40
CS61C L5 Memory Management; Intro MIPS (1) Beamer, Summer 2007 © UCB Scott Beamer, Instructor inst.eecs.berkeley.edu/~cs61c CS61C : Machine Structures Lecture #5 – Memory Management; Intro MIPS 2007-7-2 iPhone Draws Crowds www.sfgate.com

inst.eecs.berkeley.edu/~cs61c CS61C : Machine Structurescs61c/su07/lectures/05/L... · 2007. 7. 2. · •E.g., simple Lisp/Scheme system with only cons cells (61A’s Scheme not

  • Upload
    others

  • View
    7

  • Download
    0

Embed Size (px)

Citation preview

Page 1: inst.eecs.berkeley.edu/~cs61c CS61C : Machine Structurescs61c/su07/lectures/05/L... · 2007. 7. 2. · •E.g., simple Lisp/Scheme system with only cons cells (61A’s Scheme not

CS61C L5 Memory Management; Intro MIPS (1) Beamer, Summer 2007 © UCB

Scott Beamer, Instructor

inst.eecs.berkeley.edu/~cs61cCS61C : Machine Structures

Lecture #5 – Memory Management; Intro MIPS

2007-7-2

iPhoneDraws

Crowdswww.sfgate.com

Page 2: inst.eecs.berkeley.edu/~cs61c CS61C : Machine Structurescs61c/su07/lectures/05/L... · 2007. 7. 2. · •E.g., simple Lisp/Scheme system with only cons cells (61A’s Scheme not

CS61C L5 Memory Management; Intro MIPS (2) Beamer, Summer 2007 © UCB

Review• C has 3 pools of memory

• Static storage: global variable storage, basicallypermanent, entire program run

• The Stack: local variable storage, parameters,return address

• The Heap (dynamic storage): malloc() grabsspace from here, free() returns it.Nothing to do with heap data structure!

• malloc() handles free space with freelist.Three different ways:

• First fit (find first one that’s free)• Next fit (same as first, start where ended)• Best fit (finds most “snug” free space)

•One problem with all three is small fragments!

Page 3: inst.eecs.berkeley.edu/~cs61c CS61C : Machine Structurescs61c/su07/lectures/05/L... · 2007. 7. 2. · •E.g., simple Lisp/Scheme system with only cons cells (61A’s Scheme not

CS61C L5 Memory Management; Intro MIPS (3) Beamer, Summer 2007 © UCB

Slab Allocator

•A different approach to memorymanagement (used in GNU libc)•Divide blocks in to “large” and “small”by picking an arbitrary threshold size.Blocks larger than this threshold aremanaged with a freelist (as before).•For small blocks, allocate blocks insizes that are powers of 2

• e.g., if program wants to allocate 20bytes, actually give it 32 bytes

Page 4: inst.eecs.berkeley.edu/~cs61c CS61C : Machine Structurescs61c/su07/lectures/05/L... · 2007. 7. 2. · •E.g., simple Lisp/Scheme system with only cons cells (61A’s Scheme not

CS61C L5 Memory Management; Intro MIPS (4) Beamer, Summer 2007 © UCB

Slab Allocator

•Bookkeeping for small blocks isrelatively easy: just use a bitmap foreach range of blocks of the same size•Allocating is easy and fast: computethe size of the block to allocate andfind a free bit in the correspondingbitmap.•Freeing is also easy and fast: figureout which slab the address belongs toand clear the corresponding bit.

Page 5: inst.eecs.berkeley.edu/~cs61c CS61C : Machine Structurescs61c/su07/lectures/05/L... · 2007. 7. 2. · •E.g., simple Lisp/Scheme system with only cons cells (61A’s Scheme not

CS61C L5 Memory Management; Intro MIPS (5) Beamer, Summer 2007 © UCB

Slab Allocator

16 byte blocks:

32 byte blocks:

64 byte blocks:

16 byte block bitmap: 11011000

32 byte block bitmap: 0111

64 byte block bitmap: 00

Page 6: inst.eecs.berkeley.edu/~cs61c CS61C : Machine Structurescs61c/su07/lectures/05/L... · 2007. 7. 2. · •E.g., simple Lisp/Scheme system with only cons cells (61A’s Scheme not

CS61C L5 Memory Management; Intro MIPS (6) Beamer, Summer 2007 © UCB

Slab Allocator Tradeoffs

•Extremely fast for small blocks.•Slower for large blocks

• But presumably the program will takemore time to do something with a largeblock so the overhead is not as critical.

