PageRenderTime 46ms CodeModel.GetById 14ms RepoModel.GetById 0ms app.codeStats 0ms

/libgc/doc/debugging.html

https://bitbucket.org/danipen/mono
HTML | 306 lines | 295 code | 11 blank | 0 comment | 0 complexity | 9c9a390a68826c7c08e7e05fe7e545ac MD5 | raw file
Possible License(s): Unlicense, Apache-2.0, LGPL-2.0, MPL-2.0-no-copyleft-exception, CC-BY-SA-3.0, GPL-2.0
  1. <HTML>
  2. <HEAD>
  3. <TITLE>Debugging Garbage Collector Related Problems</title>
  4. </head>
  5. <BODY>
  6. <H1>Debugging Garbage Collector Related Problems</h1>
  7. This page contains some hints on
  8. debugging issues specific to
  9. the Boehm-Demers-Weiser conservative garbage collector.
  10. It applies both to debugging issues in client code that manifest themselves
  11. as collector misbehavior, and to debugging the collector itself.
  12. <P>
  13. If you suspect a bug in the collector itself, it is strongly recommended
  14. that you try the latest collector release, even if it is labelled as "alpha",
  15. before proceeding.
  16. <H2>Bus Errors and Segmentation Violations</h2>
  17. <P>
  18. If the fault occurred in GC_find_limit, or with incremental collection enabled,
  19. this is probably normal. The collector installs handlers to take care of
  20. these. You will not see these unless you are using a debugger.
  21. Your debugger <I>should</i> allow you to continue.
  22. It's often preferable to tell the debugger to ignore SIGBUS and SIGSEGV
  23. ("<TT>handle SIGSEGV SIGBUS nostop noprint</tt>" in gdb,
  24. "<TT>ignore SIGSEGV SIGBUS</tt>" in most versions of dbx)
  25. and set a breakpoint in <TT>abort</tt>.
  26. The collector will call abort if the signal had another cause,
  27. and there was not other handler previously installed.
  28. <P>
  29. We recommend debugging without incremental collection if possible.
  30. (This applies directly to UNIX systems.
  31. Debugging with incremental collection under win32 is worse. See README.win32.)
  32. <P>
  33. If the application generates an unhandled SIGSEGV or equivalent, it may
  34. often be easiest to set the environment variable GC_LOOP_ON_ABORT. On many
  35. platforms, this will cause the collector to loop in a handler when the
  36. SIGSEGV is encountered (or when the collector aborts for some other reason),
  37. and a debugger can then be attached to the looping
  38. process. This sidesteps common operating system problems related
  39. to incomplete core files for multithreaded applications, etc.
  40. <H2>Other Signals</h2>
  41. On most platforms, the multithreaded version of the collector needs one or
  42. two other signals for internal use by the collector in stopping threads.
  43. It is normally wise to tell the debugger to ignore these. On Linux,
  44. the collector currently uses SIGPWR and SIGXCPU by default.
  45. <H2>Warning Messages About Needing to Allocate Blacklisted Blocks</h2>
  46. The garbage collector generates warning messages of the form
  47. <PRE>
  48. Needed to allocate blacklisted block at 0x...
  49. </pre>
  50. or
  51. <PRE>
  52. Repeated allocation of very large block ...
  53. </pre>
  54. when it needs to allocate a block at a location that it knows to be
  55. referenced by a false pointer. These false pointers can be either permanent
  56. (<I>e.g.</i> a static integer variable that never changes) or temporary.
  57. In the latter case, the warning is largely spurious, and the block will
  58. eventually be reclaimed normally.
  59. In the former case, the program will still run correctly, but the block
  60. will never be reclaimed. Unless the block is intended to be
  61. permanent, the warning indicates a memory leak.
  62. <OL>
  63. <LI>Ignore these warnings while you are using GC_DEBUG. Some of the routines
  64. mentioned below don't have debugging equivalents. (Alternatively, write
  65. the missing routines and send them to me.)
  66. <LI>Replace allocator calls that request large blocks with calls to
  67. <TT>GC_malloc_ignore_off_page</tt> or
  68. <TT>GC_malloc_atomic_ignore_off_page</tt>. You may want to set a
  69. breakpoint in <TT>GC_default_warn_proc</tt> to help you identify such calls.
  70. Make sure that a pointer to somewhere near the beginning of the resulting block
  71. is maintained in a (preferably volatile) variable as long as
  72. the block is needed.
