annotate src/share/vm/prims/unsafe.cpp @ 23842:d109bda16490

Merge
author asaha
date Tue, 05 Apr 2016 08:55:39 -0700
parents 626f594dffa6 32b682649973
children f13e777eb255
Ignore whitespace changes - Everywhere: Within whitespace: At end of lines:
rev   line source
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1 /*
23614
32b682649973 8132051: Better byte behavior
kevinw
parents: 22797
diff changeset
2 * Copyright (c) 2000, 2016, Oracle and/or its affiliates. All rights reserved.
0
a61af66fc99e Initial load
duke
parents:
diff changeset
3 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
a61af66fc99e Initial load
duke
parents:
diff changeset
4 *
a61af66fc99e Initial load
duke
parents:
diff changeset
5 * This code is free software; you can redistribute it and/or modify it
a61af66fc99e Initial load
duke
parents:
diff changeset
6 * under the terms of the GNU General Public License version 2 only, as
a61af66fc99e Initial load
duke
parents:
diff changeset
7 * published by the Free Software Foundation.
a61af66fc99e Initial load
duke
parents:
diff changeset
8 *
a61af66fc99e Initial load
duke
parents:
diff changeset
9 * This code is distributed in the hope that it will be useful, but WITHOUT
a61af66fc99e Initial load
duke
parents:
diff changeset
10 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
a61af66fc99e Initial load
duke
parents:
diff changeset
11 * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
a61af66fc99e Initial load
duke
parents:
diff changeset
12 * version 2 for more details (a copy is included in the LICENSE file that
a61af66fc99e Initial load
duke
parents:
diff changeset
13 * accompanied this code).
a61af66fc99e Initial load
duke
parents:
diff changeset
14 *
a61af66fc99e Initial load
duke
parents:
diff changeset
15 * You should have received a copy of the GNU General Public License version
a61af66fc99e Initial load
duke
parents:
diff changeset
16 * 2 along with this work; if not, write to the Free Software Foundation,
a61af66fc99e Initial load
duke
parents:
diff changeset
17 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
a61af66fc99e Initial load
duke
parents:
diff changeset
18 *
1552
c18cbe5936b8 6941466: Oracle rebranding changes for Hotspot repositories
trims
parents: 1324
diff changeset
19 * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
c18cbe5936b8 6941466: Oracle rebranding changes for Hotspot repositories
trims
parents: 1324
diff changeset
20 * or visit www.oracle.com if you need additional information or have any
c18cbe5936b8 6941466: Oracle rebranding changes for Hotspot repositories
trims
parents: 1324
diff changeset
21 * questions.
0
a61af66fc99e Initial load
duke
parents:
diff changeset
22 *
a61af66fc99e Initial load
duke
parents:
diff changeset
23 */
a61af66fc99e Initial load
duke
parents:
diff changeset
24
1972
f95d63e2154a 6989984: Use standard include model for Hospot
stefank
parents: 1552
diff changeset
25 #include "precompiled.hpp"
f95d63e2154a 6989984: Use standard include model for Hospot
stefank
parents: 1552
diff changeset
26 #include "classfile/vmSymbols.hpp"
8001
db9981fd3124 8005915: Unify SERIALGC and INCLUDE_ALTERNATE_GCS
jprovino
parents: 7425
diff changeset
27 #include "utilities/macros.hpp"
db9981fd3124 8005915: Unify SERIALGC and INCLUDE_ALTERNATE_GCS
jprovino
parents: 7425
diff changeset
28 #if INCLUDE_ALL_GCS
3249
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
29 #include "gc_implementation/g1/g1SATBCardTableModRefBS.hpp"
8001
db9981fd3124 8005915: Unify SERIALGC and INCLUDE_ALTERNATE_GCS
jprovino
parents: 7425
diff changeset
30 #endif // INCLUDE_ALL_GCS
1972
f95d63e2154a 6989984: Use standard include model for Hospot
stefank
parents: 1552
diff changeset
31 #include "memory/allocation.inline.hpp"
f95d63e2154a 6989984: Use standard include model for Hospot
stefank
parents: 1552
diff changeset
32 #include "prims/jni.h"
f95d63e2154a 6989984: Use standard include model for Hospot
stefank
parents: 1552
diff changeset
33 #include "prims/jvm.h"
f95d63e2154a 6989984: Use standard include model for Hospot
stefank
parents: 1552
diff changeset
34 #include "runtime/globals.hpp"
f95d63e2154a 6989984: Use standard include model for Hospot
stefank
parents: 1552
diff changeset
35 #include "runtime/interfaceSupport.hpp"
20198
c49dcaf78a65 8042737: Introduce umbrella header prefetch.inline.hpp
goetz
parents: 20197
diff changeset
36 #include "runtime/prefetch.inline.hpp"
20197
ce8f6bb717c9 8042195: Introduce umbrella header orderAccess.inline.hpp.
