computing entity.
- the communication medium conveys information such as computer-executable instructions, audio/video or other media information, or other data in a modulated data signal.
- a modulated data signal is a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal.
- communication media include wired or wireless techniques implemented with an electrical, optical, RF, infrared, acoustic, or other carrier.
- Computer-readable media are any available media that can be accessed within a computing environment.
- Computer-readable media include memory 920 , storage 940 , communication media, and combinations of any of the above.
- program modules include routines, programs, libraries, objects, classes, components, data structures, etc. that perform particular tasks or implement particular abstract data types.
- the functionality of the program modules may be combined or split between program modules as desired in various embodiments.
- Computer-executable instructions for program modules may be executed within a local or distributed computing environment.
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Devices For Executing Special Programs (AREA)
- Memory System (AREA)
- Information Retrieval, Db Structures And Fs Structures Therefor (AREA)
- Stored Programmes (AREA)
Abstract
An object-oriented program is modified to create objects within specified regions, allowing memory de-allocation to take place for entire regions at once. The contents and associations between the regions are described by one or more shape graphs, which are created from an analysis of the program code. The region association metadata stored by the shape graphs allows the region-based memory management to take place while requiring no more than one region to be passed to methods for each object passed.
Description
- This application is a continuation of U.S. application Ser. No. 10/783,124, filed Feb. 19, 2004, which claims the benefit of U.S. Provisional Application No. 60/505,205, filed Sep. 23, 2003.
- The invention relates generally to memory management for object-oriented programs.
- Various programming languages, such as ML, C#, and Java, are constructed in a way that allows allocation of memory to be controlled by programmers, but performs de-allocation automatically by runtime mechanisms. The majority of these runtime systems employ a garbage collector, which traces object references during execution in order to find objects which are no longer being used and de-allocate and reuse their memory. However, most garbage-collection systems suffer from defects. Chief among these are the introduction of a runtime execution cost and a lag time between the time an object's memory could be reclaimed and when the garbage collector manages to find the object.
- As an alternative, some systems employ a region-based memory management system. In a region-based scheme, regions are allocated in memory for objects to be placed into, and memory de-allocation happens for entire regions rather than at an object-level. Region-based memory management reduces overhead by reducing the number of memory allocations for which the runtime environment must keep track and consolidates memory de-allocation that a garbage collector might do in a piecemeal fashion. One example of region's utility is upon a call to a method which creates data structures for its execution, but which then deletes those data structures when it returns. In this situation, each region used by the method can be created when the method is called, and then deleted at the point the method is returned.
- Because the number of regions is usually smaller than the total number of objects allocated, a runtime system using region-based memory management need only keep record of the number of references to objects in a region. This allows the runtime system to de-allocate a region immediately when the reference count reaches zero. This avoids the constant searching involved in garbage collection and reduces lag time for memory reclamation.
- However, traditional region-based memory management systems introduce additional overhead costs of their own. Many existing systems determine at compile-time precisely when regions are allocated or de-allocated. In order to facilitate this statically-determined memory management, some of these systems force allocation and de-allocation of regions into a last-in, first-out (or stack) model. This type of system, however, reduces memory allocation efficiency by severely restricting the order in which regions can be de-allocated.
- In other existing systems, no allocation order is set, but additional overhead costs are created because the system requires that objects passed to methods be passed along with whatever regions contain objects that may be used in the method. One of these, RegJava, a Java language extension by Christiansen and Velschow, requires that when an object is passed to a method that every subclass of the object's class be known and annotated in the source code. This is done in order to ensure that at compilation every region possibly referenced by the passed object is available to be passed to the called method. Because subclasses frequently contain fields that their superclasses do not, this means that many regions can possibly be referenced by an object of a given superclass. This can result in large numbers of regions being passed as method parameters. This additional argument-passing can exceed the number of registers available, adding more overhead to the runtime stack, and thus reducing or eliminating the efficiencies provided by a region-based system. What is needed is a system that can dynamically discover regions which contain referenced objects.
- A region-based memory management system employing shape graphs is described. In one embodiment, a memory management system is described which partitions memory into a plurality of regions and uses one or more shape graphs so that given an object, the region containing the object can be found. In another embodiment, a method for compiling an object-oriented program for a region based memory-management system is described. The method receives source code, and then performs a points-to analysis on the code to create one or more shape graphs. The method adds instrumentation to utilize the shape graphs for object-creation and region-deletion before generating code which can be executed.
- In yet another embodiment, a computer-readable medium is described containing instructions which cause a computer to compile a program for a region-based memory-management system. The instructions cause the computer to receive source code, perform a points-to analysis on the code to create one or more shape graphs, and add instrumentation to utilize the shape graphs for object-creation and region-deletion before generating code which can be executed.
- Additional features and advantages of the invention will be made apparent from the following detailed description of embodiments that proceeds with reference to the accompanying drawings.
-
FIG. 1 is a block diagram illustrating one implementation of a region-based memory management system employing shape graphs. -
FIG. 2 is a block diagram of an exemplary computer executing a program in a region-based memory management environment using shape graphs. -
FIG. 3 is a flowchart illustrating a process for creating and executing an object-oriented program employing shape-graphs for region-based memory management. -
FIG. 4 is a flowchart illustrating an additional process for creating an object-oriented program employing shape-graphs for region-based memory management. -
FIG. 5 is a flowchart illustrating an additional process for creating an object-oriented program employing shape-graphs for region-based memory management. -
FIG. 6 is a flowchart illustrating an additional process for creating an object-oriented program employing shape-graphs for region-based memory management. -
FIGS. 7 a and 7 b are block diagrams illustrating exemplary storage of objects in memory regions based on a common shape graph. -
FIG. 8 is a flowchart illustrating a process for adding instrumentation to an object-oriented program employing shape-graphs for region-based memory management. -
FIG. 9 is a block diagram of a suitable computing environment for implementing the region-based memory management system ofFIG. 1 . - The following description is directed to techniques and systems for a region-based memory management system using shape graphs. The systems and techniques allow for the creation of one or more shape graphs for an object-oriented program at compile-time. These graphs provide metadata which describes a template for region creation and object allocation within regions. The shape graphs are included within the compiled program, along with instrumentation which allows the program to analyze the graphs and use the graphs to place objects within regions and to create and access regions. This, combined with a reference-counting de-allocation scheme, creates a more efficient use of memory regions with less parameter-passing and fewer use limitations than exists in current techniques. The region-based memory management system may also be combined with a garbage collector to increase the efficiency of memory de-allocation.
