annotate src/share/vm/prims/unsafe.cpp @ 12356:359f7e70ae7f

Reduce HotSpot diff and fix previous merge
author Gilles Duboscq <duboscq@ssw.jku.at>
date Fri, 11 Oct 2013 15:41:33 +0200
parents cefad50507d8
children 39308acea2f7
Ignore whitespace changes - Everywhere: Within whitespace: At end of lines:
rev   line source
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1 /*
10405
f2110083203d 8005849: JEP 167: Event-Based JVM Tracing
sla
parents: 10399
diff changeset
2 * Copyright (c) 2000, 2013, Oracle and/or its affiliates. All rights reserved.
0
a61af66fc99e Initial load
duke
parents:
diff changeset
3 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
a61af66fc99e Initial load
duke
parents:
diff changeset
4 *
a61af66fc99e Initial load
duke
parents:
diff changeset
5 * This code is free software; you can redistribute it and/or modify it
a61af66fc99e Initial load
duke
parents:
diff changeset
6 * under the terms of the GNU General Public License version 2 only, as
a61af66fc99e Initial load
duke
parents:
diff changeset
7 * published by the Free Software Foundation.
a61af66fc99e Initial load
duke
parents:
diff changeset
8 *
a61af66fc99e Initial load
duke
parents:
diff changeset
9 * This code is distributed in the hope that it will be useful, but WITHOUT
a61af66fc99e Initial load
duke
parents:
diff changeset
10 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
a61af66fc99e Initial load
duke
parents:
diff changeset
11 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
a61af66fc99e Initial load
duke
parents:
diff changeset
12 * version 2 for more details (a copy is included in the LICENSE file that
a61af66fc99e Initial load
duke
parents:
diff changeset
13 * accompanied this code).
a61af66fc99e Initial load
duke
parents:
diff changeset
14 *
a61af66fc99e Initial load
duke
parents:
diff changeset
15 * You should have received a copy of the GNU General Public License version
a61af66fc99e Initial load
duke
parents:
diff changeset
16 * 2 along with this work; if not, write to the Free Software Foundation,
a61af66fc99e Initial load
duke
parents:
diff changeset
17 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
a61af66fc99e Initial load
duke
parents:
diff changeset
18 *
1552
c18cbe5936b8 6941466: Oracle rebranding changes for Hotspot repositories
trims
parents: 1324
diff changeset
19 * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
c18cbe5936b8 6941466: Oracle rebranding changes for Hotspot repositories
trims
parents: 1324
diff changeset
20 * or visit www.oracle.com if you need additional information or have any
c18cbe5936b8 6941466: Oracle rebranding changes for Hotspot repositories
trims
parents: 1324
diff changeset
21 * questions.
0
a61af66fc99e Initial load
duke
parents:
diff changeset
22 *
a61af66fc99e Initial load
duke
parents:
diff changeset
23 */
a61af66fc99e Initial load
duke
parents:
diff changeset
24
1972
f95d63e2154a 6989984: Use standard include model for Hospot
stefank
parents: 1552
diff changeset
25 #include "precompiled.hpp"
f95d63e2154a 6989984: Use standard include model for Hospot
stefank
parents: 1552
diff changeset
26 #include "classfile/vmSymbols.hpp"
8001
db9981fd3124 8005915: Unify SERIALGC and INCLUDE_ALTERNATE_GCS
jprovino
parents: 7425
diff changeset
27 #include "utilities/macros.hpp"
db9981fd3124 8005915: Unify SERIALGC and INCLUDE_ALTERNATE_GCS
jprovino
parents: 7425
diff changeset
28 #if INCLUDE_ALL_GCS
3249
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
29 #include "gc_implementation/g1/g1SATBCardTableModRefBS.hpp"
8001
db9981fd3124 8005915: Unify SERIALGC and INCLUDE_ALTERNATE_GCS
jprovino
parents: 7425
diff changeset
30 #endif // INCLUDE_ALL_GCS
1972
f95d63e2154a 6989984: Use standard include model for Hospot
stefank
parents: 1552
diff changeset
31 #include "memory/allocation.inline.hpp"
f95d63e2154a 6989984: Use standard include model for Hospot
stefank
parents: 1552
diff changeset
32 #include "prims/jni.h"
f95d63e2154a 6989984: Use standard include model for Hospot
stefank
parents: 1552
diff changeset
33 #include "prims/jvm.h"
f95d63e2154a 6989984: Use standard include model for Hospot
stefank
parents: 1552
diff changeset
34 #include "runtime/globals.hpp"
f95d63e2154a 6989984: Use standard include model for Hospot
stefank
parents: 1552
diff changeset
35 #include "runtime/interfaceSupport.hpp"
f95d63e2154a 6989984: Use standard include model for Hospot
stefank
parents: 1552
diff changeset
36 #include "runtime/reflection.hpp"
f95d63e2154a 6989984: Use standard include model for Hospot
stefank
parents: 1552
diff changeset
37 #include "runtime/synchronizer.hpp"
f95d63e2154a 6989984: Use standard include model for Hospot
stefank
parents: 1552
diff changeset
38 #include "services/threadService.hpp"
10405
f2110083203d 8005849: JEP 167: Event-Based JVM Tracing
sla
parents: 10399
diff changeset
39 #include "trace/tracing.hpp"
1972
f95d63e2154a 6989984: Use standard include model for Hospot
stefank
parents: 1552
diff changeset
40 #include "utilities/copy.hpp"
f95d63e2154a 6989984: Use standard include model for Hospot
stefank
parents: 1552
diff changeset
41 #include "utilities/dtrace.hpp"
f95d63e2154a 6989984: Use standard include model for Hospot
stefank
parents: 1552
diff changeset
42
0
a61af66fc99e Initial load
duke
parents:
diff changeset
43 /*
a61af66fc99e Initial load
duke
parents:
diff changeset
44 * Implementation of class sun.misc.Unsafe
a61af66fc99e Initial load
duke
parents:
diff changeset
45 */
a61af66fc99e Initial load
duke
parents:
diff changeset
46
4006
436b4a3231bf 7098194: integrate macosx-port changes
dcubed
parents: 3938
diff changeset
47 #ifndef USDT2
1324
e392695de029 6935224: Adding new DTrace probes to work with Palantir
fparain
parents: 845
diff changeset
48 HS_DTRACE_PROBE_DECL3(hotspot, thread__park__begin, uintptr_t, int, long long);
e392695de029 6935224: Adding new DTrace probes to work with Palantir
fparain
parents: 845
diff changeset
49 HS_DTRACE_PROBE_DECL1(hotspot, thread__park__end, uintptr_t);
e392695de029 6935224: Adding new DTrace probes to work with Palantir
fparain
parents: 845
diff changeset
50 HS_DTRACE_PROBE_DECL1(hotspot, thread__unpark, uintptr_t);
4006
436b4a3231bf 7098194: integrate macosx-port changes
dcubed
parents: 3938
diff changeset
51 #endif /* !USDT2 */
1324
e392695de029 6935224: Adding new DTrace probes to work with Palantir
fparain
parents: 845
diff changeset
52
0
a61af66fc99e Initial load
duke
parents:
diff changeset
53 #define MAX_OBJECT_SIZE \
a61af66fc99e Initial load
duke
parents:
diff changeset
54 ( arrayOopDesc::header_size(T_DOUBLE) * HeapWordSize \
a61af66fc99e Initial load
duke
parents:
diff changeset
55 + ((julong)max_jint * sizeof(double)) )
a61af66fc99e Initial load
duke
parents:
diff changeset
56
a61af66fc99e Initial load
duke
parents:
diff changeset
57
a61af66fc99e Initial load
duke
parents:
diff changeset
58 #define UNSAFE_ENTRY(result_type, header) \
a61af66fc99e Initial load
duke
parents:
diff changeset
59 JVM_ENTRY(result_type, header)
a61af66fc99e Initial load
duke
parents:
diff changeset
60
a61af66fc99e Initial load
duke
parents:
diff changeset
61 // Can't use UNSAFE_LEAF because it has the signature of a straight
a61af66fc99e Initial load
duke
parents:
diff changeset
62 // call into the runtime (just like JVM_LEAF, funny that) but it's
a61af66fc99e Initial load
duke
parents:
diff changeset
63 // called like a Java Native and thus the wrapper built for it passes
a61af66fc99e Initial load
duke
parents:
diff changeset
64 // arguments like a JNI call. It expects those arguments to be popped
a61af66fc99e Initial load
duke
parents:
diff changeset
65 // from the stack on Intel like all good JNI args are, and adjusts the
a61af66fc99e Initial load
duke
parents:
diff changeset
66 // stack according. Since the JVM_LEAF call expects no extra
a61af66fc99e Initial load
duke
parents:
diff changeset
67 // arguments the stack isn't popped in the C code, is pushed by the
a61af66fc99e Initial load
duke
parents:
diff changeset
68 // wrapper and we get sick.
a61af66fc99e Initial load
duke
parents:
diff changeset
69 //#define UNSAFE_LEAF(result_type, header) \
a61af66fc99e Initial load
duke
parents:
diff changeset
70 // JVM_LEAF(result_type, header)
a61af66fc99e Initial load
duke
parents:
diff changeset
71
a61af66fc99e Initial load
duke
parents:
diff changeset
72 #define UNSAFE_END JVM_END
a61af66fc99e Initial load
duke
parents:
diff changeset
73
a61af66fc99e Initial load
duke
parents:
diff changeset
74 #define UnsafeWrapper(arg) /*nothing, for the present*/
a61af66fc99e Initial load
duke
parents:
diff changeset
75
a61af66fc99e Initial load
duke
parents:
diff changeset
76
a61af66fc99e Initial load
duke
parents:
diff changeset
77 inline void* addr_from_java(jlong addr) {
a61af66fc99e Initial load
duke
parents:
diff changeset
78 // This assert fails in a variety of ways on 32-bit systems.
a61af66fc99e Initial load
duke
parents:
diff changeset
79 // It is impossible to predict whether native code that converts
a61af66fc99e Initial load
duke
parents:
diff changeset
80 // pointers to longs will sign-extend or zero-extend the addresses.
a61af66fc99e Initial load
duke
parents:
diff changeset
81 //assert(addr == (uintptr_t)addr, "must not be odd high bits");
a61af66fc99e Initial load
duke
parents:
diff changeset
82 return (void*)(uintptr_t)addr;
a61af66fc99e Initial load
duke
parents:
diff changeset
83 }
a61af66fc99e Initial load
duke
parents:
diff changeset
84
a61af66fc99e Initial load
duke
parents:
diff changeset
85 inline jlong addr_to_java(void* p) {
a61af66fc99e Initial load
duke
parents:
diff changeset
86 assert(p == (void*)(uintptr_t)p, "must not be odd high bits");
a61af66fc99e Initial load
duke
parents:
diff changeset
87 return (uintptr_t)p;
a61af66fc99e Initial load
duke
parents:
diff changeset
88 }
a61af66fc99e Initial load
duke
parents:
diff changeset
89
a61af66fc99e Initial load
duke
parents:
diff changeset
90
a61af66fc99e Initial load
duke
parents:
diff changeset
91 // Note: The VM's obj_field and related accessors use byte-scaled
a61af66fc99e Initial load
duke
parents:
diff changeset
92 // ("unscaled") offsets, just as the unsafe methods do.
a61af66fc99e Initial load
duke
parents:
diff changeset
93
a61af66fc99e Initial load
duke
parents:
diff changeset
94 // However, the method Unsafe.fieldOffset explicitly declines to
a61af66fc99e Initial load
duke
parents:
diff changeset
95 // guarantee this. The field offset values manipulated by the Java user
a61af66fc99e Initial load
duke
parents:
diff changeset
96 // through the Unsafe API are opaque cookies that just happen to be byte
a61af66fc99e Initial load
duke
parents:
diff changeset
97 // offsets. We represent this state of affairs by passing the cookies
a61af66fc99e Initial load
duke
parents:
diff changeset
98 // through conversion functions when going between the VM and the Unsafe API.
a61af66fc99e Initial load
duke
parents:
diff changeset
99 // The conversion functions just happen to be no-ops at present.
a61af66fc99e Initial load
duke
parents:
diff changeset
100
a61af66fc99e Initial load
duke
parents:
diff changeset
101 inline jlong field_offset_to_byte_offset(jlong field_offset) {
a61af66fc99e Initial load
duke
parents:
diff changeset
102 return field_offset;
a61af66fc99e Initial load
duke
parents:
diff changeset
103 }
a61af66fc99e Initial load
duke
parents:
diff changeset
104
a61af66fc99e Initial load
duke
parents:
diff changeset
105 inline jlong field_offset_from_byte_offset(jlong byte_offset) {
a61af66fc99e Initial load
duke
parents:
diff changeset
106 return byte_offset;
a61af66fc99e Initial load
duke
parents:
diff changeset
107 }
a61af66fc99e Initial load
duke
parents:
diff changeset
108
a61af66fc99e Initial load
duke
parents:
diff changeset
109 inline jint invocation_key_from_method_slot(jint slot) {
a61af66fc99e Initial load
duke
parents:
diff changeset
110 return slot;
a61af66fc99e Initial load
duke
parents:
diff changeset
111 }
a61af66fc99e Initial load
duke
parents:
diff changeset
112
a61af66fc99e Initial load
duke
parents:
diff changeset
113 inline jint invocation_key_to_method_slot(jint key) {
a61af66fc99e Initial load
duke
parents:
diff changeset
114 return key;
a61af66fc99e Initial load
duke
parents:
diff changeset
115 }
a61af66fc99e Initial load
duke
parents:
diff changeset
116
a61af66fc99e Initial load
duke
parents:
diff changeset
117 inline void* index_oop_from_field_offset_long(oop p, jlong field_offset) {
a61af66fc99e Initial load
duke
parents:
diff changeset
118 jlong byte_offset = field_offset_to_byte_offset(field_offset);
a61af66fc99e Initial load
duke
parents:
diff changeset
119 #ifdef ASSERT
a61af66fc99e Initial load
duke
parents:
diff changeset
120 if (p != NULL) {
a61af66fc99e Initial load
duke
parents:
diff changeset
121 assert(byte_offset >= 0 && byte_offset <= (jlong)MAX_OBJECT_SIZE, "sane offset");
a61af66fc99e Initial load
duke
parents:
diff changeset
122 if (byte_offset == (jint)byte_offset) {
a61af66fc99e Initial load
duke
parents:
diff changeset
123 void* ptr_plus_disp = (address)p + byte_offset;
113
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
124 assert((void*)p->obj_field_addr<oop>((jint)byte_offset) == ptr_plus_disp,
0
a61af66fc99e Initial load
duke
parents:
diff changeset
125 "raw [ptr+disp] must be consistent with oop::field_base");
a61af66fc99e Initial load
duke
parents:
diff changeset
126 }
6889
e81a8af10cd9 8001071: Add simple range check into VM implemenation of Unsafe access methods
kvn
parents: 6831
diff changeset
127 jlong p_size = HeapWordSize * (jlong)(p->size());
e81a8af10cd9 8001071: Add simple range check into VM implemenation of Unsafe access methods
kvn
parents: 6831
diff changeset
128 assert(byte_offset < p_size, err_msg("Unsafe access: offset " INT64_FORMAT " > object's size " INT64_FORMAT, byte_offset, p_size));
0
a61af66fc99e Initial load
duke
parents:
diff changeset
129 }
a61af66fc99e Initial load
duke
parents:
diff changeset
130 #endif
a61af66fc99e Initial load
duke
parents:
diff changeset
131 if (sizeof(char*) == sizeof(jint)) // (this constant folds!)
a61af66fc99e Initial load
duke
parents:
diff changeset
132 return (address)p + (jint) byte_offset;
a61af66fc99e Initial load
duke
parents:
diff changeset
133 else
a61af66fc99e Initial load
duke
parents:
diff changeset
134 return (address)p + byte_offset;
a61af66fc99e Initial load
duke
parents:
diff changeset
135 }
a61af66fc99e Initial load
duke
parents:
diff changeset
136
a61af66fc99e Initial load
duke
parents:
diff changeset
137 // Externally callable versions:
a61af66fc99e Initial load
duke
parents:
diff changeset
138 // (Use these in compiler intrinsics which emulate unsafe primitives.)
a61af66fc99e Initial load
duke
parents:
diff changeset
139 jlong Unsafe_field_offset_to_byte_offset(jlong field_offset) {
a61af66fc99e Initial load
duke
parents:
diff changeset
140 return field_offset;
a61af66fc99e Initial load
duke
parents:
diff changeset
141 }
a61af66fc99e Initial load
duke
parents:
diff changeset
142 jlong Unsafe_field_offset_from_byte_offset(jlong byte_offset) {
a61af66fc99e Initial load
duke
parents:
diff changeset
143 return byte_offset;
a61af66fc99e Initial load
duke
parents:
diff changeset
144 }
a61af66fc99e Initial load
duke
parents:
diff changeset
145 jint Unsafe_invocation_key_from_method_slot(jint slot) {
a61af66fc99e Initial load
duke
parents:
diff changeset
146 return invocation_key_from_method_slot(slot);
a61af66fc99e Initial load
duke
parents:
diff changeset
147 }
a61af66fc99e Initial load
duke
parents:
diff changeset
148 jint Unsafe_invocation_key_to_method_slot(jint key) {
a61af66fc99e Initial load
duke
parents:
diff changeset
149 return invocation_key_to_method_slot(key);
a61af66fc99e Initial load
duke
parents:
diff changeset
150 }
a61af66fc99e Initial load
duke
parents:
diff changeset
151
a61af66fc99e Initial load
duke
parents:
diff changeset
152
a61af66fc99e Initial load
duke
parents:
diff changeset
153 ///// Data in the Java heap.
a61af66fc99e Initial load
duke
parents:
diff changeset
154
a61af66fc99e Initial load
duke
parents:
diff changeset
155 #define GET_FIELD(obj, offset, type_name, v) \
a61af66fc99e Initial load
duke
parents:
diff changeset
156 oop p = JNIHandles::resolve(obj); \
a61af66fc99e Initial load
duke
parents:
diff changeset
157 type_name v = *(type_name*)index_oop_from_field_offset_long(p, offset)
a61af66fc99e Initial load
duke
parents:
diff changeset
158
a61af66fc99e Initial load
duke
parents:
diff changeset
159 #define SET_FIELD(obj, offset, type_name, x) \
a61af66fc99e Initial load
duke
parents:
diff changeset
160 oop p = JNIHandles::resolve(obj); \
a61af66fc99e Initial load
duke
parents:
diff changeset
161 *(type_name*)index_oop_from_field_offset_long(p, offset) = x
a61af66fc99e Initial load
duke
parents:
diff changeset
162
a61af66fc99e Initial load
duke
parents:
diff changeset
163 #define GET_FIELD_VOLATILE(obj, offset, type_name, v) \
a61af66fc99e Initial load
duke
parents:
diff changeset
164 oop p = JNIHandles::resolve(obj); \
2114
4fc084dac61e 7009756: volatile variables could be broken throw reflection API
kvn
parents: 1972
diff changeset
165 volatile type_name v = OrderAccess::load_acquire((volatile type_name*)index_oop_from_field_offset_long(p, offset));
0
a61af66fc99e Initial load
duke
parents:
diff changeset
166
a61af66fc99e Initial load
duke
parents:
diff changeset
167 #define SET_FIELD_VOLATILE(obj, offset, type_name, x) \
a61af66fc99e Initial load
duke
parents:
diff changeset
168 oop p = JNIHandles::resolve(obj); \
2114
4fc084dac61e 7009756: volatile variables could be broken throw reflection API
kvn
parents: 1972
diff changeset
169 OrderAccess::release_store_fence((volatile type_name*)index_oop_from_field_offset_long(p, offset), x);
0
a61af66fc99e Initial load
duke
parents:
diff changeset
170
113
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
171 // Macros for oops that check UseCompressedOops
12356
359f7e70ae7f Reduce HotSpot diff and fix previous merge
Gilles Duboscq <duboscq@ssw.jku.at>
parents: 12355
diff changeset
172
9887
4d5872186e76 Add compressed oops support in Graal/Hotspot site
Christos Kotselidis <christos.kotselidis@oracle.com>
parents: 9094
diff changeset
173 #define GET_OOP_FIELD(obj, offset, v) \
12356
359f7e70ae7f Reduce HotSpot diff and fix previous merge
Gilles Duboscq <duboscq@ssw.jku.at>
parents: 12355
diff changeset
174 oop p = JNIHandles::resolve(obj); \
359f7e70ae7f Reduce HotSpot diff and fix previous merge
Gilles Duboscq <duboscq@ssw.jku.at>
parents: 12355
diff changeset
175 oop v; \
359f7e70ae7f Reduce HotSpot diff and fix previous merge
Gilles Duboscq <duboscq@ssw.jku.at>
parents: 12355
diff changeset
176 /* Uncompression is not performed to unsafeAccess with null object. \
359f7e70ae7f Reduce HotSpot diff and fix previous merge
Gilles Duboscq <duboscq@ssw.jku.at>
parents: 12355
diff changeset
177 * This concerns accesses to the metaspace such as the classMirrorOffset in Graal which is not compressed.*/ \
359f7e70ae7f Reduce HotSpot diff and fix previous merge
Gilles Duboscq <duboscq@ssw.jku.at>
parents: 12355
diff changeset
178 if (UseCompressedOops GRAAL_ONLY(&& p != NULL && offset >= oopDesc::header_size())) { \
359f7e70ae7f Reduce HotSpot diff and fix previous merge
Gilles Duboscq <duboscq@ssw.jku.at>
parents: 12355
diff changeset
179 narrowOop n = *(narrowOop*)index_oop_from_field_offset_long(p, offset); \
359f7e70ae7f Reduce HotSpot diff and fix previous merge
Gilles Duboscq <duboscq@ssw.jku.at>
parents: 12355
diff changeset
180 v = oopDesc::decode_heap_oop(n); \
359f7e70ae7f Reduce HotSpot diff and fix previous merge
Gilles Duboscq <duboscq@ssw.jku.at>
parents: 12355
diff changeset
181 } else { \
359f7e70ae7f Reduce HotSpot diff and fix previous merge
Gilles Duboscq <duboscq@ssw.jku.at>
parents: 12355
diff changeset
182 v = *(oop*)index_oop_from_field_offset_long(p, offset); \
359f7e70ae7f Reduce HotSpot diff and fix previous merge
Gilles Duboscq <duboscq@ssw.jku.at>
parents: 12355
diff changeset
183 }
359f7e70ae7f Reduce HotSpot diff and fix previous merge
Gilles Duboscq <duboscq@ssw.jku.at>
parents: 12355
diff changeset
184
113
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
185
0
a61af66fc99e Initial load
duke
parents:
diff changeset
186 // Get/SetObject must be special-cased, since it works with handles.
a61af66fc99e Initial load
duke
parents:
diff changeset
187
a61af66fc99e Initial load
duke
parents:
diff changeset
188 // The xxx140 variants for backward compatibility do not allow a full-width offset.
a61af66fc99e Initial load
duke
parents:
diff changeset
189 UNSAFE_ENTRY(jobject, Unsafe_GetObject140(JNIEnv *env, jobject unsafe, jobject obj, jint offset))
a61af66fc99e Initial load
duke
parents:
diff changeset
190 UnsafeWrapper("Unsafe_GetObject");
a61af66fc99e Initial load
duke
parents:
diff changeset
191 if (obj == NULL) THROW_0(vmSymbols::java_lang_NullPointerException());
113
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
192 GET_OOP_FIELD(obj, offset, v)
3249
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
193 jobject ret = JNIHandles::make_local(env, v);
8001
db9981fd3124 8005915: Unify SERIALGC and INCLUDE_ALTERNATE_GCS
jprovino
parents: 7425
diff changeset
194 #if INCLUDE_ALL_GCS
3249
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
195 // We could be accessing the referent field in a reference
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
196 // object. If G1 is enabled then we need to register a non-null
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
197 // referent with the SATB barrier.