goetz
parents: 17937
diff changeset
37 #include "runtime/orderAccess.inline.hpp"
1972
f95d63e2154a 6989984: Use standard include model for Hospot
stefank
parents: 1552
diff changeset
38 #include "runtime/reflection.hpp"
f95d63e2154a 6989984: Use standard include model for Hospot
stefank
parents: 1552
diff changeset
39 #include "runtime/synchronizer.hpp"
f95d63e2154a 6989984: Use standard include model for Hospot
stefank
parents: 1552
diff changeset
40 #include "services/threadService.hpp"
10405
f2110083203d 8005849: JEP 167: Event-Based JVM Tracing
sla
parents: 10399
diff changeset
41 #include "trace/tracing.hpp"
1972
f95d63e2154a 6989984: Use standard include model for Hospot
stefank
parents: 1552
diff changeset
42 #include "utilities/copy.hpp"
f95d63e2154a 6989984: Use standard include model for Hospot
stefank
parents: 1552
diff changeset
43 #include "utilities/dtrace.hpp"
f95d63e2154a 6989984: Use standard include model for Hospot
stefank
parents: 1552
diff changeset
44
17937
78bbf4d43a14 8037816: Fix for 8036122 breaks build with Xcode5/clang
drchase
parents: 17810
diff changeset
45 PRAGMA_FORMAT_MUTE_WARNINGS_FOR_GCC
78bbf4d43a14 8037816: Fix for 8036122 breaks build with Xcode5/clang
drchase
parents: 17810
diff changeset
46
0
a61af66fc99e Initial load
duke
parents:
diff changeset
47 /*
a61af66fc99e Initial load
duke
parents:
diff changeset
48 * Implementation of class sun.misc.Unsafe
a61af66fc99e Initial load
duke
parents:
diff changeset
49 */
a61af66fc99e Initial load
duke
parents:
diff changeset
50
4006
436b4a3231bf 7098194: integrate macosx-port changes
dcubed
parents: 3938
diff changeset
51 #ifndef USDT2
1324
e392695de029 6935224: Adding new DTrace probes to work with Palantir
fparain
parents: 845
diff changeset
52 HS_DTRACE_PROBE_DECL3(hotspot, thread__park__begin, uintptr_t, int, long long);
e392695de029 6935224: Adding new DTrace probes to work with Palantir
fparain
parents: 845
diff changeset
53 HS_DTRACE_PROBE_DECL1(hotspot, thread__park__end, uintptr_t);
e392695de029 6935224: Adding new DTrace probes to work with Palantir
fparain
parents: 845
diff changeset
54 HS_DTRACE_PROBE_DECL1(hotspot, thread__unpark, uintptr_t);
4006
436b4a3231bf 7098194: integrate macosx-port changes
dcubed
parents: 3938
diff changeset
55 #endif /* !USDT2 */
1324
e392695de029 6935224: Adding new DTrace probes to work with Palantir
fparain
parents: 845
diff changeset
56
0
a61af66fc99e Initial load
duke
parents:
diff changeset
57 #define MAX_OBJECT_SIZE \
a61af66fc99e Initial load
duke
parents:
diff changeset
58 ( arrayOopDesc::header_size(T_DOUBLE) * HeapWordSize \
a61af66fc99e Initial load
duke
parents:
diff changeset
59 + ((julong)max_jint * sizeof(double)) )
a61af66fc99e Initial load
duke
parents:
diff changeset
60
a61af66fc99e Initial load
duke
parents:
diff changeset
61
a61af66fc99e Initial load
duke
parents:
diff changeset
62 #define UNSAFE_ENTRY(result_type, header) \
a61af66fc99e Initial load
duke
parents:
diff changeset
63 JVM_ENTRY(result_type, header)
a61af66fc99e Initial load
duke
parents:
diff changeset
64
a61af66fc99e Initial load
duke
parents:
diff changeset
65 // Can't use UNSAFE_LEAF because it has the signature of a straight
a61af66fc99e Initial load
duke
parents:
diff changeset
66 // call into the runtime (just like JVM_LEAF, funny that) but it's
a61af66fc99e Initial load
duke
parents:
diff changeset
67 // called like a Java Native and thus the wrapper built for it passes
a61af66fc99e Initial load
duke
parents:
diff changeset
68 // arguments like a JNI call. It expects those arguments to be popped
a61af66fc99e Initial load
duke
parents:
diff changeset
69 // from the stack on Intel like all good JNI args are, and adjusts the
a61af66fc99e Initial load
duke
parents:
diff changeset
70 // stack according. Since the JVM_LEAF call expects no extra
a61af66fc99e Initial load
duke
parents:
diff changeset
71 // arguments the stack isn't popped in the C code, is pushed by the
a61af66fc99e Initial load
duke
parents:
diff changeset
72 // wrapper and we get sick.