  73. <LI>
  74. If the large blocks are allocated with realloc, we suggest instead allocating
  75. them with something like the following. Note that the realloc size increment
  76. should be fairly large (e.g. a factor of 3/2) for this to exhibit reasonable
  77. performance. But we all know we should do that anyway.
  78. <PRE>
  79. void * big_realloc(void *p, size_t new_size)
  80. {
  81. size_t old_size = GC_size(p);
  82. void * result;
  83. if (new_size <= 10000) return(GC_realloc(p, new_size));
  84. if (new_size <= old_size) return(p);
  85. result = GC_malloc_ignore_off_page(new_size);
  86. if (result == 0) return(0);
  87. memcpy(result,p,old_size);
  88. GC_free(p);
  89. return(result);
  90. }
  91. </pre>
  92. <LI> In the unlikely case that even relatively small object
  93. (&lt;20KB) allocations are triggering these warnings, then your address
  94. space contains lots of "bogus pointers", i.e. values that appear to
  95. be pointers but aren't. Usually this can be solved by using GC_malloc_atomic
  96. or the routines in gc_typed.h to allocate large pointer-free regions of bitmaps, etc. Sometimes the problem can be solved with trivial changes of encoding
  97. in certain values. It is possible, to identify the source of the bogus
  98. pointers by building the collector with <TT>-DPRINT_BLACK_LIST</tt>,
  99. which will cause it to print the "bogus pointers", along with their location.
  100. <LI> If you get only a fixed number of these warnings, you are probably only
  101. introducing a bounded leak by ignoring them. If the data structures being
  102. allocated are intended to be permanent, then it is also safe to ignore them.
  103. The warnings can be turned off by calling GC_set_warn_proc with a procedure
  104. that ignores these warnings (e.g. by doing absolutely nothing).
  105. </ol>
  106. <H2>The Collector References a Bad Address in <TT>GC_malloc</tt></h2>
  107. This typically happens while the collector is trying to remove an entry from
  108. its free list, and the free list pointer is bad because the free list link
  109. in the last allocated object was bad.
  110. <P>
  111. With &gt; 99% probability, you wrote past the end of an allocated object.
  112. Try setting <TT>GC_DEBUG</tt> before including <TT>gc.h</tt> and
  113. allocating with <TT>GC_MALLOC</tt>. This will try to detect such
  114. overwrite errors.
  115. <H2>Unexpectedly Large Heap</h2>
  116. Unexpected heap growth can be due to one of the following:
  117. <OL>
  118. <LI> Data structures that are being unintentionally retained. This
  119. is commonly caused by data structures that are no longer being used,
  120. but were not cleared, or by caches growing without bounds.
  121. <LI> Pointer misidentification. The garbage collector is interpreting
  122. integers or other data as pointers and retaining the "referenced"
  123. objects. A common symptom is that GC_dump() shows much of the heap
  124. as black-listed.
  125. <LI> Heap fragmentation. This should never result in unbounded growth,
  126. but it may account for larger heaps. This is most commonly caused
  127. by allocation of large objects. On some platforms it can be reduced
  128. by building with -DUSE_MUNMAP, which will cause the collector to unmap
  129. memory corresponding to pages that have not been recently used.
  130. <LI> Per object overhead. This is usually a relatively minor effect, but
  131. it may be worth considering. If the collector recognizes interior
  132. pointers, object sizes are increased, so that one-past-the-end pointers
  133. are correctly recognized. The collector can be configured not to do this
  134. (<TT>-DDONT_ADD_BYTE_AT_END</tt>).
  135. <P>
  136. The collector rounds up object sizes so the result fits well into the
  137. chunk size (<TT>HBLKSIZE</tt>, normally 4K on 32 bit machines, 8K
  138. on 64 bit machines) used by the collector. Thus it may be worth avoiding
  139. objects of size 2K + 1 (or 2K if a byte is being added at the end.)
  140. </ol>
  141. The last two cases can often be identified by looking at the output
  142. of a call to <TT>GC_dump()</tt>. Among other things, it will print the
  143. list of free heap blocks, and a very brief description of all chunks in
  144. the heap, the object sizes they correspond to, and how many live objects
  145. were found in the chunk at the last collection.