- 1. Illustrated Embodiment
-
FIG. 1 illustrates one implementation of a region-based memory management system employing shape graphs. The illustrated embodiment shows acompiler 100 which accepts object-oriented program code 150 for compilation into a compiledprogram 160. In alternate implementations, the object-oriented program code can comprise Java source code, C# source code, ML source code, or others. Additionally, while the illustrated embodiment depicts the compilation of a single piece of program code, in another implementation, code comprising many separate pieces of code or libraries may be used. The compiledprogram 160, comprisingexecutable code 165 and one ormore shape graphs 170, can then be executed by an executingcomputer 130 containingmemory 140 comprising multiple regions. - In the illustrated embodiment, the
compiler 100, in addition to traditional compilation components (not shown), comprises two modules to facilitate region-based memory management in executingcomputer 130. One of these illustrated modules is theshape graph generator 110, which comprises software that analyzes the object-oriented code 150 to create at least oneshape graph 170 which is included in the compiledprogram 160 in order to facilitate later execution in a region-based system. The other illustrated module of thecompiler 100 is the memorymanagement code generator 120. In one embodiment, this module comprises software which analyzes the object-orientedprogram code 150 and inserts additional instrumentation into theexecutable code 165 of the compiledprogram 160 to facilitate region-based memory management activities, such as region and object allocation, association between regions, and location of regions. In one implementation, the shape graph generator and memory management instrumentation generator do not comprise separate software modules but are instead incorporated into thecompiler 100. In one implementation, the memorymanagement code generator 120 adds code to the object-orientedprogram code 150 directly; in another implementation, thegenerator 120 inserts machine or bytecode directly into theexecutable code 165 of the already-compiledprogram 160 before making it available for execution. - 2. Example of Region-Based Memory Including a Shape Graph
-
FIG. 2 illustrates a block diagram showing anexemplary computer 130 utilizing region-basedmemory 140. In the illustrated embodiment, the memory comprises threeregions 210 each containingvarious objects 230. AsFIG. 2 illustrates, objects contained in a region-based memory-system may contain references to other objects, as illustrated by the thin arrows connecting theobjects 230. For example, object C in region α inFIG. 2 contains both a reference to object D in region β and a reference to object E in region ε. Additionally, object A also contains a reference to object D and object B contains a references to object F. In one implementation, these references comprise fields contained in objects A, B, and C. Alternatively, references to objects may also be maintained within local method or function variables. For the sake of simplicity, the term “field” as used herein, will refer generally to any object reference, including global and local variables, not solely to fields described in object classes. -
FIG. 2 also shows associations betweenregions 210, illustrated by thethick arrows 240. In the illustrated example, these associations represent the existence of references between objects contained within the regions. Thus, because objects in region α contain references to objects in region ε, the two regions share an association. In a preferred embodiment, these associations are not actually maintained as separate entities within thecomputer 130, but rather are kept in one or more shape graphs, which are maintained along with regions to allow thecomputer 130 to locate objects and create region associations. Thus, in the example, ashape graph 250 is maintained along with region a which shows that region α has objects which are contained in the other two illustrated regions. While the illustrated example demonstrates maintaining oneshape graph 250 in association with region α, in alternate implementations a plurality of shape graphs may be maintained. While in the illustrated example theregion 250 is maintained along with region α, in another implementation shape graphs are maintained separately from thememory regions 210. Alternatively, a global shape graph may be kept which describes associations between all possible regions. - The
shape graph 250 contains metadata which maintains associations between regions based on object references by containing nodes representing regions and directed edges between the nodes which demonstrate associations between regions. In one implementation, the shape graph edges represent reference names. As an example, theshape graph 250 could contain information that any object referenced by a field called “age” in an object in region α will be contained in region β by containing α and β nodes connected by an “age” edge. In alternate implementations, shape graphs may associate regions by different or additional information, such as object type, level of protection of the reference, or by utilizing unique field identifiers. In one implementation shape graphs are maintained as data structures describing nodes and edges. In alternate implementations, different data structures may be used, as long as the structures comprise metadata which maintains associations between regions. - In one embodiment regions are allocated and associated with each other based on information in the
shape graph 170 during the execution of the program. This is performed by using shape graphs as a templates for runtime region creation and association. In one implementation, regions are created during execution when they are first used. In another, when one region is created, if that region is described in a reachable subset of the shape graph then all other regions represented in the subset are created as well. -
FIG. 2 also illustrates a runtime shapegraph handler module 270, running within the executingprogram 260, which can analyze theshape graph 250 to determine the region associations, allocate objects properly, and provide for region allocation and de-allocation. For instance, if at a particular point in the execution of a program oncomputer 130 the object D was not yet created, the shapegraph handler module 270 would be able to create the memory region β and allocate the object D within it at the time the object was to be created. In the illustrated embodiment, theshape graph handler 270 comprises a discrete module within the executingprogram 260. In another implementation a separate runtime environment does not exist, and the functions of the shape graph handler are included in the compiledprogram 160 at compilation. In yet another implementation the shape graph handler is incorporated into the runtime environment in which the executing program runs. - 3. Creation of Shape Graphs
-
FIG. 3 illustrates, in one embodiment, a process for creating a program using region-based memory management employing shape graphs. In alternate implementations, the process represented inFIG. 3 may be modified; blocks may be performed in a different order, may be combined, or may be broken into sub-blocks. The process starts atblock 310, where theprogram code 150 is analyzed to create one ormore shape graphs 170. The process of shape graph creation is described in more detail with respect toFIGS. 4, 5 , and 6. The process ofFIG. 3 continues to block 320 where instrumentation is added to the object-orientedprogram code 150 by the memorymanagement code generator 120 to allow thecomputer 130 to utilize the shape graphs at runtime. Next, atblock 330, executable code is generated from the modified object-orientedprogram code 150. Finally, atblock 340, theshape graph 170 created in the process ofblock 310 is included with theexecutable code 165 generated in the process ofblock 330 to create the completed compiledprogram 160. -
FIG. 4 illustrates one example of the process ofblock 310 ofFIG. 3 performed by theshape graph generator 110 for creating shape graphs. In alternate implementations, the process represented inFIG. 4 may be modified; blocks may be performed in a different order, may be combined, or may be broken into sub-blocks. In one embodiment, the process ofFIG. 4 is a modified version of the context sensitive points-to analysis for locating synchronizations by Erik Ruf in “Effective Synchronization Removal for Java,” (2000) (“Ruf”), which is hereby incorporated by reference. Alternate implementations may employ different shape graph creation processes which are context sensitive or context-insensitive. While the process described below utilizes the term “method” it will be recognized that the process applies to programming languages which utilize other terminology, such as “function.” In an alternative embodiment a points-to analysis algorithm is used which is similar to the kind described in U.S. Pat. No. 6,014,518 to Steensgaard, “Terminating Polymorphic Type Inference Program Analysis,” (“Steensgaard”) which is hereby incorporated by reference. - The process starts at
block 410, where the program is analyzed to compute a static call graph, which indicates, for every method, which methods are called by that method. Subsequent blocks are concerned with the creation and manipulation of alias sets, from which shape graph nodes and edges are created. An alias set, as described in Ruf, is a data structure used to represent a set of object references, along with mappings from field names to other alias sets. In one implementation, the field names come from fields of the objects represented by the alias set when they are used in theprogram code 150. - Besides storing mappings from fields to other alias sets, alias sets support unification operations, detailed by Ruf, which combine existing alias sets. Unification operations are performed according to statements contained in the
program code 150. During analysis of an object-oriented program, the process ofFIG. 4 will utilize alias set creation and unification to result in alias sets which together represent object references in the program. After the analysis of an object-oriented program, the process ofFIG. 4 will have created alias sets which together represent every object reference in the program. By creating shape graph nodes from the alias set with connecting edges defined by the alias sets' mappings, shape graphs are created. In different implementations the shape graph may be maintained in various data structures, as long as the directed graph nature of the shape graph is maintained. - While Ruf describes one formal use of and makeup of alias sets in “Effective Synchronization Removal for Java,” the alias sets described in Ruf contain additional data which are not required for shape graph creation. Thus, in one implementation an alias set comprises only a field map and an indication of whether one of the object references the alias set refers to can be reached from a global variable. As an example, the alias set for a reference to an object which has fields “name” and “age” could comprise<<name→α1, age→α2>, no>, where α1 and α2 are other alias sets representing the references made by the object's “name” and “age” fields, respectively, and the “no” indicates that the variable cannot be reached from a static global variable are other alias sets representing the references made by the object's “name” and “age” fields, respectively, and the “no” indicates that the variable cannot be reached from a global variable. In one implementation, while global reachability information is kept for the purposes of creating shape graphs, it is not required for execution. Thus, in one implementation, the reachability information may be discarded before final creation of shape graph.