a61af66fc99e Initial load
duke
parents:
diff changeset
73 //#define UNSAFE_LEAF(result_type, header) \
a61af66fc99e Initial load
duke
parents:
diff changeset
74 // JVM_LEAF(result_type, header)
a61af66fc99e Initial load
duke
parents:
diff changeset
75
a61af66fc99e Initial load
duke
parents:
diff changeset
76 #define UNSAFE_END JVM_END
a61af66fc99e Initial load
duke
parents:
diff changeset
77
a61af66fc99e Initial load
duke
parents:
diff changeset
78 #define UnsafeWrapper(arg) /*nothing, for the present*/
a61af66fc99e Initial load
duke
parents:
diff changeset
79
a61af66fc99e Initial load
duke
parents:
diff changeset
80
a61af66fc99e Initial load
duke
parents:
diff changeset
81 inline void* addr_from_java(jlong addr) {
a61af66fc99e Initial load
duke
parents:
diff changeset
82 // This assert fails in a variety of ways on 32-bit systems.
a61af66fc99e Initial load
duke
parents:
diff changeset
83 // It is impossible to predict whether native code that converts
a61af66fc99e Initial load
duke
parents:
diff changeset
84 // pointers to longs will sign-extend or zero-extend the addresses.
a61af66fc99e Initial load
duke
parents:
diff changeset
85 //assert(addr == (uintptr_t)addr, "must not be odd high bits");
a61af66fc99e Initial load
duke
parents:
diff changeset
86 return (void*)(uintptr_t)addr;
a61af66fc99e Initial load
duke
parents:
diff changeset
87 }
a61af66fc99e Initial load
duke
parents:
diff changeset
88
a61af66fc99e Initial load
duke
parents:
diff changeset
89 inline jlong addr_to_java(void* p) {
a61af66fc99e Initial load
duke
parents:
diff changeset
90 assert(p == (void*)(uintptr_t)p, "must not be odd high bits");
a61af66fc99e Initial load
duke
parents:
diff changeset
91 return (uintptr_t)p;
a61af66fc99e Initial load
duke
parents:
diff changeset
92 }
a61af66fc99e Initial load
duke
parents:
diff changeset
93
a61af66fc99e Initial load
duke
parents:
diff changeset
94
a61af66fc99e Initial load
duke
parents:
diff changeset
95 // Note: The VM's obj_field and related accessors use byte-scaled
a61af66fc99e Initial load
duke
parents:
diff changeset
96 // ("unscaled") offsets, just as the unsafe methods do.
a61af66fc99e Initial load
duke
parents:
diff changeset
97
a61af66fc99e Initial load
duke
parents:
diff changeset
98 // However, the method Unsafe.fieldOffset explicitly declines to
a61af66fc99e Initial load
duke
parents:
diff changeset
99 // guarantee this. The field offset values manipulated by the Java user
a61af66fc99e Initial load
duke
parents:
diff changeset
100 // through the Unsafe API are opaque cookies that just happen to be byte
a61af66fc99e Initial load
duke
parents:
diff changeset
101 // offsets. We represent this state of affairs by passing the cookies
a61af66fc99e Initial load
duke
parents:
diff changeset
102 // through conversion functions when going between the VM and the Unsafe API.
a61af66fc99e Initial load
duke
parents:
diff changeset
103 // The conversion functions just happen to be no-ops at present.
a61af66fc99e Initial load
duke
parents:
diff changeset
104
a61af66fc99e Initial load
duke
parents:
diff changeset
105 inline jlong field_offset_to_byte_offset(jlong field_offset) {
a61af66fc99e Initial load
duke
parents:
diff changeset
106 return field_offset;
a61af66fc99e Initial load
duke
parents:
diff changeset
107 }
a61af66fc99e Initial load
duke
parents:
diff changeset
108
a61af66fc99e Initial load
duke
parents:
diff changeset
109 inline jlong field_offset_from_byte_offset(jlong byte_offset) {
a61af66fc99e Initial load
duke
parents:
diff changeset
110 return byte_offset;
a61af66fc99e Initial load
duke
parents:
diff changeset
111 }
a61af66fc99e Initial load
duke
parents:
diff changeset
112
a61af66fc99e Initial load
duke
parents:
diff changeset
113 inline jint invocation_key_from_method_slot(jint slot) {
a61af66fc99e Initial load
duke
parents:
diff changeset
114 return slot;
a61af66fc99e Initial load
duke
parents:
diff changeset
115 }
a61af66fc99e Initial load
duke
parents:
diff changeset
