1 Constant pool
The constant pool is divided into two types, one is the static constant in the .class file Pool, the second is the runtime constant pool formed by the static constant pool in the .class file being loaded into the JVM.
1.1 Static constant pool
The constant pool in the .class file can be regarded as an array. Some constants are stored in the array. When needed in the bytecode instructions When this constant is used, it is accessed through the index of the array.
Look at the following code:
String m = "hellohellohellohellohello"; String n = "hellohellohellohellohello";
It will look like this in the bytecode:
// 常量池: #1 hellohellohellohellohello #2 ... ... ---------------------------- String m = #1; String n = #1;
Of course, this is just a simplified version, in fact More complicated (for the actual version, you can see the answer posted in the reference section at the end of the article. For now, you can only consider the simplified version)
Note that the string constant stored in this is just a simple UTF8 An encoded byte sequence, not a Java string object. It is the same as the string you store in a txt text. We use UTF8 format to open a .class file and you can see hellohellohellohellohello
It can be parsed:
1.2 Runtime constant pool
After understanding the static constant pool, the runtime constant pool is easy to understand. . Simply put, the runtime constant pool is the runtime representation of the static constant pool in the .class file in the JVM. Each static constant pool in the .class file will generate a corresponding runtime constant pool. When the JVM interprets the instruction String m = #1
, it can go to the runtime constant pool of this class to find the definition of #1.
2 String pool
The string pool is a cache pool set up by Java to reuse the String
object. It was set in the method area before Java 1.7 and saved It is a String object; it is set on the heap after Java 1.7 and saves a reference to the String
object. The String
object itself exists elsewhere on the heap. The following takes the situation after Java 1.7 as the standard.
Continue with the above example. When the JVM is interpreting String m = #1, it has obtained the corresponding UTF8 sequence from the runtime constant pool. Next, it will look for the String object corresponding to this UTF8 sequence in the string pool, and add the object's The reference is assigned to m. You may be curious about the timing when this String is created. According to this R article, when the class where this statement is located is loaded, if the corresponding object already exists in the string pool, then nothing will be done. If If it does not exist, a corresponding String object will be created and its reference will be placed in the pool.
In addition to the string pool, Wrapper types such as Integer
and Long
also have their own cache pools. For example, Integer
will cache from -128~127 The Integer
object, when using literal assignment or Integer.valueOf()
, if the corresponding object exists in the pool, the object in the pool will be returned. Only when there is no such object in the pool Only then will new objects be created on the heap.
However, unlike the string pool, these Wrapper pools will not grow like the string pool, that is, the number of objects in the pool is fixed, and there will only be -128~127 in the Integer pool. .
The buffer pool corresponding to the basic type is as follows:
boolean values true and false all byte values short values between -128 and 127 int values between -128 and 127 char in the range \u0000 to \u007F
Among all the numerical buffer pools in jdk 1.8, the Integer buffer pool IntegerCache is very special. The lower bound of this buffer pool is - 128, upper The default limit is 127, but this upper limit is adjustable. When starting the jvm, specify the size of this buffer pool through -XX:AutoBoxCacheMax=. This option will set a file named java.lang when the JVM is initialized. .IntegerCache.high system property, and then when IntegerCache is initialized, it will read the system property to determine the upper bound.
The above is the detailed content of What is the role of string constant pool and buffer pool in JAVA. For more information, please follow other related articles on the PHP Chinese website!

JavaachievesplatformindependencethroughtheJavaVirtualMachine(JVM),allowingcodetorunondifferentoperatingsystemswithoutmodification.TheJVMcompilesJavacodeintoplatform-independentbytecode,whichittheninterpretsandexecutesonthespecificOS,abstractingawayOS

Javaispowerfulduetoitsplatformindependence,object-orientednature,richstandardlibrary,performancecapabilities,andstrongsecurityfeatures.1)PlatformindependenceallowsapplicationstorunonanydevicesupportingJava.2)Object-orientedprogrammingpromotesmodulara

The top Java functions include: 1) object-oriented programming, supporting polymorphism, improving code flexibility and maintainability; 2) exception handling mechanism, improving code robustness through try-catch-finally blocks; 3) garbage collection, simplifying memory management; 4) generics, enhancing type safety; 5) ambda expressions and functional programming to make the code more concise and expressive; 6) rich standard libraries, providing optimized data structures and algorithms.

JavaisnotentirelyplatformindependentduetoJVMvariationsandnativecodeintegration,butitlargelyupholdsitsWORApromise.1)JavacompilestobytecoderunbytheJVM,allowingcross-platformexecution.2)However,eachplatformrequiresaspecificJVM,anddifferencesinJVMimpleme

TheJavaVirtualMachine(JVM)isanabstractcomputingmachinecrucialforJavaexecutionasitrunsJavabytecode,enablingthe"writeonce,runanywhere"capability.TheJVM'skeycomponentsinclude:1)ClassLoader,whichloads,links,andinitializesclasses;2)RuntimeDataAr

Javaremainsagoodlanguageduetoitscontinuousevolutionandrobustecosystem.1)Lambdaexpressionsenhancecodereadabilityandenablefunctionalprogramming.2)Streamsallowforefficientdataprocessing,particularlywithlargedatasets.3)ThemodularsystemintroducedinJava9im

Javaisgreatduetoitsplatformindependence,robustOOPsupport,extensivelibraries,andstrongcommunity.1)PlatformindependenceviaJVMallowscodetorunonvariousplatforms.2)OOPfeatureslikeencapsulation,inheritance,andpolymorphismenablemodularandscalablecode.3)Rich

The five major features of Java are polymorphism, Lambda expressions, StreamsAPI, generics and exception handling. 1. Polymorphism allows objects of different classes to be used as objects of common base classes. 2. Lambda expressions make the code more concise, especially suitable for handling collections and streams. 3.StreamsAPI efficiently processes large data sets and supports declarative operations. 4. Generics provide type safety and reusability, and type errors are caught during compilation. 5. Exception handling helps handle errors elegantly and write reliable software.


Hot AI Tools

Undresser.AI Undress
AI-powered app for creating realistic nude photos

AI Clothes Remover
Online AI tool for removing clothes from photos.

Undress AI Tool
Undress images for free

Clothoff.io
AI clothes remover

Video Face Swap
Swap faces in any video effortlessly with our completely free AI face swap tool!

Hot Article

Hot Tools

Dreamweaver Mac version
Visual web development tools

SublimeText3 Mac version
God-level code editing software (SublimeText3)

EditPlus Chinese cracked version
Small size, syntax highlighting, does not support code prompt function

MinGW - Minimalist GNU for Windows
This project is in the process of being migrated to osdn.net/projects/mingw, you can continue to follow us there. MinGW: A native Windows port of the GNU Compiler Collection (GCC), freely distributable import libraries and header files for building native Windows applications; includes extensions to the MSVC runtime to support C99 functionality. All MinGW software can run on 64-bit Windows platforms.

SecLists
SecLists is the ultimate security tester's companion. It is a collection of various types of lists that are frequently used during security assessments, all in one place. SecLists helps make security testing more efficient and productive by conveniently providing all the lists a security tester might need. List types include usernames, passwords, URLs, fuzzing payloads, sensitive data patterns, web shells, and more. The tester can simply pull this repository onto a new test machine and he will have access to every type of list he needs.
