Per-method operand stack (up to 65535 operands) plus per-method local variables (up to 65535)
Overview of a Java virtual machine (JVM) architecture based on The Java Virtual Machine Specification Java SE 7 Edition
AJava virtual machine (JVM) is avirtual machine that enables a computer to runJava programs as well as programs written inother languages that are also compiled toJava bytecode. The JVM is detailed by aspecification that formally describes what is required in a JVM implementation. Having a specification ensures interoperability of Java programs across different implementations so that program authors using theJava Development Kit (JDK) need not worry about idiosyncrasies of the underlying hardware platform.
The Java virtual machine is an abstract (virtual) computer defined by a specification. It is a part of the Java runtime environment. Thegarbage collection algorithm used and any internal optimization of the Java virtual machine instructions (their translation intomachine code) are not specified. The main reason for this omission is to not unnecessarily constrain implementers. Any Java application can be run only inside some concrete implementation of the abstract specification of the Java virtual machine.[3]
Starting withJava Platform, Standard Edition (J2SE) 5.0, changes to the JVM specification have been developed under theJava Community Process as JSR 924.[4] As of 2006[update], changes to the specification to support changes proposed to theclass file format (JSR 202)[5] are being done as a maintenance release of JSR 924. The specification for the JVM was published as theblue book,[6] whose preface states:
We intend that this specification should sufficiently document the Java Virtual Machine to make possible compatible clean-room implementations. Oracle provides tests that verify the proper operation of implementations of the Java Virtual Machine.
The most commonly used Java virtual machine is Oracle'sHotSpot.
Oracle owns the Java trademark and may allow its use to certify implementation suites as fully compatible with Oracle's specification.
Java's design philosophy revolves around the assumption of a garbage collector. Unlike languages such asC++ andRust, deterministic memory management through adelete keyword (as in C++) is not possible. Even introducing such a feature is not possible, due to a lack of ownership, aside from usingsun.misc.Unsafe or throughjava.lang.foreign to allocate/deallocate memory outside the Java heap.[8][9] Due to Java primarily using heap-based allocation, objects are stored as references, and deletion would result indangling pointers.
One of the organizational units of JVM byte code is aclass. A class loader implementation must be able to recognize and load anything that conforms to the Java classfile format. Any implementation is free to recognize other binary forms besidesclass files, but it must recognizeclass files.
The class loader performs three basic activities in this strict order:
Loading: finds and imports the binary data for a type
Linking: performs verification, preparation, and (optionally) resolution
Verification: ensures the correctness of the imported type
Preparation: allocates memory for class variables and initializing the memory to default values
Resolution: transforms symbolic references from the type into direct references.
Initialization: invokes Java code that initializes class variables to their proper starting values.
In general, there are three types of class loader: bootstrap class loader, extension class loader and System / Application class loader.
Every Java virtual machine implementation must have a bootstrap class loader that is capable of loading trusted classes, as well as an extension class loader or application class loader. The Java virtual machine specification does not specify how a class loader should locate classes.
The JVM operates on specific types of data as specified in Java Virtual Machine specifications. The data types can be divided[10] into primitive types (integer andfloating-point values) andreference types.long anddouble types, which are64-bits, are supported natively, but consume two units of storage in a frame's local variables or operand stack, since each unit is 32 bits.boolean,byte,short, andchar types are allsign-extended (exceptchar which iszero-extended) and operated on as 32-bit integers, the same asint types. The smaller types only have a few type-specific instructions for loading, storing, and type conversion.boolean is operated on as 8-bitbyte values, with 0 representingfalse and 1 representingtrue. (Althoughboolean has been treated as a type sinceThe Java Virtual Machine Specification, Second Edition clarified this issue, in compiled and executed code there is little difference between aboolean and abyte except forname mangling inmethod signatures and the type of boolean arrays.booleans in method signatures are mangled asZ whilebytes are mangled asB. Boolean arrays carry the typeboolean[] but use 8 bits per element, and the JVM has no built-in capability to pack booleans into abit array, so except for the type they perform and behave the same asbyte arrays. In all other uses, theboolean type is effectively unknown to the JVM as all instructions to operate on booleans are also used to operate onbytes.)
The JVM has a garbage-collected heap for storing objects and arrays. Code, constants, and other class data are stored in the "method area". The method area is logically part of the heap, but implementations may treat the method area separately from the heap, and for example might not garbage collect it. Each JVM thread also has its owncall stack (called a "Java Virtual Machine stack" for clarity), which storesframes. A new frame is created each time a method is called, and the frame is destroyed when that method exits.
Each frame provides an "operand stack" and an array of "local variables". The operand stack is used for operands to run computations and for receiving the return value of a called method, while local variables serve the same purpose asregisters and are also used to pass method arguments. Thus, the JVM is both astack machine and aregister machine. In practice, HotSpot eliminates every stack besides the native thread/call stack even when running in Interpreted mode, as its Templating Interpreter technically functions as a compiler.
