Garbage collection (computer science)
View on Wikipedia


In computer science, garbage collection (GC) is a form of automatic memory management.[2] The garbage collector attempts to reclaim memory that was allocated by the program, but is no longer referenced; such memory is called garbage. Garbage collection was invented by American computer scientist John McCarthy around 1959 to simplify manual memory management in Lisp.[3]
Garbage collection relieves the programmer from doing manual memory management, where the programmer specifies what objects to de-allocate and return to the memory system and when to do so.[2] Other, similar techniques include stack allocation, region inference, and memory ownership, and combinations thereof. Garbage collection may take a significant proportion of a program's total processing time, and affect performance as a result.
Resources other than memory, such as network sockets, database handles, windows, file descriptors, and device descriptors, are not typically handled by garbage collection, but rather by other methods (e.g. destructors). Some such methods de-allocate memory also.
Overview
[edit]This section needs additional citations for verification. (July 2014) |
Many programming languages require garbage collection, either as part of the language specification (e.g., RPL, Java, C#, D,[4] Go, and most scripting languages) or effectively for practical implementation (e.g., formal languages like lambda calculus).[5] These are said to be garbage-collected languages. Other languages, such as C and C++, were designed for use with manual memory management, but have garbage-collected implementations available. Some languages, like Ada, Modula-3, and C++/CLI, allow both garbage collection and manual memory management to co-exist in the same application by using separate heaps for collected and manually managed objects. Still others, like D, are garbage-collected but allow the user to manually delete objects or even disable garbage collection entirely when speed is required.[6]
Although many languages integrate GC into their compiler and runtime system, post-hoc GC systems also exist, such as Automatic Reference Counting (ARC). Some of these post-hoc GC systems do not require recompilation.[7]
Advantages
[edit]GC frees the programmer from manually de-allocating memory. This helps avoid some kinds of errors:[8]
- Dangling pointers, which occur when a piece of memory is freed while there are still pointers to it, and one of those pointers is dereferenced. By then the memory may have been reassigned to another use, with unpredictable results.[9]
- Double free bugs, which occur when the program tries to free a region of memory that has already been freed, and perhaps already been allocated again.
- Certain kinds of memory leaks, in which a program fails to free memory occupied by objects that have become unreachable, which can lead to memory exhaustion.[10]
Disadvantages
[edit]GC uses computing resources to decide which memory to free. Therefore, the penalty for the convenience of not annotating object lifetime manually in the source code is overhead, which can impair program performance.[11] A peer-reviewed paper from 2005 concluded that GC needs five times the memory to compensate for this overhead and to perform as fast as the same program using idealized explicit memory management. The comparison however is made to a program generated by inserting deallocation calls using an oracle, implemented by collecting traces from programs run under a profiler, and the program is only correct for one particular execution of the program.[12] Interaction with memory hierarchy effects can make this overhead intolerable in circumstances that are hard to predict or to detect in routine testing. The impact on performance was given by Apple as a reason for not adopting garbage collection in iOS, despite it being the most desired feature.[13]
The moment when the garbage is actually collected can be unpredictable, resulting in stalls (pauses to shift/free memory) scattered throughout a session. Unpredictable stalls can be unacceptable in real-time environments, in transaction processing, or in interactive programs. Incremental, concurrent, and real-time garbage collectors address these problems, with varying trade-offs.
Strategies
[edit]Tracing
[edit]Tracing garbage collection is the most common type of garbage collection, so much so that "garbage collection" often refers to tracing garbage collection, rather than other methods such as reference counting. The overall strategy consists of determining which objects should be garbage collected by tracing which objects are reachable by a chain of references from certain root objects, and considering the rest as garbage and collecting them. However, there are a large number of algorithms used in implementation, with widely varying complexity and performance characteristics.
Reference counting
[edit]Reference counting garbage collection is where each object has a count of the number of references to it. Garbage is identified by having a reference count of zero. An object's reference count is incremented when a reference to it is created and decremented when a reference is destroyed. When the count reaches zero, the object's memory is reclaimed.[14]
As with manual memory management, and unlike tracing garbage collection, reference counting guarantees that objects are destroyed as soon as their last reference is destroyed, and usually only accesses memory which is either in CPU caches, in objects to be freed, or directly pointed to by those, and thus tends to not have significant negative side effects on CPU cache and virtual memory operation.