  146. <P>
  147. Growing data structures can usually be identified by
  148. <OL>
  149. <LI> Building the collector with <TT>-DKEEP_BACK_PTRS</tt>,
  150. <LI> Preferably using debugging allocation (defining <TT>GC_DEBUG</tt>
  151. before including <TT>gc.h</tt> and allocating with <TT>GC_MALLOC</tt>),
  152. so that objects will be identified by their allocation site,
  153. <LI> Running the application long enough so
  154. that most of the heap is composed of "leaked" memory, and
  155. <LI> Then calling <TT>GC_generate_random_backtrace()</tt> from backptr.h
  156. a few times to determine why some randomly sampled objects in the heap are
  157. being retained.
  158. </ol>
  159. <P>
  160. The same technique can often be used to identify problems with false
  161. pointers, by noting whether the reference chains printed by
  162. <TT>GC_generate_random_backtrace()</tt> involve any misidentified pointers.
  163. An alternate technique is to build the collector with
  164. <TT>-DPRINT_BLACK_LIST</tt> which will cause it to report values that
  165. are almost, but not quite, look like heap pointers. It is very likely that
  166. actual false pointers will come from similar sources.
  167. <P>
  168. In the unlikely case that false pointers are an issue, it can usually
  169. be resolved using one or more of the following techniques:
  170. <OL>
  171. <LI> Use <TT>GC_malloc_atomic</tt> for objects containing no pointers.
  172. This is especially important for large arrays containing compressed data,
  173. pseudo-random numbers, and the like. It is also likely to improve GC
  174. performance, perhaps drastically so if the application is paging.
  175. <LI> If you allocate large objects containing only
  176. one or two pointers at the beginning, either try the typed allocation
  177. primitives is <TT>gc_typed.h</tt>, or separate out the pointerfree component.
  178. <LI> Consider using <TT>GC_malloc_ignore_off_page()</tt>
  179. to allocate large objects. (See <TT>gc.h</tt> and above for details.
  180. Large means &gt; 100K in most environments.)
  181. <LI> If your heap size is larger than 100MB or so, build the collector with
  182. -DLARGE_CONFIG. This allows the collector to keep more precise black-list
  183. information.
  184. <LI> If you are using heaps close to, or larger than, a gigabyte on a 32-bit
  185. machine, you may want to consider moving to a platform with 64-bit pointers.
  186. This is very likely to resolve any false pointer issues.
  187. </ol>
  188. <H2>Prematurely Reclaimed Objects</h2>
  189. The usual symptom of this is a segmentation fault, or an obviously overwritten
  190. value in a heap object. This should, of course, be impossible. In practice,
  191. it may happen for reasons like the following:
  192. <OL>
  193. <LI> The collector did not intercept the creation of threads correctly in
  194. a multithreaded application, <I>e.g.</i> because the client called
  195. <TT>pthread_create</tt> without including <TT>gc.h</tt>, which redefines it.
  196. <LI> The last pointer to an object in the garbage collected heap was stored
  197. somewhere were the collector couldn't see it, <I>e.g.</i> in an
  198. object allocated with system <TT>malloc</tt>, in certain types of
  199. <TT>mmap</tt>ed files,
  200. or in some data structure visible only to the OS. (On some platforms,
  201. thread-local storage is one of these.)
  202. <LI> The last pointer to an object was somehow disguised, <I>e.g.</i> by
  203. XORing it with another pointer.
  204. <LI> Incorrect use of <TT>GC_malloc_atomic</tt> or typed allocation.
  205. <LI> An incorrect <TT>GC_free</tt> call.
  206. <LI> The client program overwrote an internal garbage collector data structure.
  207. <LI> A garbage collector bug.
  208. <LI> (Empirically less likely than any of the above.) A compiler optimization
  209. that disguised the last pointer.
  210. </ol>
  211. The following relatively simple techniques should be tried first to narrow
  212. down the problem:
  213. <OL>
  214. <LI> If you are using the incremental collector try turning it off for
  215. debugging.
  216. <LI> If you are using shared libraries, try linking statically. If that works,
  217. ensure that DYNAMIC_LOADING is defined on your platform.
  218. <LI> Try to reproduce the problem with fully debuggable unoptimized code.
  219. This will eliminate the last possibility, as well as making debugging easier.
  220. <LI> Try replacing any suspect typed allocation and <TT>GC_malloc_atomic</tt>
  221. calls with calls to <TT>GC_malloc</tt>.
  222. <LI> Try removing any GC_free calls (<I>e.g.</i> with a suitable
  223. <TT>#define</tt>).