The JVM uses references and stack/array indexes to address data; it does not usebyte addressing like most physical machines do, so it does not neatly fit the usual categorization of32-bit or64-bit machines. In one sense, it could be classified as a 32-bit machine, since this is the size of the largest value it natively stores: a 32-bit integer or floating-point value or a 32-bit reference. Because a reference is 32 bits, each program is limited to at most 232 unique references and therefore at most 232 objects. However, each object can be more than one byte large, and potentiallyvery large; the largest possible object is an array oflong of length 231 - 1 which would consume 16 GiB of memory, and there could potentially be 232 of these if there were enough memory available. This results in upper bounds that are more comparable to a typical 64-bit byte-addressable machine. A JVM implementation can be designed to run on a processor that natively uses any bit width as long as it correctly implements the integer (8-, 16-, 32-, and 64-bit) and floating-point (32- and 64-bit) math that the JVM requires. Depending on the method used to implement references (native pointers, compressed pointers, or an indirection table), this can limit the number of objects to less than the theoretical maximum. An implementation of the JVM on a 64-bit platform has access to a much larger address space than one on a 32-bit platform, which allows for a much larger heap size and an increased maximum number of threads, which is needed for certain kinds of large applications; however, there can be aperformance hit from using a 64-bit implementation compared to a 32-bit implementation.
The aim is binary compatibility. Each particular hostoperating system needs its own implementation of the JVM and runtime. These JVMs interpret the bytecode semantically the same way, but the actual implementation may be different. More complex than just emulating bytecode is compatibly and efficiently implementing theJava core API that must be mapped to each host operating system.
A JVM language is any language with functionality that can be expressed in terms of a valid class file which can be hosted by the Java Virtual Machine. A class file contains Java Virtual Machine instructions (Java byte code) and a symbol table, as well as other ancillary information. The class file format is the hardware- and operating system-independent binary format used to represent compiled classes and interfaces.[11]
There are several JVM languages, both old languages ported to JVM and completely new languages.JRuby andJython are perhaps the most well-known ports of existing languages, i.e.Ruby andPython respectively. Of the new languages that have been created from scratch to compile to Java bytecode,Clojure,Groovy,Scala andKotlin may be the most popular ones. A notable feature with the JVM languages is that they arecompatible with each other, so that, for example, Scala libraries can be used with Java programs and vice versa.[12]
Java 7 JVM implementsJSR 292: Supporting Dynamically Typed Languages[13] on the Java Platform, a new feature which supports dynamically typed languages in the JVM. This feature is developed within theDa Vinci Machine project whose mission is to extend the JVM so that it supports languages other than Java.[14][15]
A basic philosophy of Java is that it is inherently safe from the standpoint that no user program can crash the host machine or otherwise interfere inappropriately with other operations on the host machine, and that it is possible to protect certain methods and data structures belonging to trusted code from access or corruption by untrusted code executing within the same JVM. Furthermore, common programmer errors that often led to data corruption or unpredictable behavior such as accessing off the end of an array or using an uninitialized pointer are not allowed to occur. Several features of Java combine to provide this safety, including the class model, the garbage-collectedheap, and the verifier.
The JVM verifies all bytecode before it is executed. This verification consists primarily of three types of checks:
Branches are always to valid locations
Data is always initialized and references are always type-safe
Access to private or package private data and methods is rigidly controlled
The first two of these checks take place primarily during the verification step that occurs when a class is loaded and made eligible for use. The third is primarily performed dynamically, when data items or methods of a class are first accessed by another class.
The verifier permits only some bytecode sequences in valid programs, e.g. ajump (branch) instruction can only target an instruction within the samemethod. Furthermore, the verifier ensures that any given instruction operates on a fixed stack location,[16] allowing the JIT compiler to transform stack accesses into fixed register accesses. Because of this, that the JVM is a stack architecture does not imply a speed penalty for emulation onregister-based architectures when using a JIT compiler. In the face of the code-verified JVM architecture, it makes no difference to a JIT compiler whether it gets named imaginary registers or imaginary stack positions that must be allocated to the target architecture's registers. In fact, code verification makes the JVM different from a classic stack architecture, of which efficient emulation with a JIT compiler is more complicated and typically carried out by a slower interpreter. Additionally, the Interpreter used by the default JVM is a special type known as a Template Interpreter, which translates bytecode directly to native, register based machine language rather than emulate a stack like a typical interpreter.[17] In many aspects the HotSpot Interpreter can be considered a JIT compiler rather than a true interpreter, meaning the stack architecture that the bytecode targets is not actually used in the implementation, but merely a specification for the intermediate representation that can well be implemented in a register based architecture. Another instance of a stack architecture being merely a specification and implemented in a register based virtual machine is theCommon Language Runtime.[18]
The original specification for the bytecode verifier used natural language that was incomplete or incorrect in some respects. A number of attempts have been made to specify the JVM as a formal system. By doing this, the security of current JVM implementations can more thoroughly be analyzed, and potential security exploits prevented. It will also be possible to optimize the JVM by skipping unnecessary safety checks, if the application being run is proven to be safe.[19]
A virtual machine architecture allows very fine-grained control over the actions that code within the machine is permitted to take. It assumes the code is "semantically" correct, that is, it successfully passed the (formal) bytecode verifier process, materialized by a tool, possibly off-board the virtual machine. This is designed to allow safe execution of untrusted code from remote sources, a model used byJava applets, and other secure code downloads. Once bytecode-verified, the downloaded code runs in a restricted "sandbox", which is designed to protect the user from misbehaving or malicious code. As an addition to the bytecode verification process, publishers can purchase a certificate with which todigitally sign applets as safe, giving them permission to ask the user to break out of the sandbox and access the local file system,clipboard, execute external pieces of software, or network.