There are a number of disadvantages to reference counting; this can generally be solved or mitigated by more sophisticated algorithms:
- Cycles
- If two or more objects refer to each other, they can create a cycle whereby neither will be collected as their mutual references never let their reference counts become zero. Some garbage collection systems using reference counting (like the one in CPython) use specific cycle-detecting algorithms to deal with this issue.[15] Another strategy is to use weak references for the "backpointers" which create cycles. Under reference counting, a weak reference is similar to a weak reference under a tracing garbage collector. It is a special reference object whose existence does not increment the reference count of the referent object. Furthermore, a weak reference is safe in that when the referent object becomes garbage, any weak reference to it lapses, rather than being permitted to remain dangling, meaning that it turns into a predictable value, such as a null reference.
- Space overhead (reference count)
- Reference counting requires space to be allocated for each object to store its reference count. The count may be stored adjacent to the object's memory or in a side table somewhere else, but in either case, every single reference-counted object requires additional storage for its reference count. Memory space with the size of an unsigned pointer is commonly used for this task, meaning that 32 or 64 bits of reference count storage must be allocated for each object. On some systems, it may be possible to mitigate this overhead by using a tagged pointer to store the reference count in unused areas of the object's memory. Often, an architecture does not actually allow programs to access the full range of memory addresses that could be stored in its native pointer size; a certain number of high bits in the address is either ignored or required to be zero. If an object reliably has a pointer at a certain location, the reference count can be stored in the unused bits of the pointer. For example, each object in Objective-C has a pointer to its class at the beginning of its memory; on the ARM64 architecture using iOS 7, 19 unused bits of this class pointer are used to store the object's reference count.[16][17]
- Speed overhead (increment/decrement)
- In naive implementations, each assignment of a reference and each reference falling out of scope often require modifications of one or more reference counters. However, in a common case when a reference is copied from an outer scope variable into an inner scope variable, such that the lifetime of the inner variable is bounded by the lifetime of the outer one, the reference incrementing can be eliminated. The outer variable "owns" the reference. In the programming language C++, this technique is readily implemented and demonstrated with the use of
constreferences. Reference counting in C++ is usually implemented using "smart pointers"[18] whose constructors, destructors, and assignment operators manage the references. A smart pointer can be passed by reference to a function, which avoids the need to copy-construct a new smart pointer (which would increase the reference count on entry into the function and decrease it on exit). Instead, the function receives a reference to the smart pointer which is produced inexpensively. The Deutsch-Bobrow method of reference counting capitalizes on the fact that most reference count updates are in fact generated by references stored in local variables. It ignores these references, only counting references in the heap, but before an object with reference count zero can be deleted, the system must verify with a scan of the stack and register that no other reference to it still exists. A further substantial decrease in the overhead on counter updates can be obtained by update coalescing introduced by Levanoni and Petrank.[19][20] Consider a pointer that in a given interval of the execution is updated several times. It first points to an objectO1, then to an objectO2, and so forth until at the end of the interval it points to some objectOn. A reference counting algorithm would typically executerc(O1)--,rc(O2)++,rc(O2)--,rc(O3)++,rc(O3)--, ...,rc(On)++. But most of these updates are redundant. In order to have the reference count properly evaluated at the end of the interval it is enough to performrc(O1)--andrc(On)++. Levanoni and Petrank measured an elimination of more than 99% of the counter updates in typical Java benchmarks.
- Requires atomicity
- When used in a multithreaded environment, these modifications (increment and decrement) may need to be atomic operations such as compare-and-swap, at least for any objects which are shared, or potentially shared among multiple threads. Atomic operations are expensive on a multiprocessor, and even more expensive if they have to be emulated with software algorithms. It is possible to avoid this issue by adding per-thread or per-CPU reference counts and only accessing the global reference count when the local reference counts become or are no longer zero (or, alternatively, using a binary tree of reference counts, or even giving up deterministic destruction in exchange for not having a global reference count at all), but this adds significant memory overhead and thus tends to be only useful in special cases (it is used, for example, in the reference counting of Linux kernel modules). Update coalescing by Levanoni and Petrank[19][20] can be used to eliminate all atomic operations from the write-barrier. Counters are never updated by the program threads in the course of program execution. They are only modified by the collector which executes as a single additional thread with no synchronization. This method can be used as a stop-the-world mechanism for parallel programs, and also with a concurrent reference counting collector.
- Not real-time
- Naive implementations of reference counting do not generally provide real-time behavior, because any pointer assignment can potentially cause a number of objects bounded only by total allocated memory size to be recursively freed while the thread is unable to perform other work. It is possible to avoid this issue by delegating the freeing of unreferenced objects to other threads, at the cost of extra overhead.
Escape analysis
[edit]Escape analysis is a compile-time technique that can convert heap allocations to stack allocations, thereby reducing the amount of garbage collection to be done. This analysis determines whether an object allocated inside a function is accessible outside of it. If a function-local allocation is found to be accessible to another function or thread, the allocation is said to "escape" and cannot be done on the stack. Otherwise, the object may be allocated directly on the stack and released when the function returns, bypassing the heap and associated memory management costs.[21]
Availability
[edit]Generally speaking, higher-level programming languages are more likely to have garbage collection as a standard feature. In some languages lacking built-in garbage collection, it can be added through a library, as with the Boehm garbage collector for C and C++.