116
a61af66fc99e Initial load
duke
parents:
diff changeset
117 inline jint invocation_key_to_method_slot(jint key) {
a61af66fc99e Initial load
duke
parents:
diff changeset
118 return key;
a61af66fc99e Initial load
duke
parents:
diff changeset
119 }
a61af66fc99e Initial load
duke
parents:
diff changeset
120
a61af66fc99e Initial load
duke
parents:
diff changeset
121 inline void* index_oop_from_field_offset_long(oop p, jlong field_offset) {
a61af66fc99e Initial load
duke
parents:
diff changeset
122 jlong byte_offset = field_offset_to_byte_offset(field_offset);
a61af66fc99e Initial load
duke
parents:
diff changeset
123 #ifdef ASSERT
a61af66fc99e Initial load
duke
parents:
diff changeset
124 if (p != NULL) {
a61af66fc99e Initial load
duke
parents:
diff changeset
125 assert(byte_offset >= 0 && byte_offset <= (jlong)MAX_OBJECT_SIZE, "sane offset");
a61af66fc99e Initial load
duke
parents:
diff changeset
126 if (byte_offset == (jint)byte_offset) {
a61af66fc99e Initial load
duke
parents:
diff changeset
127 void* ptr_plus_disp = (address)p + byte_offset;
113
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
128 assert((void*)p->obj_field_addr<oop>((jint)byte_offset) == ptr_plus_disp,
0
a61af66fc99e Initial load
duke
parents:
diff changeset
129 "raw [ptr+disp] must be consistent with oop::field_base");
a61af66fc99e Initial load
duke
parents:
diff changeset
130 }
6889
e81a8af10cd9 8001071: Add simple range check into VM implemenation of Unsafe access methods
kvn
parents: 6831
diff changeset
131 jlong p_size = HeapWordSize * (jlong)(p->size());
e81a8af10cd9 8001071: Add simple range check into VM implemenation of Unsafe access methods
kvn
parents: 6831
diff changeset
132 assert(byte_offset < p_size, err_msg("Unsafe access: offset " INT64_FORMAT " > object's size " INT64_FORMAT, byte_offset, p_size));
0
a61af66fc99e Initial load
duke
parents:
diff changeset
133 }
a61af66fc99e Initial load
duke
parents:
diff changeset
134 #endif
a61af66fc99e Initial load
duke
parents:
diff changeset
135 if (sizeof(char*) == sizeof(jint)) // (this constant folds!)
a61af66fc99e Initial load
duke
parents:
diff changeset
136 return (address)p + (jint) byte_offset;
a61af66fc99e Initial load
duke
parents:
diff changeset
137 else
a61af66fc99e Initial load
duke
parents:
diff changeset
138 return (address)p + byte_offset;
a61af66fc99e Initial load
duke
parents:
diff changeset
139 }
a61af66fc99e Initial load
duke
parents:
diff changeset
140
a61af66fc99e Initial load
duke
parents:
diff changeset
141 // Externally callable versions:
a61af66fc99e Initial load
duke
parents:
diff changeset
142 // (Use these in compiler intrinsics which emulate unsafe primitives.)
a61af66fc99e Initial load
duke
parents:
diff changeset
143 jlong Unsafe_field_offset_to_byte_offset(jlong field_offset) {
a61af66fc99e Initial load
duke
parents:
diff changeset
144 return field_offset;
a61af66fc99e Initial load
duke
parents:
diff changeset
145 }
a61af66fc99e Initial load
duke
parents:
diff changeset
146 jlong Unsafe_field_offset_from_byte_offset(jlong byte_offset) {
a61af66fc99e Initial load
duke
parents:
diff changeset
147 return byte_offset;
a61af66fc99e Initial load
duke
parents:
diff changeset
148 }
a61af66fc99e Initial load
duke
parents:
diff changeset
149 jint Unsafe_invocation_key_from_method_slot(jint slot) {
a61af66fc99e Initial load
duke
parents:
diff changeset
150 return invocation_key_from_method_slot(slot);
a61af66fc99e Initial load
duke
parents:
diff changeset
151 }
a61af66fc99e Initial load
duke
parents:
diff changeset
152 jint Unsafe_invocation_key_to_method_slot(jint key) {
a61af66fc99e Initial load
duke
parents:
diff changeset
153 return invocation_key_to_method_slot(key);
a61af66fc99e Initial load
duke
parents:
diff changeset
154 }
a61af66fc99e Initial load
duke
parents:
diff changeset
155
a61af66fc99e Initial load
duke
parents:
diff changeset
156
a61af66fc99e Initial load
duke
parents:
diff changeset
157 ///// Data in the Java heap.