- Continuing to block 420, an alias set is computed for each object reference in the object-oriented program code. Because alias sets as described by Ruf are initially created with empty field maps, the alias sets created for each field in
block 420 will be created empty. The process continues to block 430 where the static call graph created inblock 410 is divided into a set of strongly-connected components, which are to be analyzed individually. This process allows the shapegraph generator module 110 to analyze theprogram code 150 in smaller segments and to ignore methods and fields which are not referenced within a strongly-connected component, increasing the efficiency of the analysis. In another implementation, the call graph is not divided into strongly-connected components. Additionally, atblock 430 the strongly-connected components are placed in order. In the preferred implementation this is done in bottom-up topological order although in other implementations other orderings may be utilized. - Next, at
block 440, the first strongly-connected component is analyzed to create and unify alias sets based on statements in theprogram code 150. This analysis process is described in greater detail below with respect toFIGS. 5 and 6 . After the first strongly-connected component is analyzed, the process continues to decision block 460, where theshape graph generator 110 determines if there is an additional strongly-connected component. If so, the process continues to block 450, where the next strongly-connected component is analyzed and the process is repeated. If not, the process continues to block 470, where the alias sets, which have been modified and enriched by the analysis ofblocks -
FIG. 5 illustrates one example of the process ofblocks FIG. 4 performed by theshape graph generator 110 ofcompiler 100 for analyzing the strongly-connected components (“SCCs”) of theprogram code 150 to create shape graphs. In alternate implementations, the process represented inFIG. 5 may be modified; blocks may be performed in a different order, may be combined, or may be broken into sub-blocks. The process starts atblock 505, where an initial method context is created for each method in the strongly-connected component being analyzed. As Ruf describes, a method context is a tuple of the form <<ƒ0, . . . , ƒn>, r, e> where each of the ƒi's, r, and e, are alias sets corresponding to the formal values received by the caller of the method, the return value, and the exception value for that method. In alternate implementations more than one exception value may be used, or none at all may be used. Method contexts are created in order to allow alias sets created in called methods to be systematically reflected by alias sets created for the context where the method is called, making a more complete and context-sensitive shape graph template analysis. Next, each method in the SCC is analyzed in turn. - The process continues to block 510 where each parameter variable in the first analyzed method is associated with its corresponding alias set from the method context. The process then analyzes the first statement at
block 515 to determine the process that is performed in the statement. As Ruf describes, if the statement modifies references variables, processes a value, or calls a method, alias sets may need to be unified. Next atdecision block 520 the shapegraph template generator 110 determines whether the statement analyzed is a method call. If it is, the process continues to block 525, where unification of alias sets is performed according to particular method call rules. The process of unifying alias sets over method calls is described in greater detail below with respect to the process ofFIG. 6 . - If, however, the statement is determined not to be a method call at
decision block 520, the process continues to block 530, where alias sets are unified according to alias set analysis rules. As an example, if the statement ν0=ν1.ƒ is encountered, where ν0 and ν1 are local object references and f is a field name, a unification will take place. In the given example, the rule causes the alias set associated with ν0 and the alias set mapped to by ƒ in the alias set for ν1 to be unified. The practical effect of this unification is to cause references to ν0 to lead to the same alias set as references from the ƒ field of ν1. Later, when the shape graph is used at execution, objects that are referred to by the ν0 variable and by the ƒ field of ν1 will be allocated in the same region. An example list of analysis rules can be found in Ruf. - Regardless of the statement type, the process then continues to decision block 540, where the shape graph generator determines whether other statements exist in the currently-analyzed method. If other statements do exist, the process continues to block 550 where the next statement in the method is analyzed. If there are no more statements in the method, the process continues to decision block 545 where the shape graph generator determines if other methods exist in the SCC. If so, the process continues to block 555 where parameter variables in the next method are associated with alias sets from that method's method context. If, however, there are no more methods in the SCC, the process of
FIG. 5 ends. -
FIG. 6 illustrates one example of the process ofblock 525 ofFIG. 5 performed by theshape graph generator 110 ofcompiler 100 for performing alias set unification or instantiation due to a method call. In one implementation, method calls which undergo the process represented inFIG. 6 include not only specially-defined class methods but also constructors and destructor methods. In alternate implementations, the process represented inFIG. 6 may be modified; blocks may be performed in a different order, may be combined, or may be broken into sub-blocks. The process begins atblock 610, where a site context is created for the method call. A site context takes the same <<ƒ0, . . . , ƒn>, r, e> form as a method context, but instead of representing values received from a caller or returned to a caller, the ƒi's represent actual values transmitted to the callee, and r and e represent values returned by the callee. - Next, at
decision block 620, theshape graph generator 110 determines whether the method call is recursive. If the call is not recursive, the process continues to block 630, where a new instance of the method context for the called method is created. In one implementation, the creation of a new method context creates a method context with alias sets that are isomorphic to the original ones. In this implementation, the isomorphic alias sets used in the new instance are newly-created instances of alias sets, unless the alias set being copied from is available from a global variable, in which case the original alias set is used in the new method context instance. Next, atblock 640, the site context is unified with the new instance of the method context by unifying each alias set of the site context with its corresponding alias set in the new method context. The creation of a new instance of the method context allows a context-sensitive analysis. After this unification, the process then ends. In an alternative implementation, the effects of the processes described byblocks - If, however, the method call is recursive, at
block 650 the call site context is unified with the existing method context for the called method without creating a new method context. While in one implementation the different treatment of recursive method calls creates context insensitivity, it prevents the performance costs of having to iterate over the entire SCC until a fixed point is reached for the recursive call. After this unification, the process then ends. In an alternative implementation, the effects of the process described byblock 650 are achieved by an instantiation process using polymorphic type inference similar to the kind described in Steensgaard. - 4. Example of Shape Graph Effect on Region Creation and Object Allocation
-