Most functional programming languages, such as ML, Haskell, and APL, have garbage collection built in. Lisp is especially notable as both the first functional programming language and the first language to introduce garbage collection.[22]
Other dynamic languages, such as Ruby and Julia (but not Perl 5 or PHP before version 5.3,[23] which both use reference counting), JavaScript and ECMAScript also tend to use GC. Object-oriented programming languages such as Smalltalk, ooRexx, RPL and Java usually provide integrated garbage collection. Notable exceptions are C++ and Delphi, which have destructors.
BASIC
[edit]BASIC and Logo have often used garbage collection for variable-length data types, such as strings and lists, so as not to burden programmers with memory management details. On the Altair 8800, programs with many string variables and little string space could cause long pauses due to garbage collection.[24] Similarly the Applesoft BASIC interpreter's garbage collection algorithm repeatedly scans the string descriptors for the string having the highest address in order to compact it toward high memory, resulting in performance[25] and pauses anywhere from a few seconds to a few minutes.[26] A replacement garbage collector for Applesoft BASIC by Randy Wigginton identifies a group of strings in every pass over the heap, reducing collection time dramatically.[27] BASIC.SYSTEM, released with ProDOS in 1983, provides a windowing garbage collector for BASIC that is many times faster.[28]
C and C++
[edit]C has never offered official support for garbage collection. C++ added garbage collection support in C++11 to the standard library, however this was removed in C++23 due to no compilers implementing support for the feature.[29] The features that were part of this were related to pointer safety.[30]
Although garbage collection support in the standard library was removed, some garbage collectors such as Boehm garbage collector (for C and C++) can still be used. Boehm GC uses mark-and-sweep garbage collection. It can also be used in leak detection mode, where memory management is still manual however leaks and double-free errors can be detected and reported. Its use can be called from the header <gc.h>.
One can still abstract away manual object destructions in C++ by using the "resource acquisition is initialization" (RAII) idiom and smart pointers. std::unique_ptr ties lifetimes to ownership, while std::shared_ptr uses reference counting to determine lifetime. std::weak_ptr can be used to obtain a pointer without increasing the reference count. Unlike garbage collection, RAII is deterministic.
Objective-C
[edit]While the Objective-C traditionally had no garbage collection, with the release of OS X 10.5 in 2007 Apple introduced garbage collection for Objective-C 2.0, using an in-house developed runtime collector.[31] However, with the 2012 release of OS X 10.8, garbage collection was deprecated in favor of LLVM's automatic reference counter (ARC) that was introduced with OS X 10.7.[32] Furthermore, since May 2015 Apple even forbade the usage of garbage collection for new OS X applications in the App Store.[33][34] For iOS, garbage collection has never been introduced due to problems in application responsivity and performance;[13][35] instead, iOS uses ARC.[36][37]
Limited environments
[edit]Garbage collection is rarely used on embedded or real-time systems because of the usual need for very tight control over the use of limited resources. However, garbage collectors compatible with many limited environments have been developed.[38] The Microsoft .NET Micro Framework, .NET nanoFramework[39] and Java Platform, Micro Edition are embedded software platforms that, like their larger cousins, include garbage collection.
Java
[edit]Garbage collectors available in Java OpenJDKs virtual machine (JVM) include:
- Serial
- Parallel
- CMS (Concurrent Mark Sweep)
- G1 (Garbage-First)
- ZGC (Z Garbage Collector)
- Epsilon
- Shenandoah
- GenZGC (Generational ZGC)
- GenShen (Generational Shenandoah)
- IBM Metronome (only in IBM OpenJDK)
- SAP (only in SAP OpenJDK)
- Azul C4 (Continuously Concurrent Compacting Collector)[40] (only in Azul Systems OpenJDK)
Compile-time use
[edit]Compile-time garbage collection is a form of static analysis allowing memory to be reused and reclaimed based on invariants known during compilation.
This form of garbage collection has been studied in the Mercury programming language,[41] and it saw greater usage with the introduction of LLVM's automatic reference counter (ARC) into Apple's ecosystem (iOS and OS X) in 2011.[36][37][33]
Real-time systems
[edit]Incremental, concurrent, and real-time garbage collectors have been developed, for example by Henry Baker and by Henry Lieberman.[42][43][44]
In Baker's algorithm, the allocation is done in either half of a single region of memory. When it becomes half full, a garbage collection is performed which moves the live objects into the other half and the remaining objects are implicitly deallocated. The running program (the 'mutator') has to check that any object it references is in the correct half, and if not move it across, while a background task is finding all of the objects.[45]
Generational garbage collection schemes are based on the empirical observation that most objects die young. In generational garbage collection, two or more allocation regions (generations) are kept, which are kept separate based on the object's age. New objects are created in the "young" generation that is regularly collected, and when a generation is full, the objects that are still referenced from older regions are copied into the next oldest generation. Occasionally a full scan is performed.