a61af66fc99e Initial load
duke
parents:
diff changeset
158
23614
32b682649973 8132051: Better byte behavior
kevinw
parents: 22797
diff changeset
159 #define truncate_jboolean(x) ((x) & 1)
32b682649973 8132051: Better byte behavior
kevinw
parents: 22797
diff changeset
160 #define truncate_jbyte(x) (x)
32b682649973 8132051: Better byte behavior
kevinw
parents: 22797
diff changeset
161 #define truncate_jshort(x) (x)
32b682649973 8132051: Better byte behavior
kevinw
parents: 22797
diff changeset
162 #define truncate_jchar(x) (x)
32b682649973 8132051: Better byte behavior
kevinw
parents: 22797
diff changeset
163 #define truncate_jint(x) (x)
32b682649973 8132051: Better byte behavior
kevinw
parents: 22797
diff changeset
164 #define truncate_jlong(x) (x)
32b682649973 8132051: Better byte behavior
kevinw
parents: 22797
diff changeset
165 #define truncate_jfloat(x) (x)
32b682649973 8132051: Better byte behavior
kevinw
parents: 22797
diff changeset
166 #define truncate_jdouble(x) (x)
32b682649973 8132051: Better byte behavior
kevinw
parents: 22797
diff changeset
167
0
a61af66fc99e Initial load
duke
parents:
diff changeset
168 #define GET_FIELD(obj, offset, type_name, v) \
a61af66fc99e Initial load
duke
parents:
diff changeset
169 oop p = JNIHandles::resolve(obj); \
a61af66fc99e Initial load
duke
parents:
diff changeset
170 type_name v = *(type_name*)index_oop_from_field_offset_long(p, offset)
a61af66fc99e Initial load
duke
parents:
diff changeset
171
a61af66fc99e Initial load
duke
parents:
diff changeset
172 #define SET_FIELD(obj, offset, type_name, x) \
a61af66fc99e Initial load
duke
parents:
diff changeset
173 oop p = JNIHandles::resolve(obj); \
23614
32b682649973 8132051: Better byte behavior
kevinw
parents: 22797
diff changeset
174 *(type_name*)index_oop_from_field_offset_long(p, offset) = truncate_##type_name(x)
0
a61af66fc99e Initial load
duke
parents:
diff changeset
175
a61af66fc99e Initial load
duke
parents:
diff changeset
176 #define GET_FIELD_VOLATILE(obj, offset, type_name, v) \
a61af66fc99e Initial load
duke
parents:
diff changeset
177 oop p = JNIHandles::resolve(obj); \
17794
3514ee402842 8029101: PPC64 (part 211): ordering of Independent Reads of Independent Writes
goetz
parents: 12316
diff changeset
178 if (support_IRIW_for_not_multiple_copy_atomic_cpu) { \
3514ee402842 8029101: PPC64 (part 211): ordering of Independent Reads of Independent Writes
goetz
parents: 12316
diff changeset
179 OrderAccess::fence(); \
3514ee402842 8029101: PPC64 (part 211): ordering of Independent Reads of Independent Writes
goetz
parents: 12316
diff changeset
180 } \
2114
4fc084dac61e 7009756: volatile variables could be broken throw reflection API
kvn
parents: 1972
diff changeset
181 volatile type_name v = OrderAccess::load_acquire((volatile type_name*)index_oop_from_field_offset_long(p, offset));
0
a61af66fc99e Initial load
duke
parents:
diff changeset
182
a61af66fc99e Initial load
duke
parents:
diff changeset
183 #define SET_FIELD_VOLATILE(obj, offset, type_name, x) \
a61af66fc99e Initial load
duke
parents:
diff changeset
184 oop p = JNIHandles::resolve(obj); \
23614
32b682649973 8132051: Better byte behavior
kevinw
parents: 22797
diff changeset
185 OrderAccess::release_store_fence((volatile type_name*)index_oop_from_field_offset_long(p, offset), truncate_##type_name(x));
0
a61af66fc99e Initial load
duke
parents:
diff changeset
186
113
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
187 // Macros for oops that check UseCompressedOops
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
188
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
189 #define GET_OOP_FIELD(obj, offset, v) \
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
190 oop p = JNIHandles::resolve(obj); \
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
191 oop v; \
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
192 if (UseCompressedOops) { \
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
193 narrowOop n = *(narrowOop*)index_oop_from_field_offset_long(p, offset); \
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
194 v = oopDesc::decode_heap_oop(n); \
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
195 } else { \
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
196 v = *(oop*)index_oop_from_field_offset_long(p, offset); \
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
197 }
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
198
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
199
0
a61af66fc99e Initial load
duke
parents:
diff changeset
200 // Get/SetObject must be special-cased, since it works with handles.
a61af66fc99e Initial load
duke
parents:
diff changeset
201
a61af66fc99e Initial load
duke
parents:
diff changeset
202 // The xxx140 variants for backward compatibility do not allow a full-width offset.
a61af66fc99e Initial load
duke
parents:
diff changeset
203 UNSAFE_ENTRY(jobject, Unsafe_GetObject140(JNIEnv *env, jobject unsafe, jobject obj, jint offset))
a61af66fc99e Initial load
duke
parents:
diff changeset
204 UnsafeWrapper("Unsafe_GetObject");
a61af66fc99e Initial load
duke
parents:
diff changeset
205 if (obj == NULL) THROW_0(vmSymbols::java_lang_NullPointerException());
113
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
206 GET_OOP_FIELD(obj, offset, v)
3249
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
207 jobject ret = JNIHandles::make_local(env, v);
8001
db9981fd3124 8005915: Unify SERIALGC and INCLUDE_ALTERNATE_GCS
jprovino
parents: 7425
diff changeset
208 #if INCLUDE_ALL_GCS
3249
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
209 // We could be accessing the referent field in a reference
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
210 // object. If G1 is enabled then we need to register a non-null
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
211 // referent with the SATB barrier.