FIGS. 7 a and 7 b illustrate two examples of objects stored in regions according to a common shape graph. In the illustrated example, the shape graph is not shown as a separate entity, but is illustrated through the illustrated edges connecting regions. The shape graph from which both examples are derived is created from an analysis of the following code:public class Table { public Object One; private Pair two; public Pair Two { get { return this.two; } set { this.two = value; } } } public class Pair { public Object left; public Object right; public Pair( ) { } public Pair(Object a, Object b) { this.left = a; this.right = b; } } public class Triple: Pair { public Object middle; public Triple( ) { } public Triple(Object a, Object b, Object c): base(a, c) { this.middle = b; } } public class Test { public static int Main(String[] args) { Table table = new Table( ); table. Pair( ); Object shared = new Object( ); if (args.Length > 1) { table.Two = new Pair(new Object( ), shared); } else { table.Two = new Triple(new Object( ), shared, new Object( )); } } } - The two examples show differences in the type and number of objects located in the regions which depend on the execution of the program. The two possible executions of the example code are parameterized by argument length. An analysis of the code creates a shape graph which comprises a template for the creation of five memory regions, as
FIGS. 7 a and 7 b illustrate. The first memory region,region 700, will always, after execution, contain a Table object referred to by the local field “table.” The second,region 710, will always contain a Pair object referred to by the “One” field of the Table ofregion 700. -
Region 720, however, may contain different types of objects. The shape graph describesregion 720 as containing a objects referred to by the “two” field of objects ofregion 700. However, as the code,FIG. 7 a, andFIG. 7 b illustrate, in one execution of the code a Pair object is allocated inregion 720 and in another execution of the code a Triple object is located inregion 720. This is done because Triple is a subclass of Pair and either the Pair ofFIG. 7 a or the Triple ofFIG. 7 b ends up referred to by the “two” field of the object inregion 700. Thus, asFIGS. 7 a and 7 b illustrate, a region can contain objects of different classes.FIGS. 7 a and 7 b also demonstrate that, in one implementation, the analysis does not incorporate differences between public and private fields into the shape graph. The “One” field is a public field and the “two” field is private, but because both refer to objects, both are included in the shape graph. - As in
regions FIGS. 7 a and 7 b are formed describesregion 730 as containing objects referred to by the “left” field of the objects ofregion 720 and describesregion 740 as containing objects referred to by the “right” field of objects inregion 720.Region 740, however, has different contents depending on the execution of the program.FIG. 7 a, which illustrates the program execution where the length of the program arguments is greater than 1, the “two” field refers to a Pair object, which has only “left” and “right” fields. Thus, there is only a single object, referred to by “right,” in theregion 740. In contrast, inFIG. 7 b, the “two” field refers to a Triple object, which contains not only the “left” and “right” fields of a Pair, but additionally contains a “middle” field. And because the shape graph which provides a template forFIGS. 7 a and 7 b provides that objects referred to by either the “middle” and “right” fields should be contained in the same region, inFIG. 7 b,region 740 contains the two objects referred to by the “middle” and “right” fields. - In the illustrated examples, the shape graph describes the referents of both the “middle” and “right” fields as being in the same region rather than putting them in separate regions. In one implementation, this is a direct result of the use of alias sets as described by Ruf for shape graph creation. The reason for this in the example of
FIGS. 7 a and 7 b is the existence of the “shared” reference in the main method. Under the two possible executions of the program, “shared” may be assigned to either the “right” field of a Pair object inregion 720 or the “middle” field of a Triple object inregion 720. As a consequence of the assignment to the “right” field, objects referenced by the “shared” and “right” fields must be in the same region. Similarly, as a consequence of the assignment to the “middle” field, objects referenced by the “shared” and “middle” fields must be in the same region. However, in order to allow objects to be consistently available, the field “shared” references objects in one region only. Thus, for the example code above a shape graph is created which puts objects referred to by “middle” and “right” in the same region. - 5. Instrumentation for Utilizing Shape Graphs
-
FIG. 8 describes one implementation of the process performed inblock 320 by the memorymanagement code generator 120 for adding instrumentation to utilize shape graphs. In alternate implementations, the process represented inFIG. 3 may be modified; blocks may be performed in a different order, may be combined, or may be broken into sub-blocks. The instrumentation added by the processes ofFIG. 8 in one implementation may be added as source code, such as method calls or inlined code, prior to compilation. Alternately, the instrumentation is added to code on which compilation has begun or is completed, such as in the form of bytecode or machine code. Additionally, the inclusion of some instrumentation may involve the manipulation or transformation of existing program code rather than only the addition of new code. While one implementation consolidates region and shape graph handling routines into theshape graph handler 270 of the executingprogram 260, in other implementations the routines are generally incorporated into the code of the object-oriented program. - The process beings at
block 810, where region-creating instrumentation is added. In one implementation, the instrumentation accepts a global shape graph and allocates a region based on an indication of which region from the shape graph is needed. In another implementation, only the section of the shape graph necessary to describe the region is given to the region-creating instrumentation. Additionally, different implementations may create regions at different times during execution. In one implementation, all regions corresponding to a reachable subset of a shape graph are created at the same time. In another, regions are created as-needed by the program. - Region-creation instrumentation may also, in one implementation, include instrumentation for the simultaneous creation of sets of regions which are strongly-connected in the shape graph. This is useful because, in one implementation, reference counters are used to keep track of which regions are still being used in during the execution of the program. If separate counters were kept for each region in a strongly-connected set a condition could develop during program execution where no references exist from any regions outside the set, yet because of the strongly-connected nature of the set, references could still exist inside. Thus, the reference counter for the regions might never reach zero, even though, relative to the rest of the program, the set is “dead” and cannot be referenced again by any object outside the set. This would keep the regions artificially alive, rather than being de-allocated and having their memory returned to the system. Thus, in one implementation, if the shape graph is determined to describe a set of strongly-connected regions, instrumentation is added creating all the regions at once rather than separately. In another implementation, strongly-connected region sets are not created simultaneously, although in order to avoid the problem described above different instrumentation with regard to reference counters is useful. In another implementation, strongly connected components in the points-to graph are reduced to single nodes in the shape graph, which ensures that the shape graph is a directed acyclic graph.
- The process then continues to block 820, where instrumentation is added allowing the program to count region references. In one implementation, this involves the creation of reference count variables for every region. In another, the reference count variables for strongly-connected region sets are combined into a single count which counts only references from regions outside the strongly-connected set. The use of a single count for strongly-connected region sets prevents the problem mentioned above by ignoring references among regions inside the set. Alternatively, a single count may be kept for each subset of a strongly-connected set that is strongly-connected at each point during execution. When subsets of the larger strongly-connected set are linked by a reference during runtime, the counts can then be merged into a single count.