Formal proof of bytecode verifiers have been done by the Javacard industry (Formal Development of an Embedded Verifier for Java Card Byte Code[20])
For eachhardware architecture a different Java bytecodeinterpreter is needed. When a computer has a Java bytecode interpreter, it can run any Java bytecode program, and the same program can be run on any computer that has such an interpreter.
When Java bytecode is executed by an interpreter, the execution will always be slower than the execution of the same program compiled into native machine language. This problem is mitigated byjust-in-time (JIT) compilers for executing Java bytecode. A JIT compiler may translate Java bytecode into native machine language while executing the program. The translated parts of the program can then be executed much more quickly than they could be interpreted. This technique gets applied to those parts of a program frequently executed. This way a JIT compiler can significantly speed up the overall execution time.
There is no necessary connection between the Java programming language and Java bytecode. A program written in Java can be compiled directly into the machine language of a real computer and programs written in other languages than Java can be compiled into Java bytecode.
Java bytecode is intended to be platform-independent and secure.[21] Some JVM implementations do not include an interpreter, but consist only of a just-in-time compiler.[22]
At the start of the Java platform's lifetime, the JVM was marketed as a web technology for creatingRich Web Applications. As of 2018[update], most web browsers and operating systems bundling web browsers do not ship with a Javaplug-in, nor do they permit side-loading any non-Flash plug-in. The Java browser plugin was deprecated inJDK 9.[23]
TheNPAPI Java browser plug-in was designed to allow the JVM to execute so-calledJava applets embedded into HTML pages. For browsers with the plug-in installed, the applet is allowed to draw into a rectangular region on the page assigned to it. Because the plug-in includes a JVM, Java applets are not restricted to the Java programming language; any language targeting the JVM may run in the plug-in. A restricted set of APIs allow applets access to the user's microphone or 3D acceleration, although applets are not able to modify the page outside its rectangular region.Adobe Flash Player, the main competing technology, works in the same way in this respect.
As of June 2015[update] according to W3Techs, Java applet andSilverlight use had fallen to 0.1% each for all web sites, while Flash had fallen to 10.8%.[24]
Since May 2016, JavaPoly allows users to import unmodified Java libraries, and invoke them directly from JavaScript. JavaPoly allows websites to use unmodified Java libraries, even if the user does not have Java installed on their computer.[25]
With the continuing improvements in JavaScript execution speed, combined with the increased use of mobile devices whose web browsers do not implement support for plugins, there are efforts to target those users throughtranspilation to JavaScript. It is possible to either transpile the source code or JVM bytecode to JavaScript.
Compiling the JVM bytecode, which is universal across JVM languages, allows building upon the language's existing compiler to bytecode. The main JVM bytecode to JavaScript transpilers are TeaVM,[26] the compiler contained in Dragome Web SDK,[27] Bck2Brwsr,[28] and j2js-compiler.[29]
Leading transpilers from JVM languages to JavaScript include the Java-to-JavaScript transpiler contained inGoogle Web Toolkit, J2CL,[30] Clojurescript (Clojure), GrooScript (Apache Groovy), Scala.js (Scala) and others.[31]
^"The Verification process".The Java Virtual Machine Specification. Sun Microsystems. 1999.Archived from the original on 2011-03-21. Retrieved2009-05-31.
^Freund, Stephen N.; Mitchell, John C. (1999). "A formal framework for the Java bytecode language and verifier".Proceedings of the 14th ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications - OOPSLA '99. pp. 147–166.CiteSeerX10.1.1.2.4663.doi:10.1145/320384.320397.ISBN978-1581132380.S2CID14302964.
JSR 45Archived 2006-02-05 at theWayback Machine, specifies changes to the class file format to support source-level debugging of languages such asJavaServer Pages (JSP) andSQLJ that are translated to Java