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
212 if (UseG1GC) {
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
213 bool needs_barrier = false;
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
214
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
215 if (ret != NULL) {
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
216 if (offset == java_lang_ref_Reference::referent_offset) {
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
217 oop o = JNIHandles::resolve_non_null(obj);
6725
da91efe96a93 6964458: Reimplement class meta-data storage to use native memory
coleenp
parents: 6266
diff changeset
218 Klass* k = o->klass();
da91efe96a93 6964458: Reimplement class meta-data storage to use native memory
coleenp
parents: 6266
diff changeset
219 if (InstanceKlass::cast(k)->reference_type() != REF_NONE) {
da91efe96a93 6964458: Reimplement class meta-data storage to use native memory
coleenp
parents: 6266
diff changeset
220 assert(InstanceKlass::cast(k)->is_subclass_of(SystemDictionary::Reference_klass()), "sanity");
3249
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
221 needs_barrier = true;
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
222 }
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
223 }
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
224 }
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
225
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
226 if (needs_barrier) {
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
227 oop referent = JNIHandles::resolve(ret);
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
228 G1SATBCardTableModRefBS::enqueue(referent);
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
229 }
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
230 }
8001
db9981fd3124 8005915: Unify SERIALGC and INCLUDE_ALTERNATE_GCS
jprovino
parents: 7425
diff changeset
231 #endif // INCLUDE_ALL_GCS
3249
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
232 return ret;
0
a61af66fc99e Initial load
duke
parents:
diff changeset
233 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
234
a61af66fc99e Initial load
duke
parents:
diff changeset
235 UNSAFE_ENTRY(void, Unsafe_SetObject140(JNIEnv *env, jobject unsafe, jobject obj, jint offset, jobject x_h))
a61af66fc99e Initial load
duke
parents:
diff changeset
236 UnsafeWrapper("Unsafe_SetObject");
a61af66fc99e Initial load
duke
parents:
diff changeset
237 if (obj == NULL) THROW(vmSymbols::java_lang_NullPointerException());
a61af66fc99e Initial load
duke
parents:
diff changeset
238 oop x = JNIHandles::resolve(x_h);
a61af66fc99e Initial load
duke
parents:
diff changeset
239 //SET_FIELD(obj, offset, oop, x);
a61af66fc99e Initial load
duke
parents:
diff changeset
240 oop p = JNIHandles::resolve(obj);
113
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
241 if (UseCompressedOops) {
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
242 if (x != NULL) {
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
243 // If there is a heap base pointer, we are obliged to emit a store barrier.
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
244 oop_store((narrowOop*)index_oop_from_field_offset_long(p, offset), x);
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
245 } else {
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
246 narrowOop n = oopDesc::encode_heap_oop_not_null(x);
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
247 *(narrowOop*)index_oop_from_field_offset_long(p, offset) = n;
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
248 }
0
a61af66fc99e Initial load
duke
parents:
diff changeset
249 } else {
113
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
250 if (x != NULL) {
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
251 // If there is a heap base pointer, we are obliged to emit a store barrier.
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
252 oop_store((oop*)index_oop_from_field_offset_long(p, offset), x);
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
253 } else {
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
254 *(oop*)index_oop_from_field_offset_long(p, offset) = x;
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
255 }
0
a61af66fc99e Initial load
duke
parents:
diff changeset
256 }
a61af66fc99e Initial load
duke
parents:
diff changeset
257 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
258
a61af66fc99e Initial load
duke
parents:
diff changeset
259 // The normal variants allow a null base pointer with an arbitrary address.
a61af66fc99e Initial load
duke
parents:
diff changeset
260 // But if the base pointer is non-null, the offset should make some sense.
a61af66fc99e Initial load
duke
parents:
diff changeset
261 // That is, it should be in the range [0, MAX_OBJECT_SIZE].
a61af66fc99e Initial load
duke
parents:
diff changeset
262 UNSAFE_ENTRY(jobject, Unsafe_GetObject(JNIEnv *env, jobject unsafe, jobject obj, jlong offset))
a61af66fc99e Initial load
duke
parents:
diff changeset
263 UnsafeWrapper("Unsafe_GetObject");
113
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
264 GET_OOP_FIELD(obj, offset, v)
3249
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
265 jobject ret = JNIHandles::make_local(env, v);
8001
db9981fd3124 8005915: Unify SERIALGC and INCLUDE_ALTERNATE_GCS
jprovino
parents: 7425
diff changeset
266 #if INCLUDE_ALL_GCS
3249
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
267 // We could be accessing the referent field in a reference
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
268 // object. If G1 is enabled then we need to register non-null
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
269 // referent with the SATB barrier.