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
198 if (UseG1GC) {
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
199 bool needs_barrier = false;
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
200
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
201 if (ret != NULL) {
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
202 if (offset == java_lang_ref_Reference::referent_offset) {
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
203 oop o = JNIHandles::resolve_non_null(obj);
6725
da91efe96a93 6964458: Reimplement class meta-data storage to use native memory
coleenp
parents: 6266
diff changeset
204 Klass* k = o->klass();
da91efe96a93 6964458: Reimplement class meta-data storage to use native memory
coleenp
parents: 6266
diff changeset
205 if (InstanceKlass::cast(k)->reference_type() != REF_NONE) {
da91efe96a93 6964458: Reimplement class meta-data storage to use native memory
coleenp
parents: 6266
diff changeset
206 assert(InstanceKlass::cast(k)->is_subclass_of(SystemDictionary::Reference_klass()), "sanity");
3249
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
207 needs_barrier = true;
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
208 }
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
209 }
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
210 }
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
211
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
212 if (needs_barrier) {
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
213 oop referent = JNIHandles::resolve(ret);
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
214 G1SATBCardTableModRefBS::enqueue(referent);
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
215 }
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
216 }
8001
db9981fd3124 8005915: Unify SERIALGC and INCLUDE_ALTERNATE_GCS
jprovino
parents: 7425
diff changeset
217 #endif // INCLUDE_ALL_GCS
3249
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
218 return ret;
0
a61af66fc99e Initial load
duke
parents:
diff changeset
219 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
220
a61af66fc99e Initial load
duke
parents:
diff changeset
221 UNSAFE_ENTRY(void, Unsafe_SetObject140(JNIEnv *env, jobject unsafe, jobject obj, jint offset, jobject x_h))
a61af66fc99e Initial load
duke
parents:
diff changeset
222 UnsafeWrapper("Unsafe_SetObject");
a61af66fc99e Initial load
duke
parents:
diff changeset
223 if (obj == NULL) THROW(vmSymbols::java_lang_NullPointerException());
a61af66fc99e Initial load
duke
parents:
diff changeset
224 oop x = JNIHandles::resolve(x_h);
a61af66fc99e Initial load
duke
parents:
diff changeset
225 //SET_FIELD(obj, offset, oop, x);
a61af66fc99e Initial load
duke
parents:
diff changeset
226 oop p = JNIHandles::resolve(obj);
113
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
227 if (UseCompressedOops) {
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
228 if (x != NULL) {
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
229 // If there is a heap base pointer, we are obliged to emit a store barrier.
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
230 oop_store((narrowOop*)index_oop_from_field_offset_long(p, offset), x);
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
231 } else {
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
232 narrowOop n = oopDesc::encode_heap_oop_not_null(x);
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
233 *(narrowOop*)index_oop_from_field_offset_long(p, offset) = n;
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
234 }
0
a61af66fc99e Initial load
duke
parents:
diff changeset
235 } else {
113
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
236 if (x != NULL) {
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
237 // If there is a heap base pointer, we are obliged to emit a store barrier.
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
238 oop_store((oop*)index_oop_from_field_offset_long(p, offset), x);
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
239 } else {
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
240 *(oop*)index_oop_from_field_offset_long(p, offset) = x;
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
241 }
0
a61af66fc99e Initial load
duke
parents:
diff changeset
242 }
a61af66fc99e Initial load
duke
parents:
diff changeset
243 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
244
a61af66fc99e Initial load
duke
parents:
diff changeset
245 // The normal variants allow a null base pointer with an arbitrary address.
a61af66fc99e Initial load
duke
parents:
diff changeset
246 // But if the base pointer is non-null, the offset should make some sense.
a61af66fc99e Initial load
duke
parents:
diff changeset
247 // That is, it should be in the range [0, MAX_OBJECT_SIZE].
a61af66fc99e Initial load
duke
parents:
diff changeset
248 UNSAFE_ENTRY(jobject, Unsafe_GetObject(JNIEnv *env, jobject unsafe, jobject obj, jlong offset))
a61af66fc99e Initial load
duke
parents:
diff changeset
249 UnsafeWrapper("Unsafe_GetObject");
113
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
250 GET_OOP_FIELD(obj, offset, v)
3249
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
251 jobject ret = JNIHandles::make_local(env, v);
8001
db9981fd3124 8005915: Unify SERIALGC and INCLUDE_ALTERNATE_GCS
jprovino
parents: 7425
diff changeset
252 #if INCLUDE_ALL_GCS
3249
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
253 // We could be accessing the referent field in a reference
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
254 // object. If G1 is enabled then we need to register non-null
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
255 // referent with the SATB barrier.
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
256 if (UseG1GC) {
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
257 bool needs_barrier = false;
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
258
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
259 if (ret != NULL) {
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
260 if (offset == java_lang_ref_Reference::referent_offset && obj != NULL) {
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
261 oop o = JNIHandles::resolve(obj);
6725
da91efe96a93 6964458: Reimplement class meta-data storage to use native memory
coleenp
parents: 6266
diff changeset
262 Klass* k = o->klass();
da91efe96a93 6964458: Reimplement class meta-data storage to use native memory
coleenp
parents: 6266
diff changeset
263 if (InstanceKlass::cast(k)->reference_type() != REF_NONE) {
da91efe96a93 6964458: Reimplement class meta-data storage to use native memory
coleenp
parents: 6266
diff changeset
264 assert(InstanceKlass::cast(k)->is_subclass_of(SystemDictionary::Reference_klass()), "sanity");
3249
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
265 needs_barrier = true;
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
266 }
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
267 }
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
268 }
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
269
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
270 if (needs_barrier) {
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
271 oop referent = JNIHandles::resolve(ret);
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
272 G1SATBCardTableModRefBS::enqueue(referent);
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
273 }
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
274 }
8001
db9981fd3124 8005915: Unify SERIALGC and INCLUDE_ALTERNATE_GCS
jprovino
parents: 7425
diff changeset
275 #endif // INCLUDE_ALL_GCS
3249
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
276 return ret;
0
a61af66fc99e Initial load
duke
parents:
diff changeset
277 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
278
a61af66fc99e Initial load
duke
parents:
diff changeset
279 UNSAFE_ENTRY(void, Unsafe_SetObject(JNIEnv *env, jobject unsafe, jobject obj, jlong offset, jobject x_h))
a61af66fc99e Initial load
duke
parents:
diff changeset
280 UnsafeWrapper("Unsafe_SetObject");
a61af66fc99e Initial load
duke
parents:
diff changeset
281 oop x = JNIHandles::resolve(x_h);
a61af66fc99e Initial load
duke
parents:
diff changeset
282 oop p = JNIHandles::resolve(obj);
113
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
283 if (UseCompressedOops) {
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
284 oop_store((narrowOop*)index_oop_from_field_offset_long(p, offset), x);
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
285 } else {
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
286 oop_store((oop*)index_oop_from_field_offset_long(p, offset), x);
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
287 }
0
a61af66fc99e Initial load
duke
parents:
diff changeset
288 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
289
a61af66fc99e Initial load
duke
parents:
diff changeset
290 UNSAFE_ENTRY(jobject, Unsafe_GetObjectVolatile(JNIEnv *env, jobject unsafe, jobject obj, jlong offset))
a61af66fc99e Initial load
duke
parents:
diff changeset
291 UnsafeWrapper("Unsafe_GetObjectVolatile");
6224
56c4f88474b3 7087357: JSR 292: remove obsolete code after 7085860
twisti
parents: 4043
diff changeset
292 oop p = JNIHandles::resolve(obj);
56c4f88474b3 7087357: JSR 292: remove obsolete code after 7085860
twisti
parents: 4043
diff changeset
293 void* addr = index_oop_from_field_offset_long(p, offset);
56c4f88474b3 7087357: JSR 292: remove obsolete code after 7085860
twisti
parents: 4043
diff changeset
294 volatile oop v;
56c4f88474b3 7087357: JSR 292: remove obsolete code after 7085860
twisti
parents: 4043
diff changeset
295 if (UseCompressedOops) {
56c4f88474b3 7087357: JSR 292: remove obsolete code after 7085860
twisti
parents: 4043
diff changeset
296 volatile narrowOop n = *(volatile narrowOop*) addr;
12316
190899198332 7195622: CheckUnhandledOops has limited usefulness now
hseigel
parents: 10405
diff changeset
297 (void)const_cast<oop&>(v = oopDesc::decode_heap_oop(n));
6224
56c4f88474b3 7087357: JSR 292: remove obsolete code after 7085860
twisti
parents: 4043
diff changeset
298 } else {
12316
190899198332 7195622: CheckUnhandledOops has limited usefulness now
hseigel
parents: 10405
diff changeset
299 (void)const_cast<oop&>(v = *(volatile oop*) addr);
6224
56c4f88474b3 7087357: JSR 292: remove obsolete code after 7085860
twisti
parents: 4043
diff changeset
300 }
56c4f88474b3 7087357: JSR 292: remove obsolete code after 7085860
twisti
parents: 4043
diff changeset
301 OrderAccess::acquire();
0
a61af66fc99e Initial load
duke
parents:
diff changeset
302 return JNIHandles::make_local(env, v);
a61af66fc99e Initial load
duke
parents:
diff changeset
303 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
304
a61af66fc99e Initial load
duke
parents:
diff changeset
305 UNSAFE_ENTRY(void, Unsafe_SetObjectVolatile(JNIEnv *env, jobject unsafe, jobject obj, jlong offset, jobject x_h))
a61af66fc99e Initial load
duke
parents:
diff changeset
306 UnsafeWrapper("Unsafe_SetObjectVolatile");
a61af66fc99e Initial load
duke
parents:
diff changeset
307 oop x = JNIHandles::resolve(x_h);
a61af66fc99e Initial load
duke
parents:
diff changeset
308 oop p = JNIHandles::resolve(obj);
2114
4fc084dac61e 7009756: volatile variables could be broken throw reflection API
kvn
parents: 1972
diff changeset
309 void* addr = index_oop_from_field_offset_long(p, offset);
4fc084dac61e 7009756: volatile variables could be broken throw reflection API
kvn
parents: 1972
diff changeset
310 OrderAccess::release();
113
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
311 if (UseCompressedOops) {
2114
4fc084dac61e 7009756: volatile variables could be broken throw reflection API
kvn
parents: 1972
diff changeset
312 oop_store((narrowOop*)addr, x);
113
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
313 } else {
2114
4fc084dac61e 7009756: volatile variables could be broken throw reflection API
kvn
parents: 1972
diff changeset
314 oop_store((oop*)addr, x);
113
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
315 }
0
a61af66fc99e Initial load
duke
parents:
diff changeset
316 OrderAccess::fence();
a61af66fc99e Initial load
duke
parents:
diff changeset
317 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
318
10235
6b388e7d4905 8013633: Cleanup platform ifdefs in unsafe.cpp
bpittore
parents: 8866
diff changeset
319 #ifndef SUPPORTS_NATIVE_CX8
2114
4fc084dac61e 7009756: volatile variables could be broken throw reflection API
kvn
parents: 1972
diff changeset
320 // Keep old code for platforms which may not have atomic jlong (8 bytes) instructions
4fc084dac61e 7009756: volatile variables could be broken throw reflection API
kvn
parents: 1972
diff changeset
321
0
a61af66fc99e Initial load
duke
parents:
diff changeset
322 // Volatile long versions must use locks if !VM_Version::supports_cx8().
a61af66fc99e Initial load
duke
parents:
diff changeset
323 // support_cx8 is a surrogate for 'supports atomic long memory ops'.
a61af66fc99e Initial load
duke
parents:
diff changeset
324
a61af66fc99e Initial load
duke
parents:
diff changeset
325 UNSAFE_ENTRY(jlong, Unsafe_GetLongVolatile(JNIEnv *env, jobject unsafe, jobject obj, jlong offset))
a61af66fc99e Initial load
duke
parents:
diff changeset
326 UnsafeWrapper("Unsafe_GetLongVolatile");
a61af66fc99e Initial load
duke
parents:
diff changeset
327 {
a61af66fc99e Initial load
duke
parents:
diff changeset
328 if (VM_Version::supports_cx8()) {
a61af66fc99e Initial load
duke
parents:
diff changeset
329 GET_FIELD_VOLATILE(obj, offset, jlong, v);
a61af66fc99e Initial load
duke
parents:
diff changeset
330 return v;
a61af66fc99e Initial load
duke
parents:
diff changeset
331 }
a61af66fc99e Initial load
duke
parents:
diff changeset
332 else {
a61af66fc99e Initial load
duke
parents:
diff changeset
333 Handle p (THREAD, JNIHandles::resolve(obj));
a61af66fc99e Initial load
duke
parents:
diff changeset
334 jlong* addr = (jlong*)(index_oop_from_field_offset_long(p(), offset));
a61af66fc99e Initial load
duke
parents:
diff changeset
335 ObjectLocker ol(p, THREAD);
a61af66fc99e Initial load
duke
parents:
diff changeset
336 jlong value = *addr;
a61af66fc99e Initial load
duke
parents:
diff changeset
337 return value;
a61af66fc99e Initial load
duke
parents:
diff changeset
338 }
a61af66fc99e Initial load
duke
parents:
diff changeset
339 }
a61af66fc99e Initial load
duke
parents:
diff changeset
340 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
341
a61af66fc99e Initial load
duke
parents:
diff changeset
342 UNSAFE_ENTRY(void, Unsafe_SetLongVolatile(JNIEnv *env, jobject unsafe, jobject obj, jlong offset, jlong x))
a61af66fc99e Initial load
duke
parents:
diff changeset
343 UnsafeWrapper("Unsafe_SetLongVolatile");
a61af66fc99e Initial load
duke
parents:
diff changeset
344 {
a61af66fc99e Initial load
duke
parents:
diff changeset
345 if (VM_Version::supports_cx8()) {
a61af66fc99e Initial load
duke
parents:
diff changeset
346 SET_FIELD_VOLATILE(obj, offset, jlong, x);
a61af66fc99e Initial load
duke
parents:
diff changeset
347 }
a61af66fc99e Initial load
duke
parents:
diff changeset
348 else {
a61af66fc99e Initial load
duke
parents:
diff changeset
349 Handle p (THREAD, JNIHandles::resolve(obj));
a61af66fc99e Initial load
duke
parents:
diff changeset
350 jlong* addr = (jlong*)(index_oop_from_field_offset_long(p(), offset));
a61af66fc99e Initial load
duke
parents:
diff changeset
351 ObjectLocker ol(p, THREAD);
a61af66fc99e Initial load
duke
parents:
diff changeset
352 *addr = x;
a61af66fc99e Initial load
duke
parents:
diff changeset
353 }
a61af66fc99e Initial load
duke
parents:
diff changeset
354 }
a61af66fc99e Initial load
duke
parents:
diff changeset
355 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
356
10235
6b388e7d4905 8013633: Cleanup platform ifdefs in unsafe.cpp
bpittore
parents: 8866
diff changeset
357 #endif // not SUPPORTS_NATIVE_CX8
0
a61af66fc99e Initial load
duke
parents:
diff changeset
358
a61af66fc99e Initial load
duke
parents:
diff changeset
359 #define DEFINE_GETSETOOP(jboolean, Boolean) \
a61af66fc99e Initial load
duke
parents:
diff changeset
360 \
a61af66fc99e Initial load
duke
parents:
diff changeset
361 UNSAFE_ENTRY(jboolean, Unsafe_Get##Boolean##140(JNIEnv *env, jobject unsafe, jobject obj, jint offset)) \
a61af66fc99e Initial load
duke
parents:
diff changeset
362 UnsafeWrapper("Unsafe_Get"#Boolean); \
a61af66fc99e Initial load
duke
parents:
diff changeset
363 if (obj == NULL) THROW_0(vmSymbols::java_lang_NullPointerException()); \
a61af66fc99e Initial load
duke
parents:
diff changeset
364 GET_FIELD(obj, offset, jboolean, v); \
a61af66fc99e Initial load
duke
parents:
diff changeset
365 return v; \
a61af66fc99e Initial load
duke
parents:
diff changeset
366 UNSAFE_END \
a61af66fc99e Initial load
duke
parents:
diff changeset
367 \
a61af66fc99e Initial load
duke
parents:
diff changeset
368 UNSAFE_ENTRY(void, Unsafe_Set##Boolean##140(JNIEnv *env, jobject unsafe, jobject obj, jint offset, jboolean x)) \
a61af66fc99e Initial load
duke
parents:
diff changeset
369 UnsafeWrapper("Unsafe_Set"#Boolean); \
a61af66fc99e Initial load
duke
parents:
diff changeset
370 if (obj == NULL) THROW(vmSymbols::java_lang_NullPointerException()); \
a61af66fc99e Initial load
duke
parents:
diff changeset
371 SET_FIELD(obj, offset, jboolean, x); \
a61af66fc99e Initial load
duke
parents:
diff changeset
372 UNSAFE_END \
a61af66fc99e Initial load
duke
parents:
diff changeset
373 \
a61af66fc99e Initial load
duke
parents:
diff changeset
374 UNSAFE_ENTRY(jboolean, Unsafe_Get##Boolean(JNIEnv *env, jobject unsafe, jobject obj, jlong offset)) \
a61af66fc99e Initial load
duke
parents:
diff changeset
375 UnsafeWrapper("Unsafe_Get"#Boolean); \
a61af66fc99e Initial load
duke
parents:
diff changeset
376 GET_FIELD(obj, offset, jboolean, v); \
a61af66fc99e Initial load
duke
parents:
diff changeset
377 return v; \
a61af66fc99e Initial load
duke
parents:
diff changeset
378 UNSAFE_END \
a61af66fc99e Initial load
duke
parents:
diff changeset
379 \
a61af66fc99e Initial load
duke
parents:
diff changeset
380 UNSAFE_ENTRY(void, Unsafe_Set##Boolean(JNIEnv *env, jobject unsafe, jobject obj, jlong offset, jboolean x)) \
a61af66fc99e Initial load
duke
parents:
diff changeset
381 UnsafeWrapper("Unsafe_Set"#Boolean); \
a61af66fc99e Initial load
duke
parents:
diff changeset
382 SET_FIELD(obj, offset, jboolean, x); \
a61af66fc99e Initial load
duke
parents:
diff changeset
383 UNSAFE_END \
a61af66fc99e Initial load
duke
parents:
diff changeset
384 \
a61af66fc99e Initial load
duke
parents:
diff changeset
385 // END DEFINE_GETSETOOP.
a61af66fc99e Initial load
duke
parents:
diff changeset
386
2114
4fc084dac61e 7009756: volatile variables could be broken throw reflection API
kvn
parents: 1972
diff changeset
387 DEFINE_GETSETOOP(jboolean, Boolean)
4fc084dac61e 7009756: volatile variables could be broken throw reflection API
kvn
parents: 1972
diff changeset
388 DEFINE_GETSETOOP(jbyte, Byte)
4fc084dac61e 7009756: volatile variables could be broken throw reflection API
kvn
parents: 1972
diff changeset
389 DEFINE_GETSETOOP(jshort, Short);
4fc084dac61e 7009756: volatile variables could be broken throw reflection API
kvn
parents: 1972
diff changeset
390 DEFINE_GETSETOOP(jchar, Char);
4fc084dac61e 7009756: volatile variables could be broken throw reflection API
kvn
parents: 1972
diff changeset
391 DEFINE_GETSETOOP(jint, Int);
4fc084dac61e 7009756: volatile variables could be broken throw reflection API
kvn
parents: 1972
diff changeset
392 DEFINE_GETSETOOP(jlong, Long);
4fc084dac61e 7009756: volatile variables could be broken throw reflection API
kvn
parents: 1972
diff changeset
393 DEFINE_GETSETOOP(jfloat, Float);
4fc084dac61e 7009756: volatile variables could be broken throw reflection API
kvn
parents: 1972
diff changeset
394 DEFINE_GETSETOOP(jdouble, Double);
4fc084dac61e 7009756: volatile variables could be broken throw reflection API
kvn
parents: 1972
diff changeset
395
4fc084dac61e 7009756: volatile variables could be broken throw reflection API
kvn
parents: 1972
diff changeset
396 #undef DEFINE_GETSETOOP
0
a61af66fc99e Initial load
duke
parents:
diff changeset
397
a61af66fc99e Initial load
duke
parents:
diff changeset
398 #define DEFINE_GETSETOOP_VOLATILE(jboolean, Boolean) \
a61af66fc99e Initial load
duke
parents:
diff changeset
399 \
a61af66fc99e Initial load
duke
parents:
diff changeset
400 UNSAFE_ENTRY(jboolean, Unsafe_Get##Boolean##Volatile(JNIEnv *env, jobject unsafe, jobject obj, jlong offset)) \
a61af66fc99e Initial load
duke
parents:
diff changeset
401 UnsafeWrapper("Unsafe_Get"#Boolean); \
a61af66fc99e Initial load
duke
parents:
diff changeset
402 GET_FIELD_VOLATILE(obj, offset, jboolean, v); \
a61af66fc99e Initial load
duke
parents:
diff changeset
403 return v; \
a61af66fc99e Initial load
duke
parents:
diff changeset
404 UNSAFE_END \
a61af66fc99e Initial load
duke
parents:
diff changeset
405 \
a61af66fc99e Initial load
duke
parents:
diff changeset
406 UNSAFE_ENTRY(void, Unsafe_Set##Boolean##Volatile(JNIEnv *env, jobject unsafe, jobject obj, jlong offset, jboolean x)) \
a61af66fc99e Initial load
duke
parents:
diff changeset
407 UnsafeWrapper("Unsafe_Set"#Boolean); \
a61af66fc99e Initial load
duke
parents:
diff changeset
408 SET_FIELD_VOLATILE(obj, offset, jboolean, x); \
a61af66fc99e Initial load
duke
parents:
diff changeset
409 UNSAFE_END \
a61af66fc99e Initial load
duke
parents:
diff changeset
410 \
a61af66fc99e Initial load
duke
parents:
diff changeset
411 // END DEFINE_GETSETOOP_VOLATILE.