•Minimal space overhead•No fragmentation (as we defined itbefore) for small blocks, but still havewasted space!

Page 7: inst.eecs.berkeley.edu/~cs61c CS61C : Machine Structurescs61c/su07/lectures/05/L... · 2007. 7. 2. · •E.g., simple Lisp/Scheme system with only cons cells (61A’s Scheme not

CS61C L5 Memory Management; Intro MIPS (7) Beamer, Summer 2007 © UCB

Internal vs. External Fragmentation

•With the slab allocator, differencebetween requested size and nextpower of 2 is wasted

• e.g., if program wants to allocate 20bytes and we give it a 32 byte block, 12bytes are unused.

•We also refer to this as fragmentation,but call it internal fragmentation sincethe wasted space is actually within anallocated block.•External fragmentation: wasted spacebetween allocated blocks.

Page 8: inst.eecs.berkeley.edu/~cs61c CS61C : Machine Structurescs61c/su07/lectures/05/L... · 2007. 7. 2. · •E.g., simple Lisp/Scheme system with only cons cells (61A’s Scheme not

CS61C L5 Memory Management; Intro MIPS (8) Beamer, Summer 2007 © UCB

Buddy System

•Yet another memory managementtechnique (used in Linux kernel)•Like GNU’s “slab allocator”, but onlyallocate blocks in sizes that arepowers of 2 (internal fragmentation ispossible)•Keep separate free lists for each size

• e.g., separate free lists for 16 byte, 32byte, 64 byte blocks, etc.

Page 9: inst.eecs.berkeley.edu/~cs61c CS61C : Machine Structurescs61c/su07/lectures/05/L... · 2007. 7. 2. · •E.g., simple Lisp/Scheme system with only cons cells (61A’s Scheme not

CS61C L5 Memory Management; Intro MIPS (9) Beamer, Summer 2007 © UCB

Buddy System• If no free block of size n is available, finda block of size 2n and split it in to twoblocks of size n•When a block of size n is freed, if itsneighbor of size n is also free, combinethe blocks in to a single block of size 2n

• Buddy is block in other half larger block

•Same speed advantages as slab allocator

buddies NOT buddies

Page 10: inst.eecs.berkeley.edu/~cs61c CS61C : Machine Structurescs61c/su07/lectures/05/L... · 2007. 7. 2. · •E.g., simple Lisp/Scheme system with only cons cells (61A’s Scheme not

CS61C L5 Memory Management; Intro MIPS (10) Beamer, Summer 2007 © UCB

Allocation Schemes

•So which memory managementscheme (K&R, slab, buddy) isbest?

•There is no single best approach forevery application.

•Different applications have differentallocation / deallocation patterns.

•A scheme that works well for oneapplication may work poorly foranother application.

Page 11: inst.eecs.berkeley.edu/~cs61c CS61C : Machine Structurescs61c/su07/lectures/05/L... · 2007. 7. 2. · •E.g., simple Lisp/Scheme system with only cons cells (61A’s Scheme not

CS61C L5 Memory Management; Intro MIPS (11) Beamer, Summer 2007 © UCB

Administrivia•Third section is going to happen eventhough it isn’t in telebears yet…

• It will start meeting today• Discussion MW 5-6 in 320 Soda• Lab TuTh 5-7 in 271 Soda

•Attend your assigned section (if you go)• If you are on the waitlist, the third section isyour section

•HW3 and Proj1 will be posted in the nextfew days

Page 12: inst.eecs.berkeley.edu/~cs61c CS61C : Machine Structurescs61c/su07/lectures/05/L... · 2007. 7. 2. · •E.g., simple Lisp/Scheme system with only cons cells (61A’s Scheme not

CS61C L5 Memory Management; Intro MIPS (12) Beamer, Summer 2007 © UCB

Automatic Memory Management

•Dynamically allocated memory isdifficult to track – why not track itautomatically?• If we can keep track of what memoryis in use, we can reclaim everythingelse.

• Unreachable memory is called garbage,the process of reclaiming it is calledgarbage collection.

•So how do we track what is in use?

Page 13: inst.eecs.berkeley.edu/~cs61c CS61C : Machine Structurescs61c/su07/lectures/05/L... · 2007. 7. 2. · •E.g., simple Lisp/Scheme system with only cons cells (61A’s Scheme not

CS61C L5 Memory Management; Intro MIPS (13) Beamer, Summer 2007 © UCB

Tracking Memory Usage

•Techniques depend heavily on theprogramming language and rely onhelp from the compiler.•Start with all pointers in globalvariables and local variables (root set).•Recursively examine dynamicallyallocated objects we see a pointer to.