  224. <LI> Rebuild the collector with <TT>-DGC_ASSERTIONS</tt>.
  225. <LI> If the following works on your platform (i.e. if gctest still works
  226. if you do this), try building the collector with
  227. <TT>-DREDIRECT_MALLOC=GC_malloc_uncollectable</tt>. This will cause
  228. the collector to scan memory allocated with malloc.
  229. </ol>
  230. If all else fails, you will have to attack this with a debugger.
  231. Suggested steps:
  232. <OL>
  233. <LI> Call <TT>GC_dump()</tt> from the debugger around the time of the failure. Verify
  234. that the collectors idea of the root set (i.e. static data regions which
  235. it should scan for pointers) looks plausible. If not, i.e. if it doesn't
  236. include some static variables, report this as
  237. a collector bug. Be sure to describe your platform precisely, since this sort
  238. of problem is nearly always very platform dependent.
  239. <LI> Especially if the failure is not deterministic, try to isolate it to
  240. a relatively small test case.
  241. <LI> Set a break point in <TT>GC_finish_collection</tt>. This is a good
  242. point to examine what has been marked, i.e. found reachable, by the
  243. collector.
  244. <LI> If the failure is deterministic, run the process
  245. up to the last collection before the failure.
  246. Note that the variable <TT>GC_gc_no</tt> counts collections and can be used
  247. to set a conditional breakpoint in the right one. It is incremented just
  248. before the call to GC_finish_collection.
  249. If object <TT>p</tt> was prematurely recycled, it may be helpful to
  250. look at <TT>*GC_find_header(p)</tt> at the failure point.
  251. The <TT>hb_last_reclaimed</tt> field will identify the collection number
  252. during which its block was last swept.
  253. <LI> Verify that the offending object still has its correct contents at
  254. this point.
  255. Then call <TT>GC_is_marked(p)</tt> from the debugger to verify that the
  256. object has not been marked, and is about to be reclaimed. Note that
  257. <TT>GC_is_marked(p)</tt> expects the real address of an object (the
  258. address of the debug header if there is one), and thus it may
  259. be more appropriate to call <TT>GC_is_marked(GC_base(p))</tt>
  260. instead.
  261. <LI> Determine a path from a root, i.e. static variable, stack, or
  262. register variable,
  263. to the reclaimed object. Call <TT>GC_is_marked(q)</tt> for each object
  264. <TT>q</tt> along the path, trying to locate the first unmarked object, say
  265. <TT>r</tt>.
  266. <LI> If <TT>r</tt> is pointed to by a static root,
  267. verify that the location
  268. pointing to it is part of the root set printed by <TT>GC_dump()</tt>. If it
  269. is on the stack in the main (or only) thread, verify that
  270. <TT>GC_stackbottom</tt> is set correctly to the base of the stack. If it is
  271. in another thread stack, check the collector's thread data structure
  272. (<TT>GC_thread[]</tt> on several platforms) to make sure that stack bounds
  273. are set correctly.
  274. <LI> If <TT>r</tt> is pointed to by heap object <TT>s</tt>, check that the
  275. collector's layout description for <TT>s</tt> is such that the pointer field
  276. will be scanned. Call <TT>*GC_find_header(s)</tt> to look at the descriptor
  277. for the heap chunk. The <TT>hb_descr</tt> field specifies the layout
  278. of objects in that chunk. See gc_mark.h for the meaning of the descriptor.
  279. (If it's low order 2 bits are zero, then it is just the length of the
  280. object prefix to be scanned. This form is always used for objects allocated
  281. with <TT>GC_malloc</tt> or <TT>GC_malloc_atomic</tt>.)
  282. <LI> If the failure is not deterministic, you may still be able to apply some
  283. of the above technique at the point of failure. But remember that objects
  284. allocated since the last collection will not have been marked, even if the
  285. collector is functioning properly. On some platforms, the collector
  286. can be configured to save call chains in objects for debugging.
  287. Enabling this feature will also cause it to save the call stack at the
  288. point of the last GC in GC_arrays._last_stack.
  289. <LI> When looking at GC internal data structures remember that a number
  290. of <TT>GC_</tt><I>xxx</i> variables are really macro defined to
  291. <TT>GC_arrays._</tt><I>xxx</i>, so that
  292. the collector can avoid scanning them.
  293. </ol>
  294. </body>
  295. </html>