a61af66fc99e Initial load
duke
parents:
diff changeset
412
a61af66fc99e Initial load
duke
parents:
diff changeset
413 DEFINE_GETSETOOP_VOLATILE(jboolean, Boolean)
a61af66fc99e Initial load
duke
parents:
diff changeset
414 DEFINE_GETSETOOP_VOLATILE(jbyte, Byte)
a61af66fc99e Initial load
duke
parents:
diff changeset
415 DEFINE_GETSETOOP_VOLATILE(jshort, Short);
a61af66fc99e Initial load
duke
parents:
diff changeset
416 DEFINE_GETSETOOP_VOLATILE(jchar, Char);
a61af66fc99e Initial load
duke
parents:
diff changeset
417 DEFINE_GETSETOOP_VOLATILE(jint, Int);
a61af66fc99e Initial load
duke
parents:
diff changeset
418 DEFINE_GETSETOOP_VOLATILE(jfloat, Float);
a61af66fc99e Initial load
duke
parents:
diff changeset
419 DEFINE_GETSETOOP_VOLATILE(jdouble, Double);
a61af66fc99e Initial load
duke
parents:
diff changeset
420
10235
6b388e7d4905 8013633: Cleanup platform ifdefs in unsafe.cpp
bpittore
parents: 8866
diff changeset
421 #ifdef SUPPORTS_NATIVE_CX8
2114
4fc084dac61e 7009756: volatile variables could be broken throw reflection API
kvn
parents: 1972
diff changeset
422 DEFINE_GETSETOOP_VOLATILE(jlong, Long);
4fc084dac61e 7009756: volatile variables could be broken throw reflection API
kvn
parents: 1972
diff changeset
423 #endif
4fc084dac61e 7009756: volatile variables could be broken throw reflection API
kvn
parents: 1972
diff changeset
424
4fc084dac61e 7009756: volatile variables could be broken throw reflection API
kvn
parents: 1972
diff changeset
425 #undef DEFINE_GETSETOOP_VOLATILE
0
a61af66fc99e Initial load
duke
parents:
diff changeset
426
a61af66fc99e Initial load
duke
parents:
diff changeset
427 // The non-intrinsified versions of setOrdered just use setVolatile
a61af66fc99e Initial load
duke
parents:
diff changeset
428
2114
4fc084dac61e 7009756: volatile variables could be broken throw reflection API
kvn
parents: 1972
diff changeset
429 UNSAFE_ENTRY(void, Unsafe_SetOrderedInt(JNIEnv *env, jobject unsafe, jobject obj, jlong offset, jint x))
4fc084dac61e 7009756: volatile variables could be broken throw reflection API
kvn
parents: 1972
diff changeset
430 UnsafeWrapper("Unsafe_SetOrderedInt");
4fc084dac61e 7009756: volatile variables could be broken throw reflection API
kvn
parents: 1972
diff changeset
431 SET_FIELD_VOLATILE(obj, offset, jint, x);
0
a61af66fc99e Initial load
duke
parents:
diff changeset
432 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
433
a61af66fc99e Initial load
duke
parents:
diff changeset
434 UNSAFE_ENTRY(void, Unsafe_SetOrderedObject(JNIEnv *env, jobject unsafe, jobject obj, jlong offset, jobject x_h))
a61af66fc99e Initial load
duke
parents:
diff changeset
435 UnsafeWrapper("Unsafe_SetOrderedObject");
a61af66fc99e Initial load
duke
parents:
diff changeset
436 oop x = JNIHandles::resolve(x_h);
a61af66fc99e Initial load
duke
parents:
diff changeset
437 oop p = JNIHandles::resolve(obj);
2114
4fc084dac61e 7009756: volatile variables could be broken throw reflection API
kvn
parents: 1972
diff changeset
438 void* addr = index_oop_from_field_offset_long(p, offset);
4fc084dac61e 7009756: volatile variables could be broken throw reflection API
kvn
parents: 1972
diff changeset
439 OrderAccess::release();
113
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
440 if (UseCompressedOops) {
2114
4fc084dac61e 7009756: volatile variables could be broken throw reflection API
kvn
parents: 1972
diff changeset
441 oop_store((narrowOop*)addr, x);
113
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
442 } else {
2114
4fc084dac61e 7009756: volatile variables could be broken throw reflection API
kvn
parents: 1972
diff changeset
443 oop_store((oop*)addr, x);
113
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
444 }
0
a61af66fc99e Initial load
duke
parents:
diff changeset
445 OrderAccess::fence();
a61af66fc99e Initial load
duke
parents:
diff changeset
446 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
447
a61af66fc99e Initial load
duke
parents:
diff changeset
448 UNSAFE_ENTRY(void, Unsafe_SetOrderedLong(JNIEnv *env, jobject unsafe, jobject obj, jlong offset, jlong x))
a61af66fc99e Initial load
duke
parents:
diff changeset
449 UnsafeWrapper("Unsafe_SetOrderedLong");
10235
6b388e7d4905 8013633: Cleanup platform ifdefs in unsafe.cpp
bpittore
parents: 8866
diff changeset
450 #ifdef SUPPORTS_NATIVE_CX8
2114
4fc084dac61e 7009756: volatile variables could be broken throw reflection API
kvn
parents: 1972
diff changeset
451 SET_FIELD_VOLATILE(obj, offset, jlong, x);
4fc084dac61e 7009756: volatile variables could be broken throw reflection API
kvn
parents: 1972
diff changeset
452 #else
4fc084dac61e 7009756: volatile variables could be broken throw reflection API
kvn
parents: 1972
diff changeset
453 // Keep old code for platforms which may not have atomic long (8 bytes) instructions
0
a61af66fc99e Initial load
duke
parents:
diff changeset
454 {
a61af66fc99e Initial load
duke
parents:
diff changeset
455 if (VM_Version::supports_cx8()) {
a61af66fc99e Initial load
duke
parents:
diff changeset
456 SET_FIELD_VOLATILE(obj, offset, jlong, x);
a61af66fc99e Initial load
duke
parents:
diff changeset
457 }
a61af66fc99e Initial load
duke
parents:
diff changeset
458 else {
a61af66fc99e Initial load
duke
parents:
diff changeset
459 Handle p (THREAD, JNIHandles::resolve(obj));
a61af66fc99e Initial load
duke
parents:
diff changeset
460 jlong* addr = (jlong*)(index_oop_from_field_offset_long(p(), offset));
a61af66fc99e Initial load
duke
parents:
diff changeset
461 ObjectLocker ol(p, THREAD);
a61af66fc99e Initial load
duke
parents:
diff changeset
462 *addr = x;
a61af66fc99e Initial load
duke
parents:
diff changeset
463 }
a61af66fc99e Initial load
duke
parents:
diff changeset
464 }
2114
4fc084dac61e 7009756: volatile variables could be broken throw reflection API
kvn
parents: 1972
diff changeset
465 #endif
0
a61af66fc99e Initial load
duke
parents:
diff changeset
466 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
467
7425
1e41b0bc58a0 8004318: JEP-171: Support Unsafe fences intrinsics
kvn
parents: 7185
diff changeset
468 UNSAFE_ENTRY(void, Unsafe_LoadFence(JNIEnv *env, jobject unsafe))
1e41b0bc58a0 8004318: JEP-171: Support Unsafe fences intrinsics
kvn
parents: 7185
diff changeset
469 UnsafeWrapper("Unsafe_LoadFence");
1e41b0bc58a0 8004318: JEP-171: Support Unsafe fences intrinsics
kvn
parents: 7185
diff changeset
470 OrderAccess::acquire();
1e41b0bc58a0 8004318: JEP-171: Support Unsafe fences intrinsics
kvn
parents: 7185
diff changeset
471 UNSAFE_END
1e41b0bc58a0 8004318: JEP-171: Support Unsafe fences intrinsics
kvn
parents: 7185
diff changeset
472
1e41b0bc58a0 8004318: JEP-171: Support Unsafe fences intrinsics
kvn
parents: 7185
diff changeset
473 UNSAFE_ENTRY(void, Unsafe_StoreFence(JNIEnv *env, jobject unsafe))
1e41b0bc58a0 8004318: JEP-171: Support Unsafe fences intrinsics
kvn
parents: 7185
diff changeset
474 UnsafeWrapper("Unsafe_StoreFence");
1e41b0bc58a0 8004318: JEP-171: Support Unsafe fences intrinsics
kvn
parents: 7185
diff changeset
475 OrderAccess::release();
1e41b0bc58a0 8004318: JEP-171: Support Unsafe fences intrinsics
kvn
parents: 7185
diff changeset
476 UNSAFE_END
1e41b0bc58a0 8004318: JEP-171: Support Unsafe fences intrinsics
kvn
parents: 7185
diff changeset
477
1e41b0bc58a0 8004318: JEP-171: Support Unsafe fences intrinsics
kvn
parents: 7185
diff changeset
478 UNSAFE_ENTRY(void, Unsafe_FullFence(JNIEnv *env, jobject unsafe))
1e41b0bc58a0 8004318: JEP-171: Support Unsafe fences intrinsics
kvn
parents: 7185
diff changeset
479 UnsafeWrapper("Unsafe_FullFence");
1e41b0bc58a0 8004318: JEP-171: Support Unsafe fences intrinsics
kvn
parents: 7185
diff changeset
480 OrderAccess::fence();
1e41b0bc58a0 8004318: JEP-171: Support Unsafe fences intrinsics
kvn
parents: 7185
diff changeset
481 UNSAFE_END
1e41b0bc58a0 8004318: JEP-171: Support Unsafe fences intrinsics
kvn
parents: 7185
diff changeset
482
0
a61af66fc99e Initial load
duke
parents:
diff changeset
483 ////// Data in the C heap.
a61af66fc99e Initial load
duke
parents:
diff changeset
484
a61af66fc99e Initial load
duke
parents:
diff changeset
485 // Note: These do not throw NullPointerException for bad pointers.
a61af66fc99e Initial load
duke
parents:
diff changeset
486 // They just crash. Only a oop base pointer can generate a NullPointerException.
a61af66fc99e Initial load
duke
parents:
diff changeset
487 //
a61af66fc99e Initial load
duke
parents:
diff changeset
488 #define DEFINE_GETSETNATIVE(java_type, Type, native_type) \
a61af66fc99e Initial load
duke
parents:
diff changeset
489 \
a61af66fc99e Initial load
duke
parents:
diff changeset
490 UNSAFE_ENTRY(java_type, Unsafe_GetNative##Type(JNIEnv *env, jobject unsafe, jlong addr)) \
a61af66fc99e Initial load
duke
parents:
diff changeset
491 UnsafeWrapper("Unsafe_GetNative"#Type); \
a61af66fc99e Initial load
duke
parents:
diff changeset
492 void* p = addr_from_java(addr); \
a61af66fc99e Initial load
duke
parents:
diff changeset
493 JavaThread* t = JavaThread::current(); \
a61af66fc99e Initial load
duke
parents:
diff changeset
494 t->set_doing_unsafe_access(true); \
a61af66fc99e Initial load
duke
parents:
diff changeset
495 java_type x = *(volatile native_type*)p; \
a61af66fc99e Initial load
duke
parents:
diff changeset
496 t->set_doing_unsafe_access(false); \
a61af66fc99e Initial load
duke
parents:
diff changeset
497 return x; \
a61af66fc99e Initial load
duke
parents:
diff changeset
498 UNSAFE_END \
a61af66fc99e Initial load
duke
parents:
diff changeset
499 \
a61af66fc99e Initial load
duke
parents:
diff changeset
500 UNSAFE_ENTRY(void, Unsafe_SetNative##Type(JNIEnv *env, jobject unsafe, jlong addr, java_type x)) \
a61af66fc99e Initial load
duke
parents:
diff changeset
501 UnsafeWrapper("Unsafe_SetNative"#Type); \
a61af66fc99e Initial load
duke
parents:
diff changeset
502 JavaThread* t = JavaThread::current(); \
a61af66fc99e Initial load
duke
parents:
diff changeset
503 t->set_doing_unsafe_access(true); \
a61af66fc99e Initial load
duke
parents:
diff changeset
504 void* p = addr_from_java(addr); \
a61af66fc99e Initial load
duke
parents:
diff changeset
505 *(volatile native_type*)p = x; \
a61af66fc99e Initial load
duke
parents:
diff changeset
506 t->set_doing_unsafe_access(false); \
a61af66fc99e Initial load
duke
parents:
diff changeset
507 UNSAFE_END \
a61af66fc99e Initial load
duke
parents:
diff changeset
508 \
a61af66fc99e Initial load
duke
parents:
diff changeset
509 // END DEFINE_GETSETNATIVE.
a61af66fc99e Initial load
duke
parents:
diff changeset
510
a61af66fc99e Initial load
duke
parents:
diff changeset
511 DEFINE_GETSETNATIVE(jbyte, Byte, signed char)
a61af66fc99e Initial load
duke
parents:
diff changeset
512 DEFINE_GETSETNATIVE(jshort, Short, signed short);
a61af66fc99e Initial load
duke
parents:
diff changeset
513 DEFINE_GETSETNATIVE(jchar, Char, unsigned short);
a61af66fc99e Initial load
duke
parents:
diff changeset
514 DEFINE_GETSETNATIVE(jint, Int, jint);
a61af66fc99e Initial load
duke
parents:
diff changeset
515 // no long -- handled specially
a61af66fc99e Initial load
duke
parents:
diff changeset
516 DEFINE_GETSETNATIVE(jfloat, Float, float);
a61af66fc99e Initial load
duke
parents:
diff changeset
517 DEFINE_GETSETNATIVE(jdouble, Double, double);
a61af66fc99e Initial load
duke
parents:
diff changeset
518
a61af66fc99e Initial load
duke
parents:
diff changeset
519 #undef DEFINE_GETSETNATIVE
a61af66fc99e Initial load
duke
parents:
diff changeset
520
a61af66fc99e Initial load
duke
parents:
diff changeset
521 UNSAFE_ENTRY(jlong, Unsafe_GetNativeLong(JNIEnv *env, jobject unsafe, jlong addr))
a61af66fc99e Initial load
duke
parents:
diff changeset
522 UnsafeWrapper("Unsafe_GetNativeLong");
a61af66fc99e Initial load
duke
parents:
diff changeset
523 JavaThread* t = JavaThread::current();
a61af66fc99e Initial load
duke
parents:
diff changeset
524 // We do it this way to avoid problems with access to heap using 64
a61af66fc99e Initial load
duke
parents:
diff changeset
525 // bit loads, as jlong in heap could be not 64-bit aligned, and on
a61af66fc99e Initial load
duke
parents:
diff changeset
526 // some CPUs (SPARC) it leads to SIGBUS.
a61af66fc99e Initial load
duke
parents:
diff changeset
527 t->set_doing_unsafe_access(true);
a61af66fc99e Initial load
duke
parents:
diff changeset
528 void* p = addr_from_java(addr);
a61af66fc99e Initial load
duke
parents:
diff changeset
529 jlong x;
a61af66fc99e Initial load
duke
parents:
diff changeset
530 if (((intptr_t)p & 7) == 0) {
a61af66fc99e Initial load
duke
parents:
diff changeset
531 // jlong is aligned, do a volatile access
a61af66fc99e Initial load
duke
parents:
diff changeset
532 x = *(volatile jlong*)p;
a61af66fc99e Initial load
duke
parents:
diff changeset
533 } else {
a61af66fc99e Initial load
duke
parents:
diff changeset
534 jlong_accessor acc;
a61af66fc99e Initial load
duke
parents:
diff changeset
535 acc.words[0] = ((volatile jint*)p)[0];
a61af66fc99e Initial load
duke
parents:
diff changeset
536 acc.words[1] = ((volatile jint*)p)[1];
a61af66fc99e Initial load
duke
parents:
diff changeset
537 x = acc.long_value;
a61af66fc99e Initial load
duke
parents:
diff changeset
538 }
a61af66fc99e Initial load
duke
parents:
diff changeset
539 t->set_doing_unsafe_access(false);
a61af66fc99e Initial load
duke
parents:
diff changeset
540 return x;
a61af66fc99e Initial load
duke
parents:
diff changeset
541 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
542
a61af66fc99e Initial load
duke
parents:
diff changeset
543 UNSAFE_ENTRY(void, Unsafe_SetNativeLong(JNIEnv *env, jobject unsafe, jlong addr, jlong x))
a61af66fc99e Initial load
duke
parents:
diff changeset
544 UnsafeWrapper("Unsafe_SetNativeLong");
a61af66fc99e Initial load
duke
parents:
diff changeset
545 JavaThread* t = JavaThread::current();
a61af66fc99e Initial load
duke
parents:
diff changeset
546 // see comment for Unsafe_GetNativeLong
a61af66fc99e Initial load
duke
parents:
diff changeset
547 t->set_doing_unsafe_access(true);
a61af66fc99e Initial load
duke
parents:
diff changeset
548 void* p = addr_from_java(addr);
a61af66fc99e Initial load
duke
parents:
diff changeset
549 if (((intptr_t)p & 7) == 0) {
a61af66fc99e Initial load
duke
parents:
diff changeset
550 // jlong is aligned, do a volatile access
a61af66fc99e Initial load
duke
parents:
diff changeset
551 *(volatile jlong*)p = x;
a61af66fc99e Initial load
duke
parents:
diff changeset
552 } else {
a61af66fc99e Initial load
duke
parents:
diff changeset
553 jlong_accessor acc;
a61af66fc99e Initial load
duke
parents:
diff changeset
554 acc.long_value = x;
a61af66fc99e Initial load
duke
parents:
diff changeset
555 ((volatile jint*)p)[0] = acc.words[0];
a61af66fc99e Initial load
duke
parents:
diff changeset
556 ((volatile jint*)p)[1] = acc.words[1];
a61af66fc99e Initial load
duke
parents:
diff changeset
557 }
a61af66fc99e Initial load
duke
parents:
diff changeset
558 t->set_doing_unsafe_access(false);
a61af66fc99e Initial load
duke
parents:
diff changeset
559 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
560
a61af66fc99e Initial load
duke
parents:
diff changeset
561
a61af66fc99e Initial load
duke
parents:
diff changeset
562 UNSAFE_ENTRY(jlong, Unsafe_GetNativeAddress(JNIEnv *env, jobject unsafe, jlong addr))
a61af66fc99e Initial load
duke
parents:
diff changeset
563 UnsafeWrapper("Unsafe_GetNativeAddress");
a61af66fc99e Initial load
duke
parents:
diff changeset
564 void* p = addr_from_java(addr);
a61af66fc99e Initial load
duke
parents:
diff changeset
565 return addr_to_java(*(void**)p);
a61af66fc99e Initial load
duke
parents:
diff changeset
566 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
567
a61af66fc99e Initial load
duke
parents:
diff changeset
568 UNSAFE_ENTRY(void, Unsafe_SetNativeAddress(JNIEnv *env, jobject unsafe, jlong addr, jlong x))
a61af66fc99e Initial load
duke
parents:
diff changeset
569 UnsafeWrapper("Unsafe_SetNativeAddress");
a61af66fc99e Initial load
duke
parents:
diff changeset
570 void* p = addr_from_java(addr);
a61af66fc99e Initial load
duke
parents:
diff changeset
571 *(void**)p = addr_from_java(x);
a61af66fc99e Initial load
duke
parents:
diff changeset
572 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
573
a61af66fc99e Initial load
duke
parents:
diff changeset
574
a61af66fc99e Initial load
duke
parents:
diff changeset
575 ////// Allocation requests
a61af66fc99e Initial load
duke
parents:
diff changeset
576
a61af66fc99e Initial load
duke
parents:
diff changeset
577 UNSAFE_ENTRY(jobject, Unsafe_AllocateInstance(JNIEnv *env, jobject unsafe, jclass cls))
a61af66fc99e Initial load
duke
parents:
diff changeset
578 UnsafeWrapper("Unsafe_AllocateInstance");
a61af66fc99e Initial load
duke
parents:
diff changeset
579 {
a61af66fc99e Initial load
duke
parents:
diff changeset
580 ThreadToNativeFromVM ttnfv(thread);
a61af66fc99e Initial load
duke
parents:
diff changeset
581 return env->AllocObject(cls);
a61af66fc99e Initial load
duke
parents:
diff changeset
582 }
a61af66fc99e Initial load
duke
parents:
diff changeset
583 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
584
a61af66fc99e Initial load
duke
parents:
diff changeset
585 UNSAFE_ENTRY(jlong, Unsafe_AllocateMemory(JNIEnv *env, jobject unsafe, jlong size))
a61af66fc99e Initial load
duke
parents:
diff changeset
586 UnsafeWrapper("Unsafe_AllocateMemory");
a61af66fc99e Initial load
duke
parents:
diff changeset
587 size_t sz = (size_t)size;
a61af66fc99e Initial load
duke
parents:
diff changeset
588 if (sz != (julong)size || size < 0) {
a61af66fc99e Initial load
duke
parents:
diff changeset
589 THROW_0(vmSymbols::java_lang_IllegalArgumentException());
a61af66fc99e Initial load
duke
parents:
diff changeset
590 }
a61af66fc99e Initial load
duke
parents:
diff changeset
591 if (sz == 0) {
a61af66fc99e Initial load
duke
parents:
diff changeset
592 return 0;
a61af66fc99e Initial load
duke
parents:
diff changeset
593 }
a61af66fc99e Initial load
duke
parents:
diff changeset
594 sz = round_to(sz, HeapWordSize);
6197
d2a62e0f25eb 6995781: Native Memory Tracking (Phase 1)
zgu
parents: 4043
diff changeset
595 void* x = os::malloc(sz, mtInternal);
0
a61af66fc99e Initial load
duke
parents:
diff changeset
596 if (x == NULL) {
a61af66fc99e Initial load
duke
parents:
diff changeset
597 THROW_0(vmSymbols::java_lang_OutOfMemoryError());
a61af66fc99e Initial load
duke
parents:
diff changeset
598 }
a61af66fc99e Initial load
duke
parents:
diff changeset
599 //Copy::fill_to_words((HeapWord*)x, sz / HeapWordSize);
a61af66fc99e Initial load
duke
parents:
diff changeset
600 return addr_to_java(x);
a61af66fc99e Initial load
duke
parents:
diff changeset
601 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
602
a61af66fc99e Initial load
duke
parents:
diff changeset
603 UNSAFE_ENTRY(jlong, Unsafe_ReallocateMemory(JNIEnv *env, jobject unsafe, jlong addr, jlong size))
a61af66fc99e Initial load
duke
parents:
diff changeset
604 UnsafeWrapper("Unsafe_ReallocateMemory");
a61af66fc99e Initial load
duke
parents:
diff changeset
605 void* p = addr_from_java(addr);
a61af66fc99e Initial load
duke
parents:
diff changeset
606 size_t sz = (size_t)size;
a61af66fc99e Initial load
duke
parents:
diff changeset
607 if (sz != (julong)size || size < 0) {
a61af66fc99e Initial load
duke
parents:
diff changeset
608 THROW_0(vmSymbols::java_lang_IllegalArgumentException());
a61af66fc99e Initial load
duke
parents:
diff changeset
609 }
a61af66fc99e Initial load
duke
parents:
diff changeset
610 if (sz == 0) {
a61af66fc99e Initial load
duke
parents:
diff changeset
611 os::free(p);
a61af66fc99e Initial load
duke
parents:
diff changeset
612 return 0;
a61af66fc99e Initial load
duke
parents:
diff changeset
613 }
a61af66fc99e Initial load
duke
parents:
diff changeset
614 sz = round_to(sz, HeapWordSize);
6197
d2a62e0f25eb 6995781: Native Memory Tracking (Phase 1)
zgu
parents: 4043
diff changeset
615 void* x = (p == NULL) ? os::malloc(sz, mtInternal) : os::realloc(p, sz, mtInternal);
0
a61af66fc99e Initial load
duke
parents:
diff changeset
616 if (x == NULL) {
a61af66fc99e Initial load
duke
parents:
diff changeset
617 THROW_0(vmSymbols::java_lang_OutOfMemoryError());
a61af66fc99e Initial load
duke
parents:
diff changeset
618 }
a61af66fc99e Initial load
duke
parents:
diff changeset
619 return addr_to_java(x);
a61af66fc99e Initial load
duke
parents:
diff changeset
620 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
621
a61af66fc99e Initial load
duke
parents:
diff changeset
622 UNSAFE_ENTRY(void, Unsafe_FreeMemory(JNIEnv *env, jobject unsafe, jlong addr))
a61af66fc99e Initial load
duke
parents:
diff changeset
623 UnsafeWrapper("Unsafe_FreeMemory");
a61af66fc99e Initial load
duke
parents:
diff changeset
624 void* p = addr_from_java(addr);
a61af66fc99e Initial load
duke
parents:
diff changeset
625 if (p == NULL) {
a61af66fc99e Initial load
duke
parents:
diff changeset
626 return;
a61af66fc99e Initial load
duke
parents:
diff changeset
627 }
a61af66fc99e Initial load
duke
parents:
diff changeset
628 os::free(p);
a61af66fc99e Initial load
duke
parents:
diff changeset
629 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
630
a61af66fc99e Initial load
duke
parents:
diff changeset
631 UNSAFE_ENTRY(void, Unsafe_SetMemory(JNIEnv *env, jobject unsafe, jlong addr, jlong size, jbyte value))
a61af66fc99e Initial load
duke
parents:
diff changeset
632 UnsafeWrapper("Unsafe_SetMemory");
a61af66fc99e Initial load
duke
parents:
diff changeset
633 size_t sz = (size_t)size;