• We can do this in constant space byreversing the pointers on the way down

•How do we recursively find pointers indynamically allocated memory?

Page 14: inst.eecs.berkeley.edu/~cs61c CS61C : Machine Structurescs61c/su07/lectures/05/L... · 2007. 7. 2. · •E.g., simple Lisp/Scheme system with only cons cells (61A’s Scheme not

CS61C L5 Memory Management; Intro MIPS (14) Beamer, Summer 2007 © UCB

Tracking Memory Usage• Again, it depends heavily on the

programming language and compiler.• Could have only a single type of dynamically

allocated object in memory• E.g., simple Lisp/Scheme system with only cons

cells (61A’s Scheme not “simple”)

• Could use a strongly typed language (e.g.,Java)

• Don’t allow conversion (casting) betweenarbitrary types.

• C/C++ are not strongly typed.

• Here are 3 schemes to collect garbage

Page 15: inst.eecs.berkeley.edu/~cs61c CS61C : Machine Structurescs61c/su07/lectures/05/L... · 2007. 7. 2. · •E.g., simple Lisp/Scheme system with only cons cells (61A’s Scheme not

CS61C L5 Memory Management; Intro MIPS (15) Beamer, Summer 2007 © UCB

Scheme 1: Reference Counting

•For every chunk of dynamicallyallocated memory, keep a count ofnumber of pointers that point to it.•When the count reaches 0, reclaim.•Simple assignment statements canresult in a lot of work, since mayupdate reference counts of manyitems

Page 16: inst.eecs.berkeley.edu/~cs61c CS61C : Machine Structurescs61c/su07/lectures/05/L... · 2007. 7. 2. · •E.g., simple Lisp/Scheme system with only cons cells (61A’s Scheme not

CS61C L5 Memory Management; Intro MIPS (16) Beamer, Summer 2007 © UCB

Reference Counting Example

•For every chunk of dynamicallyallocated memory, keep a count ofnumber of pointers that point to it.

• When the count reaches 0, reclaim.int *p1, *p2;p1 = malloc(sizeof(int));p2 = malloc(sizeof(int));*p1 = 10; *p2 = 20;

p1p2

1020Reference count = 1

Reference count = 1

Page 17: inst.eecs.berkeley.edu/~cs61c CS61C : Machine Structurescs61c/su07/lectures/05/L... · 2007. 7. 2. · •E.g., simple Lisp/Scheme system with only cons cells (61A’s Scheme not

CS61C L5 Memory Management; Intro MIPS (17) Beamer, Summer 2007 © UCB

Reference Counting Example

•For every chunk of dynamicallyallocated memory, keep a count ofnumber of pointers that point to it.

• When the count reaches 0, reclaim.int *p1, *p2;p1 = malloc(sizeof(int));p2 = malloc(sizeof(int));*p1 = 10; *p2 = 20; p1 = p2;

p1p2

1020Reference count = 2

Reference count = 0

Page 18: inst.eecs.berkeley.edu/~cs61c CS61C : Machine Structurescs61c/su07/lectures/05/L... · 2007. 7. 2. · •E.g., simple Lisp/Scheme system with only cons cells (61A’s Scheme not

CS61C L5 Memory Management; Intro MIPS (18) Beamer, Summer 2007 © UCB

Reference Counting (p1, p2 are pointers)p1 = p2;

• Increment reference count for p2• If p1 held a valid value, decrement itsreference count• If the reference count for p1 is now 0,reclaim the storage it points to.

• If the storage pointed to by p1 held otherpointers, decrement all of their referencecounts, and so on…

•Must also decrement reference countwhen local variables cease to exist.

Page 19: inst.eecs.berkeley.edu/~cs61c CS61C : Machine Structurescs61c/su07/lectures/05/L... · 2007. 7. 2. · •E.g., simple Lisp/Scheme system with only cons cells (61A’s Scheme not

CS61C L5 Memory Management; Intro MIPS (19) Beamer, Summer 2007 © UCB

Reference Counting Flaws

•Extra overhead added to assignments,as well as ending a block of code.•Does not work for circular structures!

• E.g., doubly linked list:

X Y Z

Page 20: inst.eecs.berkeley.edu/~cs61c CS61C : Machine Structurescs61c/su07/lectures/05/L... · 2007. 7. 2. · •E.g., simple Lisp/Scheme system with only cons cells (61A’s Scheme not

CS61C L5 Memory Management; Intro MIPS (20) Beamer, Summer 2007 © UCB

Scheme 2: Mark and Sweep Garbage Col.