Some high-level language computer architectures include hardware support for real-time garbage collection.
Most implementations of real-time garbage collectors use tracing.[citation needed] Such real-time garbage collectors meet hard real-time constraints when used with a real-time operating system.[46]
See also
[edit]References
[edit]- ^ Abelson, Harold; Sussman, Gerald Jay; Sussman, Julie (2016). Structure and Interpretation of Computer Programs (PDF) (2nd ed.). Cambridge, Massachusetts, US: MIT Press. pp. 734–736.
- ^ a b "What is garbage collection (GC) in programming?". Storage. Retrieved 2024-06-21.
- ^ McCarthy, John (1960). "Recursive functions of symbolic expressions and their computation by machine, Part I". Communications of the ACM. 3 (4): 184–195. doi:10.1145/367177.367199. S2CID 1489409. Retrieved 2009-05-29.
- ^ "Overview – D Programming Language". dlang.org. Digital Mars. Retrieved 2014-07-29.
- ^ Heller, Martin (2023-02-03). "What is garbage collection? Automated memory management for your programs". InfoWorld. Retrieved 2024-06-21.
- ^ "A Guide to Garbage Collection in Programming". freeCodeCamp.org. 2020-01-16. Retrieved 2024-06-21.
- ^ "Garbage Collection - D Programming Language". dlang.org. Retrieved 2022-10-17.
- ^ "Garbage Collection". rebelsky.cs.grinnell.edu. Retrieved 2024-01-13.
- ^ Heller, Martin (2023-02-03). "What is garbage collection? Automated memory management for your programs". InfoWorld. Retrieved 2024-06-21.
- ^ Microsoft (2023-02-28). "Fundamentals of garbage collection | Microsoft Learn". Retrieved 2023-03-29.
- ^ Zorn, Benjamin (1993-01-22). "The Measured Cost of Conservative Garbage Collection". Software: Practice and Experience. 23 (7). Department of Computer Science, University of Colorado Boulder: 733–756. CiteSeerX 10.1.1.14.1816. doi:10.1002/spe.4380230704. S2CID 16182444.
- ^ Hertz, Matthew; Berger, Emery D. (2005). "Quantifying the Performance of Garbage Collection vs. Explicit Memory Management" (PDF). Proceedings of the 20th Annual ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications - OOPSLA '05. pp. 313–326. doi:10.1145/1094811.1094836. ISBN 1-59593031-0. S2CID 6570650. Archived (PDF) from the original on 2012-04-02. Retrieved 2015-03-15.
- ^ a b "Developer Tools Kickoff – session 300" (PDF). WWDC 2011. Apple, Inc. 2011-06-24. Archived from the original (PDF) on 2023-09-04. Retrieved 2015-03-27.
- ^ Microsoft (2009-01-27). "Reference Counting Garbage Collection". Retrieved 2023-03-29.
- ^ "Reference Counts". Extending and Embedding the Python Interpreter. 2008-02-21. Retrieved 2014-05-22.
- ^ Ash, Mike. "Friday Q&A 2013-09-27: ARM64 and You". mikeash.com. Retrieved 2014-04-27.
- ^ "Hamster Emporium: [objc explain]: Non-pointer isa". Sealiesoftware.com. 2013-09-24. Retrieved 2014-04-27.
- ^ Pibinger, Roland (2005-05-03) [2005-04-17]. "RAII, Dynamic Objects, and Factories in C++".
- ^ a b Levanoni, Yossi; Petrank, Erez (2001). "An on-the-fly reference-counting garbage collector for java". Proceedings of the 16th ACM SIGPLAN Conference on Object-Oriented Programming, Systems, Languages, and Applications. OOPSLA 2001. pp. 367–380. doi:10.1145/504282.504309.
- ^ a b Levanoni, Yossi; Petrank, Erez (2006). "An on-the-fly reference-counting garbage collector for java". ACM Trans. Program. Lang. Syst. 28: 31–69. CiteSeerX 10.1.1.15.9106. doi:10.1145/1111596.1111597. S2CID 14777709.
- ^ Salagnac, Guillaume; Yovine, Sergio; Garbervetsky, Diego (2005-05-24). "Fast Escape Analysis for Region-based Memory Management". Electronic Notes in Theoretical Computer Science. 131: 99–110. doi:10.1016/j.entcs.2005.01.026.