a61af66fc99e Initial load
duke
parents:
diff changeset
634 if (sz != (julong)size || size < 0) {
a61af66fc99e Initial load
duke
parents:
diff changeset
635 THROW(vmSymbols::java_lang_IllegalArgumentException());
a61af66fc99e Initial load
duke
parents:
diff changeset
636 }
a61af66fc99e Initial load
duke
parents:
diff changeset
637 char* p = (char*) addr_from_java(addr);
a61af66fc99e Initial load
duke
parents:
diff changeset
638 Copy::fill_to_memory_atomic(p, sz, value);
a61af66fc99e Initial load
duke
parents:
diff changeset
639 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
640
a61af66fc99e Initial load
duke
parents:
diff changeset
641 UNSAFE_ENTRY(void, Unsafe_SetMemory2(JNIEnv *env, jobject unsafe, jobject obj, jlong offset, jlong size, jbyte value))
a61af66fc99e Initial load
duke
parents:
diff changeset
642 UnsafeWrapper("Unsafe_SetMemory");
a61af66fc99e Initial load
duke
parents:
diff changeset
643 size_t sz = (size_t)size;
a61af66fc99e Initial load
duke
parents:
diff changeset
644 if (sz != (julong)size || size < 0) {
a61af66fc99e Initial load
duke
parents:
diff changeset
645 THROW(vmSymbols::java_lang_IllegalArgumentException());
a61af66fc99e Initial load
duke
parents:
diff changeset
646 }
a61af66fc99e Initial load
duke
parents:
diff changeset
647 oop base = JNIHandles::resolve(obj);
a61af66fc99e Initial load
duke
parents:
diff changeset
648 void* p = index_oop_from_field_offset_long(base, offset);
a61af66fc99e Initial load
duke
parents:
diff changeset
649 Copy::fill_to_memory_atomic(p, sz, value);
a61af66fc99e Initial load
duke
parents:
diff changeset
650 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
651
a61af66fc99e Initial load
duke
parents:
diff changeset
652 UNSAFE_ENTRY(void, Unsafe_CopyMemory(JNIEnv *env, jobject unsafe, jlong srcAddr, jlong dstAddr, jlong size))
a61af66fc99e Initial load
duke
parents:
diff changeset
653 UnsafeWrapper("Unsafe_CopyMemory");
a61af66fc99e Initial load
duke
parents:
diff changeset
654 if (size == 0) {
a61af66fc99e Initial load
duke
parents:
diff changeset
655 return;
a61af66fc99e Initial load
duke
parents:
diff changeset
656 }
a61af66fc99e Initial load
duke
parents:
diff changeset
657 size_t sz = (size_t)size;
a61af66fc99e Initial load
duke
parents:
diff changeset
658 if (sz != (julong)size || size < 0) {
a61af66fc99e Initial load
duke
parents:
diff changeset
659 THROW(vmSymbols::java_lang_IllegalArgumentException());
a61af66fc99e Initial load
duke
parents:
diff changeset
660 }
a61af66fc99e Initial load
duke
parents:
diff changeset
661 void* src = addr_from_java(srcAddr);
a61af66fc99e Initial load
duke
parents:
diff changeset
662 void* dst = addr_from_java(dstAddr);
a61af66fc99e Initial load
duke
parents:
diff changeset
663 Copy::conjoint_memory_atomic(src, dst, sz);
a61af66fc99e Initial load
duke
parents:
diff changeset
664 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
665
a61af66fc99e Initial load
duke
parents:
diff changeset
666 UNSAFE_ENTRY(void, Unsafe_CopyMemory2(JNIEnv *env, jobject unsafe, jobject srcObj, jlong srcOffset, jobject dstObj, jlong dstOffset, jlong size))
a61af66fc99e Initial load
duke
parents:
diff changeset
667 UnsafeWrapper("Unsafe_CopyMemory");
a61af66fc99e Initial load
duke
parents:
diff changeset
668 if (size == 0) {
a61af66fc99e Initial load
duke
parents:
diff changeset
669 return;
a61af66fc99e Initial load
duke
parents:
diff changeset
670 }
a61af66fc99e Initial load
duke
parents:
diff changeset
671 size_t sz = (size_t)size;
a61af66fc99e Initial load
duke
parents:
diff changeset
672 if (sz != (julong)size || size < 0) {
a61af66fc99e Initial load
duke
parents:
diff changeset
673 THROW(vmSymbols::java_lang_IllegalArgumentException());
a61af66fc99e Initial load
duke
parents:
diff changeset
674 }
a61af66fc99e Initial load
duke
parents:
diff changeset
675 oop srcp = JNIHandles::resolve(srcObj);
a61af66fc99e Initial load
duke
parents:
diff changeset
676 oop dstp = JNIHandles::resolve(dstObj);
a61af66fc99e Initial load
duke
parents:
diff changeset
677 if (dstp != NULL && !dstp->is_typeArray()) {
a61af66fc99e Initial load
duke
parents:
diff changeset
678 // NYI: This works only for non-oop arrays at present.
a61af66fc99e Initial load
duke
parents:
diff changeset
679 // Generalizing it would be reasonable, but requires card marking.
a61af66fc99e Initial load
duke
parents:
diff changeset
680 // Also, autoboxing a Long from 0L in copyMemory(x,y, 0L,z, n) would be bad.
a61af66fc99e Initial load
duke
parents:
diff changeset
681 THROW(vmSymbols::java_lang_IllegalArgumentException());
a61af66fc99e Initial load
duke
parents:
diff changeset
682 }
a61af66fc99e Initial load
duke
parents:
diff changeset
683 void* src = index_oop_from_field_offset_long(srcp, srcOffset);
a61af66fc99e Initial load
duke
parents:
diff changeset
684 void* dst = index_oop_from_field_offset_long(dstp, dstOffset);
a61af66fc99e Initial load
duke
parents:
diff changeset
685 Copy::conjoint_memory_atomic(src, dst, sz);
a61af66fc99e Initial load
duke
parents:
diff changeset
686 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
687
a61af66fc99e Initial load
duke
parents:
diff changeset
688
a61af66fc99e Initial load
duke
parents:
diff changeset
689 ////// Random queries
a61af66fc99e Initial load
duke
parents:
diff changeset
690
a61af66fc99e Initial load
duke
parents:
diff changeset
691 // See comment at file start about UNSAFE_LEAF
a61af66fc99e Initial load
duke
parents:
diff changeset
692 //UNSAFE_LEAF(jint, Unsafe_AddressSize())
a61af66fc99e Initial load
duke
parents:
diff changeset
693 UNSAFE_ENTRY(jint, Unsafe_AddressSize(JNIEnv *env, jobject unsafe))
a61af66fc99e Initial load
duke
parents:
diff changeset
694 UnsafeWrapper("Unsafe_AddressSize");
a61af66fc99e Initial load
duke
parents:
diff changeset
695 return sizeof(void*);
a61af66fc99e Initial load
duke
parents:
diff changeset
696 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
697
a61af66fc99e Initial load
duke
parents:
diff changeset
698 // See comment at file start about UNSAFE_LEAF
a61af66fc99e Initial load
duke
parents:
diff changeset
699 //UNSAFE_LEAF(jint, Unsafe_PageSize())
a61af66fc99e Initial load
duke
parents:
diff changeset
700 UNSAFE_ENTRY(jint, Unsafe_PageSize(JNIEnv *env, jobject unsafe))
a61af66fc99e Initial load
duke
parents:
diff changeset
701 UnsafeWrapper("Unsafe_PageSize");
a61af66fc99e Initial load
duke
parents:
diff changeset
702 return os::vm_page_size();
a61af66fc99e Initial load
duke
parents:
diff changeset
703 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
704
a61af66fc99e Initial load
duke
parents:
diff changeset
705 jint find_field_offset(jobject field, int must_be_static, TRAPS) {
a61af66fc99e Initial load
duke
parents:
diff changeset
706 if (field == NULL) {
a61af66fc99e Initial load
duke
parents:
diff changeset
707 THROW_0(vmSymbols::java_lang_NullPointerException());
a61af66fc99e Initial load
duke
parents:
diff changeset
708 }
a61af66fc99e Initial load
duke
parents:
diff changeset
709
a61af66fc99e Initial load
duke
parents:
diff changeset
710 oop reflected = JNIHandles::resolve_non_null(field);
a61af66fc99e Initial load
duke
parents:
diff changeset
711 oop mirror = java_lang_reflect_Field::clazz(reflected);
6725
da91efe96a93 6964458: Reimplement class meta-data storage to use native memory
coleenp
parents: 6266
diff changeset
712 Klass* k = java_lang_Class::as_Klass(mirror);
0
a61af66fc99e Initial load
duke
parents:
diff changeset
713 int slot = java_lang_reflect_Field::slot(reflected);
a61af66fc99e Initial load
duke
parents:
diff changeset
714 int modifiers = java_lang_reflect_Field::modifiers(reflected);
a61af66fc99e Initial load
duke
parents:
diff changeset
715
a61af66fc99e Initial load
duke
parents:
diff changeset
716 if (must_be_static >= 0) {
a61af66fc99e Initial load
duke
parents:
diff changeset
717 int really_is_static = ((modifiers & JVM_ACC_STATIC) != 0);
a61af66fc99e Initial load
duke
parents:
diff changeset
718 if (must_be_static != really_is_static) {
a61af66fc99e Initial load
duke
parents:
diff changeset
719 THROW_0(vmSymbols::java_lang_IllegalArgumentException());
a61af66fc99e Initial load
duke
parents:
diff changeset
720 }
a61af66fc99e Initial load
duke
parents:
diff changeset
721 }
a61af66fc99e Initial load
duke
parents:
diff changeset
722
6725
da91efe96a93 6964458: Reimplement class meta-data storage to use native memory
coleenp
parents: 6266
diff changeset
723 int offset = InstanceKlass::cast(k)->field_offset(slot);
0
a61af66fc99e Initial load
duke
parents:
diff changeset
724 return field_offset_from_byte_offset(offset);
a61af66fc99e Initial load
duke
parents:
diff changeset
725 }
a61af66fc99e Initial load
duke
parents:
diff changeset
726
a61af66fc99e Initial load
duke
parents:
diff changeset
727 UNSAFE_ENTRY(jlong, Unsafe_ObjectFieldOffset(JNIEnv *env, jobject unsafe, jobject field))
a61af66fc99e Initial load
duke
parents:
diff changeset
728 UnsafeWrapper("Unsafe_ObjectFieldOffset");
a61af66fc99e Initial load
duke
parents:
diff changeset
729 return find_field_offset(field, 0, THREAD);
a61af66fc99e Initial load
duke
parents:
diff changeset
730 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
731
a61af66fc99e Initial load
duke
parents:
diff changeset
732 UNSAFE_ENTRY(jlong, Unsafe_StaticFieldOffset(JNIEnv *env, jobject unsafe, jobject field))
a61af66fc99e Initial load
duke
parents:
diff changeset
733 UnsafeWrapper("Unsafe_StaticFieldOffset");
a61af66fc99e Initial load
duke
parents:
diff changeset
734 return find_field_offset(field, 1, THREAD);
a61af66fc99e Initial load
duke
parents:
diff changeset
735 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
736
a61af66fc99e Initial load
duke
parents:
diff changeset
737 UNSAFE_ENTRY(jobject, Unsafe_StaticFieldBaseFromField(JNIEnv *env, jobject unsafe, jobject field))
a61af66fc99e Initial load
duke
parents:
diff changeset
738 UnsafeWrapper("Unsafe_StaticFieldBase");
a61af66fc99e Initial load
duke
parents:
diff changeset
739 // Note: In this VM implementation, a field address is always a short
a61af66fc99e Initial load
duke
parents:
diff changeset
740 // offset from the base of a a klass metaobject. Thus, the full dynamic
a61af66fc99e Initial load
duke
parents:
diff changeset
741 // range of the return type is never used. However, some implementations
a61af66fc99e Initial load
duke
parents:
diff changeset
742 // might put the static field inside an array shared by many classes,
a61af66fc99e Initial load
duke
parents:
diff changeset
743 // or even at a fixed address, in which case the address could be quite
a61af66fc99e Initial load
duke
parents:
diff changeset
744 // large. In that last case, this function would return NULL, since
a61af66fc99e Initial load
duke
parents:
diff changeset
745 // the address would operate alone, without any base pointer.
a61af66fc99e Initial load
duke
parents:
diff changeset
746
a61af66fc99e Initial load
duke
parents:
diff changeset
747 if (field == NULL) THROW_0(vmSymbols::java_lang_NullPointerException());
a61af66fc99e Initial load
duke
parents:
diff changeset
748
a61af66fc99e Initial load
duke
parents:
diff changeset
749 oop reflected = JNIHandles::resolve_non_null(field);
a61af66fc99e Initial load
duke
parents:
diff changeset
750 oop mirror = java_lang_reflect_Field::clazz(reflected);
a61af66fc99e Initial load
duke
parents:
diff changeset
751 int modifiers = java_lang_reflect_Field::modifiers(reflected);
a61af66fc99e Initial load
duke
parents:
diff changeset
752
a61af66fc99e Initial load
duke
parents:
diff changeset
753 if ((modifiers & JVM_ACC_STATIC) == 0) {
a61af66fc99e Initial load
duke
parents:
diff changeset
754 THROW_0(vmSymbols::java_lang_IllegalArgumentException());
a61af66fc99e Initial load
duke
parents:
diff changeset
755 }
a61af66fc99e Initial load
duke
parents:
diff changeset
756
2376
c7f3d0b4570f 7017732: move static fields into Class to prepare for perm gen removal
never
parents: 2316
diff changeset
757 return JNIHandles::make_local(env, mirror);
0
a61af66fc99e Initial load
duke
parents:
diff changeset
758 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
759
a61af66fc99e Initial load
duke
parents:
diff changeset
760 //@deprecated
a61af66fc99e Initial load
duke
parents:
diff changeset
761 UNSAFE_ENTRY(jint, Unsafe_FieldOffset(JNIEnv *env, jobject unsafe, jobject field))
a61af66fc99e Initial load
duke
parents:
diff changeset
762 UnsafeWrapper("Unsafe_FieldOffset");
a61af66fc99e Initial load
duke
parents:
diff changeset
763 // tries (but fails) to be polymorphic between static and non-static:
a61af66fc99e Initial load
duke
parents:
diff changeset
764 jlong offset = find_field_offset(field, -1, THREAD);
a61af66fc99e Initial load
duke
parents:
diff changeset
765 guarantee(offset == (jint)offset, "offset fits in 32 bits");
a61af66fc99e Initial load
duke
parents:
diff changeset
766 return (jint)offset;
a61af66fc99e Initial load
duke
parents:
diff changeset
767 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
768
a61af66fc99e Initial load
duke
parents:
diff changeset
769 //@deprecated
a61af66fc99e Initial load
duke
parents:
diff changeset
770 UNSAFE_ENTRY(jobject, Unsafe_StaticFieldBaseFromClass(JNIEnv *env, jobject unsafe, jobject clazz))
a61af66fc99e Initial load
duke
parents:
diff changeset
771 UnsafeWrapper("Unsafe_StaticFieldBase");
a61af66fc99e Initial load
duke
parents:
diff changeset
772 if (clazz == NULL) {
a61af66fc99e Initial load
duke
parents:
diff changeset
773 THROW_0(vmSymbols::java_lang_NullPointerException());
a61af66fc99e Initial load
duke
parents:
diff changeset
774 }
2376
c7f3d0b4570f 7017732: move static fields into Class to prepare for perm gen removal
never
parents: 2316
diff changeset
775 return JNIHandles::make_local(env, JNIHandles::resolve_non_null(clazz));
0
a61af66fc99e Initial load
duke
parents:
diff changeset
776 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
777
6266
1d7922586cf6 7023639: JSR 292 method handle invocation needs a fast path for compiled code
twisti
parents: 6226
diff changeset
778 UNSAFE_ENTRY(void, Unsafe_EnsureClassInitialized(JNIEnv *env, jobject unsafe, jobject clazz)) {
0
a61af66fc99e Initial load
duke
parents:
diff changeset
779 UnsafeWrapper("Unsafe_EnsureClassInitialized");
a61af66fc99e Initial load
duke
parents:
diff changeset
780 if (clazz == NULL) {
a61af66fc99e Initial load
duke
parents:
diff changeset
781 THROW(vmSymbols::java_lang_NullPointerException());
a61af66fc99e Initial load
duke
parents:
diff changeset
782 }
a61af66fc99e Initial load
duke
parents:
diff changeset
783 oop mirror = JNIHandles::resolve_non_null(clazz);
6266
1d7922586cf6 7023639: JSR 292 method handle invocation needs a fast path for compiled code
twisti
parents: 6226
diff changeset
784
6725
da91efe96a93 6964458: Reimplement class meta-data storage to use native memory
coleenp
parents: 6266
diff changeset
785 Klass* klass = java_lang_Class::as_Klass(mirror);
6983
070d523b96a7 8001471: Klass::cast() does nothing
hseigel
parents: 6889
diff changeset
786 if (klass != NULL && klass->should_be_initialized()) {
6725
da91efe96a93 6964458: Reimplement class meta-data storage to use native memory
coleenp
parents: 6266
diff changeset
787 InstanceKlass* k = InstanceKlass::cast(klass);
0
a61af66fc99e Initial load
duke
parents:
diff changeset
788 k->initialize(CHECK);
a61af66fc99e Initial load
duke
parents:
diff changeset
789 }
6266
1d7922586cf6 7023639: JSR 292 method handle invocation needs a fast path for compiled code
twisti
parents: 6226
diff changeset
790 }
1d7922586cf6 7023639: JSR 292 method handle invocation needs a fast path for compiled code
twisti
parents: 6226
diff changeset
791 UNSAFE_END
1d7922586cf6 7023639: JSR 292 method handle invocation needs a fast path for compiled code
twisti
parents: 6226
diff changeset
792
1d7922586cf6 7023639: JSR 292 method handle invocation needs a fast path for compiled code
twisti
parents: 6226
diff changeset
793 UNSAFE_ENTRY(jboolean, Unsafe_ShouldBeInitialized(JNIEnv *env, jobject unsafe, jobject clazz)) {
1d7922586cf6 7023639: JSR 292 method handle invocation needs a fast path for compiled code
twisti
parents: 6226
diff changeset
794 UnsafeWrapper("Unsafe_ShouldBeInitialized");
1d7922586cf6 7023639: JSR 292 method handle invocation needs a fast path for compiled code
twisti
parents: 6226
diff changeset
795 if (clazz == NULL) {
1d7922586cf6 7023639: JSR 292 method handle invocation needs a fast path for compiled code
twisti
parents: 6226
diff changeset
796 THROW_(vmSymbols::java_lang_NullPointerException(), false);
1d7922586cf6 7023639: JSR 292 method handle invocation needs a fast path for compiled code
twisti
parents: 6226
diff changeset
797 }
1d7922586cf6 7023639: JSR 292 method handle invocation needs a fast path for compiled code
twisti
parents: 6226
diff changeset
798 oop mirror = JNIHandles::resolve_non_null(clazz);
6725
da91efe96a93 6964458: Reimplement class meta-data storage to use native memory
coleenp
parents: 6266
diff changeset
799 Klass* klass = java_lang_Class::as_Klass(mirror);
6983
070d523b96a7 8001471: Klass::cast() does nothing
hseigel
parents: 6889
diff changeset
800 if (klass != NULL && klass->should_be_initialized()) {
6266
1d7922586cf6 7023639: JSR 292 method handle invocation needs a fast path for compiled code
twisti
parents: 6226
diff changeset
801 return true;
1d7922586cf6 7023639: JSR 292 method handle invocation needs a fast path for compiled code
twisti
parents: 6226
diff changeset
802 }
1d7922586cf6 7023639: JSR 292 method handle invocation needs a fast path for compiled code
twisti
parents: 6226
diff changeset
803 return false;
1d7922586cf6 7023639: JSR 292 method handle invocation needs a fast path for compiled code
twisti
parents: 6226
diff changeset
804 }
0
a61af66fc99e Initial load
duke
parents:
diff changeset
805 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
806
a61af66fc99e Initial load
duke
parents:
diff changeset
807 static void getBaseAndScale(int& base, int& scale, jclass acls, TRAPS) {
a61af66fc99e Initial load
duke
parents:
diff changeset
808 if (acls == NULL) {
a61af66fc99e Initial load
duke
parents:
diff changeset
809 THROW(vmSymbols::java_lang_NullPointerException());
a61af66fc99e Initial load
duke
parents:
diff changeset
810 }
a61af66fc99e Initial load
duke
parents:
diff changeset
811 oop mirror = JNIHandles::resolve_non_null(acls);
6725
da91efe96a93 6964458: Reimplement class meta-data storage to use native memory
coleenp
parents: 6266
diff changeset
812 Klass* k = java_lang_Class::as_Klass(mirror);
da91efe96a93 6964458: Reimplement class meta-data storage to use native memory
coleenp
parents: 6266
diff changeset
813 if (k == NULL || !k->oop_is_array()) {
0
a61af66fc99e Initial load
duke
parents:
diff changeset
814 THROW(vmSymbols::java_lang_InvalidClassException());
6725
da91efe96a93 6964458: Reimplement class meta-data storage to use native memory
coleenp
parents: 6266
diff changeset
815 } else if (k->oop_is_objArray()) {
0
a61af66fc99e Initial load
duke
parents:
diff changeset
816 base = arrayOopDesc::base_offset_in_bytes(T_OBJECT);
113
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
817 scale = heapOopSize;
6725
da91efe96a93 6964458: Reimplement class meta-data storage to use native memory
coleenp
parents: 6266
diff changeset
818 } else if (k->oop_is_typeArray()) {
6831
d8ce2825b193 8000213: NPG: Should have renamed arrayKlass and typeArrayKlass
coleenp
parents: 6725
diff changeset
819 TypeArrayKlass* tak = TypeArrayKlass::cast(k);
0
a61af66fc99e Initial load
duke
parents:
diff changeset
820 base = tak->array_header_in_bytes();
a61af66fc99e Initial load
duke
parents:
diff changeset
821 assert(base == arrayOopDesc::base_offset_in_bytes(tak->element_type()), "array_header_size semantics ok");
a61af66fc99e Initial load
duke
parents:
diff changeset
822 scale = (1 << tak->log2_element_size());
a61af66fc99e Initial load
duke
parents:
diff changeset
823 } else {
a61af66fc99e Initial load
duke
parents:
diff changeset
824 ShouldNotReachHere();
a61af66fc99e Initial load
duke
parents:
diff changeset
825 }
a61af66fc99e Initial load
duke
parents:
diff changeset
826 }
a61af66fc99e Initial load
duke
parents:
diff changeset
827
a61af66fc99e Initial load
duke
parents:
diff changeset
828 UNSAFE_ENTRY(jint, Unsafe_ArrayBaseOffset(JNIEnv *env, jobject unsafe, jclass acls))
a61af66fc99e Initial load
duke
parents:
diff changeset
829 UnsafeWrapper("Unsafe_ArrayBaseOffset");
a61af66fc99e Initial load
duke
parents:
diff changeset
830 int base, scale;
a61af66fc99e Initial load
duke
parents:
diff changeset
831 getBaseAndScale(base, scale, acls, CHECK_0);
a61af66fc99e Initial load
duke
parents:
diff changeset
832 return field_offset_from_byte_offset(base);
a61af66fc99e Initial load
duke
parents:
diff changeset
833 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
834
a61af66fc99e Initial load
duke
parents:
diff changeset
835
a61af66fc99e Initial load
duke
parents:
diff changeset
836 UNSAFE_ENTRY(jint, Unsafe_ArrayIndexScale(JNIEnv *env, jobject unsafe, jclass acls))
a61af66fc99e Initial load
duke
parents:
diff changeset
837 UnsafeWrapper("Unsafe_ArrayIndexScale");
a61af66fc99e Initial load
duke
parents:
diff changeset
838 int base, scale;
a61af66fc99e Initial load
duke
parents:
diff changeset
839 getBaseAndScale(base, scale, acls, CHECK_0);
a61af66fc99e Initial load
duke
parents:
diff changeset
840 // This VM packs both fields and array elements down to the byte.