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
270 if (UseG1GC) {
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
271 bool needs_barrier = false;
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
272
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
273 if (ret != NULL) {
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
274 if (offset == java_lang_ref_Reference::referent_offset && obj != NULL) {
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
275 oop o = JNIHandles::resolve(obj);
6725
da91efe96a93 6964458: Reimplement class meta-data storage to use native memory
coleenp
parents: 6266
diff changeset
276 Klass* k = o->klass();
da91efe96a93 6964458: Reimplement class meta-data storage to use native memory
coleenp
parents: 6266
diff changeset
277 if (InstanceKlass::cast(k)->reference_type() != REF_NONE) {
da91efe96a93 6964458: Reimplement class meta-data storage to use native memory
coleenp
parents: 6266
diff changeset
278 assert(InstanceKlass::cast(k)->is_subclass_of(SystemDictionary::Reference_klass()), "sanity");
3249
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
279 needs_barrier = true;
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
280 }
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
281 }
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
282 }
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
283
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
284 if (needs_barrier) {
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
285 oop referent = JNIHandles::resolve(ret);
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
286 G1SATBCardTableModRefBS::enqueue(referent);
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
287 }
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
288 }
8001
db9981fd3124 8005915: Unify SERIALGC and INCLUDE_ALTERNATE_GCS
jprovino
parents: 7425
diff changeset
289 #endif // INCLUDE_ALL_GCS
3249
e1162778c1c8 7009266: G1: assert(obj->is_oop_or_null(true )) failed: Error
johnc
parents: 2376
diff changeset
290 return ret;
0
a61af66fc99e Initial load
duke
parents:
diff changeset
291 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
292
a61af66fc99e Initial load
duke
parents:
diff changeset
293 UNSAFE_ENTRY(void, Unsafe_SetObject(JNIEnv *env, jobject unsafe, jobject obj, jlong offset, jobject x_h))
a61af66fc99e Initial load
duke
parents:
diff changeset
294 UnsafeWrapper("Unsafe_SetObject");
a61af66fc99e Initial load
duke
parents:
diff changeset
295 oop x = JNIHandles::resolve(x_h);
a61af66fc99e Initial load
duke
parents:
diff changeset
296 oop p = JNIHandles::resolve(obj);
113
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
297 if (UseCompressedOops) {
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
298 oop_store((narrowOop*)index_oop_from_field_offset_long(p, offset), x);
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
299 } else {
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
300 oop_store((oop*)index_oop_from_field_offset_long(p, offset), x);
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
301 }
0
a61af66fc99e Initial load
duke
parents:
diff changeset
302 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
303
a61af66fc99e Initial load
duke
parents:
diff changeset
304 UNSAFE_ENTRY(jobject, Unsafe_GetObjectVolatile(JNIEnv *env, jobject unsafe, jobject obj, jlong offset))
a61af66fc99e Initial load
duke
parents:
diff changeset
305 UnsafeWrapper("Unsafe_GetObjectVolatile");
6224
56c4f88474b3 7087357: JSR 292: remove obsolete code after 7085860
twisti
parents: 4043
diff changeset
306 oop p = JNIHandles::resolve(obj);
56c4f88474b3 7087357: JSR 292: remove obsolete code after 7085860
twisti
parents: 4043
diff changeset
307 void* addr = index_oop_from_field_offset_long(p, offset);
56c4f88474b3 7087357: JSR 292: remove obsolete code after 7085860
twisti
parents: 4043
diff changeset
308 volatile oop v;
56c4f88474b3 7087357: JSR 292: remove obsolete code after 7085860
twisti
parents: 4043
diff changeset
309 if (UseCompressedOops) {
56c4f88474b3 7087357: JSR 292: remove obsolete code after 7085860
twisti
parents: 4043
diff changeset
310 volatile narrowOop n = *(volatile narrowOop*) addr;
12316
190899198332 7195622: CheckUnhandledOops has limited usefulness now
hseigel
parents: 10405
diff changeset
311 (void)const_cast<oop&>(v = oopDesc::decode_heap_oop(n));
6224
56c4f88474b3 7087357: JSR 292: remove obsolete code after 7085860
twisti
parents: 4043
diff changeset
312 } else {
12316
190899198332 7195622: CheckUnhandledOops has limited usefulness now
hseigel
parents: 10405
diff changeset
313 (void)const_cast<oop&>(v = *(volatile oop*) addr);
6224
56c4f88474b3 7087357: JSR 292: remove obsolete code after 7085860
twisti
parents: 4043
diff changeset
314 }
56c4f88474b3 7087357: JSR 292: remove obsolete code after 7085860
twisti
parents: 4043
diff changeset
315 OrderAccess::acquire();
0
a61af66fc99e Initial load