- ^ Chisnall, David (2011-01-12). Influential Programming Languages, Part 4: Lisp.
- ^ "PHP: Performance Considerations". php.net. Retrieved 2015-01-14.
- ^ "Altair 8800 Basic 4.1 Reference Manual" (PDF). The Vintage Technology Digital Archive. April 1977. p. 108. Archived (PDF) from the original on 2021-06-29. Retrieved 2021-06-29.
- ^ "I did some work to speed up string garbage collection under Applesoft..." Hacker News. Retrieved 2021-06-29.
- ^ Little, Gary B. (1985). Inside the Apple IIc. Bowie, Md.: Brady Communications Co. p. 82. ISBN 0-89303-564-5. Retrieved 2021-06-29.
- ^ "Fast Garbage Collection". Call-A.P.P.L.E.: 40–45. January 1981.
- ^ Worth, Don (1984). Beneath Apple Pro DOS (PDF) (March 1985 printing ed.). Chatsworth, California, US: Quality Software. pp. 2–6. ISBN 0-912985-05-4. Archived (PDF) from the original on 2008-12-03. Retrieved 2021-06-29.
- ^ JF Bastien; Alisdair Meredith (2021-04-16). "Removing Garbage Collection Support".
- ^ "std::pointer_safety - cppreference.com". en.cppreference.com. Retrieved 2024-12-09.
- ^ "Objective-C 2.0 Overview". Archived from the original on 2010-07-24.
- ^ Siracusa, John (2011-07-20). "Mac OS X 10.7 Lion: the Ars Technica review".
- ^ a b "Apple says Mac app makers must transition to ARC memory management by May". AppleInsider. 2015-02-20.
- ^ Cichon, Waldemar (2015-02-21). "App Store: Apple entfernt Programme mit Garbage Collection". Heise.de. Retrieved 2015-03-30.
- ^ Silva, Precious (2014-11-18). "iOS 8 vs Android 5.0 Lollipop: Apple Kills Google with Memory Efficiency". International Business Times. Archived from the original on 2015-04-03. Retrieved 2015-04-07.
- ^ a b Napier, Rob; Kumar, Mugunth (2012-11-20). iOS 6 Programming Pushing the Limit. John Wiley & Sons. ISBN 978-1-11844997-4. Retrieved 2015-03-30.
- ^ a b Cruz, José R. C. (2012-05-22). "Automatic Reference Counting on iOS". Dr. Dobbs. Archived from the original on 2020-05-16. Retrieved 2015-03-30.
- ^ Fu, Wei; Hauser, Carl (2005). "A real-time garbage collection framework for embedded systems". Proceedings of the 2005 Workshop on Software and Compilers for Embedded Systems - SCOPES '05. pp. 20–26. doi:10.1145/1140389.1140392. ISBN 1-59593207-0. S2CID 8635481.
- ^ ".NET nanoFramework".
- ^ Tene, Gil; Iyengar, Balaji; Wolf, Michael (2011). "C4: the continuously concurrent compacting collector" (PDF). ISMM '11: Proceedings of the international symposium on Memory management. doi:10.1145/1993478. ISBN 978-1-45030263-0. Archived (PDF) from the original on 2017-08-09.
- ^ Mazur, Nancy (May 2004). Compile-time garbage collection for the declarative language Mercury (PDF) (Thesis). Katholieke Universiteit Leuven. Archived (PDF) from the original on 2014-04-27.
- ^ Huelsbergen, Lorenz; Winterbottom, Phil (1998). "Very concurrent mark-&-sweep garbage collection without fine-grain synchronization" (PDF). Proceedings of the First International Symposium on Memory Management - ISMM '98. pp. 166–175. doi:10.1145/286860.286878. ISBN 1-58113114-3. S2CID 14399427. Archived (PDF) from the original on 2008-05-13.
- ^ "GC FAQ".
- ^ Lieberman, Henry; Hewitt, Carl (1983). "A real-time garbage collector based on the lifetimes of objects". Communications of the ACM. 26 (6): 419–429. doi:10.1145/358141.358147. hdl:1721.1/6335. S2CID 14161480.
