当前位置:网站首页>JVM memory model concept
JVM memory model concept
2022-07-06 14:22:00 【xmh-sxh-1314】
JVM The memory model is divided into virtual machine stack , Pile up , Method area , Program counter , Five parts of the local method stack .
Java The virtual machine stack is the same as the program counter ,Java Virtual machine stack (Java Virtual Machine Stacks) It's also thread private , It has the same life cycle as a thread .
Java Heap for most applications ,Java Pile up (Java Heap) yes Java The largest chunk of memory managed by a virtual machine .Java The heap is an area of memory Shared by all threads , Created when the virtual machine starts .
Method area (Method Area) And Java Pile up , Is an area of memory Shared by each thread , It is used to store class information that has been loaded by the virtual machine 、 Constant 、 Static variables 、 Real time compiler compiled code and other data .
Program counter (Program Counter Register) It's a small amount of memory , Its function can be seen
It is the line number indicator of the bytecode executed by the current thread .
Native Method Stack (Native Method Stacks) It's very similar to what the virtual machine stack does , The difference is that the virtual machine stack executes for the virtual machine Java Method ( That's bytecode ) service , The local method stack is used by the virtual machine Native Method service .
JVM The advantages of memory model
Built in memory based concurrency model : Thread mechanism
Synchronization lock Synchronization
A large number of thread safe library packages support
Memory based concurrency mechanism , Flexible granularity control , Flexibility is higher than database lock .
Multi core parallel computing model
Thread based asynchronous model .
边栏推荐
- 1143_ SiCp learning notes_ Tree recursion
- Get started with typescript
- Overview of LNMP architecture and construction of related services
- A complete collection of papers on text recognition
- Record once, modify password logic vulnerability actual combat
- Middleware vulnerability recurrence Apache
- Intensive literature reading series (I): Courier routing and assignment for food delivery service using reinforcement learning
- 安全面试之XSS(跨站脚本攻击)
- Chain team implementation (C language)
- Hcip -- MPLS experiment
猜你喜欢

Intranet information collection of Intranet penetration (I)

JDBC read this article is enough

Hackmyvm Target Series (3) - vues

内网渗透之内网信息收集(二)

7-7 7003 combination lock (PTA program design)

Hackmyvm target series (6) -videoclub

1143_ SiCp learning notes_ Tree recursion

Meituan dynamic thread pool practice ideas, open source

captcha-killer验证码识别插件

Intensive literature reading series (I): Courier routing and assignment for food delivery service using reinforcement learning
随机推荐
记一次,修改密码逻辑漏洞实战
HackMyvm靶机系列(5)-warez
Mixlab unbounded community white paper officially released
msf生成payload大全
2022华中杯数学建模思路
内网渗透之内网信息收集(一)
记一次edu,SQL注入实战
The difference between layer 3 switch and router
《统计学》第八版贾俊平第十三章时间序列分析和预测知识点总结及课后习题答案
[three paradigms of database] you can understand it at a glance
Sqqyw (indifferent dot icon system) vulnerability recurrence and 74cms vulnerability recurrence
Spot gold prices rose amid volatility, and the rise in U.S. prices is likely to become the key to the future
Nuxtjs quick start (nuxt2)
网络层—简单的arp断网
Analysis of penetration test learning and actual combat stage
内网渗透之内网信息收集(四)
How to understand the difference between technical thinking and business thinking in Bi?
Meituan dynamic thread pool practice ideas, open source
链队实现(C语言)
Detailed explanation of network foundation routing