- In addition to the reference counts for regions, in
block 820 the memory-management code generator 120 also adds instrumentation to increment and decrement reference counts. In one implementation, code is added before references are created to add to the reference count for the region for which the reference is created. Thus, every time a reference to an object is created, the reference count for that object's region is increased by one. In one implementation of the decrementing instrumentation, a last-use analysis is performed on the code during compile-time by the memory-management code generator 120 to determine when the reference counts may be decremented. In another implementation the instrumentation for decrementing reference counters additionally includes instrumentation to de-allocate regions and the objects contained in them. Additionally, in implementations described above, the addition of a reference to an object in a region from a strongly-connected set of regions may cause a single count for the entire set to increment, or may cause the merger of counts. - In
block 830, object allocation instrumentation is added to the program. In one implementation, this instrumentation comprises an object allocation routine or method which takes an indication of a region and the type or size of an object and allocates the object within the region. - In
block 840 field-setting instrumentation is added. In one implementation, this instrumentation comprises a routine or method which takes an indication of two existing regions and a field and populates the template provided by the shape graph by setting the edge corresponding to the field to the second region. This allows regions which are created lazily during the course of execution to be associated with already-existing regions when the program deems necessary. This can be done both for setting fields that refer to a new object and for setting fields in a new object to refer to objects in older regions. - In
block 850 instrumentation is added which allows regions to be looked up. This can be done in multiple ways. In one implementation, a lookup routine or method is used which, given an indication of a region and a field used by an object in that region, finds the region containing the object referred-to by the given field. - In another implementation, additional instrumentation is added to allow regions to be found in particular circumstances so that the field-setting routine described above with respect to block 840 may be used. In particular this is done for methods which take an input object and create a new object in a region reachable from the region containing the input object. The situation exists when the region containing the new object is only indirectly reachable from the region containing the input object. Thus, instrumentation is added which allows the program at runtime to identify the region containing the input object from the shape graph and traverse the shape graph to find the region of the new object while creating regions and region edges as necessary to establish a path or a plurality of paths from the region containing the input object to the region containing the new object. This instrumentation is not limited to this particular example; other situations may arise depending on the structure of the program code which require addition of instrumentation to traverse shape graphs and resolve references to regions which are not directly available.
- In another implementation of
block 850 instrumentation is added so that regions can be found during method execution. In one implementation this comprises a different lookup routine which, given an object will provide the region in which that object is contained. This implementation would allow the program to execute with a reduced set of shape graphs available, because regions could be directly found from the objects inside them. Thus, objects could be passed into methods with no additional parameters. However, this implementation may provide additional overhead because of the necessity of keeping many object-region associations in runtime memory. - Alternately, instead of keeping track of every object-region associations, another implementation uses shape graphs to find the regions containing objects when those objects are passed into methods. This is done by adding instrumentation so that when an object is passed to a method, the region for the object is found using the shape graph, and passed to the method as well, allowing the region to be maintained properly during method execution. This is similar to the techniques described by Christiansen and Velschow, where many regions where passed with each object. But because in the techniques described herein at most one region is passed per object passed, the overhead implicit in Christiansen and Velschow's techniques is sharply reduced. Additionally, the passing of only the regions that contain a method's input objects prevents out-of-context region information from being incorporated into methods, allowing a programmer studying the method to examine it without reference to the method calling it or methods that it calls.
- In one implementation, regions containing argument objects area always passed along with the argument objects when doing a method call. In another implementation, regions are only passed to methods that analysis of the object-oriented code identified as potentially allocating objects in the argument objects' regions or in regions reachable from the argument objects' regions. In another implementation, regions are also passed to methods that analysis identifies as potentially deallocating one or more argument regions or one or more regions reachable from the argument objects' regions.
- In one implementation, a globally-maintained shape graph is considered for all method calls. In another, sub-graphs of the global shape graph are associated with regions, as illustrated in
FIG. 2 , so that only the necessary parts of the shape graph are consulted before a method call. - 5. Computing Environment
- The above described
compiler 100 and executing computer 130 (FIG. 1 ) can be implemented on any of a variety of computing devices and environments, including computers of various form factors (personal, workstation, server, handheld, laptop, tablet, or other mobile), distributed computing networks, and Web services, as a few general examples. Thecompiler 100 andruntime environment 260 can be implemented in hardware circuitry, as well as in compiling or runtime software executing within a computer or other computing environment, such as shown inFIG. 9 . -
FIG. 9 illustrates a generalized example of asuitable computing environment 900 in which the described techniques can be implemented. Thecomputing environment 900 is not intended to suggest any limitation as to scope of use or functionality of the invention, as the present invention may be implemented in diverse general-purpose or special-purpose computing environments. - With reference to
FIG. 9 , thecomputing environment 900 includes at least oneprocessing unit 910 andmemory 920. InFIG. 9 , this mostbasic configuration 930 is included within a dashed line. Theprocessing unit 910 executes computer-executable instructions and may be a real or a virtual processor. In a multi-processing system, multiple processing units execute computer-executable instructions to increase processing power. Thememory 920 may be volatile memory (e.g., registers, cache, RAM), non-volatile memory (e.g., ROM, EEPROM, flash memory, etc.), or some combination of the two. In one implementation, thememory 920stores software 980 implementing thecompiler 100 or theruntime environment 260. - A computing environment may have additional features. For example, the
computing environment 900 includesstorage 940, one ormore input devices 950, one ormore output devices 960, and one ormore communication connections 970. An interconnection mechanism (not shown) such as a bus, controller, or network interconnects the components of thecomputing environment 900. Typically, operating system software (not shown) provides an operating environment for other software executing in thecomputing environment 900, and coordinates activities of the components of thecomputing environment 900. - The
storage 940 may be removable or non-removable, and includes magnetic disks, magnetic tapes or cassettes, CD-ROMs, CD-RWs, DVDs, or any other medium which can be used to store information and which can be accessed within thecomputing environment 900. In one implementation, thestorage 940 stores instructions for the compiling and runtime software. - The input device(s) 950 (e.g., for devices operating as a control point in the device connectivity architecture 100) may be a touch input device such as a keyboard, mouse, pen, or trackball, a voice input device, a scanning device, or another device that provides input to the
computing environment 900. For audio, the input device(s) 950 may be a sound card or similar device that accepts audio input in analog or digital form, or a CD-ROM reader that provides audio samples to the computing environment. The output device(s) 960 may be a display, printer, speaker, CD-writer, or another device that provides output from thecomputing environment 900. - The communication connection(s) 970 enable communication over a communication medium to another computing entity. The communication medium conveys information such as computer-executable instructions, audio/video or other media information, or other data in a modulated data signal. A modulated data signal is a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media include wired or wireless techniques implemented with an electrical, optical, RF, infrared, acoustic, or other carrier.
- The region-based memory management techniques herein can be described in the general context of computer-readable media. Computer-readable media are any available media that can be accessed within a computing environment. By way of example, and not limitation, with the
computing environment 900, computer-readable media includememory 920,storage 940, communication media, and combinations of any of the above. - The techniques herein can be described in the general context of computer-executable instructions, such as those included in program modules, being executed in a computing environment on a target real or virtual processor. Generally, program modules include routines, programs, libraries, objects, classes, components, data structures, etc. that perform particular tasks or implement particular abstract data types. The functionality of the program modules may be combined or split between program modules as desired in various embodiments. Computer-executable instructions for program modules may be executed within a local or distributed computing environment.
- For the sake of presentation, the detailed description uses terms like “determine,” “create,” and “analyze” to describe computer operations in a computing environment. These terms are high-level abstractions for operations performed by a computer, and should not be confused with acts performed by a human being. The actual computer operations corresponding to these terms vary depending on implementation.
- In view of the many possible embodiments to which the principles of our invention may be applied, we claim as our invention all such embodiments as may come within the scope and spirit of the following claims and equivalents thereto.