- ^ Baker, Henry G. (1978). "List processing in real time on a serial computer". Communications of the ACM. 21 (4): 280–294. doi:10.1145/359460.359470. hdl:1721.1/41976. S2CID 17661259. see also description
- ^ McCloskey; Bacon; Cheng; Grove (2008), Staccato: A Parallel and Concurrent Real-time Compacting Garbage Collector for Multiprocessors (PDF), archived (PDF) from the original on 2014-03-11
Further reading
[edit]- Jones, Richard; Hosking, Antony; Moss, J. Eliot B. (2011-08-16). The Garbage Collection Handbook: The Art of Automatic Memory Management. CRC Applied Algorithms and Data Structures Series. Chapman and Hall / CRC Press / Taylor & Francis Ltd. ISBN 978-1-4200-8279-1. (511 pages)
- Jones, Richard; Lins, Rafael (1996-07-12). Garbage Collection: Algorithms for Automatic Dynamic Memory Management (1 ed.). Wiley. ISBN 978-0-47194148-4. (404 pages)
- Schorr, Herbert; Waite, William M. (August 1967). "An Efficient Machine-Independent Procedure for Garbage Collection in Various List Structures" (PDF). Communications of the ACM. 10 (8): 501–506. doi:10.1145/363534.363554. S2CID 5684388. Archived (PDF) from the original on 2021-01-22.
- Wilson, Paul R. (1992). "Uniprocessor Garbage Collection Techniques". Memory Management. Lecture Notes in Computer Science. Vol. 637. Springer-Verlag. pp. 1–42. CiteSeerX 10.1.1.47.2438. doi:10.1007/bfb0017182. ISBN 3-540-55940-X.
{{cite book}}:|journal=ignored (help) - Wilson, Paul R.; Johnstone, Mark S.; Neely, Michael; Boles, David (1995). "Dynamic Storage Allocation: A Survey and Critical Review". Memory Management. Lecture Notes in Computer Science. Vol. 986 (1 ed.). pp. 1–116. CiteSeerX 10.1.1.47.275. doi:10.1007/3-540-60368-9_19. ISBN 978-3-540-60368-9.
{{cite book}}:|journal=ignored (help)
External links
[edit]- The Memory Management Reference Archived 2020-12-13 at the Wayback Machine
- The Very Basics of Garbage Collection
- Java SE 6 HotSpot Virtual Machine Garbage Collection Tuning
- TinyGC - an independent implementation of the BoehmGC API
- Conservative Garbage Collection Implementation for C Language
- MeixnerGC - an incremental mark and sweep garbage collector for C++ using smart pointers
Garbage collection (computer science)
View on GrokipediaIntroduction
Definition and Purpose
Garbage collection (GC) is a form of automatic memory management whereby a runtime system periodically identifies and reclaims portions of memory occupied by objects that are no longer accessible or in use by the executing program.[2] In this process, objects are classified as "live" if they remain reachable from designated roots—such as active stack frames, global variables, or registers—via chains of references; conversely, unreachable objects constitute "garbage" and are eligible for reclamation to free up heap space.[9] Heap allocation refers to the dynamic creation of such objects in a program's heap memory region, distinct from static or stack-based allocation, enabling flexible data structures but necessitating automated cleanup to prevent resource exhaustion.[10] The core purpose of garbage collection is to automate the deallocation of dynamically allocated memory, thereby mitigating bugs inherent in manual management, including memory leaks where unused objects accumulate indefinitely and dangling pointers that reference prematurely freed memory.[11] This automation reduces the cognitive burden on developers, who can focus on algorithmic logic rather than explicit memory tracking, enhancing code reliability and maintainability across long-running applications.[1] Garbage collection originated in the late 1950s to address the limitations of manual memory management in early high-level languages, where dynamic allocation often led to complex and error-prone deallocation logic.[12] Pioneered by John McCarthy for the Lisp programming language around 1959, it provided a mechanism for automatic reclamation suited to Lisp's recursive, list-based structures, marking a foundational shift toward safer memory handling in computing.[13]Comparison to Manual Management
In manual memory management, prevalent in languages such as C and C++, programmers explicitly allocate memory for dynamic data structures using functions likemalloc or the new operator, and are responsible for deallocating it via free or delete once it is no longer needed.[14] This approach grants direct control over memory usage but introduces significant risks, including memory leaks, where forgotten deallocations cause accumulated unreleased memory, leading to performance degradation and potential program failure over extended execution.[15] Additionally, dangling pointers arise from accessing memory after deallocation (use-after-free errors), which can result in data corruption, crashes, or security vulnerabilities, as the freed memory may be repurposed unpredictably.[16] Poor deallocation patterns further exacerbate external fragmentation, where free memory becomes scattered in non-contiguous blocks, hindering allocation of large contiguous regions despite sufficient total free space.
Garbage collection automates this process by having the runtime system transparently detect and reclaim memory occupied by unreachable objects, without requiring programmer intervention for deallocation.[17] This mechanism identifies live objects through reachability analysis from program roots (such as stack variables and globals) and marks unreferenced ones for collection, thereby preventing leaks and dangling references inherent in manual approaches.[14] As a result, developers focus on logic rather than memory lifecycle, reducing the cognitive burden and error rate associated with explicit management.