a61af66fc99e Initial load
duke
parents:
diff changeset
841 // But watch out: If this changes, so that array references for
a61af66fc99e Initial load
duke
parents:
diff changeset
842 // a given primitive type (say, T_BOOLEAN) use different memory units
a61af66fc99e Initial load
duke
parents:
diff changeset
843 // than fields, this method MUST return zero for such arrays.
a61af66fc99e Initial load
duke
parents:
diff changeset
844 // For example, the VM used to store sub-word sized fields in full
a61af66fc99e Initial load
duke
parents:
diff changeset
845 // words in the object layout, so that accessors like getByte(Object,int)
a61af66fc99e Initial load
duke
parents:
diff changeset
846 // did not really do what one might expect for arrays. Therefore,
a61af66fc99e Initial load
duke
parents:
diff changeset
847 // this function used to report a zero scale factor, so that the user
a61af66fc99e Initial load
duke
parents:
diff changeset
848 // would know not to attempt to access sub-word array elements.
a61af66fc99e Initial load
duke
parents:
diff changeset
849 // // Code for unpacked fields:
a61af66fc99e Initial load
duke
parents:
diff changeset
850 // if (scale < wordSize) return 0;
a61af66fc99e Initial load
duke
parents:
diff changeset
851
a61af66fc99e Initial load
duke
parents:
diff changeset
852 // The following allows for a pretty general fieldOffset cookie scheme,
a61af66fc99e Initial load
duke
parents:
diff changeset
853 // but requires it to be linear in byte offset.
a61af66fc99e Initial load
duke
parents:
diff changeset
854 return field_offset_from_byte_offset(scale) - field_offset_from_byte_offset(0);
a61af66fc99e Initial load
duke
parents:
diff changeset
855 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
856
a61af66fc99e Initial load
duke
parents:
diff changeset
857
a61af66fc99e Initial load
duke
parents:
diff changeset
858 static inline void throw_new(JNIEnv *env, const char *ename) {
a61af66fc99e Initial load
duke
parents:
diff changeset
859 char buf[100];
a61af66fc99e Initial load
duke
parents:
diff changeset
860 strcpy(buf, "java/lang/");
a61af66fc99e Initial load
duke
parents:
diff changeset
861 strcat(buf, ename);
a61af66fc99e Initial load
duke
parents:
diff changeset
862 jclass cls = env->FindClass(buf);
a61af66fc99e Initial load
duke
parents:
diff changeset
863 char* msg = NULL;
a61af66fc99e Initial load
duke
parents:
diff changeset
864 env->ThrowNew(cls, msg);
a61af66fc99e Initial load
duke
parents:
diff changeset
865 }
a61af66fc99e Initial load
duke
parents:
diff changeset
866
8866
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
867 static jclass Unsafe_DefineClass_impl(JNIEnv *env, jstring name, jbyteArray data, int offset, int length, jobject loader, jobject pd) {
0
a61af66fc99e Initial load
duke
parents:
diff changeset
868 {
a61af66fc99e Initial load
duke
parents:
diff changeset
869 // Code lifted from JDK 1.3 ClassLoader.c
a61af66fc99e Initial load
duke
parents:
diff changeset
870
a61af66fc99e Initial load
duke
parents:
diff changeset
871 jbyte *body;
a61af66fc99e Initial load
duke
parents:
diff changeset
872 char *utfName;
a61af66fc99e Initial load
duke
parents:
diff changeset
873 jclass result = 0;
a61af66fc99e Initial load
duke
parents:
diff changeset
874 char buf[128];
a61af66fc99e Initial load
duke
parents:
diff changeset
875
a61af66fc99e Initial load
duke
parents:
diff changeset
876 if (UsePerfData) {
a61af66fc99e Initial load
duke
parents:
diff changeset
877 ClassLoader::unsafe_defineClassCallCounter()->inc();
a61af66fc99e Initial load
duke
parents:
diff changeset
878 }
a61af66fc99e Initial load
duke
parents:
diff changeset
879
a61af66fc99e Initial load
duke
parents:
diff changeset
880 if (data == NULL) {
a61af66fc99e Initial load
duke
parents:
diff changeset
881 throw_new(env, "NullPointerException");
a61af66fc99e Initial load
duke
parents:
diff changeset
882 return 0;
a61af66fc99e Initial load
duke
parents:
diff changeset
883 }
a61af66fc99e Initial load
duke
parents:
diff changeset
884
a61af66fc99e Initial load
duke
parents:
diff changeset
885 /* Work around 4153825. malloc crashes on Solaris when passed a
a61af66fc99e Initial load
duke
parents:
diff changeset
886 * negative size.
a61af66fc99e Initial load
duke
parents:
diff changeset
887 */
a61af66fc99e Initial load
duke
parents:
diff changeset
888 if (length < 0) {
a61af66fc99e Initial load
duke
parents:
diff changeset
889 throw_new(env, "ArrayIndexOutOfBoundsException");
a61af66fc99e Initial load
duke
parents:
diff changeset
890 return 0;
a61af66fc99e Initial load
duke
parents:
diff changeset
891 }
a61af66fc99e Initial load
duke
parents:
diff changeset
892
6197
d2a62e0f25eb 6995781: Native Memory Tracking (Phase 1)
zgu
parents: 4043
diff changeset
893 body = NEW_C_HEAP_ARRAY(jbyte, length, mtInternal);
0
a61af66fc99e Initial load
duke
parents:
diff changeset
894
a61af66fc99e Initial load
duke
parents:
diff changeset
895 if (body == 0) {
a61af66fc99e Initial load
duke
parents:
diff changeset
896 throw_new(env, "OutOfMemoryError");
a61af66fc99e Initial load
duke
parents:
diff changeset
897 return 0;
a61af66fc99e Initial load
duke
parents:
diff changeset
898 }
a61af66fc99e Initial load
duke
parents:
diff changeset
899
a61af66fc99e Initial load
duke
parents:
diff changeset
900 env->GetByteArrayRegion(data, offset, length, body);
a61af66fc99e Initial load
duke
parents:
diff changeset
901
a61af66fc99e Initial load
duke
parents:
diff changeset
902 if (env->ExceptionOccurred())
a61af66fc99e Initial load
duke
parents:
diff changeset
903 goto free_body;
a61af66fc99e Initial load
duke
parents:
diff changeset
904
a61af66fc99e Initial load
duke
parents:
diff changeset
905 if (name != NULL) {
a61af66fc99e Initial load
duke
parents:
diff changeset
906 uint len = env->GetStringUTFLength(name);
a61af66fc99e Initial load
duke
parents:
diff changeset
907 int unicode_len = env->GetStringLength(name);
a61af66fc99e Initial load
duke
parents:
diff changeset
908 if (len >= sizeof(buf)) {
6197
d2a62e0f25eb 6995781: Native Memory Tracking (Phase 1)
zgu
parents: 4043
diff changeset
909 utfName = NEW_C_HEAP_ARRAY(char, len + 1, mtInternal);
0
a61af66fc99e Initial load
duke
parents:
diff changeset
910 if (utfName == NULL) {
a61af66fc99e Initial load
duke
parents:
diff changeset
911 throw_new(env, "OutOfMemoryError");
a61af66fc99e Initial load
duke
parents:
diff changeset
912 goto free_body;
a61af66fc99e Initial load
duke
parents:
diff changeset
913 }
a61af66fc99e Initial load
duke
parents:
diff changeset
914 } else {
a61af66fc99e Initial load
duke
parents:
diff changeset
915 utfName = buf;
a61af66fc99e Initial load
duke
parents:
diff changeset
916 }
a61af66fc99e Initial load
duke
parents:
diff changeset
917 env->GetStringUTFRegion(name, 0, unicode_len, utfName);
a61af66fc99e Initial load
duke
parents:
diff changeset
918 //VerifyFixClassname(utfName);
a61af66fc99e Initial load
duke
parents:
diff changeset
919 for (uint i = 0; i < len; i++) {
a61af66fc99e Initial load
duke
parents:
diff changeset
920 if (utfName[i] == '.') utfName[i] = '/';
a61af66fc99e Initial load
duke
parents:
diff changeset
921 }
a61af66fc99e Initial load
duke
parents:
diff changeset
922 } else {
a61af66fc99e Initial load
duke
parents:
diff changeset
923 utfName = NULL;
a61af66fc99e Initial load
duke
parents:
diff changeset
924 }
a61af66fc99e Initial load
duke
parents:
diff changeset
925
a61af66fc99e Initial load
duke
parents:
diff changeset
926 result = JVM_DefineClass(env, utfName, loader, body, length, pd);
a61af66fc99e Initial load
duke
parents:
diff changeset
927
a61af66fc99e Initial load
duke
parents:
diff changeset
928 if (utfName && utfName != buf)
6197
d2a62e0f25eb 6995781: Native Memory Tracking (Phase 1)
zgu
parents: 4043
diff changeset
929 FREE_C_HEAP_ARRAY(char, utfName, mtInternal);
0
a61af66fc99e Initial load
duke
parents:
diff changeset
930
a61af66fc99e Initial load
duke
parents:
diff changeset
931 free_body:
6197
d2a62e0f25eb 6995781: Native Memory Tracking (Phase 1)
zgu
parents: 4043
diff changeset
932 FREE_C_HEAP_ARRAY(jbyte, body, mtInternal);
0
a61af66fc99e Initial load
duke
parents:
diff changeset
933 return result;
a61af66fc99e Initial load
duke
parents:
diff changeset
934 }
a61af66fc99e Initial load
duke
parents:
diff changeset
935 }
a61af66fc99e Initial load
duke
parents:
diff changeset
936
a61af66fc99e Initial load
duke
parents:
diff changeset
937
8866
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
938 UNSAFE_ENTRY(jclass, Unsafe_DefineClass(JNIEnv *env, jobject unsafe, jstring name, jbyteArray data, int offset, int length, jobject loader, jobject pd))
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
939 UnsafeWrapper("Unsafe_DefineClass");
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
940 {
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
941 ThreadToNativeFromVM ttnfv(thread);
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
942 return Unsafe_DefineClass_impl(env, name, data, offset, length, loader, pd);
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
943 }
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
944 UNSAFE_END
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
945
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
946
0
a61af66fc99e Initial load
duke
parents:
diff changeset
947 UNSAFE_ENTRY(jclass, Unsafe_DefineClass0(JNIEnv *env, jobject unsafe, jstring name, jbyteArray data, int offset, int length))
a61af66fc99e Initial load
duke
parents:
diff changeset
948 UnsafeWrapper("Unsafe_DefineClass");
a61af66fc99e Initial load
duke
parents:
diff changeset
949 {
a61af66fc99e Initial load
duke
parents:
diff changeset
950 ThreadToNativeFromVM ttnfv(thread);
a61af66fc99e Initial load
duke
parents:
diff changeset
951
a61af66fc99e Initial load
duke
parents:
diff changeset
952 int depthFromDefineClass0 = 1;
a61af66fc99e Initial load
duke
parents:
diff changeset
953 jclass caller = JVM_GetCallerClass(env, depthFromDefineClass0);
a61af66fc99e Initial load
duke
parents:
diff changeset
954 jobject loader = (caller == NULL) ? NULL : JVM_GetClassLoader(env, caller);
a61af66fc99e Initial load
duke
parents:
diff changeset
955 jobject pd = (caller == NULL) ? NULL : JVM_GetProtectionDomain(env, caller);
a61af66fc99e Initial load
duke
parents:
diff changeset
956
8866
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
957 return Unsafe_DefineClass_impl(env, name, data, offset, length, loader, pd);
0
a61af66fc99e Initial load
duke
parents:
diff changeset
958 }
a61af66fc99e Initial load
duke
parents:
diff changeset
959 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
960
a61af66fc99e Initial load
duke
parents:
diff changeset
961
431
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
962 #define DAC_Args CLS"[B["OBJ
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
963 // define a class but do not make it known to the class loader or system dictionary
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
964 // - host_class: supplies context for linkage, access control, protection domain, and class loader
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
965 // - data: bytes of a class file, a raw memory address (length gives the number of bytes)
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
966 // - cp_patches: where non-null entries exist, they replace corresponding CP entries in data
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
967
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
968 // When you load an anonymous class U, it works as if you changed its name just before loading,
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
969 // to a name that you will never use again. Since the name is lost, no other class can directly
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
970 // link to any member of U. Just after U is loaded, the only way to use it is reflectively,
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
971 // through java.lang.Class methods like Class.newInstance.
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
972
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
973 // Access checks for linkage sites within U continue to follow the same rules as for named classes.
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
974 // The package of an anonymous class is given by the package qualifier on the name under which it was loaded.
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
975 // An anonymous class also has special privileges to access any member of its host class.
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
976 // This is the main reason why this loading operation is unsafe. The purpose of this is to
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
977 // allow language implementations to simulate "open classes"; a host class in effect gets
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
978 // new code when an anonymous class is loaded alongside it. A less convenient but more
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
979 // standard way to do this is with reflection, which can also be set to ignore access
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
980 // restrictions.
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
981
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
982 // Access into an anonymous class is possible only through reflection. Therefore, there
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
983 // are no special access rules for calling into an anonymous class. The relaxed access
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
984 // rule for the host class is applied in the opposite direction: A host class reflectively
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
985 // access one of its anonymous classes.
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
986
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
987 // If you load the same bytecodes twice, you get two different classes. You can reload
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
988 // the same bytecodes with or without varying CP patches.
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
989
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
990 // By using the CP patching array, you can have a new anonymous class U2 refer to an older one U1.
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
991 // The bytecodes for U2 should refer to U1 by a symbolic name (doesn't matter what the name is).
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
992 // The CONSTANT_Class entry for that name can be patched to refer directly to U1.
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
993
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
994 // This allows, for example, U2 to use U1 as a superclass or super-interface, or as
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
995 // an outer class (so that U2 is an anonymous inner class of anonymous U1).
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
996 // It is not possible for a named class, or an older anonymous class, to refer by
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
997 // name (via its CP) to a newer anonymous class.
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
998
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
999 // CP patching may also be used to modify (i.e., hack) the names of methods, classes,
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1000 // or type descriptors used in the loaded anonymous class.
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1001
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1002 // Finally, CP patching may be used to introduce "live" objects into the constant pool,
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1003 // instead of "dead" strings. A compiled statement like println((Object)"hello") can
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1004 // be changed to println(greeting), where greeting is an arbitrary object created before
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1005 // the anonymous class is loaded. This is useful in dynamic languages, in which
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1006 // various kinds of metaobjects must be introduced as constants into bytecode.
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1007 // Note the cast (Object), which tells the verifier to expect an arbitrary object,
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1008 // not just a literal string. For such ldc instructions, the verifier uses the
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1009 // type Object instead of String, if the loaded constant is not in fact a String.
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1010
7185
90273fc0a981 8000662: NPG: nashorn ant clean test262 out-of-memory with Java heap
coleenp
parents: 6983
diff changeset
1011 static instanceKlassHandle
431
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1012 Unsafe_DefineAnonymousClass_impl(JNIEnv *env,
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1013 jclass host_class, jbyteArray data, jobjectArray cp_patches_jh,
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1014 HeapWord* *temp_alloc,
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1015 TRAPS) {
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1016
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1017 if (UsePerfData) {
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1018 ClassLoader::unsafe_defineClassCallCounter()->inc();
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1019 }
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1020
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1021 if (data == NULL) {
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1022 THROW_0(vmSymbols::java_lang_NullPointerException());
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1023 }
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1024
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1025 jint length = typeArrayOop(JNIHandles::resolve_non_null(data))->length();
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1026 jint word_length = (length + sizeof(HeapWord)-1) / sizeof(HeapWord);
6197
d2a62e0f25eb 6995781: Native Memory Tracking (Phase 1)
zgu
parents: 4043
diff changeset
1027 HeapWord* body = NEW_C_HEAP_ARRAY(HeapWord, word_length, mtInternal);
431
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1028 if (body == NULL) {
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1029 THROW_0(vmSymbols::java_lang_OutOfMemoryError());
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1030 }
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1031
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1032 // caller responsible to free it:
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1033 (*temp_alloc) = body;
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1034
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1035 {
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1036 jbyte* array_base = typeArrayOop(JNIHandles::resolve_non_null(data))->byte_at_addr(0);
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1037 Copy::conjoint_words((HeapWord*) array_base, body, word_length);
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1038 }
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1039
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1040 u1* class_bytes = (u1*) body;
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1041 int class_bytes_length = (int) length;
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1042 if (class_bytes_length < 0) class_bytes_length = 0;
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1043 if (class_bytes == NULL
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1044 || host_class == NULL
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1045 || length != class_bytes_length)
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1046 THROW_0(vmSymbols::java_lang_IllegalArgumentException());
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1047
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1048 objArrayHandle cp_patches_h;
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1049 if (cp_patches_jh != NULL) {
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1050 oop p = JNIHandles::resolve_non_null(cp_patches_jh);
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1051 if (!p->is_objArray())
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1052 THROW_0(vmSymbols::java_lang_IllegalArgumentException());
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1053 cp_patches_h = objArrayHandle(THREAD, (objArrayOop)p);
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1054 }
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1055
6725
da91efe96a93 6964458: Reimplement class meta-data storage to use native memory
coleenp
parents: 6266
diff changeset
1056 KlassHandle host_klass(THREAD, java_lang_Class::as_Klass(JNIHandles::resolve_non_null(host_class)));
431
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1057 const char* host_source = host_klass->external_name();
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1058 Handle host_loader(THREAD, host_klass->class_loader());
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1059 Handle host_domain(THREAD, host_klass->protection_domain());
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1060
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1061 GrowableArray<Handle>* cp_patches = NULL;
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1062 if (cp_patches_h.not_null()) {
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1063 int alen = cp_patches_h->length();
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1064 for (int i = alen-1; i >= 0; i--) {
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1065 oop p = cp_patches_h->obj_at(i);
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1066 if (p != NULL) {
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1067 Handle patch(THREAD, p);
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1068 if (cp_patches == NULL)
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1069 cp_patches = new GrowableArray<Handle>(i+1, i+1, Handle());
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1070 cp_patches->at_put(i, patch);
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1071 }
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1072 }
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1073 }
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1074
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1075 ClassFileStream st(class_bytes, class_bytes_length, (char*) host_source);
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1076
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1077 instanceKlassHandle anon_klass;
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1078 {
2177
3582bf76420e 6990754: Use native memory and reference counting to implement SymbolTable
coleenp
parents: 2114
diff changeset
1079 Symbol* no_class_name = NULL;
6725
da91efe96a93 6964458: Reimplement class meta-data storage to use native memory
coleenp
parents: 6266
diff changeset
1080 Klass* anonk = SystemDictionary::parse_stream(no_class_name,
431
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1081 host_loader, host_domain,
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1082 &st, host_klass, cp_patches,
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1083 CHECK_NULL);
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1084 if (anonk == NULL) return NULL;
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1085 anon_klass = instanceKlassHandle(THREAD, anonk);
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1086 }
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1087
7185
90273fc0a981 8000662: NPG: nashorn ant clean test262 out-of-memory with Java heap
coleenp
parents: 6983
diff changeset
1088 return anon_klass;
431
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1089 }
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1090
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1091 UNSAFE_ENTRY(jclass, Unsafe_DefineAnonymousClass(JNIEnv *env, jobject unsafe, jclass host_class, jbyteArray data, jobjectArray cp_patches_jh))
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1092 {
7185
90273fc0a981 8000662: NPG: nashorn ant clean test262 out-of-memory with Java heap
coleenp
parents: 6983
diff changeset
1093 instanceKlassHandle anon_klass;
90273fc0a981 8000662: NPG: nashorn ant clean test262 out-of-memory with Java heap
coleenp
parents: 6983
diff changeset
1094 jobject res_jh = NULL;
90273fc0a981 8000662: NPG: nashorn ant clean test262 out-of-memory with Java heap
coleenp
parents: 6983
diff changeset
1095
431
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1096 UnsafeWrapper("Unsafe_DefineAnonymousClass");
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1097 ResourceMark rm(THREAD);
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1098
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1099 HeapWord* temp_alloc = NULL;
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1100
7185
90273fc0a981 8000662: NPG: nashorn ant clean test262 out-of-memory with Java heap
coleenp
parents: 6983
diff changeset
1101 anon_klass = Unsafe_DefineAnonymousClass_impl(env, host_class, data,
90273fc0a981 8000662: NPG: nashorn ant clean test262 out-of-memory with Java heap
coleenp
parents: 6983
diff changeset
1102 cp_patches_jh,
431
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1103 &temp_alloc, THREAD);
7185
90273fc0a981 8000662: NPG: nashorn ant clean test262 out-of-memory with Java heap
coleenp
parents: 6983
diff changeset
1104 if (anon_klass() != NULL)
90273fc0a981 8000662: NPG: nashorn ant clean test262 out-of-memory with Java heap
coleenp
parents: 6983
diff changeset
1105 res_jh = JNIHandles::make_local(env, anon_klass->java_mirror());
431
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1106
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1107 // try/finally clause:
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1108 if (temp_alloc != NULL) {
6197
d2a62e0f25eb 6995781: Native Memory Tracking (Phase 1)
zgu
parents: 4043
diff changeset
1109 FREE_C_HEAP_ARRAY(HeapWord, temp_alloc, mtInternal);
431
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1110 }
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1111
7185
90273fc0a981 8000662: NPG: nashorn ant clean test262 out-of-memory with Java heap
coleenp
parents: 6983
diff changeset
1112 // The anonymous class loader data has been artificially been kept alive to
90273fc0a981 8000662: NPG: nashorn ant clean test262 out-of-memory with Java heap
coleenp
parents: 6983
diff changeset
1113 // this point. The mirror and any instances of this class have to keep
90273fc0a981 8000662: NPG: nashorn ant clean test262 out-of-memory with Java heap
coleenp
parents: 6983
diff changeset
1114 // it alive afterwards.
