


When Does Golang append() Create a New Slice?
The documentation for append() indicates that it will allocate a new slice and copy the elements when the capacity of the original slice is insufficient. However, a discrepancy arises when examining the output of the following code, which generates combinations of a boolean alphabet.
<code class="go">package main import ( "fmt" ) func AddOption(c chan []bool, combo []bool, length int) { if length == 0 { fmt.Println(combo, "!") c <p><strong>Contrasting Observations</strong></p> <p>In the output, the lines ending with an exclamation mark represent slices sent over the channel by AddOption, while the lines without an exclamation mark show the slices received in main(). Noticeably, the slices sent over the channel appear to be modified after being sent, despite append() allegedly returning a new slice.</p> <p><strong>Examining the Source</strong></p> <p>The questionable codeblock is:</p> <pre class="brush:php;toolbar:false"><code class="go">var newCombo []bool for _, ch := range []bool{true, false} { newCombo = append(combo, ch) AddOption(c, newCombo, length-1) }</code>
According to the documentation, append() should return a new slice descriptor pointing to a new underlying data array when the capacity of the original slice is not sufficient. However, the passed value as the second argument to AddOption may be either a pointer to a slice descriptor or a genuine copy of the slice descriptor.
Clarifying the Behavior
The answer to this question lies in distinguishing between the slice data type and its actual representation. A slice descriptor consists of two integers for length and capacity, along with a pointer to the underlying data.
While append() does return a new slice descriptor with a potentially different underlying data array, the pointer to the data remains the same unless the capacity is expanded. This means that while the slice descriptor itself is a copy, the pointer value (address to the underlying data) is shared.
Additional Example
For illustration, consider this code snippet:
<code class="go">package main import "fmt" func main() { s := make([]int, 0, 5) s = append(s, []int{1, 2, 3, 4}...) a := append(s, 5) fmt.Println(a) b := append(s, 6) fmt.Println(b) fmt.Println(a) }</code>
This code prints:
[1 2 3 4 5] [1 2 3 4 6] [1 2 3 4 6]
Initially, s has enough capacity, so a and b share the same underlying data pointer. However, if we reduce the capacity of s to 4, the output changes to:
[1 2 3 4 5] [1 2 3 4 6] [1 2 3 4 5]
This demonstrates that a and b only share the same underlying data when s has sufficient capacity.
The above is the detailed content of Why Does Golang\'s `append()` Seem to Modify a Slice After It\'s Sent Over a Channel?. For more information, please follow other related articles on the PHP Chinese website!

This article explains Go's package import mechanisms: named imports (e.g., import "fmt") and blank imports (e.g., import _ "fmt"). Named imports make package contents accessible, while blank imports only execute t

This article explains Beego's NewFlash() function for inter-page data transfer in web applications. It focuses on using NewFlash() to display temporary messages (success, error, warning) between controllers, leveraging the session mechanism. Limita

This article details efficient conversion of MySQL query results into Go struct slices. It emphasizes using database/sql's Scan method for optimal performance, avoiding manual parsing. Best practices for struct field mapping using db tags and robus

This article demonstrates creating mocks and stubs in Go for unit testing. It emphasizes using interfaces, provides examples of mock implementations, and discusses best practices like keeping mocks focused and using assertion libraries. The articl

This article explores Go's custom type constraints for generics. It details how interfaces define minimum type requirements for generic functions, improving type safety and code reusability. The article also discusses limitations and best practices

This article details efficient file writing in Go, comparing os.WriteFile (suitable for small files) with os.OpenFile and buffered writes (optimal for large files). It emphasizes robust error handling, using defer, and checking for specific errors.

The article discusses writing unit tests in Go, covering best practices, mocking techniques, and tools for efficient test management.

This article explores using tracing tools to analyze Go application execution flow. It discusses manual and automatic instrumentation techniques, comparing tools like Jaeger, Zipkin, and OpenTelemetry, and highlighting effective data visualization


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

AI Hentai Generator
Generate AI Hentai for free.

Hot Article

Hot Tools

MantisBT
Mantis is an easy-to-deploy web-based defect tracking tool designed to aid in product defect tracking. It requires PHP, MySQL and a web server. Check out our demo and hosting services.

SublimeText3 Chinese version
Chinese version, very easy to use

Dreamweaver CS6
Visual web development tools

mPDF
mPDF is a PHP library that can generate PDF files from UTF-8 encoded HTML. The original author, Ian Back, wrote mPDF to output PDF files "on the fly" from his website and handle different languages. It is slower than original scripts like HTML2FPDF and produces larger files when using Unicode fonts, but supports CSS styles etc. and has a lot of enhancements. Supports almost all languages, including RTL (Arabic and Hebrew) and CJK (Chinese, Japanese and Korean). Supports nested block-level elements (such as P, DIV),

DVWA
Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software
