当前位置:网站首页>JVM memory model concept
JVM memory model concept
2022-07-06 14:22:00 【xmh-sxh-1314】
JVM The memory model is divided into virtual machine stack , Pile up , Method area , Program counter , Five parts of the local method stack .
Java The virtual machine stack is the same as the program counter ,Java Virtual machine stack (Java Virtual Machine Stacks) It's also thread private , It has the same life cycle as a thread .
Java Heap for most applications ,Java Pile up (Java Heap) yes Java The largest chunk of memory managed by a virtual machine .Java The heap is an area of memory Shared by all threads , Created when the virtual machine starts .
Method area (Method Area) And Java Pile up , Is an area of memory Shared by each thread , It is used to store class information that has been loaded by the virtual machine 、 Constant 、 Static variables 、 Real time compiler compiled code and other data .
Program counter (Program Counter Register) It's a small amount of memory , Its function can be seen
It is the line number indicator of the bytecode executed by the current thread .
Native Method Stack (Native Method Stacks) It's very similar to what the virtual machine stack does , The difference is that the virtual machine stack executes for the virtual machine Java Method ( That's bytecode ) service , The local method stack is used by the virtual machine Native Method service .
JVM The advantages of memory model
Built in memory based concurrency model : Thread mechanism
Synchronization lock Synchronization
A large number of thread safe library packages support
Memory based concurrency mechanism , Flexible granularity control , Flexibility is higher than database lock .
Multi core parallel computing model
Thread based asynchronous model .
边栏推荐
- Record a penetration of the cat shed from outside to inside. Library operation extraction flag
- Spot gold prices rose amid volatility, and the rise in U.S. prices is likely to become the key to the future
- HackMyvm靶机系列(3)-visions
- 7-3 construction hash table (PTA program design)
- HackMyvm靶機系列(3)-visions
- Intel oneapi - opening a new era of heterogeneity
- Record an edu, SQL injection practice
- Yugu p1012 spelling +p1019 word Solitaire (string)
- Intranet information collection of Intranet penetration (5)
- HackMyvm靶机系列(1)-webmaster
猜你喜欢

7-5 staircase upgrade (PTA program design)

攻防世界MISC练习区(SimpleRAR、base64stego、功夫再高也怕菜刀)

Callback function ----------- callback

Constants, variables, and operators of SystemVerilog usage

HackMyvm靶机系列(3)-visions

记一次edu,SQL注入实战

图书管理系统

Detailed explanation of network foundation

Circular queue (C language)

Package bedding of components
随机推荐
The difference between layer 3 switch and router
HackMyvm靶机系列(1)-webmaster
Hackmyvm target series (3) -visions
Only 40% of the articles are original? Here comes the modification method
Experiment 7 use of common classes
Matlab opens M file garbled solution
SRC mining ideas and methods
Brief introduction to XHR - basic use of XHR
Constants, variables, and operators of SystemVerilog usage
XSS unexpected event
Intranet information collection of Intranet penetration (I)
【MySQL数据库的学习】
《英特尔 oneAPI—打开异构新纪元》
记一次api接口SQL注入实战
HackMyvm靶机系列(5)-warez
Detailed explanation of network foundation
JS several ways to judge whether an object is an array
Wei Shen of Peking University revealed the current situation: his class is not very good, and there are only 5 or 6 middle-term students left after leaving class
7-14 error ticket (PTA program design)
Callback function ----------- callback