90273fc0a981 8000662: NPG: nashorn ant clean test262 out-of-memory with Java heap
coleenp
parents: 6983
diff changeset
1115 if (anon_klass() != NULL) {
90273fc0a981 8000662: NPG: nashorn ant clean test262 out-of-memory with Java heap
coleenp
parents: 6983
diff changeset
1116 anon_klass->class_loader_data()->set_keep_alive(false);
90273fc0a981 8000662: NPG: nashorn ant clean test262 out-of-memory with Java heap
coleenp
parents: 6983
diff changeset
1117 }
90273fc0a981 8000662: NPG: nashorn ant clean test262 out-of-memory with Java heap
coleenp
parents: 6983
diff changeset
1118
90273fc0a981 8000662: NPG: nashorn ant clean test262 out-of-memory with Java heap
coleenp
parents: 6983
diff changeset
1119 // let caller initialize it as needed...
90273fc0a981 8000662: NPG: nashorn ant clean test262 out-of-memory with Java heap
coleenp
parents: 6983
diff changeset
1120
431
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1121 return (jclass) res_jh;
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1122 }
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1123 UNSAFE_END
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1124
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1125
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1126
a61af66fc99e Initial load
duke
parents:
diff changeset
1127 UNSAFE_ENTRY(void, Unsafe_MonitorEnter(JNIEnv *env, jobject unsafe, jobject jobj))
a61af66fc99e Initial load
duke
parents:
diff changeset
1128 UnsafeWrapper("Unsafe_MonitorEnter");
a61af66fc99e Initial load
duke
parents:
diff changeset
1129 {
a61af66fc99e Initial load
duke
parents:
diff changeset
1130 if (jobj == NULL) {
a61af66fc99e Initial load
duke
parents:
diff changeset
1131 THROW(vmSymbols::java_lang_NullPointerException());
a61af66fc99e Initial load
duke
parents:
diff changeset
1132 }
a61af66fc99e Initial load
duke
parents:
diff changeset
1133 Handle obj(thread, JNIHandles::resolve_non_null(jobj));
a61af66fc99e Initial load
duke
parents:
diff changeset
1134 ObjectSynchronizer::jni_enter(obj, CHECK);
a61af66fc99e Initial load
duke
parents:
diff changeset
1135 }
a61af66fc99e Initial load
duke
parents:
diff changeset
1136 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
1137
a61af66fc99e Initial load
duke
parents:
diff changeset
1138
a61af66fc99e Initial load
duke
parents:
diff changeset
1139 UNSAFE_ENTRY(jboolean, Unsafe_TryMonitorEnter(JNIEnv *env, jobject unsafe, jobject jobj))
a61af66fc99e Initial load
duke
parents:
diff changeset
1140 UnsafeWrapper("Unsafe_TryMonitorEnter");
a61af66fc99e Initial load
duke
parents:
diff changeset
1141 {
a61af66fc99e Initial load
duke
parents:
diff changeset
1142 if (jobj == NULL) {
a61af66fc99e Initial load
duke
parents:
diff changeset
1143 THROW_(vmSymbols::java_lang_NullPointerException(), JNI_FALSE);
a61af66fc99e Initial load
duke
parents:
diff changeset
1144 }
a61af66fc99e Initial load
duke
parents:
diff changeset
1145 Handle obj(thread, JNIHandles::resolve_non_null(jobj));
a61af66fc99e Initial load
duke
parents:
diff changeset
1146 bool res = ObjectSynchronizer::jni_try_enter(obj, CHECK_0);
a61af66fc99e Initial load
duke
parents:
diff changeset
1147 return (res ? JNI_TRUE : JNI_FALSE);
a61af66fc99e Initial load
duke
parents:
diff changeset
1148 }
a61af66fc99e Initial load
duke
parents:
diff changeset
1149 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
1150
a61af66fc99e Initial load
duke
parents:
diff changeset
1151
a61af66fc99e Initial load
duke
parents:
diff changeset
1152 UNSAFE_ENTRY(void, Unsafe_MonitorExit(JNIEnv *env, jobject unsafe, jobject jobj))
a61af66fc99e Initial load
duke
parents:
diff changeset
1153 UnsafeWrapper("Unsafe_MonitorExit");
a61af66fc99e Initial load
duke
parents:
diff changeset
1154 {
a61af66fc99e Initial load
duke
parents:
diff changeset
1155 if (jobj == NULL) {
a61af66fc99e Initial load
duke
parents:
diff changeset
1156 THROW(vmSymbols::java_lang_NullPointerException());
a61af66fc99e Initial load
duke
parents:
diff changeset
1157 }
a61af66fc99e Initial load
duke
parents:
diff changeset
1158 Handle obj(THREAD, JNIHandles::resolve_non_null(jobj));
a61af66fc99e Initial load
duke
parents:
diff changeset
1159 ObjectSynchronizer::jni_exit(obj(), CHECK);
a61af66fc99e Initial load
duke
parents:
diff changeset
1160 }
a61af66fc99e Initial load
duke
parents:
diff changeset
1161 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
1162
a61af66fc99e Initial load
duke
parents:
diff changeset
1163
a61af66fc99e Initial load
duke
parents:
diff changeset
1164 UNSAFE_ENTRY(void, Unsafe_ThrowException(JNIEnv *env, jobject unsafe, jthrowable thr))
a61af66fc99e Initial load
duke
parents:
diff changeset
1165 UnsafeWrapper("Unsafe_ThrowException");
a61af66fc99e Initial load
duke
parents:
diff changeset
1166 {
a61af66fc99e Initial load
duke
parents:
diff changeset
1167 ThreadToNativeFromVM ttnfv(thread);
a61af66fc99e Initial load
duke
parents:
diff changeset
1168 env->Throw(thr);
a61af66fc99e Initial load
duke
parents:
diff changeset
1169 }
a61af66fc99e Initial load
duke
parents:
diff changeset
1170 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
1171
a61af66fc99e Initial load
duke
parents:
diff changeset
1172 // JSR166 ------------------------------------------------------------------
a61af66fc99e Initial load
duke
parents:
diff changeset
1173
a61af66fc99e Initial load
duke
parents:
diff changeset
1174 UNSAFE_ENTRY(jboolean, Unsafe_CompareAndSwapObject(JNIEnv *env, jobject unsafe, jobject obj, jlong offset, jobject e_h, jobject x_h))
a61af66fc99e Initial load
duke
parents:
diff changeset
1175 UnsafeWrapper("Unsafe_CompareAndSwapObject");
a61af66fc99e Initial load
duke
parents:
diff changeset
1176 oop x = JNIHandles::resolve(x_h);
a61af66fc99e Initial load
duke
parents:
diff changeset
1177 oop e = JNIHandles::resolve(e_h);
a61af66fc99e Initial load
duke
parents:
diff changeset
1178 oop p = JNIHandles::resolve(obj);
113
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
1179 HeapWord* addr = (HeapWord *)index_oop_from_field_offset_long(p, offset);
6725
da91efe96a93 6964458: Reimplement class meta-data storage to use native memory
coleenp
parents: 6266
diff changeset
1180 oop res = oopDesc::atomic_compare_exchange_oop(x, addr, e, true);
113
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
1181 jboolean success = (res == e);
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1182 if (success)
113
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
1183 update_barrier_set((void*)addr, x);
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1184 return success;
a61af66fc99e Initial load
duke
parents:
diff changeset
1185 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
1186
a61af66fc99e Initial load
duke
parents:
diff changeset
1187 UNSAFE_ENTRY(jboolean, Unsafe_CompareAndSwapInt(JNIEnv *env, jobject unsafe, jobject obj, jlong offset, jint e, jint x))
a61af66fc99e Initial load
duke
parents:
diff changeset
1188 UnsafeWrapper("Unsafe_CompareAndSwapInt");
a61af66fc99e Initial load
duke
parents:
diff changeset
1189 oop p = JNIHandles::resolve(obj);
a61af66fc99e Initial load
duke
parents:
diff changeset
1190 jint* addr = (jint *) index_oop_from_field_offset_long(p, offset);
a61af66fc99e Initial load
duke
parents:
diff changeset
1191 return (jint)(Atomic::cmpxchg(x, addr, e)) == e;
a61af66fc99e Initial load
duke
parents:
diff changeset
1192 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
1193
a61af66fc99e Initial load
duke
parents:
diff changeset
1194 UNSAFE_ENTRY(jboolean, Unsafe_CompareAndSwapLong(JNIEnv *env, jobject unsafe, jobject obj, jlong offset, jlong e, jlong x))
a61af66fc99e Initial load
duke
parents:
diff changeset
1195 UnsafeWrapper("Unsafe_CompareAndSwapLong");
a61af66fc99e Initial load
duke
parents:
diff changeset
1196 Handle p (THREAD, JNIHandles::resolve(obj));
a61af66fc99e Initial load
duke
parents:
diff changeset
1197 jlong* addr = (jlong*)(index_oop_from_field_offset_long(p(), offset));
a61af66fc99e Initial load
duke
parents:
diff changeset
1198 if (VM_Version::supports_cx8())
a61af66fc99e Initial load
duke
parents:
diff changeset
1199 return (jlong)(Atomic::cmpxchg(x, addr, e)) == e;
a61af66fc99e Initial load
duke
parents:
diff changeset
1200 else {
a61af66fc99e Initial load
duke
parents:
diff changeset
1201 jboolean success = false;
a61af66fc99e Initial load
duke
parents:
diff changeset
1202 ObjectLocker ol(p, THREAD);
a61af66fc99e Initial load
duke
parents:
diff changeset
1203 if (*addr == e) { *addr = x; success = true; }
a61af66fc99e Initial load
duke
parents:
diff changeset
1204 return success;
a61af66fc99e Initial load
duke
parents:
diff changeset
1205 }
a61af66fc99e Initial load
duke
parents:
diff changeset
1206 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
1207
a61af66fc99e Initial load
duke
parents:
diff changeset
1208 UNSAFE_ENTRY(void, Unsafe_Park(JNIEnv *env, jobject unsafe, jboolean isAbsolute, jlong time))
a61af66fc99e Initial load
duke
parents:
diff changeset
1209 UnsafeWrapper("Unsafe_Park");
10405
f2110083203d 8005849: JEP 167: Event-Based JVM Tracing
sla
parents: 10399
diff changeset
1210 EventThreadPark event;
4006
436b4a3231bf 7098194: integrate macosx-port changes
dcubed
parents: 3938
diff changeset
1211 #ifndef USDT2
1324
e392695de029 6935224: Adding new DTrace probes to work with Palantir
fparain
parents: 845
diff changeset
1212 HS_DTRACE_PROBE3(hotspot, thread__park__begin, thread->parker(), (int) isAbsolute, time);
4006
436b4a3231bf 7098194: integrate macosx-port changes
dcubed
parents: 3938
diff changeset
1213 #else /* USDT2 */
436b4a3231bf 7098194: integrate macosx-port changes
dcubed
parents: 3938
diff changeset
1214 HOTSPOT_THREAD_PARK_BEGIN(
436b4a3231bf 7098194: integrate macosx-port changes
dcubed
parents: 3938
diff changeset
1215 (uintptr_t) thread->parker(), (int) isAbsolute, time);
436b4a3231bf 7098194: integrate macosx-port changes
dcubed
parents: 3938
diff changeset
1216 #endif /* USDT2 */
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1217 JavaThreadParkedState jtps(thread, time != 0);
a61af66fc99e Initial load
duke
parents:
diff changeset
1218 thread->parker()->park(isAbsolute != 0, time);
4006
436b4a3231bf 7098194: integrate macosx-port changes
dcubed
parents: 3938
diff changeset
1219 #ifndef USDT2
1324
e392695de029 6935224: Adding new DTrace probes to work with Palantir
fparain
parents: 845
diff changeset
1220 HS_DTRACE_PROBE1(hotspot, thread__park__end, thread->parker());
4006
436b4a3231bf 7098194: integrate macosx-port changes
dcubed
parents: 3938
diff changeset
1221 #else /* USDT2 */
436b4a3231bf 7098194: integrate macosx-port changes
dcubed
parents: 3938
diff changeset
1222 HOTSPOT_THREAD_PARK_END(
436b4a3231bf 7098194: integrate macosx-port changes
dcubed
parents: 3938
diff changeset
1223 (uintptr_t) thread->parker());
436b4a3231bf 7098194: integrate macosx-port changes
dcubed
parents: 3938
diff changeset
1224 #endif /* USDT2 */
10405
f2110083203d 8005849: JEP 167: Event-Based JVM Tracing
sla
parents: 10399
diff changeset
1225 if (event.should_commit()) {
f2110083203d 8005849: JEP 167: Event-Based JVM Tracing
sla
parents: 10399
diff changeset
1226 oop obj = thread->current_park_blocker();
12316
190899198332 7195622: CheckUnhandledOops has limited usefulness now
hseigel
parents: 10405
diff changeset
1227 event.set_klass((obj != NULL) ? obj->klass() : NULL);
10405
f2110083203d 8005849: JEP 167: Event-Based JVM Tracing
sla
parents: 10399
diff changeset
1228 event.set_timeout(time);
12316
190899198332 7195622: CheckUnhandledOops has limited usefulness now
hseigel
parents: 10405
diff changeset
1229 event.set_address((obj != NULL) ? (TYPE_ADDRESS) cast_from_oop<uintptr_t>(obj) : 0);
10405
f2110083203d 8005849: JEP 167: Event-Based JVM Tracing
sla
parents: 10399
diff changeset
1230 event.commit();
f2110083203d 8005849: JEP 167: Event-Based JVM Tracing
sla
parents: 10399
diff changeset
1231 }
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1232 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
1233
a61af66fc99e Initial load
duke
parents:
diff changeset
1234 UNSAFE_ENTRY(void, Unsafe_Unpark(JNIEnv *env, jobject unsafe, jobject jthread))
a61af66fc99e Initial load
duke
parents:
diff changeset
1235 UnsafeWrapper("Unsafe_Unpark");
a61af66fc99e Initial load
duke
parents:
diff changeset
1236 Parker* p = NULL;
a61af66fc99e Initial load
duke
parents:
diff changeset
1237 if (jthread != NULL) {
a61af66fc99e Initial load
duke
parents:
diff changeset
1238 oop java_thread = JNIHandles::resolve_non_null(jthread);
a61af66fc99e Initial load
duke
parents:
diff changeset
1239 if (java_thread != NULL) {
a61af66fc99e Initial load
duke
parents:
diff changeset
1240 jlong lp = java_lang_Thread::park_event(java_thread);
a61af66fc99e Initial load
duke
parents:
diff changeset
1241 if (lp != 0) {
a61af66fc99e Initial load
duke
parents:
diff changeset
1242 // This cast is OK even though the jlong might have been read
a61af66fc99e Initial load
duke
parents:
diff changeset
1243 // non-atomically on 32bit systems, since there, one word will
a61af66fc99e Initial load
duke
parents:
diff changeset
1244 // always be zero anyway and the value set is always the same
a61af66fc99e Initial load
duke
parents:
diff changeset
1245 p = (Parker*)addr_from_java(lp);
a61af66fc99e Initial load
duke
parents:
diff changeset
1246 } else {
a61af66fc99e Initial load
duke
parents:
diff changeset
1247 // Grab lock if apparently null or using older version of library
a61af66fc99e Initial load
duke
parents:
diff changeset
1248 MutexLocker mu(Threads_lock);
a61af66fc99e Initial load
duke
parents:
diff changeset
1249 java_thread = JNIHandles::resolve_non_null(jthread);
a61af66fc99e Initial load
duke
parents:
diff changeset
1250 if (java_thread != NULL) {
a61af66fc99e Initial load
duke
parents:
diff changeset
1251 JavaThread* thr = java_lang_Thread::thread(java_thread);
a61af66fc99e Initial load
duke
parents:
diff changeset
1252 if (thr != NULL) {
a61af66fc99e Initial load
duke
parents:
diff changeset
1253 p = thr->parker();
a61af66fc99e Initial load
duke
parents:
diff changeset
1254 if (p != NULL) { // Bind to Java thread for next time.
a61af66fc99e Initial load
duke
parents:
diff changeset
1255 java_lang_Thread::set_park_event(java_thread, addr_to_java(p));
a61af66fc99e Initial load
duke
parents:
diff changeset
1256 }
a61af66fc99e Initial load
duke
parents:
diff changeset
1257 }
a61af66fc99e Initial load
duke
parents:
diff changeset
1258 }
a61af66fc99e Initial load
duke
parents:
diff changeset
1259 }
a61af66fc99e Initial load
duke
parents:
diff changeset
1260 }
a61af66fc99e Initial load
duke
parents:
diff changeset
1261 }
a61af66fc99e Initial load
duke
parents:
diff changeset
1262 if (p != NULL) {
4006
436b4a3231bf 7098194: integrate macosx-port changes
dcubed
parents: 3938
diff changeset
1263 #ifndef USDT2
1324
e392695de029 6935224: Adding new DTrace probes to work with Palantir
fparain
parents: 845
diff changeset
1264 HS_DTRACE_PROBE1(hotspot, thread__unpark, p);
4006
436b4a3231bf 7098194: integrate macosx-port changes
dcubed
parents: 3938
diff changeset
1265 #else /* USDT2 */
436b4a3231bf 7098194: integrate macosx-port changes
dcubed
parents: 3938
diff changeset
1266 HOTSPOT_THREAD_UNPARK(
436b4a3231bf 7098194: integrate macosx-port changes
dcubed
parents: 3938
diff changeset
1267 (uintptr_t) p);
436b4a3231bf 7098194: integrate macosx-port changes
dcubed
parents: 3938
diff changeset
1268 #endif /* USDT2 */
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1269 p->unpark();
a61af66fc99e Initial load
duke
parents:
diff changeset
1270 }
a61af66fc99e Initial load
duke
parents:
diff changeset
1271 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
1272
a61af66fc99e Initial load
duke
parents:
diff changeset
1273 UNSAFE_ENTRY(jint, Unsafe_Loadavg(JNIEnv *env, jobject unsafe, jdoubleArray loadavg, jint nelem))
a61af66fc99e Initial load
duke
parents:
diff changeset
1274 UnsafeWrapper("Unsafe_Loadavg");
a61af66fc99e Initial load
duke
parents:
diff changeset
1275 const int max_nelem = 3;
a61af66fc99e Initial load
duke
parents:
diff changeset
1276 double la[max_nelem];
a61af66fc99e Initial load
duke
parents:
diff changeset
1277 jint ret;
a61af66fc99e Initial load
duke
parents:
diff changeset
1278
a61af66fc99e Initial load
duke
parents:
diff changeset
1279 typeArrayOop a = typeArrayOop(JNIHandles::resolve_non_null(loadavg));
a61af66fc99e Initial load
duke
parents:
diff changeset
1280 assert(a->is_typeArray(), "must be type array");
a61af66fc99e Initial load
duke
parents:
diff changeset
1281
a61af66fc99e Initial load
duke
parents:
diff changeset
1282 if (nelem < 0 || nelem > max_nelem || a->length() < nelem) {
a61af66fc99e Initial load
duke
parents:
diff changeset
1283 ThreadToNativeFromVM ttnfv(thread);
a61af66fc99e Initial load
duke
parents:
diff changeset
1284 throw_new(env, "ArrayIndexOutOfBoundsException");
a61af66fc99e Initial load
duke
parents:
diff changeset
1285 return -1;
a61af66fc99e Initial load
duke
parents:
diff changeset
1286 }
a61af66fc99e Initial load
duke
parents:
diff changeset
1287
a61af66fc99e Initial load
duke
parents:
diff changeset
1288 ret = os::loadavg(la, nelem);
a61af66fc99e Initial load
duke
parents:
diff changeset
1289 if (ret == -1) return -1;
a61af66fc99e Initial load
duke
parents:
diff changeset
1290
a61af66fc99e Initial load
duke
parents:
diff changeset
1291 // if successful, ret is the number of samples actually retrieved.