• Keep allocating new memory until memory isexhausted, then try to find unused memory.• Consider objects in heap a graph, chunks of

memory (objects) are graph nodes, pointers tomemory are graph edges.

• Edge from A to B => A stores pointer to B

• Can start with the root set, perform a graphtraversal, find all usable memory!• 2 Phases: (1) Mark used nodes;(2) Sweep free

ones, returning list of free nodes

Page 21: inst.eecs.berkeley.edu/~cs61c CS61C : Machine Structurescs61c/su07/lectures/05/L... · 2007. 7. 2. · •E.g., simple Lisp/Scheme system with only cons cells (61A’s Scheme not

CS61C L5 Memory Management; Intro MIPS (21) Beamer, Summer 2007 © UCB

Mark and Sweep

•Graph traversal is relatively easy toimplement recursively

°But with recursion, state is stored onthe execution stack.

°Garbage collection is invoked when notmuch memory left

°As before, we could traverse inconstant space (by reversing pointers)

void traverse(struct graph_node *node) { /* visit this node */ foreach child in node->children { traverse(child); }}

Page 22: inst.eecs.berkeley.edu/~cs61c CS61C : Machine Structurescs61c/su07/lectures/05/L... · 2007. 7. 2. · •E.g., simple Lisp/Scheme system with only cons cells (61A’s Scheme not

CS61C L5 Memory Management; Intro MIPS (22) Beamer, Summer 2007 © UCB

Scheme 3: Copying Garbage Collection

•Divide memory into two spaces, onlyone in use at any time.•When active space is exhausted,traverse the active space, copying allobjects to the other space, then makethe new space active and continue.

• Only reachable objects are copied!

•Use “forwarding pointers” to keepconsistency

• Simple solution to avoiding having to have atable of old and new addresses, and to markobjects already copied (see bonus slides)

Page 23: inst.eecs.berkeley.edu/~cs61c CS61C : Machine Structurescs61c/su07/lectures/05/L... · 2007. 7. 2. · •E.g., simple Lisp/Scheme system with only cons cells (61A’s Scheme not

CS61C L5 Memory Management; Intro MIPS (23) Beamer, Summer 2007 © UCB

Peer Instruction

A. Of {K&R, Slab, Buddy}, there is no best(it depends on the problem).

B. Since automatic garbage collection canoccur any time, it is more difficult tomeasure the execution time of a Javaprogram vs. a C program.

C. We don’t have automatic garbagecollection in C because of efficiency.

ABC1: FFF2: FFT3: FTF4: FTT5: TFF6: TFT7: TTF8: TTT

Page 24: inst.eecs.berkeley.edu/~cs61c CS61C : Machine Structurescs61c/su07/lectures/05/L... · 2007. 7. 2. · •E.g., simple Lisp/Scheme system with only cons cells (61A’s Scheme not

CS61C L5 Memory Management; Intro MIPS (24) Beamer, Summer 2007 © UCB

“And in semi-conclusion…”•Several techniques for managing heap viamalloc and free: best-, first-, next-fit

• 2 types of memory fragmentation: internal &external; all suffer from some kind of frag.

• Each technique has strengths andweaknesses, none is definitively best

•Automatic memory management relievesprogrammer from managing memory.

• All require help from language and compiler• Reference Count: not for circular structures• Mark and Sweep: complicated and slow, works• Copying: Divides memory to copy good stuff

Page 25: inst.eecs.berkeley.edu/~cs61c CS61C : Machine Structurescs61c/su07/lectures/05/L... · 2007. 7. 2. · •E.g., simple Lisp/Scheme system with only cons cells (61A’s Scheme not

CS61C L5 Memory Management; Intro MIPS (25) Beamer, Summer 2007 © UCB

Forwarding Pointers: 1st copy “abc”

From To

abc def

xyz

abc

?

Page 26: inst.eecs.berkeley.edu/~cs61c CS61C : Machine Structurescs61c/su07/lectures/05/L... · 2007. 7. 2. · •E.g., simple Lisp/Scheme system with only cons cells (61A’s Scheme not

CS61C L5 Memory Management; Intro MIPS (26) Beamer, Summer 2007 © UCB

Forwarding Pointers: leave ptr to new abc

From To

abc def

xyz

abc

?