While garbage collection incurs runtime overhead—such as periodic pauses for collection and extra metadata for tracking object references—it eliminates common manual errors, enhancing software reliability and maintainability.[17] In contrast, manual management offers precise control and lower overhead in performance-critical scenarios, but demands rigorous discipline, often leading to subtle bugs that are difficult to debug.[14] For instance, C-style code using raw pointers for dynamic arrays requires careful pairing of allocation and deallocation to avoid leaks, whereas Java's runtime employs garbage collection to handle object lifecycles automatically, simplifying development at the expense of occasional non-deterministic pauses.[17] Studies indicate that well-tuned garbage collectors can achieve space efficiency and execution times comparable to manual management in many workloads, underscoring the viability of automatic approaches for modern applications.[17]
Core Concepts
Object Reachability
In garbage collection, an object is deemed reachable if there is a directed path from one of the program's roots to that object via a chain of references contained within other objects. This path-based definition ensures that only objects potentially accessible during program execution are preserved, while those without such connections are classified as garbage and eligible for reclamation. The concept originates from early automatic memory management systems, where reclaiming unreachable memory prevents exhaustion of heap space without manual intervention. Roots serve as the starting points for determining reachability and typically include locations outside the heap that may hold pointers to heap-allocated objects, such as local variables on the call stack, global or static variables, CPU registers, and entire thread stacks in multithreaded environments. These roots represent the program's active state at the moment of collection, capturing all potential entry points into the heap. By tracing from these roots, the collector follows references recursively to mark all connected objects as live, ensuring completeness in identifying usable memory. The heap's structure lends itself to modeling as a directed graph, with objects as nodes and references as edges pointing from referencing objects to the referenced ones. In this graph, reachable objects form connected components accessible from the root set, while garbage consists of disconnected components or isolated nodes with no incoming path from roots. This graph-theoretic view underscores that even complex structures, such as trees or lists, are preserved only if linked back to roots, providing a formal foundation for distinguishing live data from waste. Garbage collectors differ in their approach to identifying pointers and roots, leading to distinctions between precise and conservative implementations. Precise collectors leverage compile-time type information to exactly locate pointers in memory, enabling accurate tracing without ambiguity. In contrast, conservative collectors, designed for languages without such metadata like C or C++, scan memory regions (including stacks and registers) for word-sized values that could be pointers, treating potential matches as roots even if they are not; this approximation may retain some garbage as false positives but avoids requiring language-level cooperation. The trade-off favors conservative methods in uncooperative environments, where they achieve safe collection at the cost of slightly reduced efficiency. A key challenge in reachability arises with cycles, where objects reference each other mutually but lack connection to any root. For instance, if object A holds a reference to object B and B references A back, forming a cycle, both remain garbage if no root points to either, as no path exists from the program's active state to the cycle. This illustrates that mutual references alone do not confer reachability; the collector must detect the absence of root linkage to reclaim such structures, preventing memory leaks from orphaned cycles.Roots and Tracing Basics
In garbage collection, roots represent the entry points from which the collector begins identifying reachable objects, typically consisting of locations outside the heap that may hold references to heap-allocated objects, such as stacks, CPU registers, and global or static variables.[18] The process of root identification involves systematically scanning these areas to extract all pointers to the heap; for instance, the stack is traversed frame by frame to locate local variables that reference objects, while registers are inspected for any live pointers at the moment of collection initiation.[5] In multi-threaded environments, this scanning extends to the stacks and registers of all threads to capture a consistent snapshot of references across the program.[19] The tracing process operationalizes reachability by starting from the identified roots and recursively following references through the object graph to mark all connected objects as live.[5] This traversal, often implemented using depth-first or breadth-first search, ensures that every object directly or indirectly referenced from a root is visited, thereby distinguishing reachable objects from those that can be reclaimed.[18] Efficiency in tracing is enhanced by techniques such as bitmap marking, where a compact bitmap array is used alongside the heap to record the marked status of objects, with each bit corresponding to an object or a fixed-size block to minimize space overhead and speed up checks during traversal.[5] A key abstraction for understanding and implementing tracing, particularly in preparations for incremental collection, is the tri-color marking scheme, which categorizes objects into three states: white for unvisited objects, gray for objects that have been visited but whose outgoing references have not been fully explored, and black for objects whose references have been completely processed.[20] This model facilitates recursive marking by maintaining a worklist of gray objects, ensuring no reachable object is overlooked while allowing potential interruptions in more advanced collectors.[20] In basic tracing implementations, the entire process requires a stop-the-world pause, during which the mutator threads are halted to prevent mutations that could invalidate the reachability computation, typically lasting from milliseconds to seconds depending on heap size and object graph complexity.[18] These pauses ensure atomicity in root scanning and tracing but can impact application responsiveness in latency-sensitive scenarios.[21]Algorithmic Approaches