a61af66fc99e Initial load
duke
parents:
diff changeset
1292 assert(ret >= 0 && ret <= max_nelem, "Unexpected loadavg return value");
a61af66fc99e Initial load
duke
parents:
diff changeset
1293 switch(ret) {
a61af66fc99e Initial load
duke
parents:
diff changeset
1294 case 3: a->double_at_put(2, (jdouble)la[2]); // fall through
a61af66fc99e Initial load
duke
parents:
diff changeset
1295 case 2: a->double_at_put(1, (jdouble)la[1]); // fall through
a61af66fc99e Initial load
duke
parents:
diff changeset
1296 case 1: a->double_at_put(0, (jdouble)la[0]); break;
a61af66fc99e Initial load
duke
parents:
diff changeset
1297 }
a61af66fc99e Initial load
duke
parents:
diff changeset
1298 return ret;
a61af66fc99e Initial load
duke
parents:
diff changeset
1299 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
1300
a61af66fc99e Initial load
duke
parents:
diff changeset
1301 UNSAFE_ENTRY(void, Unsafe_PrefetchRead(JNIEnv* env, jclass ignored, jobject obj, jlong offset))
a61af66fc99e Initial load
duke
parents:
diff changeset
1302 UnsafeWrapper("Unsafe_PrefetchRead");
a61af66fc99e Initial load
duke
parents:
diff changeset
1303 oop p = JNIHandles::resolve(obj);
a61af66fc99e Initial load
duke
parents:
diff changeset
1304 void* addr = index_oop_from_field_offset_long(p, 0);
a61af66fc99e Initial load
duke
parents:
diff changeset
1305 Prefetch::read(addr, (intx)offset);
a61af66fc99e Initial load
duke
parents:
diff changeset
1306 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
1307
a61af66fc99e Initial load
duke
parents:
diff changeset
1308 UNSAFE_ENTRY(void, Unsafe_PrefetchWrite(JNIEnv* env, jclass ignored, jobject obj, jlong offset))
a61af66fc99e Initial load
duke
parents:
diff changeset
1309 UnsafeWrapper("Unsafe_PrefetchWrite");
a61af66fc99e Initial load
duke
parents:
diff changeset
1310 oop p = JNIHandles::resolve(obj);
a61af66fc99e Initial load
duke
parents:
diff changeset
1311 void* addr = index_oop_from_field_offset_long(p, 0);
a61af66fc99e Initial load
duke
parents:
diff changeset
1312 Prefetch::write(addr, (intx)offset);
a61af66fc99e Initial load
duke
parents:
diff changeset
1313 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
1314
a61af66fc99e Initial load
duke
parents:
diff changeset
1315
a61af66fc99e Initial load
duke
parents:
diff changeset
1316 /// JVM_RegisterUnsafeMethods
a61af66fc99e Initial load
duke
parents:
diff changeset
1317
a61af66fc99e Initial load
duke
parents:
diff changeset
1318 #define ADR "J"
a61af66fc99e Initial load
duke
parents:
diff changeset
1319
a61af66fc99e Initial load
duke
parents:
diff changeset
1320 #define LANG "Ljava/lang/"
a61af66fc99e Initial load
duke
parents:
diff changeset
1321
a61af66fc99e Initial load
duke
parents:
diff changeset
1322 #define OBJ LANG"Object;"
a61af66fc99e Initial load
duke
parents:
diff changeset
1323 #define CLS LANG"Class;"
a61af66fc99e Initial load
duke
parents:
diff changeset
1324 #define CTR LANG"reflect/Constructor;"
a61af66fc99e Initial load
duke
parents:
diff changeset
1325 #define FLD LANG"reflect/Field;"
a61af66fc99e Initial load
duke
parents:
diff changeset
1326 #define MTH LANG"reflect/Method;"
a61af66fc99e Initial load
duke
parents:
diff changeset
1327 #define THR LANG"Throwable;"
a61af66fc99e Initial load
duke
parents:
diff changeset
1328
a61af66fc99e Initial load
duke
parents:
diff changeset
1329 #define DC0_Args LANG"String;[BII"
8866
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1330 #define DC_Args DC0_Args LANG"ClassLoader;" "Ljava/security/ProtectionDomain;"
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1331
a61af66fc99e Initial load
duke
parents:
diff changeset
1332 #define CC (char*) /*cast a literal from (const char*)*/
a61af66fc99e Initial load
duke
parents:
diff changeset
1333 #define FN_PTR(f) CAST_FROM_FN_PTR(void*, &f)
a61af66fc99e Initial load
duke
parents:
diff changeset
1334
a61af66fc99e Initial load
duke
parents:
diff changeset
1335 // define deprecated accessors for compabitility with 1.4.0
a61af66fc99e Initial load
duke
parents:
diff changeset
1336 #define DECLARE_GETSETOOP_140(Boolean, Z) \
a61af66fc99e Initial load
duke
parents:
diff changeset
1337 {CC"get"#Boolean, CC"("OBJ"I)"#Z, FN_PTR(Unsafe_Get##Boolean##140)}, \
a61af66fc99e Initial load
duke
parents:
diff changeset
1338 {CC"put"#Boolean, CC"("OBJ"I"#Z")V", FN_PTR(Unsafe_Set##Boolean##140)}
a61af66fc99e Initial load
duke
parents:
diff changeset
1339
a61af66fc99e Initial load
duke
parents:
diff changeset
1340 // Note: In 1.4.1, getObject and kin take both int and long offsets.
a61af66fc99e Initial load
duke
parents:
diff changeset
1341 #define DECLARE_GETSETOOP_141(Boolean, Z) \
a61af66fc99e Initial load
duke
parents:
diff changeset
1342 {CC"get"#Boolean, CC"("OBJ"J)"#Z, FN_PTR(Unsafe_Get##Boolean)}, \
a61af66fc99e Initial load
duke
parents:
diff changeset
1343 {CC"put"#Boolean, CC"("OBJ"J"#Z")V", FN_PTR(Unsafe_Set##Boolean)}
a61af66fc99e Initial load
duke
parents:
diff changeset
1344
a61af66fc99e Initial load
duke
parents:
diff changeset
1345 // Note: In 1.5.0, there are volatile versions too
a61af66fc99e Initial load
duke
parents:
diff changeset
1346 #define DECLARE_GETSETOOP(Boolean, Z) \
a61af66fc99e Initial load
duke
parents:
diff changeset
1347 {CC"get"#Boolean, CC"("OBJ"J)"#Z, FN_PTR(Unsafe_Get##Boolean)}, \
a61af66fc99e Initial load
duke
parents:
diff changeset
1348 {CC"put"#Boolean, CC"("OBJ"J"#Z")V", FN_PTR(Unsafe_Set##Boolean)}, \
a61af66fc99e Initial load
duke
parents:
diff changeset
1349 {CC"get"#Boolean"Volatile", CC"("OBJ"J)"#Z, FN_PTR(Unsafe_Get##Boolean##Volatile)}, \
a61af66fc99e Initial load
duke
parents:
diff changeset
1350 {CC"put"#Boolean"Volatile", CC"("OBJ"J"#Z")V", FN_PTR(Unsafe_Set##Boolean##Volatile)}
a61af66fc99e Initial load
duke
parents:
diff changeset
1351
a61af66fc99e Initial load
duke
parents:
diff changeset
1352
a61af66fc99e Initial load
duke
parents:
diff changeset
1353 #define DECLARE_GETSETNATIVE(Byte, B) \
a61af66fc99e Initial load
duke
parents:
diff changeset
1354 {CC"get"#Byte, CC"("ADR")"#B, FN_PTR(Unsafe_GetNative##Byte)}, \
a61af66fc99e Initial load
duke
parents:
diff changeset
1355 {CC"put"#Byte, CC"("ADR#B")V", FN_PTR(Unsafe_SetNative##Byte)}
a61af66fc99e Initial load
duke
parents:
diff changeset
1356
a61af66fc99e Initial load
duke
parents:
diff changeset
1357
a61af66fc99e Initial load
duke
parents:
diff changeset
1358
8866
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1359 // These are the methods for 1.4.0
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1360 static JNINativeMethod methods_140[] = {
a61af66fc99e Initial load
duke
parents:
diff changeset
1361 {CC"getObject", CC"("OBJ"I)"OBJ"", FN_PTR(Unsafe_GetObject140)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1362 {CC"putObject", CC"("OBJ"I"OBJ")V", FN_PTR(Unsafe_SetObject140)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1363
a61af66fc99e Initial load
duke
parents:
diff changeset
1364 DECLARE_GETSETOOP_140(Boolean, Z),
a61af66fc99e Initial load
duke
parents:
diff changeset
1365 DECLARE_GETSETOOP_140(Byte, B),
a61af66fc99e Initial load
duke
parents:
diff changeset
1366 DECLARE_GETSETOOP_140(Short, S),
a61af66fc99e Initial load
duke
parents:
diff changeset
1367 DECLARE_GETSETOOP_140(Char, C),
a61af66fc99e Initial load
duke
parents:
diff changeset
1368 DECLARE_GETSETOOP_140(Int, I),
a61af66fc99e Initial load
duke
parents:
diff changeset
1369 DECLARE_GETSETOOP_140(Long, J),
a61af66fc99e Initial load
duke
parents:
diff changeset
1370 DECLARE_GETSETOOP_140(Float, F),
a61af66fc99e Initial load
duke
parents:
diff changeset
1371 DECLARE_GETSETOOP_140(Double, D),
a61af66fc99e Initial load
duke
parents:
diff changeset
1372
a61af66fc99e Initial load
duke
parents:
diff changeset
1373 DECLARE_GETSETNATIVE(Byte, B),
a61af66fc99e Initial load
duke
parents:
diff changeset
1374 DECLARE_GETSETNATIVE(Short, S),
a61af66fc99e Initial load
duke
parents:
diff changeset
1375 DECLARE_GETSETNATIVE(Char, C),
a61af66fc99e Initial load
duke
parents:
diff changeset
1376 DECLARE_GETSETNATIVE(Int, I),
a61af66fc99e Initial load
duke
parents:
diff changeset
1377 DECLARE_GETSETNATIVE(Long, J),
a61af66fc99e Initial load
duke
parents:
diff changeset
1378 DECLARE_GETSETNATIVE(Float, F),
a61af66fc99e Initial load
duke
parents:
diff changeset
1379 DECLARE_GETSETNATIVE(Double, D),
a61af66fc99e Initial load
duke
parents:
diff changeset
1380
a61af66fc99e Initial load
duke
parents:
diff changeset
1381 {CC"getAddress", CC"("ADR")"ADR, FN_PTR(Unsafe_GetNativeAddress)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1382 {CC"putAddress", CC"("ADR""ADR")V", FN_PTR(Unsafe_SetNativeAddress)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1383
a61af66fc99e Initial load
duke
parents:
diff changeset
1384 {CC"allocateMemory", CC"(J)"ADR, FN_PTR(Unsafe_AllocateMemory)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1385 {CC"reallocateMemory", CC"("ADR"J)"ADR, FN_PTR(Unsafe_ReallocateMemory)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1386 {CC"freeMemory", CC"("ADR")V", FN_PTR(Unsafe_FreeMemory)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1387
8866
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1388 {CC"fieldOffset", CC"("FLD")I", FN_PTR(Unsafe_FieldOffset)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1389 {CC"staticFieldBase", CC"("CLS")"OBJ, FN_PTR(Unsafe_StaticFieldBaseFromClass)},
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1390 {CC"ensureClassInitialized",CC"("CLS")V", FN_PTR(Unsafe_EnsureClassInitialized)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1391 {CC"arrayBaseOffset", CC"("CLS")I", FN_PTR(Unsafe_ArrayBaseOffset)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1392 {CC"arrayIndexScale", CC"("CLS")I", FN_PTR(Unsafe_ArrayIndexScale)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1393 {CC"addressSize", CC"()I", FN_PTR(Unsafe_AddressSize)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1394 {CC"pageSize", CC"()I", FN_PTR(Unsafe_PageSize)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1395
a61af66fc99e Initial load
duke
parents:
diff changeset
1396 {CC"defineClass", CC"("DC0_Args")"CLS, FN_PTR(Unsafe_DefineClass0)},
8866
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1397 {CC"defineClass", CC"("DC_Args")"CLS, FN_PTR(Unsafe_DefineClass)},
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1398 {CC"allocateInstance", CC"("CLS")"OBJ, FN_PTR(Unsafe_AllocateInstance)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1399 {CC"monitorEnter", CC"("OBJ")V", FN_PTR(Unsafe_MonitorEnter)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1400 {CC"monitorExit", CC"("OBJ")V", FN_PTR(Unsafe_MonitorExit)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1401 {CC"throwException", CC"("THR")V", FN_PTR(Unsafe_ThrowException)}
a61af66fc99e Initial load
duke
parents:
diff changeset
1402 };
a61af66fc99e Initial load
duke
parents:
diff changeset
1403
8866
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1404 // These are the methods prior to the JSR 166 changes in 1.5.0
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1405 static JNINativeMethod methods_141[] = {
a61af66fc99e Initial load
duke
parents:
diff changeset
1406 {CC"getObject", CC"("OBJ"J)"OBJ"", FN_PTR(Unsafe_GetObject)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1407 {CC"putObject", CC"("OBJ"J"OBJ")V", FN_PTR(Unsafe_SetObject)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1408
a61af66fc99e Initial load
duke
parents:
diff changeset
1409 DECLARE_GETSETOOP_141(Boolean, Z),
a61af66fc99e Initial load
duke
parents:
diff changeset
1410 DECLARE_GETSETOOP_141(Byte, B),
a61af66fc99e Initial load
duke
parents:
diff changeset
1411 DECLARE_GETSETOOP_141(Short, S),
a61af66fc99e Initial load
duke
parents:
diff changeset
1412 DECLARE_GETSETOOP_141(Char, C),
a61af66fc99e Initial load
duke
parents:
diff changeset
1413 DECLARE_GETSETOOP_141(Int, I),
a61af66fc99e Initial load
duke
parents:
diff changeset
1414 DECLARE_GETSETOOP_141(Long, J),
a61af66fc99e Initial load
duke
parents:
diff changeset
1415 DECLARE_GETSETOOP_141(Float, F),
a61af66fc99e Initial load
duke
parents:
diff changeset
1416 DECLARE_GETSETOOP_141(Double, D),
a61af66fc99e Initial load
duke
parents:
diff changeset
1417
a61af66fc99e Initial load
duke
parents:
diff changeset
1418 DECLARE_GETSETNATIVE(Byte, B),
a61af66fc99e Initial load
duke
parents:
diff changeset
1419 DECLARE_GETSETNATIVE(Short, S),
a61af66fc99e Initial load
duke
parents:
diff changeset
1420 DECLARE_GETSETNATIVE(Char, C),
a61af66fc99e Initial load
duke
parents:
diff changeset
1421 DECLARE_GETSETNATIVE(Int, I),
a61af66fc99e Initial load
duke
parents:
diff changeset
1422 DECLARE_GETSETNATIVE(Long, J),
a61af66fc99e Initial load
duke
parents:
diff changeset
1423 DECLARE_GETSETNATIVE(Float, F),
a61af66fc99e Initial load
duke
parents:
diff changeset
1424 DECLARE_GETSETNATIVE(Double, D),
a61af66fc99e Initial load
duke
parents:
diff changeset
1425
a61af66fc99e Initial load
duke
parents:
diff changeset
1426 {CC"getAddress", CC"("ADR")"ADR, FN_PTR(Unsafe_GetNativeAddress)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1427 {CC"putAddress", CC"("ADR""ADR")V", FN_PTR(Unsafe_SetNativeAddress)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1428
a61af66fc99e Initial load
duke
parents:
diff changeset
1429 {CC"allocateMemory", CC"(J)"ADR, FN_PTR(Unsafe_AllocateMemory)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1430 {CC"reallocateMemory", CC"("ADR"J)"ADR, FN_PTR(Unsafe_ReallocateMemory)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1431 {CC"freeMemory", CC"("ADR")V", FN_PTR(Unsafe_FreeMemory)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1432
a61af66fc99e Initial load
duke
parents:
diff changeset
1433 {CC"objectFieldOffset", CC"("FLD")J", FN_PTR(Unsafe_ObjectFieldOffset)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1434 {CC"staticFieldOffset", CC"("FLD")J", FN_PTR(Unsafe_StaticFieldOffset)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1435 {CC"staticFieldBase", CC"("FLD")"OBJ, FN_PTR(Unsafe_StaticFieldBaseFromField)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1436 {CC"ensureClassInitialized",CC"("CLS")V", FN_PTR(Unsafe_EnsureClassInitialized)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1437 {CC"arrayBaseOffset", CC"("CLS")I", FN_PTR(Unsafe_ArrayBaseOffset)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1438 {CC"arrayIndexScale", CC"("CLS")I", FN_PTR(Unsafe_ArrayIndexScale)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1439 {CC"addressSize", CC"()I", FN_PTR(Unsafe_AddressSize)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1440 {CC"pageSize", CC"()I", FN_PTR(Unsafe_PageSize)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1441
a61af66fc99e Initial load
duke
parents:
diff changeset
1442 {CC"defineClass", CC"("DC0_Args")"CLS, FN_PTR(Unsafe_DefineClass0)},
8866
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1443 {CC"defineClass", CC"("DC_Args")"CLS, FN_PTR(Unsafe_DefineClass)},
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1444 {CC"allocateInstance", CC"("CLS")"OBJ, FN_PTR(Unsafe_AllocateInstance)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1445 {CC"monitorEnter", CC"("OBJ")V", FN_PTR(Unsafe_MonitorEnter)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1446 {CC"monitorExit", CC"("OBJ")V", FN_PTR(Unsafe_MonitorExit)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1447 {CC"throwException", CC"("THR")V", FN_PTR(Unsafe_ThrowException)}
a61af66fc99e Initial load
duke
parents:
diff changeset
1448
a61af66fc99e Initial load
duke
parents:
diff changeset
1449 };
a61af66fc99e Initial load
duke
parents:
diff changeset
1450
8866
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1451 // These are the methods prior to the JSR 166 changes in 1.6.0
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1452 static JNINativeMethod methods_15[] = {
a61af66fc99e Initial load
duke
parents:
diff changeset
1453 {CC"getObject", CC"("OBJ"J)"OBJ"", FN_PTR(Unsafe_GetObject)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1454 {CC"putObject", CC"("OBJ"J"OBJ")V", FN_PTR(Unsafe_SetObject)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1455 {CC"getObjectVolatile",CC"("OBJ"J)"OBJ"", FN_PTR(Unsafe_GetObjectVolatile)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1456 {CC"putObjectVolatile",CC"("OBJ"J"OBJ")V", FN_PTR(Unsafe_SetObjectVolatile)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1457
a61af66fc99e Initial load
duke
parents:
diff changeset
1458
a61af66fc99e Initial load
duke
parents:
diff changeset
1459 DECLARE_GETSETOOP(Boolean, Z),
a61af66fc99e Initial load
duke
parents:
diff changeset
1460 DECLARE_GETSETOOP(Byte, B),
a61af66fc99e Initial load
duke
parents:
diff changeset
1461 DECLARE_GETSETOOP(Short, S),
a61af66fc99e Initial load
duke
parents:
diff changeset
1462 DECLARE_GETSETOOP(Char, C),
a61af66fc99e Initial load
duke
parents:
diff changeset
1463 DECLARE_GETSETOOP(Int, I),
a61af66fc99e Initial load
duke
parents:
diff changeset
1464 DECLARE_GETSETOOP(Long, J),
a61af66fc99e Initial load
duke
parents:
diff changeset
1465 DECLARE_GETSETOOP(Float, F),
a61af66fc99e Initial load
duke
parents:
diff changeset
1466 DECLARE_GETSETOOP(Double, D),
a61af66fc99e Initial load
duke
parents:
diff changeset
1467
a61af66fc99e Initial load
duke
parents:
diff changeset
1468 DECLARE_GETSETNATIVE(Byte, B),
a61af66fc99e Initial load
duke
parents:
diff changeset
1469 DECLARE_GETSETNATIVE(Short, S),
a61af66fc99e Initial load
duke
parents:
diff changeset
1470 DECLARE_GETSETNATIVE(Char, C),
a61af66fc99e Initial load
duke
parents:
diff changeset
1471 DECLARE_GETSETNATIVE(Int, I),
a61af66fc99e Initial load
duke
parents:
diff changeset
1472 DECLARE_GETSETNATIVE(Long, J),
a61af66fc99e Initial load
duke
parents:
diff changeset
1473 DECLARE_GETSETNATIVE(Float, F),
a61af66fc99e Initial load
duke
parents:
diff changeset
1474 DECLARE_GETSETNATIVE(Double, D),
a61af66fc99e Initial load
duke
parents:
diff changeset
1475
a61af66fc99e Initial load
duke
parents:
diff changeset
1476 {CC"getAddress", CC"("ADR")"ADR, FN_PTR(Unsafe_GetNativeAddress)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1477 {CC"putAddress", CC"("ADR""ADR")V", FN_PTR(Unsafe_SetNativeAddress)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1478
a61af66fc99e Initial load
duke
parents:
diff changeset
1479 {CC"allocateMemory", CC"(J)"ADR, FN_PTR(Unsafe_AllocateMemory)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1480 {CC"reallocateMemory", CC"("ADR"J)"ADR, FN_PTR(Unsafe_ReallocateMemory)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1481 {CC"freeMemory", CC"("ADR")V", FN_PTR(Unsafe_FreeMemory)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1482
a61af66fc99e Initial load
duke
parents:
diff changeset
1483 {CC"objectFieldOffset", CC"("FLD")J", FN_PTR(Unsafe_ObjectFieldOffset)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1484 {CC"staticFieldOffset", CC"("FLD")J", FN_PTR(Unsafe_StaticFieldOffset)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1485 {CC"staticFieldBase", CC"("FLD")"OBJ, FN_PTR(Unsafe_StaticFieldBaseFromField)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1486 {CC"ensureClassInitialized",CC"("CLS")V", FN_PTR(Unsafe_EnsureClassInitialized)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1487 {CC"arrayBaseOffset", CC"("CLS")I", FN_PTR(Unsafe_ArrayBaseOffset)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1488 {CC"arrayIndexScale", CC"("CLS")I", FN_PTR(Unsafe_ArrayIndexScale)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1489 {CC"addressSize", CC"()I", FN_PTR(Unsafe_AddressSize)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1490 {CC"pageSize", CC"()I", FN_PTR(Unsafe_PageSize)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1491
a61af66fc99e Initial load
duke
parents:
diff changeset
1492 {CC"defineClass", CC"("DC0_Args")"CLS, FN_PTR(Unsafe_DefineClass0)},
8866
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1493 {CC"defineClass", CC"("DC_Args")"CLS, FN_PTR(Unsafe_DefineClass)},
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1494 {CC"allocateInstance", CC"("CLS")"OBJ, FN_PTR(Unsafe_AllocateInstance)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1495 {CC"monitorEnter", CC"("OBJ")V", FN_PTR(Unsafe_MonitorEnter)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1496 {CC"monitorExit", CC"("OBJ")V", FN_PTR(Unsafe_MonitorExit)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1497 {CC"throwException", CC"("THR")V", FN_PTR(Unsafe_ThrowException)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1498 {CC"compareAndSwapObject", CC"("OBJ"J"OBJ""OBJ")Z", FN_PTR(Unsafe_CompareAndSwapObject)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1499 {CC"compareAndSwapInt", CC"("OBJ"J""I""I"")Z", FN_PTR(Unsafe_CompareAndSwapInt)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1500 {CC"compareAndSwapLong", CC"("OBJ"J""J""J"")Z", FN_PTR(Unsafe_CompareAndSwapLong)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1501 {CC"park", CC"(ZJ)V", FN_PTR(Unsafe_Park)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1502 {CC"unpark", CC"("OBJ")V", FN_PTR(Unsafe_Unpark)}
a61af66fc99e Initial load
duke
parents:
diff changeset
1503
a61af66fc99e Initial load
duke
parents:
diff changeset
1504 };
a61af66fc99e Initial load
duke
parents:
diff changeset
1505
8866
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1506 // These are the methods for 1.6.0 and 1.7.0
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1507 static JNINativeMethod methods_16[] = {
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1508 {CC"getObject", CC"("OBJ"J)"OBJ"", FN_PTR(Unsafe_GetObject)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1509 {CC"putObject", CC"("OBJ"J"OBJ")V", FN_PTR(Unsafe_SetObject)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1510 {CC"getObjectVolatile",CC"("OBJ"J)"OBJ"", FN_PTR(Unsafe_GetObjectVolatile)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1511 {CC"putObjectVolatile",CC"("OBJ"J"OBJ")V", FN_PTR(Unsafe_SetObjectVolatile)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1512
8866
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1513 DECLARE_GETSETOOP(Boolean, Z),
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1514 DECLARE_GETSETOOP(Byte, B),
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1515 DECLARE_GETSETOOP(Short, S),
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1516 DECLARE_GETSETOOP(Char, C),
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1517 DECLARE_GETSETOOP(Int, I),
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1518 DECLARE_GETSETOOP(Long, J),
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1519 DECLARE_GETSETOOP(Float, F),
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1520 DECLARE_GETSETOOP(Double, D),
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1521
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1522 DECLARE_GETSETNATIVE(Byte, B),
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1523 DECLARE_GETSETNATIVE(Short, S),