Page 27: inst.eecs.berkeley.edu/~cs61c CS61C : Machine Structurescs61c/su07/lectures/05/L... · 2007. 7. 2. · •E.g., simple Lisp/Scheme system with only cons cells (61A’s Scheme not

CS61C L5 Memory Management; Intro MIPS (27) Beamer, Summer 2007 © UCB

Forwarding Pointers : now copy “xyz”

From To

def

xyz

abc

?

Forwarding pointer

Page 28: inst.eecs.berkeley.edu/~cs61c CS61C : Machine Structurescs61c/su07/lectures/05/L... · 2007. 7. 2. · •E.g., simple Lisp/Scheme system with only cons cells (61A’s Scheme not

CS61C L5 Memory Management; Intro MIPS (28) Beamer, Summer 2007 © UCB

Forwarding Pointers: leave ptr to new xyz

From To

def abc

xyzxyz

Forwarding pointer

Page 29: inst.eecs.berkeley.edu/~cs61c CS61C : Machine Structurescs61c/su07/lectures/05/L... · 2007. 7. 2. · •E.g., simple Lisp/Scheme system with only cons cells (61A’s Scheme not

CS61C L5 Memory Management; Intro MIPS (29) Beamer, Summer 2007 © UCB

Forwarding Pointers: now copy “def”

From To

def abc

xyz

Forwarding pointer

Forwarding pointer

Since xyz was already copied,def uses xyz’s forwarding pointerto find its new location

Page 30: inst.eecs.berkeley.edu/~cs61c CS61C : Machine Structurescs61c/su07/lectures/05/L... · 2007. 7. 2. · •E.g., simple Lisp/Scheme system with only cons cells (61A’s Scheme not

CS61C L5 Memory Management; Intro MIPS (30) Beamer, Summer 2007 © UCB

Forwarding Pointers

From To

def abc

xyz

def

Forwarding pointer

Forwarding pointer

Since xyz was already copied,def uses xyz’s forwarding pointerto find its new location

Page 31: inst.eecs.berkeley.edu/~cs61c CS61C : Machine Structurescs61c/su07/lectures/05/L... · 2007. 7. 2. · •E.g., simple Lisp/Scheme system with only cons cells (61A’s Scheme not

CS61C L5 Memory Management; Intro MIPS (31) Beamer, Summer 2007 © UCB

Assembly Language

•Basic job of a CPU: execute lots ofinstructions.• Instructions are the primitiveoperations that the CPU may execute.•Different CPUs implement differentsets of instructions. The set ofinstructions a particular CPUimplements is an Instruction SetArchitecture (ISA).

• Examples: Intel 80x86 (Pentium 4),IBM/Motorola PowerPC (Macintosh),MIPS, Intel IA64, ...

Page 32: inst.eecs.berkeley.edu/~cs61c CS61C : Machine Structurescs61c/su07/lectures/05/L... · 2007. 7. 2. · •E.g., simple Lisp/Scheme system with only cons cells (61A’s Scheme not

CS61C L5 Memory Management; Intro MIPS (32) Beamer, Summer 2007 © UCB

Book: Programming From the Ground Up“A new book was just released which isbased on a new concept - teachingcomputer science through assemblylanguage (Linux x86 assembly language,to be exact). This book teaches how themachine itself operates, rather than justthe language. I've found that the keydifference between mediocre and excellentprogrammers is whether or not they know assemblylanguage. Those that do tend to understandcomputers themselves at a much deeper level.Although [almost!] unheard of today, this concept isn'treally all that new -- there used to not be much choicein years past. Apple computers came with only BASICand assembly language, and there were booksavailable on assembly language for kids. This is whythe old-timers are often viewed as 'wizards': they hadto know assembly language programming.” -- slashdot.org comment, 2004-02-05

Page 33: inst.eecs.berkeley.edu/~cs61c CS61C : Machine Structurescs61c/su07/lectures/05/L... · 2007. 7. 2. · •E.g., simple Lisp/Scheme system with only cons cells (61A’s Scheme not

CS61C L5 Memory Management; Intro MIPS (33) Beamer, Summer 2007 © UCB

Instruction Set Architectures

•Early trend was to add more and moreinstructions to new CPUs to doelaborate operations

• VAX architecture had an instruction tomultiply polynomials!

•RISC philosophy (Cocke IBM,Patterson, Hennessy, 1980s) –Reduced Instruction Set Computing

• Keep the instruction set small and simple,makes it easier to build fast hardware.

• Let software do complicated operations bycomposing simpler ones.