Claims (15)
1. A computer system for managing memory for an executing object-oriented program, the program comprising a plurality of objects and the system comprising:
a processing unit;
a computer-readable memory partitioned into a plurality of regions, each region containing at least one object in the memory; and
at least one data structure in the computer-readable memory representing at least one region shape graph describing relations between the regions, the relations based at least in part on references between objects contained in the regions;
wherein the processing unit is configured to execute software such that given a reference to a target object, the processing unit can identify a partitioned region of memory containing the target object by using information from the at least one region shape graph.
2. The system of claim 1 , wherein:
the at least one region shape graph comprises a plurality of nodes connected by edges;
each node represents a region in memory; and
each edge represents one or more references between the objects of one region and the objects of another region.
3. The system of claim 2 , wherein using information from the shape graph comprises:
identifying a first region in memory which contains an object which has a reference to the target object;
identifying a first node in the at least one shape graph which represents the identified first region;
identifying the edge leading from the identified first node which represents the reference to the target object;
identifying a second node which the identified edge leads to; and
identifying the region which is represented by the second node as the region containing the target object.
4. The system of claim 1 , wherein each region has a shape-graph associated with it and each shape-graph is stored along with the regions it is associated with.
5. The system of claim 1 , further comprising a memory-management software module configured to:
determine, for a region, when no objects contained in the region are referenced by any fields outside of the region; and
delete the region upon making such a determination.
6. The system of claim 5 , wherein configured to determine when no objects are referenced comprises configured to:
keep a count for each region of the number of references made to objects contained in the region; and
upon determining that the count for a region is zero, determine that no objects contained in the region are referenced by any other fields.
7. The system of claim 5 , further comprising a garbage collector.
8. The system of claim 1 , where at least one shape graph represents fewer than the total number of regions.
9. The system of claim 1 , where no more than one region parameter is passed to a method for every object passed to a method.
10. A method for compiling an object-oriented program, the program configured to be executed in a system employing region-based memory-management and the method comprising:
receiving source code for an object-oriented program;
performing a points-to analysis on the source code to develop at least one data structure containing region association metadata for the program;
adding instrumentation to the program, the instrumentation configured:
to cause objects to be created in regions based on information in the data structure; and
to cause deletion of all objects in a region when a determination is made that no objects in the region are referenced by any fields outside the region; and
compiling the program to produce executable code for the program; and
storing the executable code in a computer-readable storage medium.
11. The method of claim 10 , wherein the data structure containing region association metadata comprises a shape graph.
12. A computer-readable medium containing instructions, which, when executed, cause a computer to compile an object-oriented program to be executed in a system employing region-based memory management by performing the following process:
receiving source code for an object-oriented program;
performing a points-to analysis on the source code to develop at least one shape-graph template for the program;
adding instrumentation to the program, the instrumentation configured:
to cause objects to be created in regions based on the shape-graph template; and
to cause deletion of all objects in a region when a determination is made that no objects in the region are referenced by any objects outside the region; and
compiling the program.
13. The computer-readable medium of claim 12 , wherein the added instrumentation at least in part comprises:
region-creation code which creates a region given a shape-graph;
object-allocation code which given a region and object information, allocates an object within certain region; and
region-lookup code which, given a region and an identifier of a field, identifies the region referenced by that field.
14. The method of claim 13 , wherein the added instrumentation further comprises field-setting code which given two regions and a reference to a field from an object in one region which references an object in the other region, sets the shape graph to connect the nodes corresponding to the two regions through an edge corresponding to the field.
15. The method of claim 13 , wherein employing region-based memory management comprises at least in part:
keeping a count for each region or set of regions of the number of references made to the objects contained in that region or set; and
upon determining that the count for a region or set of regions is zero, deleting the region or set; and
wherein the added instrumentation further comprises:
incrementing code which, given a region or set of regions, increases the count kept for that region or set; and
decrementing code which, given a region or set of regions, decreases the count kept for that region or set.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/843,532 US20080010327A1 (en) | 2003-09-23 | 2007-08-22 | Region-based memory management for object-oriented programs |
Applications Claiming Priority (3)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US50520503P | 2003-09-23 | 2003-09-23 | |
US10/783,124 US7263532B2 (en) | 2003-09-23 | 2004-02-19 | Region-based memory management for object-oriented programs |
US11/843,532 US20080010327A1 (en) | 2003-09-23 | 2007-08-22 | Region-based memory management for object-oriented programs |
Related Parent Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/783,124 Continuation US7263532B2 (en) | 2003-09-23 | 2004-02-19 | Region-based memory management for object-oriented programs |
Publications (1)
Publication Number | Publication Date |
---|---|
US20080010327A1 true US20080010327A1 (en) | 2008-01-10 |
Family
ID=34198314
Family Applications (2)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/783,124 Expired - Fee Related US7263532B2 (en) | 2003-09-23 | 2004-02-19 | Region-based memory management for object-oriented programs |
US11/843,532 Abandoned US20080010327A1 (en) | 2003-09-23 | 2007-08-22 | Region-based memory management for object-oriented programs |
Family Applications Before (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US10/783,124 Expired - Fee Related US7263532B2 (en) | 2003-09-23 | 2004-02-19 | Region-based memory management for object-oriented programs |
Country Status (5)
Country | Link |
---|---|
US (2) | US7263532B2 (en) |
EP (1) | EP1519273B1 (en) |
JP (1) | JP4896384B2 (en) |
KR (1) | KR20050030139A (en) |
CN (1) | CN100474251C (en) |
Cited By (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070006223A1 (en) * | 2005-04-18 | 2007-01-04 | Research In Motion Limited | System and method for visual design of resource management references |
