search
Home类库下载java类库Principles of Java Visibility Mechanism

Basic concepts

1. Visibility

When one thread modifies a shared variable, another thread can read the modified value.

2. Memory Barriers

A set of instructions for the processor to implement sequential restrictions on memory operations.

3. Buffer Line

The CPU tells the smallest unit of storage that can be allocated in the cache, and when the processor fills in the cache line, the entire cache line is loaded.

4.Lock prefixed instructions

Lock prefixed instructions will do two things on a multi-core processor:

1) Associate the data of the current processor’s cache line into the system memory.

2) This operation of writing back to the memory will invalidate the data cached by other CPUs at the memory address.

5. Cache coherence protocol

Under multi-processor, zero guarantees that the cache of each processor is consistent. Each processor will check whether the value of its cache is consistent by sniffing the data spread on the bus. expired. When the processor finds that the address corresponding to its cache line has been modified, it will set the current processor's cache line to an invalid state. When the processor reads or writes this data, it will re-read the data from the memory into the processor cache.

6.CAS

CompareAndSwap Compare and swap

CAS operation requires inputting two values, an old value (the value before performing the CAS operation, the expected value) and a new value. This is only possible when the current value is equal to the old value. Sets the current value to the new value, otherwise does not set it. This is an atomic operation, guaranteed by hardware.

7. Reordering rules

Fundamentally, JMM has only one reordering restriction for compilers and processors, as long as the results of program execution are not changed (referring to single-threaded or correctly synchronized multi-threaded environments) , then the compiler and processor can optimize it.

Volatile

As can be seen from the above Lock prefix instructions and cache consistency protocol, this is the implementation principle of volatile.

In fact, when the valatile variable is written, a Lock prefix is ​​indeed added to achieve the purpose of visibility.

final

The Final field can only be explicitly assigned once, but this does not mean that the final field cannot be initialized multiple times.

For example: final int i; i will be initialized to the default value: 0 before it is assigned in the constructor. This can be proven by debugging the code.

In order to ensure that the value of the final field will not be accessed before initialization, the programmer only needs to ensure one thing: that is, in the constructor, the object being constructed (this) does not "escape". Then without any synchronization means, it can be guaranteed that the final fields seen by any thread, including basic types and reference types, have been correctly initialized through the constructor.

An example of an object being constructed escapes:

public class FinalTest{ 
   final int i; 
   static FinalTest obj; 
  
   public FinalTest(){ 
   i  =1; 
   /** 
   *这里会使正在被构造的对象逸出,如果和上一句做了重排序,那么其他线程就可以通过obj访问到还为被初始化的final域。 
   **/ 
   obj = this;  
  } 
}

Happens-Before rule

The meaning of happens-before

Happen-Before rule is used to describe the sequential relationship between two operations. These two The operation can be in one thread or not. This order does not strictly mean execution time order, but rather that the results of the previous operation are visible to the subsequent operation.

Happens-Before relationship is defined as follows:

If one happens-before another operation, then the execution result of the first operation is visible to the second operation, and the execution order of the first operation is ranked after the second operation The existence of a happens-before relationship between two operations does not mean that the specific implementation of the Java platform must be executed in the order specified by the happens-before relationship. If the execution result after reordering is consistent with the execution result according to the happens-before relationship, then this reordering is not illegal.

For example, if A precedes B in the order of program execution, and A modifies a shared variable, and B happens to use the shared variable, then A needs to happen-before B. To put it more bluntly, A has to share The modification of variables needs to be visible to B when B is executed.

happens-before rule

Program sequence rule: Every operation in a thread happens-before any subsequent operation in that thread.

Monitor lock rules: Unlocking a lock happens-before the subsequent locking of the lock.

volatile rule: A write to a volatile field happens-before any subsequent read of this volatile field.

Transitivity: If Ahappens-before B, and B happens-before C, then A happens-before C.

start() rule: If thread A performs the operation ThreadB.start(), then the ThreadB.start() operation of thread A happens-before any operation in thread B.

join() rule: If thread A performs the ThreadB.join() operation and returns successfully, then any operation of thread B happens-before thread A returns successfully from the ThreadB.join() operation.

Explanation of all these rules: Ahappens-before B does not mean that A must happen before B, but it means that if A has happened before B, then the operation result of A must be visible to B

Statement
The content of this article is voluntarily contributed by netizens, and the copyright belongs to the original author. This site does not assume corresponding legal responsibility. If you find any content suspected of plagiarism or infringement, please contact admin@php.cn

Hot AI Tools

Undresser.AI Undress

Undresser.AI Undress

AI-powered app for creating realistic nude photos

AI Clothes Remover

AI Clothes Remover

Online AI tool for removing clothes from photos.

Undress AI Tool

Undress AI Tool

Undress images for free

Clothoff.io

Clothoff.io

AI clothes remover

AI Hentai Generator

AI Hentai Generator

Generate AI Hentai for free.

Hot Article

R.E.P.O. Energy Crystals Explained and What They Do (Yellow Crystal)
3 weeks agoBy尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. Best Graphic Settings
3 weeks agoBy尊渡假赌尊渡假赌尊渡假赌
R.E.P.O. How to Fix Audio if You Can't Hear Anyone
3 weeks agoBy尊渡假赌尊渡假赌尊渡假赌
WWE 2K25: How To Unlock Everything In MyRise
4 weeks agoBy尊渡假赌尊渡假赌尊渡假赌

Hot Tools

SecLists

SecLists

SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.

PhpStorm Mac version

PhpStorm Mac version

The latest (2018.2.1) professional PHP integrated development tool

SAP NetWeaver Server Adapter for Eclipse

SAP NetWeaver Server Adapter for Eclipse

Integrate Eclipse with SAP NetWeaver application server.

DVWA

DVWA

Damn Vulnerable Web App (DVWA) is a PHP/MySQL web application that is very vulnerable. Its main goals are to be an aid for security professionals to test their skills and tools in a legal environment, to help web developers better understand the process of securing web applications, and to help teachers/students teach/learn in a classroom environment Web application security. The goal of DVWA is to practice some of the most common web vulnerabilities through a simple and straightforward interface, with varying degrees of difficulty. Please note that this software

SublimeText3 Mac version

SublimeText3 Mac version

God-level code editing software (SublimeText3)