Page 34: inst.eecs.berkeley.edu/~cs61c CS61C : Machine Structurescs61c/su07/lectures/05/L... · 2007. 7. 2. · •E.g., simple Lisp/Scheme system with only cons cells (61A’s Scheme not

CS61C L5 Memory Management; Intro MIPS (34) Beamer, Summer 2007 © UCB

MIPS Architecture•MIPS – semiconductor companythat built one of the firstcommercial RISC architectures•We will study the MIPSarchitecture in some detail in thisclass (also used in upper divisioncourses CS 152, 162, 164)•Why MIPS instead of Intel 80x86?

• MIPS is simple, elegant. Don’t wantto get bogged down in gritty details.

• MIPS widely used in embedded apps,x86 little used in embedded, and moreembedded computers than PCs

Page 35: inst.eecs.berkeley.edu/~cs61c CS61C : Machine Structurescs61c/su07/lectures/05/L... · 2007. 7. 2. · •E.g., simple Lisp/Scheme system with only cons cells (61A’s Scheme not

CS61C L5 Memory Management; Intro MIPS (35) Beamer, Summer 2007 © UCB

Assembly Variables: Registers (1/4)

•Unlike HLL like C or Java, assemblycannot use variables

• Why not? Keep Hardware Simple

•Assembly Operands are registers• limited number of special locations builtdirectly into the hardware

• operations can only be performed onthese!

•Benefit: Since registers are directly inhardware, they are very fast(faster than 1 billionth of a second)

Page 36: inst.eecs.berkeley.edu/~cs61c CS61C : Machine Structurescs61c/su07/lectures/05/L... · 2007. 7. 2. · •E.g., simple Lisp/Scheme system with only cons cells (61A’s Scheme not

CS61C L5 Memory Management; Intro MIPS (36) Beamer, Summer 2007 © UCB

Assembly Variables: Registers (2/4)

•Drawback: Since registers are inhardware, there are a predeterminednumber of them

• Solution: MIPS code must be verycarefully put together to efficiently useregisters

•32 registers in MIPS• Why 32? Smaller is faster

•Each MIPS register is 32 bits wide• Groups of 32 bits called a word in MIPS

Page 37: inst.eecs.berkeley.edu/~cs61c CS61C : Machine Structurescs61c/su07/lectures/05/L... · 2007. 7. 2. · •E.g., simple Lisp/Scheme system with only cons cells (61A’s Scheme not

CS61C L5 Memory Management; Intro MIPS (37) Beamer, Summer 2007 © UCB

Assembly Variables: Registers (3/4)

•Registers are numbered from 0 to 31•Each register can be referred to bynumber or name•Number references:

$0, $1, $2, … $30, $31

Page 38: inst.eecs.berkeley.edu/~cs61c CS61C : Machine Structurescs61c/su07/lectures/05/L... · 2007. 7. 2. · •E.g., simple Lisp/Scheme system with only cons cells (61A’s Scheme not

CS61C L5 Memory Management; Intro MIPS (38) Beamer, Summer 2007 © UCB

Assembly Variables: Registers (4/4)

•By convention, each register also hasa name to make it easier to code•For now:

$16 - $23 $s0 - $s7

(correspond to C variables)$8 - $15 $t0 - $t7

(correspond to temporary variables)Later will explain other 16 register names

• In general, use names to make yourcode more readable

Page 39: inst.eecs.berkeley.edu/~cs61c CS61C : Machine Structurescs61c/su07/lectures/05/L... · 2007. 7. 2. · •E.g., simple Lisp/Scheme system with only cons cells (61A’s Scheme not

CS61C L5 Memory Management; Intro MIPS (39) Beamer, Summer 2007 © UCB

C, Java variables vs. registers

• In C (and most High Level Languages)variables declared first and given a type

• Example:int fahr, celsius;char a, b, c, d, e;

•Each variable can ONLY represent avalue of the type it was declared as(cannot mix and match int and charvariables).• In Assembly Language, the registershave no type; operation determines howregister contents are treated

Page 40: inst.eecs.berkeley.edu/~cs61c CS61C : Machine Structurescs61c/su07/lectures/05/L... · 2007. 7. 2. · •E.g., simple Lisp/Scheme system with only cons cells (61A’s Scheme not

CS61C L5 Memory Management; Intro MIPS (40) Beamer, Summer 2007 © UCB

“And in Conclusion…”

• In MIPS Assembly Language:• Registers replace C variables• One Instruction (simple operation) per line• Simpler is Better• Smaller is Faster

•New Registers:C Variables: $s0 - $s7Temporary Variables: $t0 - $t7