US20090259701A1 (en) * | 2008-04-14 | 2009-10-15 | Wideman Roderick B | Methods and systems for space management in data de-duplication |
US20100192130A1 (en) * | 2009-01-29 | 2010-07-29 | Microsoft Corporation | Automated verification of a type-safe operating system |
US20100191928A1 (en) * | 2009-01-29 | 2010-07-29 | Microsoft Corporation | Automatic region-based verification of garbage collectors |
US20120254838A1 (en) * | 2011-03-29 | 2012-10-04 | International Business Machines Company | Method and apparatus for tracing memory accesses |
US8549490B2 (en) | 2009-09-29 | 2013-10-01 | International Business Machines Corporation | Static code analysis for packaged application customization |
Families Citing this family (26)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JP5689361B2 (en) | 2011-05-20 | 2015-03-25 | インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation | Method, program, and system for converting a part of graph data into a data structure that is an image of a homomorphic map |
US20050283771A1 (en) * | 2004-06-22 | 2005-12-22 | Nokia Corporation | System and method for decreasing the memory footprint of applications with automatic memory management systems |
US8204931B2 (en) | 2004-12-28 | 2012-06-19 | Sap Ag | Session management within a multi-tiered enterprise network |
US8589562B2 (en) | 2005-04-29 | 2013-11-19 | Sap Ag | Flexible failover configuration |
CN100461176C (en) * | 2006-01-26 | 2009-02-11 | 无锡永中科技有限公司 | Object memory store based object reference method |
US20080163063A1 (en) * | 2006-12-29 | 2008-07-03 | Sap Ag | Graphical user interface system and method for presenting information related to session and cache objects |
US8640086B2 (en) * | 2006-12-29 | 2014-01-28 | Sap Ag | Graphical user interface system and method for presenting objects |
US9311082B2 (en) * | 2006-12-29 | 2016-04-12 | Sap Se | System and method for processing graph objects |
US8332939B2 (en) * | 2007-02-21 | 2012-12-11 | International Business Machines Corporation | System and method for the automatic identification of subject-executed code and subject-granted access rights |
US8230477B2 (en) * | 2007-02-21 | 2012-07-24 | International Business Machines Corporation | System and method for the automatic evaluation of existing security policies and automatic creation of new security policies |
US20080307174A1 (en) * | 2007-06-08 | 2008-12-11 | Apple Inc. | Dual Use Memory Management Library |
JP5403362B2 (en) * | 2007-08-02 | 2014-01-29 | 日本電気株式会社 | PATTERN INSPECTION SYSTEM, PATTERN INSPECTION DEVICE, METHOD, AND PATTERN INSPECTION PROGRAM |
JP5185242B2 (en) * | 2009-12-04 | 2013-04-17 | 株式会社東芝 | Compilation device |
US8239404B2 (en) * | 2010-06-10 | 2012-08-07 | Microsoft Corporation | Identifying entries and exits of strongly connected components |
JP5745932B2 (en) | 2011-05-20 | 2015-07-08 | インターナショナル・ビジネス・マシーンズ・コーポレーションInternational Business Machines Corporation | Method, program, and system for reflecting operation on object which is image of mapping in graph data |
US8966635B2 (en) * | 2012-02-24 | 2015-02-24 | Hewlett-Packard Development Company, L.P. | Software module object analysis |
US10754766B2 (en) | 2014-03-21 | 2020-08-25 | Red Hat Israel, Ltd. | Indirect resource management |
US9405659B2 (en) | 2014-06-27 | 2016-08-02 | Vmware, Inc. | Measuring the logging quality of a computer program |
US9292281B2 (en) * | 2014-06-27 | 2016-03-22 | Vmware, Inc. | Identifying code that exhibits ideal logging behavior |
US9552274B2 (en) * | 2014-06-27 | 2017-01-24 | Vmware, Inc. | Enhancements to logging of a computer program |
AU2015289441B2 (en) * | 2014-07-18 | 2019-06-27 | Ab Initio Technology Llc. | Managing parameter sets |
EP3304358A1 (en) * | 2015-06-05 | 2018-04-11 | Hexagon Technology Center GmbH | Method and apparatus for performing a geometric transformation on objects in an object-oriented environment using a multiple-transaction technique |
US9880743B1 (en) * | 2016-03-31 | 2018-01-30 | EMC IP Holding Company LLC | Tracking compressed fragments for efficient free space management |
FR3070775B1 (en) * | 2017-09-04 | 2019-08-23 | Vsora | DYNAMIC ALLOCATION USING MULTIPLE BATTERIES |
CN108459552B (en) * | 2018-01-31 | 2021-07-23 | 南京拓控信息科技股份有限公司 | Intelligent object-oriented programmable automatic control method |
US11416392B2 (en) * | 2019-06-20 | 2022-08-16 | Microsoft Technology Licensing, Llc | Arena-based memory management |
Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US30575A (en) * | 1860-11-06 | Improvement in apparatus for trying oils | ||
US126560A (en) * | 1872-05-07 | Improvement in churns | ||
US155764A (en) * | 1874-10-06 | Improvement in lifting-jacks | ||
US4989132A (en) * | 1988-10-24 | 1991-01-29 | Eastman Kodak Company | Object-oriented, logic, and database programming tool with garbage collection |
US5687368A (en) * | 1994-07-22 | 1997-11-11 | Iowa State University Research Foundation, Inc. | CPU-controlled garbage-collecting memory module |
US6006197A (en) * | 1998-04-20 | 1999-12-21 | Straightup Software, Inc. | System and method for assessing effectiveness of internet marketing campaign |
US6009410A (en) * | 1997-10-16 | 1999-12-28 | At&T Corporation | Method and system for presenting customized advertising to a user on the world wide web |
US6249793B1 (en) * | 1999-06-10 | 2001-06-19 | Sun Microsystems, Inc. | Mostly concurrent compaction in a garbage collection system |
US6286001B1 (en) * | 1999-02-24 | 2001-09-04 | Doodlebug Online, Inc. | System and method for authorizing access to data on content servers in a distributed network |
US6324549B1 (en) * | 1998-03-04 | 2001-11-27 | Nec Corporation | Distributed system and memory management device, method, and storage medium |
US6839895B1 (en) * | 1997-12-09 | 2005-01-04 | International Business Machines Corporation | Method of, system for, and computer program product for providing efficient utilization of memory hierarchy through code restructuring |
US6865657B1 (en) * | 2000-06-02 | 2005-03-08 | Sun Microsystems, Inc. | Garbage collector for a virtual heap |
US6941321B2 (en) * | 1999-01-26 | 2005-09-06 | Xerox Corporation | System and method for identifying similarities among objects in a collection |
US20050234985A1 (en) * | 2004-04-09 | 2005-10-20 | Nexjenn Media, Inc. | System, method and computer program product for extracting metadata faster than real-time |
US6964037B1 (en) * | 1999-09-19 | 2005-11-08 | Kestrel Institute | Method and apparatus for determining colimits of hereditary diagrams |
Family Cites Families (8)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
JPH0728691A (en) * | 1993-07-09 | 1995-01-31 | Nec Corp | Garbage collection efficiency increasing method |
EP1068572A2 (en) * | 1999-01-06 | 2001-01-17 | Koninklijke Philips Electronics N.V. | Arrangement for executing program code with reduced memory requirements |
US6434576B1 (en) * | 1999-08-19 | 2002-08-13 | Sun Microsystems, Inc. | Popular-object handling in a train-algorithm-based garbage collector |
US6594678B1 (en) * | 2000-01-05 | 2003-07-15 | Sun Microsystems, Inc. | Methods and apparatus for improving locality of reference through memory management |
GB0007493D0 (en) * | 2000-03-28 | 2000-05-17 | Tao Group Ltd | Garbage collection |
JP2002278828A (en) * | 2001-03-21 | 2002-09-27 | Sony Corp | Garbage collection performing method, computer program, program storage medium and information processor |
JP4041347B2 (en) * | 2001-05-29 | 2008-01-30 | 松下電器産業株式会社 | Garbage collection apparatus and garbage collection method |