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1524 DECLARE_GETSETNATIVE(Char, C),
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1525 DECLARE_GETSETNATIVE(Int, I),
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1526 DECLARE_GETSETNATIVE(Long, J),
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1527 DECLARE_GETSETNATIVE(Float, F),
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1528 DECLARE_GETSETNATIVE(Double, D),
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1529
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1530 {CC"getAddress", CC"("ADR")"ADR, FN_PTR(Unsafe_GetNativeAddress)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1531 {CC"putAddress", CC"("ADR""ADR")V", FN_PTR(Unsafe_SetNativeAddress)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1532
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1533 {CC"allocateMemory", CC"(J)"ADR, FN_PTR(Unsafe_AllocateMemory)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1534 {CC"reallocateMemory", CC"("ADR"J)"ADR, FN_PTR(Unsafe_ReallocateMemory)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1535 {CC"freeMemory", CC"("ADR")V", FN_PTR(Unsafe_FreeMemory)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1536
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1537 {CC"objectFieldOffset", CC"("FLD")J", FN_PTR(Unsafe_ObjectFieldOffset)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1538 {CC"staticFieldOffset", CC"("FLD")J", FN_PTR(Unsafe_StaticFieldOffset)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1539 {CC"staticFieldBase", CC"("FLD")"OBJ, FN_PTR(Unsafe_StaticFieldBaseFromField)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1540 {CC"ensureClassInitialized",CC"("CLS")V", FN_PTR(Unsafe_EnsureClassInitialized)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1541 {CC"arrayBaseOffset", CC"("CLS")I", FN_PTR(Unsafe_ArrayBaseOffset)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1542 {CC"arrayIndexScale", CC"("CLS")I", FN_PTR(Unsafe_ArrayIndexScale)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1543 {CC"addressSize", CC"()I", FN_PTR(Unsafe_AddressSize)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1544 {CC"pageSize", CC"()I", FN_PTR(Unsafe_PageSize)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1545
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1546 {CC"defineClass", CC"("DC0_Args")"CLS, FN_PTR(Unsafe_DefineClass0)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1547 {CC"defineClass", CC"("DC_Args")"CLS, FN_PTR(Unsafe_DefineClass)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1548 {CC"allocateInstance", CC"("CLS")"OBJ, FN_PTR(Unsafe_AllocateInstance)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1549 {CC"monitorEnter", CC"("OBJ")V", FN_PTR(Unsafe_MonitorEnter)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1550 {CC"monitorExit", CC"("OBJ")V", FN_PTR(Unsafe_MonitorExit)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1551 {CC"tryMonitorEnter", CC"("OBJ")Z", FN_PTR(Unsafe_TryMonitorEnter)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1552 {CC"throwException", CC"("THR")V", FN_PTR(Unsafe_ThrowException)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1553 {CC"compareAndSwapObject", CC"("OBJ"J"OBJ""OBJ")Z", FN_PTR(Unsafe_CompareAndSwapObject)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1554 {CC"compareAndSwapInt", CC"("OBJ"J""I""I"")Z", FN_PTR(Unsafe_CompareAndSwapInt)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1555 {CC"compareAndSwapLong", CC"("OBJ"J""J""J"")Z", FN_PTR(Unsafe_CompareAndSwapLong)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1556 {CC"putOrderedObject", CC"("OBJ"J"OBJ")V", FN_PTR(Unsafe_SetOrderedObject)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1557 {CC"putOrderedInt", CC"("OBJ"JI)V", FN_PTR(Unsafe_SetOrderedInt)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1558 {CC"putOrderedLong", CC"("OBJ"JJ)V", FN_PTR(Unsafe_SetOrderedLong)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1559 {CC"park", CC"(ZJ)V", FN_PTR(Unsafe_Park)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1560 {CC"unpark", CC"("OBJ")V", FN_PTR(Unsafe_Unpark)}
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1561 };
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1562
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1563 // These are the methods for 1.8.0
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1564 static JNINativeMethod methods_18[] = {
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1565 {CC"getObject", CC"("OBJ"J)"OBJ"", FN_PTR(Unsafe_GetObject)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1566 {CC"putObject", CC"("OBJ"J"OBJ")V", FN_PTR(Unsafe_SetObject)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1567 {CC"getObjectVolatile",CC"("OBJ"J)"OBJ"", FN_PTR(Unsafe_GetObjectVolatile)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1568 {CC"putObjectVolatile",CC"("OBJ"J"OBJ")V", FN_PTR(Unsafe_SetObjectVolatile)},
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1569
a61af66fc99e Initial load
duke
parents:
diff changeset
1570 DECLARE_GETSETOOP(Boolean, Z),
a61af66fc99e Initial load
duke
parents:
diff changeset
1571 DECLARE_GETSETOOP(Byte, B),
a61af66fc99e Initial load
duke
parents:
diff changeset
1572 DECLARE_GETSETOOP(Short, S),
a61af66fc99e Initial load
duke
parents:
diff changeset
1573 DECLARE_GETSETOOP(Char, C),
a61af66fc99e Initial load
duke
parents:
diff changeset
1574 DECLARE_GETSETOOP(Int, I),
a61af66fc99e Initial load
duke
parents:
diff changeset
1575 DECLARE_GETSETOOP(Long, J),
a61af66fc99e Initial load
duke
parents:
diff changeset
1576 DECLARE_GETSETOOP(Float, F),
a61af66fc99e Initial load
duke
parents:
diff changeset
1577 DECLARE_GETSETOOP(Double, D),
a61af66fc99e Initial load
duke
parents:
diff changeset
1578
a61af66fc99e Initial load
duke
parents:
diff changeset
1579 DECLARE_GETSETNATIVE(Byte, B),
a61af66fc99e Initial load
duke
parents:
diff changeset
1580 DECLARE_GETSETNATIVE(Short, S),
a61af66fc99e Initial load
duke
parents:
diff changeset
1581 DECLARE_GETSETNATIVE(Char, C),
a61af66fc99e Initial load
duke
parents:
diff changeset
1582 DECLARE_GETSETNATIVE(Int, I),
a61af66fc99e Initial load
duke
parents:
diff changeset
1583 DECLARE_GETSETNATIVE(Long, J),
a61af66fc99e Initial load
duke
parents:
diff changeset
1584 DECLARE_GETSETNATIVE(Float, F),
a61af66fc99e Initial load
duke
parents:
diff changeset
1585 DECLARE_GETSETNATIVE(Double, D),
a61af66fc99e Initial load
duke
parents:
diff changeset
1586
a61af66fc99e Initial load
duke
parents:
diff changeset
1587 {CC"getAddress", CC"("ADR")"ADR, FN_PTR(Unsafe_GetNativeAddress)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1588 {CC"putAddress", CC"("ADR""ADR")V", FN_PTR(Unsafe_SetNativeAddress)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1589
a61af66fc99e Initial load
duke
parents:
diff changeset
1590 {CC"allocateMemory", CC"(J)"ADR, FN_PTR(Unsafe_AllocateMemory)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1591 {CC"reallocateMemory", CC"("ADR"J)"ADR, FN_PTR(Unsafe_ReallocateMemory)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1592 {CC"freeMemory", CC"("ADR")V", FN_PTR(Unsafe_FreeMemory)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1593
a61af66fc99e Initial load
duke
parents:
diff changeset
1594 {CC"objectFieldOffset", CC"("FLD")J", FN_PTR(Unsafe_ObjectFieldOffset)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1595 {CC"staticFieldOffset", CC"("FLD")J", FN_PTR(Unsafe_StaticFieldOffset)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1596 {CC"staticFieldBase", CC"("FLD")"OBJ, FN_PTR(Unsafe_StaticFieldBaseFromField)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1597 {CC"ensureClassInitialized",CC"("CLS")V", FN_PTR(Unsafe_EnsureClassInitialized)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1598 {CC"arrayBaseOffset", CC"("CLS")I", FN_PTR(Unsafe_ArrayBaseOffset)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1599 {CC"arrayIndexScale", CC"("CLS")I", FN_PTR(Unsafe_ArrayIndexScale)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1600 {CC"addressSize", CC"()I", FN_PTR(Unsafe_AddressSize)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1601 {CC"pageSize", CC"()I", FN_PTR(Unsafe_PageSize)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1602
8866
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1603 {CC"defineClass", CC"("DC_Args")"CLS, FN_PTR(Unsafe_DefineClass)},
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1604 {CC"allocateInstance", CC"("CLS")"OBJ, FN_PTR(Unsafe_AllocateInstance)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1605 {CC"monitorEnter", CC"("OBJ")V", FN_PTR(Unsafe_MonitorEnter)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1606 {CC"monitorExit", CC"("OBJ")V", FN_PTR(Unsafe_MonitorExit)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1607 {CC"tryMonitorEnter", CC"("OBJ")Z", FN_PTR(Unsafe_TryMonitorEnter)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1608 {CC"throwException", CC"("THR")V", FN_PTR(Unsafe_ThrowException)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1609 {CC"compareAndSwapObject", CC"("OBJ"J"OBJ""OBJ")Z", FN_PTR(Unsafe_CompareAndSwapObject)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1610 {CC"compareAndSwapInt", CC"("OBJ"J""I""I"")Z", FN_PTR(Unsafe_CompareAndSwapInt)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1611 {CC"compareAndSwapLong", CC"("OBJ"J""J""J"")Z", FN_PTR(Unsafe_CompareAndSwapLong)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1612 {CC"putOrderedObject", CC"("OBJ"J"OBJ")V", FN_PTR(Unsafe_SetOrderedObject)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1613 {CC"putOrderedInt", CC"("OBJ"JI)V", FN_PTR(Unsafe_SetOrderedInt)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1614 {CC"putOrderedLong", CC"("OBJ"JJ)V", FN_PTR(Unsafe_SetOrderedLong)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1615 {CC"park", CC"(ZJ)V", FN_PTR(Unsafe_Park)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1616 {CC"unpark", CC"("OBJ")V", FN_PTR(Unsafe_Unpark)}
a61af66fc99e Initial load
duke
parents:
diff changeset
1617 };
a61af66fc99e Initial load
duke
parents:
diff changeset
1618
a61af66fc99e Initial load
duke
parents:
diff changeset
1619 JNINativeMethod loadavg_method[] = {
8866
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1620 {CC"getLoadAverage", CC"([DI)I", FN_PTR(Unsafe_Loadavg)}
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1621 };
a61af66fc99e Initial load
duke
parents:
diff changeset
1622
a61af66fc99e Initial load
duke
parents:
diff changeset
1623 JNINativeMethod prefetch_methods[] = {
a61af66fc99e Initial load
duke
parents:
diff changeset
1624 {CC"prefetchRead", CC"("OBJ"J)V", FN_PTR(Unsafe_PrefetchRead)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1625 {CC"prefetchWrite", CC"("OBJ"J)V", FN_PTR(Unsafe_PrefetchWrite)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1626 {CC"prefetchReadStatic", CC"("OBJ"J)V", FN_PTR(Unsafe_PrefetchRead)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1627 {CC"prefetchWriteStatic",CC"("OBJ"J)V", FN_PTR(Unsafe_PrefetchWrite)}
a61af66fc99e Initial load
duke
parents:
diff changeset
1628 };
a61af66fc99e Initial load
duke
parents:
diff changeset
1629
8866
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1630 JNINativeMethod memcopy_methods_17[] = {
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1631 {CC"copyMemory", CC"("OBJ"J"OBJ"JJ)V", FN_PTR(Unsafe_CopyMemory2)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1632 {CC"setMemory", CC"("OBJ"JJB)V", FN_PTR(Unsafe_SetMemory2)}
a61af66fc99e Initial load
duke
parents:
diff changeset
1633 };
a61af66fc99e Initial load
duke
parents:
diff changeset
1634
a61af66fc99e Initial load
duke
parents:
diff changeset
1635 JNINativeMethod memcopy_methods_15[] = {
a61af66fc99e Initial load
duke
parents:
diff changeset
1636 {CC"setMemory", CC"("ADR"JB)V", FN_PTR(Unsafe_SetMemory)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1637 {CC"copyMemory", CC"("ADR ADR"J)V", FN_PTR(Unsafe_CopyMemory)}
a61af66fc99e Initial load
duke
parents:
diff changeset
1638 };
a61af66fc99e Initial load
duke
parents:
diff changeset
1639
431
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1640 JNINativeMethod anonk_methods[] = {
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1641 {CC"defineAnonymousClass", CC"("DAC_Args")"CLS, FN_PTR(Unsafe_DefineAnonymousClass)},
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1642 };
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1643
6266
1d7922586cf6 7023639: JSR 292 method handle invocation needs a fast path for compiled code
twisti
parents: 6226
diff changeset
1644 JNINativeMethod lform_methods[] = {
1d7922586cf6 7023639: JSR 292 method handle invocation needs a fast path for compiled code
twisti
parents: 6226
diff changeset
1645 {CC"shouldBeInitialized",CC"("CLS")Z", FN_PTR(Unsafe_ShouldBeInitialized)},
1d7922586cf6 7023639: JSR 292 method handle invocation needs a fast path for compiled code
twisti
parents: 6226
diff changeset
1646 };
1d7922586cf6 7023639: JSR 292 method handle invocation needs a fast path for compiled code
twisti
parents: 6226
diff changeset
1647
8866
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1648 JNINativeMethod fence_methods[] = {
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1649 {CC"loadFence", CC"()V", FN_PTR(Unsafe_LoadFence)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1650 {CC"storeFence", CC"()V", FN_PTR(Unsafe_StoreFence)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1651 {CC"fullFence", CC"()V", FN_PTR(Unsafe_FullFence)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1652 };
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1653
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1654 #undef CC
a61af66fc99e Initial load
duke
parents:
diff changeset
1655 #undef FN_PTR
a61af66fc99e Initial load
duke
parents:
diff changeset
1656
a61af66fc99e Initial load
duke
parents:
diff changeset
1657 #undef ADR
a61af66fc99e Initial load
duke
parents:
diff changeset
1658 #undef LANG
a61af66fc99e Initial load
duke
parents:
diff changeset
1659 #undef OBJ
a61af66fc99e Initial load
duke
parents:
diff changeset
1660 #undef CLS
a61af66fc99e Initial load
duke
parents:
diff changeset
1661 #undef CTR
a61af66fc99e Initial load
duke
parents:
diff changeset
1662 #undef FLD
a61af66fc99e Initial load
duke
parents:
diff changeset
1663 #undef MTH
a61af66fc99e Initial load
duke
parents:
diff changeset
1664 #undef THR
a61af66fc99e Initial load
duke
parents:
diff changeset
1665 #undef DC0_Args
8866
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1666 #undef DC_Args
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1667
a61af66fc99e Initial load
duke
parents:
diff changeset
1668 #undef DECLARE_GETSETOOP
a61af66fc99e Initial load
duke
parents:
diff changeset
1669 #undef DECLARE_GETSETNATIVE
a61af66fc99e Initial load
duke
parents:
diff changeset
1670
a61af66fc99e Initial load
duke
parents:
diff changeset
1671
8866
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1672 /**
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1673 * Helper method to register native methods.
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1674 */
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1675 static bool register_natives(const char* message, JNIEnv* env, jclass clazz, const JNINativeMethod* methods, jint nMethods) {
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1676 int status = env->RegisterNatives(clazz, methods, nMethods);
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1677 if (status < 0 || env->ExceptionOccurred()) {
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1678 if (PrintMiscellaneous && (Verbose || WizardMode)) {
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1679 tty->print_cr("Unsafe: failed registering %s", message);
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1680 }
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1681 env->ExceptionClear();
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1682 return false;
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1683 } else {
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1684 if (PrintMiscellaneous && (Verbose || WizardMode)) {
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1685 tty->print_cr("Unsafe: successfully registered %s", message);
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1686 }
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1687 return true;
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1688 }
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1689 }
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1690
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1691
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1692 // This one function is exported, used by NativeLookup.
a61af66fc99e Initial load
duke
parents:
diff changeset
1693 // The Unsafe_xxx functions above are called only from the interpreter.
a61af66fc99e Initial load
duke
parents:
diff changeset
1694 // The optimizer looks at names and signatures to recognize
a61af66fc99e Initial load
duke
parents:
diff changeset
1695 // individual functions.
a61af66fc99e Initial load
duke
parents:
diff changeset
1696
a61af66fc99e Initial load
duke
parents:
diff changeset
1697 JVM_ENTRY(void, JVM_RegisterUnsafeMethods(JNIEnv *env, jclass unsafecls))
a61af66fc99e Initial load
duke
parents:
diff changeset
1698 UnsafeWrapper("JVM_RegisterUnsafeMethods");
a61af66fc99e Initial load
duke
parents:
diff changeset
1699 {
a61af66fc99e Initial load
duke
parents:
diff changeset
1700 ThreadToNativeFromVM ttnfv(thread);
8866
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1701
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1702 // Unsafe methods
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1703 {
8866
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1704 bool success = false;
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1705 // We need to register the 1.6 methods first because the 1.8 methods would register fine on 1.7 and 1.6
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1706 if (!success) {
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1707 success = register_natives("1.6 methods", env, unsafecls, methods_16, sizeof(methods_16)/sizeof(JNINativeMethod));
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1708 }
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1709 if (!success) {
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1710 success = register_natives("1.8 methods", env, unsafecls, methods_18, sizeof(methods_18)/sizeof(JNINativeMethod));
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1711 }
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1712 if (!success) {
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1713 success = register_natives("1.5 methods", env, unsafecls, methods_15, sizeof(methods_15)/sizeof(JNINativeMethod));
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1714 }
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1715 if (!success) {
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1716 success = register_natives("1.4.1 methods", env, unsafecls, methods_141, sizeof(methods_141)/sizeof(JNINativeMethod));
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1717 }
8866
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1718 if (!success) {
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1719 success = register_natives("1.4.0 methods", env, unsafecls, methods_140, sizeof(methods_140)/sizeof(JNINativeMethod));
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1720 }
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1721 guarantee(success, "register unsafe natives");
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1722 }
8866
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1723
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1724 // Unsafe.getLoadAverage
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1725 register_natives("1.6 loadavg method", env, unsafecls, loadavg_method, sizeof(loadavg_method)/sizeof(JNINativeMethod));
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1726
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1727 // Prefetch methods
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1728 register_natives("1.6 prefetch methods", env, unsafecls, prefetch_methods, sizeof(prefetch_methods)/sizeof(JNINativeMethod));
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1729
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1730 // Memory copy methods
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1731 {
8866
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1732 bool success = false;
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1733 if (!success) {
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1734 success = register_natives("1.7 memory copy methods", env, unsafecls, memcopy_methods_17, sizeof(memcopy_methods_17)/sizeof(JNINativeMethod));
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1735 }
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1736 if (!success) {
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1737 success = register_natives("1.5 memory copy methods", env, unsafecls, memcopy_methods_15, sizeof(memcopy_methods_15)/sizeof(JNINativeMethod));
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1738 }
a61af66fc99e Initial load
duke
parents:
diff changeset
1739 }
8866
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1740
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1741 // Unsafe.defineAnonymousClass
2416
38fea01eb669 6817525: turn on method handle functionality by default for JSR 292
twisti
parents: 2376
diff changeset
1742 if (EnableInvokeDynamic) {
8866
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1743 register_natives("1.7 define anonymous class method", env, unsafecls, anonk_methods, sizeof(anonk_methods)/sizeof(JNINativeMethod));
6266
1d7922586cf6 7023639: JSR 292 method handle invocation needs a fast path for compiled code
twisti
parents: 6226
diff changeset
1744 }
8866
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1745
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1746 // Unsafe.shouldBeInitialized
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1747 if (EnableInvokeDynamic) {
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1748 register_natives("1.7 LambdaForm support", env, unsafecls, lform_methods, sizeof(lform_methods)/sizeof(JNINativeMethod));
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1749 }
8866
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1750
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1751 // Fence methods
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1752 register_natives("1.8 fence methods", env, unsafecls, fence_methods, sizeof(fence_methods)/sizeof(JNINativeMethod));
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1753 }
a61af66fc99e Initial load
duke
parents:
diff changeset
1754 JVM_END