Reference Counting
Reference counting is a garbage collection technique that automatically deallocates memory by maintaining an explicit count of references to each object. Introduced by George E. Collins in 1960, the mechanism associates a counter with every allocated object, which is incremented each time a new reference to the object is created and decremented when a reference is destroyed. When the counter reaches zero, indicating no active references remain, the object is immediately reclaimed, freeing its memory. This approach provides precise tracking of object lifetimes without requiring global heap scans, making it suitable for systems where low-latency memory management is critical.[22] A fundamental limitation of basic reference counting arises with circular references, where two or more objects reference each other, preventing their counters from reaching zero despite being unreachable from program roots.[23] For instance, if object A points to object B and object B points back to object A, neither can be deallocated under standard reference counting, leading to memory leaks.[23] This creates reachability challenges, as cycles mask true unreachability from the program's entry points. To address this, solutions include weak references, which do not increment the count and thus break cycles without sustaining mutual dependencies.[24] Another method is deferred reference counting, which delays decrements during mutation to detect and resolve cycles incrementally.[25] In implementation, reference counts are typically stored inline within each object's header, occupying a single machine word to minimize overhead.[22] For multithreaded environments, atomic operations such as compare-and-swap are employed to update counters safely, ensuring consistency across concurrent accesses without locks.[22] This design allows for efficient integration into language runtimes, though it requires compiler or runtime support to instrument pointer assignments.[25] Reference counting offers several advantages, including immediate deallocation upon the last reference's release, which eliminates the need for collection pauses and supports real-time systems. It also incurs no whole-heap traversal costs, distributing reclamation work proportionally to allocation and deallocation activity. These properties make it particularly effective for workloads with short-lived objects and infrequent cycles. A prominent example is the CPython implementation of Python, which employs reference counting as its primary memory management strategy, supplemented by a cycle detection mechanism to handle circular references.[26] In CPython, each PyObject header includes an ob_refcnt field that tracks references, with decrements to zero triggering immediate deallocation unless cycles are suspected.[26] The cycle detector periodically examines objects with suspicious reference patterns, reclaiming cyclic garbage without relying on full tracing.[27]Mark-and-Sweep Tracing
Mark-and-sweep is a tracing garbage collection algorithm that identifies and reclaims unreachable objects by marking live ones and then sweeping the heap to free the unmarked. It was invented by John McCarthy in 1960 as part of the Lisp programming system to automatically manage memory for list structures without manual deallocation.[28] The algorithm assumes a heap where objects contain pointers to other objects, and it begins tracing from a set of roots, such as global variables, stack frames, and registers holding active pointers.[29] The algorithm proceeds in two distinct phases: marking and sweeping. In the mark phase, the collector performs a graph traversal—typically depth-first or breadth-first—from the roots to identify all reachable objects, marking each as live to prevent redundant processing. This phase ensures that only objects directly or indirectly accessible from the roots are considered live, while others are deemed garbage. To efficiently track marked status and avoid revisiting objects during traversal, implementations commonly use a bitmap (a separate array of bits, one per heap word or object) or a dedicated mark bit within each object's header. The bitmap approach improves locality by centralizing mark operations, reducing cache misses compared to per-object bits.[30][31] Marking can be implemented recursively or iteratively. A recursive version, suitable for languages like Lisp, follows pointers until all live objects are marked, but it risks stack overflow for deeply nested structures; an iterative version uses a stack or queue to simulate the recursion safely. The following outlines a basic recursive marking procedure (called on each root):procedure mark(obj):
if obj is null or marked(obj):
return
set marked(obj) to true
for each pointer field child in obj:
mark(child)
After marking, all roots and their transitive closures are flagged.[29][31]
In the sweep phase, the collector scans the entire heap sequentially, typically from low to high addresses. For each object encountered, if it is unmarked, it is reclaimed by adding it to a free list or pool for future allocations; if marked, its mark bit is cleared to prepare for the next collection cycle. This phase updates the free space management structures, such as linking freed blocks into a list of available memory chunks. The sweep ensures complete reclamation but requires traversing the full heap, incurring time proportional to heap size regardless of live data volume.[30][29]
The basic mark-and-sweep algorithm does not relocate objects, leaving gaps (holes) where garbage was removed, which can lead to external fragmentation. Over multiple collections, these scattered free blocks may prevent allocation of large contiguous regions even if total free space is sufficient, potentially causing out-of-memory errors at high heap occupancies. No compaction occurs in this variant, distinguishing it from more advanced approaches that address fragmentation through relocation.[31][30]