US7036120B2 (en) * | 2001-07-31 | 2006-04-25 | Sun Microsystems, Inc. | Two tier clusters for representation of objects in Java programming environments |
-
2004
- 2004-02-19 US US10/783,124 patent/US7263532B2/en not_active Expired - Fee Related
- 2004-09-22 EP EP04022556.7A patent/EP1519273B1/en not_active Expired - Lifetime
- 2004-09-22 JP JP2004275876A patent/JP4896384B2/en not_active Expired - Fee Related
- 2004-09-23 KR KR1020040076272A patent/KR20050030139A/en not_active Application Discontinuation
- 2004-09-23 CN CNB2004101023346A patent/CN100474251C/en not_active Expired - Fee Related
-
2007
- 2007-08-22 US US11/843,532 patent/US20080010327A1/en not_active Abandoned
Patent Citations (15)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US30575A (en) * | 1860-11-06 | Improvement in apparatus for trying oils | ||
US126560A (en) * | 1872-05-07 | Improvement in churns | ||
US155764A (en) * | 1874-10-06 | Improvement in lifting-jacks | ||
US4989132A (en) * | 1988-10-24 | 1991-01-29 | Eastman Kodak Company | Object-oriented, logic, and database programming tool with garbage collection |
US5687368A (en) * | 1994-07-22 | 1997-11-11 | Iowa State University Research Foundation, Inc. | CPU-controlled garbage-collecting memory module |
US6009410A (en) * | 1997-10-16 | 1999-12-28 | At&T Corporation | Method and system for presenting customized advertising to a user on the world wide web |
US6839895B1 (en) * | 1997-12-09 | 2005-01-04 | International Business Machines Corporation | Method of, system for, and computer program product for providing efficient utilization of memory hierarchy through code restructuring |
US6324549B1 (en) * | 1998-03-04 | 2001-11-27 | Nec Corporation | Distributed system and memory management device, method, and storage medium |
US6006197A (en) * | 1998-04-20 | 1999-12-21 | Straightup Software, Inc. | System and method for assessing effectiveness of internet marketing campaign |
US6941321B2 (en) * | 1999-01-26 | 2005-09-06 | Xerox Corporation | System and method for identifying similarities among objects in a collection |
US6286001B1 (en) * | 1999-02-24 | 2001-09-04 | Doodlebug Online, Inc. | System and method for authorizing access to data on content servers in a distributed network |
US6249793B1 (en) * | 1999-06-10 | 2001-06-19 | Sun Microsystems, Inc. | Mostly concurrent compaction in a garbage collection system |
US6964037B1 (en) * | 1999-09-19 | 2005-11-08 | Kestrel Institute | Method and apparatus for determining colimits of hereditary diagrams |
US6865657B1 (en) * | 2000-06-02 | 2005-03-08 | Sun Microsystems, Inc. | Garbage collector for a virtual heap |
US20050234985A1 (en) * | 2004-04-09 | 2005-10-20 | Nexjenn Media, Inc. | System, method and computer program product for extracting metadata faster than real-time |
Cited By (12)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20070006223A1 (en) * | 2005-04-18 | 2007-01-04 | Research In Motion Limited | System and method for visual design of resource management references |
US20090259701A1 (en) * | 2008-04-14 | 2009-10-15 | Wideman Roderick B | Methods and systems for space management in data de-duplication |
WO2009129161A2 (en) * | 2008-04-14 | 2009-10-22 | Quantum Corporation | Methods and systems for space management in data de-duplication |
WO2009129161A3 (en) * | 2008-04-14 | 2010-01-07 | Quantum Corporation | Methods and systems for space management in data de-duplication |
US8650228B2 (en) | 2008-04-14 | 2014-02-11 | Roderick B. Wideman | Methods and systems for space management in data de-duplication |
US20100192130A1 (en) * | 2009-01-29 | 2010-07-29 | Microsoft Corporation | Automated verification of a type-safe operating system |
US20100191928A1 (en) * | 2009-01-29 | 2010-07-29 | Microsoft Corporation | Automatic region-based verification of garbage collectors |
US8341602B2 (en) | 2009-01-29 | 2012-12-25 | Microsoft Corporation | Automated verification of a type-safe operating system |
US8776032B2 (en) | 2009-01-29 | 2014-07-08 | Microsoft Corporation | Automatic region-based verification of garbage collectors |
US8549490B2 (en) | 2009-09-29 | 2013-10-01 | International Business Machines Corporation | Static code analysis for packaged application customization |
US20120254838A1 (en) * | 2011-03-29 | 2012-10-04 | International Business Machines Company | Method and apparatus for tracing memory accesses |
US9817744B2 (en) * | 2011-03-29 | 2017-11-14 | International Business Machines Corporation | Method and apparatus for tracing memory accesses |
Also Published As
Publication number | Publication date |
---|---|
JP2005100402A (en) | 2005-04-14 |
CN1661559A (en) | 2005-08-31 |
US7263532B2 (en) | 2007-08-28 |
EP1519273A3 (en) | 2009-01-07 |
US20050065973A1 (en) | 2005-03-24 |
KR20050030139A (en) | 2005-03-29 |
CN100474251C (en) | 2009-04-01 |
EP1519273A2 (en) | 2005-03-30 |
JP4896384B2 (en) | 2012-03-14 |
EP1519273B1 (en) | 2016-12-28 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7263532B2 (en) | Region-based memory management for object-oriented programs | |
US6598141B1 (en) | Manipulating interior pointers on a stack during garbage collection | |
Choi et al. | Escape analysis for Java | |
US6381738B1 (en) | Method for optimizing creation and destruction of objects in computer programs | |
US7565386B2 (en) | Reference-counting subsumption analysis | |
US6505344B1 (en) | Object oriented apparatus and method for allocating objects on an invocation stack | |
JP3110040B2 (en) | Method and apparatus for compiling a computer program with register allocation between procedures | |
Agesen et al. | Garbage collection and local variable type-precision and liveness in Java virtual machines | |
US5535394A (en) | Methods for distinguishing dynamically allocated storage along different call paths and for providing a compact representation of alias analysis | |
US7058943B2 (en) | Object oriented apparatus and method for allocating objects on an invocation stack in a partial compilation environment | |
US7693919B2 (en) | Eager reference-counting garbage collection | |
Gheorghioiu et al. | Interprocedural compatibility analysis for static object preallocation | |
Hosking et al. | Towards compile-time optimisations for persistence | |
US20090094301A1 (en) | Applications of overlooking root information for improving nondeferred reference-counting garbage collection | |
Chong et al. | Static analysis of accessed regions in recursive data structures | |
Jones et al. | A fast analysis for thread-local garbage collection with dynamic class loading | |
US8103706B2 (en) | Nondeferred reference-counting garbage collection using overlooking roots | |
Lang | Improved stack allocation using escape analysis in the KESO multi-JVM | |
US20220308933A1 (en) | Tracking frame states of call stack frames including colorless roots | |
Brahnmath | Optimizing orthogonal persistence for Java | |
Hill et al. | Deriving escape analysis by abstract interpretation | |
Jones et al. | Collecting the garbage without blocking the traffic | |
ァゥ et al. | Escape Analysis for Java | |
Nagata et al. | Region-based memory management for a dynamically-typed language | |
Brahnmath | Optimizing Orthogonal Persistence for Java (MS Thesis) |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STCB | Information on status: application discontinuation |
Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION |
|
AS | Assignment |
Owner name: MICROSOFT TECHNOLOGY LICENSING, LLC, WASHINGTON Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:MICROSOFT CORPORATION;REEL/FRAME:034766/0001 Effective date: 20141014 |