Dusty Caches for Reference Counting Garbage Collection - PowerPoint PPT Presentation

1 / 27
About This Presentation
Title:

Dusty Caches for Reference Counting Garbage Collection

Description:

iterator iter = list.iterator(); while(iter.hasNext()) { Object item = iter.next ... iter. 11. Ref. counts & Memory Traffic. node 0. 1. node 1. 2. node 2. 1 ... – PowerPoint PPT presentation

Number of Views:70
Avg rating:3.0/5.0
Slides: 28
Provided by: praveenkri
Category:

less

Transcript and Presenter's Notes

Title: Dusty Caches for Reference Counting Garbage Collection


1
Dusty Caches for Reference Counting Garbage
Collection
  • Scott Friedman, Praveen Krishnamurthy,
  • Roger Chamberlain, Ron K. Cytron, Jason Fritts
  • Dept. of Computer Science and Engineering
  • Washington University in St. Louis
  • Sponsored by NSF grant ITR-0313203

2
Outline
  • Introduction
  • Reference counting garbage collection
  • Dusty cache
  • Design and policy
  • Evaluating dusty caches
  • Quantifying performance using JVM
  • Experiment on Liquid Architecture
  • Conclusions

3
Introduction
  • Garbage collection
  • Java, C
  • Unused objects are reclaimed
  • Techniques
  • Reference counting
  • Mark and sweep
  • Copy and collect

4
Reference Counts
  • P new Integer(..)

Integer
class members
P
1
reference count
5
Reference Counts
  • P new Integer(..)
  • Q P

Integer
class members
P
2
Q
reference count
6
Reference Counts
  • P new Integer(..)
  • Q new Integer(..)

class members
P
1
class members
Q
1
7
Reference Counts
  • P Q

class members
P
0
class members
Q
2
8
Ref. counts Memory Traffic
  • Short-lived (temporary) changes in reference
    counts
  • Linked lists, trees, sorting, hashtables etc.

9
Ref. counts Memory Traffic
  • linkedList list
  • iterator iter list.iterator()
  • while(iter.hasNext())
  • Object item iter.next()
  • foo(item)

head
node 0
node 1
node 2
node n
1
1
1
1
10
Ref. counts Memory Traffic
  • linkedList list
  • iterator iter list.iterator()
  • while(iter.hasNext())
  • Object item iter.next()
  • foo(item)

head
node 0
node 1
node 2
node n
2
1
1
1
11
Ref. counts Memory Traffic
  • linkedList list
  • iterator iter list.iterator()
  • while(iter.hasNext())
  • Object item iter.next()
  • foo(item)

head
node 0
node 1
node 2
node n
1
2
1
1
12
Ref. counts Memory Traffic
  • linkedList list
  • iterator iter list.iterator()
  • while(iter.hasNext())
  • Object item iter.next()
  • foo(item)

head
node 0
node 1
node 2
node n
1
1
2
1
13
Ref. counts Memory Traffic
  • linkedList list
  • iterator iter list.iterator()
  • while(iter.hasNext())
  • Object item iter.next()
  • foo(item)

head
node 0
node 1
node 2
node n
1
1
1
2
14
Ref. counts Memory Traffic
node 0
node 1
node 2
node n
head
1
1
1
1
  • Consequence
  • Every object is marked dirty in the cache
  • Will be written back to RAM upon eviction
  • Unnecessary writes to RAM
  • Temporally silent stores (Lepak Lipasti, 2002)
  • Our solution - Dusty Cache
  • Eliminates all such unnecessary writes to memory

15
Outline
  • Introduction
  • Reference counting
  • Dusty caches
  • Design and operations
  • Evaluating dusty caches
  • Quantifying performance using JVM
  • Experiment on Liquid Architecture
  • Conclusions

16
Cache Design WriteBack
tag
ddata
x
x
Read update the tag, valid and data
Write update dirty and data
cache lines
cached value
address
tag
offset
valid
dirty
17
Cache Design Dusty
dimage
tag
ddata
x
x
Read update tag, data and image
Writes update tag and data
cache lines
mem value
cached value
address
tag
offset
valid
dirty
ivalid
18
Outline
  • Introduction
  • Reference counting
  • Dusty cache
  • Design and operations
  • Evaluating dusty caches
  • Quantifying performance using JVM
  • Experiment on Liquid Architecture
  • Conclusions

19
Evaluating Dusty Cache
  • Traces from JVM instrumentation
  • Suns Java Virtual Machine
  • Reference counting garbage collection
  • Reference count for all objects
  • of JVM instructions between reference count
    changes
  • of cache altering instructions between changes
  • Eviction from cache
  • window for a window of size k cache writes, a
    value v written at write i will be evicted at
    write ik

20
JVM Quantifying Memory Savings
  • Cache configurations
  • Unified, Non-unified caches
  • WriteThrough, WriteBack, Dusty
  • Measured as memory writes saved
  • Baseline was a WriteThrough cache

21
1. SPEC DataBase
8,088 objs
22
2. SPEC JESS
46,129 objs
23
Experiments on a flexible processor
  • Liquid Architecture
  • Platform to study microarchitecture refinements
  • Softcore LEON2 5-stage SPARC compliant 32-bit
  • Statsmodnon intrusive performance measurement
    tool
  • Limitations
  • 4 MB of SRAM, No JVM

24
Experiment on Liquid Architecture
  • Deployed LEON with a dusty cache policy
  • Replicated all of the L1 cache
  • Monte Carlo Experiment
  • Determine probability of cache altering events
  • Reads, Writes, HeapRefCount, HeapRefCount--
  • Events access random addresses in memory
  • Experiments monitored both RC and non-RC traffic

25
Emulation using Liquid Architecture
  • Results of the Monte Carlo Experiment

50 reduction
26
Conclusions
  • Dusty cache policy effectively filters the
    unnecessary reference counting traffic
  • Savings around 5 - 25 over WB cache
  • Microarchitecture optimization
  • Dusty cache can be a small subset of the cache
  • Could potentially reduce writes even in
    non-reference counting traffic
  • Inferred from Characterization of silent stores
    (Bell et al. 2000)

27
Liquid Architecture Project
  • http//www.arl.wustl.edu/liquid
  • Email liquid_at_cs.wustl.edu
  • Sponsored by NSF grant ITR-0313203
Write a Comment
User Comments (0)
About PowerShow.com