duke
parents:
diff changeset
316 return JNIHandles::make_local(env, v);
a61af66fc99e Initial load
duke
parents:
diff changeset
317 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
318
a61af66fc99e Initial load
duke
parents:
diff changeset
319 UNSAFE_ENTRY(void, Unsafe_SetObjectVolatile(JNIEnv *env, jobject unsafe, jobject obj, jlong offset, jobject x_h))
a61af66fc99e Initial load
duke
parents:
diff changeset
320 UnsafeWrapper("Unsafe_SetObjectVolatile");
a61af66fc99e Initial load
duke
parents:
diff changeset
321 oop x = JNIHandles::resolve(x_h);
a61af66fc99e Initial load
duke
parents:
diff changeset
322 oop p = JNIHandles::resolve(obj);
2114
4fc084dac61e 7009756: volatile variables could be broken throw reflection API
kvn
parents: 1972
diff changeset
323 void* addr = index_oop_from_field_offset_long(p, offset);
4fc084dac61e 7009756: volatile variables could be broken throw reflection API
kvn
parents: 1972
diff changeset
324 OrderAccess::release();
113
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
325 if (UseCompressedOops) {
2114
4fc084dac61e 7009756: volatile variables could be broken throw reflection API
kvn
parents: 1972
diff changeset
326 oop_store((narrowOop*)addr, x);
113
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
327 } else {
2114
4fc084dac61e 7009756: volatile variables could be broken throw reflection API
kvn
parents: 1972
diff changeset
328 oop_store((oop*)addr, x);
113
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
329 }
0
a61af66fc99e Initial load
duke
parents:
diff changeset
330 OrderAccess::fence();
a61af66fc99e Initial load
duke
parents:
diff changeset
331 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
332
10235
6b388e7d4905 8013633: Cleanup platform ifdefs in unsafe.cpp
bpittore
parents: 8866
diff changeset
333 #ifndef SUPPORTS_NATIVE_CX8
2114
4fc084dac61e 7009756: volatile variables could be broken throw reflection API
kvn
parents: 1972
diff changeset
334
22797
f46871c6c063 8035663: Suspicious failure of test java/util/concurrent/Phaser/FickleRegister.java
dholmes
parents: 20415
diff changeset
335 // VM_Version::supports_cx8() is a surrogate for 'supports atomic long memory ops'.
f46871c6c063 8035663: Suspicious failure of test java/util/concurrent/Phaser/FickleRegister.java
dholmes
parents: 20415
diff changeset
336 //
f46871c6c063 8035663: Suspicious failure of test java/util/concurrent/Phaser/FickleRegister.java
dholmes
parents: 20415
diff changeset
337 // On platforms which do not support atomic compare-and-swap of jlong (8 byte)
f46871c6c063 8035663: Suspicious failure of test java/util/concurrent/Phaser/FickleRegister.java
dholmes
parents: 20415
diff changeset
338 // values we have to use a lock-based scheme to enforce atomicity. This has to be
f46871c6c063 8035663: Suspicious failure of test java/util/concurrent/Phaser/FickleRegister.java
dholmes
parents: 20415
diff changeset
339 // applied to all Unsafe operations that set the value of a jlong field. Even so
f46871c6c063 8035663: Suspicious failure of test java/util/concurrent/Phaser/FickleRegister.java
dholmes
parents: 20415
diff changeset
340 // the compareAndSwapLong operation will not be atomic with respect to direct stores
f46871c6c063 8035663: Suspicious failure of test java/util/concurrent/Phaser/FickleRegister.java
dholmes
parents: 20415
diff changeset
341 // to the field from Java code. It is important therefore that any Java code that
f46871c6c063 8035663: Suspicious failure of test java/util/concurrent/Phaser/FickleRegister.java
dholmes
parents: 20415
diff changeset
342 // utilizes these Unsafe jlong operations does not perform direct stores. To permit
f46871c6c063 8035663: Suspicious failure of test java/util/concurrent/Phaser/FickleRegister.java
dholmes
parents: 20415
diff changeset
343 // direct loads of the field from Java code we must also use Atomic::store within the
f46871c6c063 8035663: Suspicious failure of test java/util/concurrent/Phaser/FickleRegister.java
dholmes
parents: 20415
diff changeset
344 // locked regions. And for good measure, in case there are direct stores, we also
f46871c6c063 8035663: Suspicious failure of test java/util/concurrent/Phaser/FickleRegister.java
dholmes
parents: 20415
diff changeset
345 // employ Atomic::load within those regions. Note that the field in question must be
f46871c6c063 8035663: Suspicious failure of test java/util/concurrent/Phaser/FickleRegister.java
dholmes
parents: 20415
diff changeset
346 // volatile and so must have atomic load/store accesses applied at the Java level.
f46871c6c063 8035663: Suspicious failure of test java/util/concurrent/Phaser/FickleRegister.java
dholmes
parents: 20415
diff changeset
347 //
f46871c6c063 8035663: Suspicious failure of test java/util/concurrent/Phaser/FickleRegister.java
dholmes
parents: 20415
diff changeset
348 // The locking scheme could utilize a range of strategies for controlling the locking
f46871c6c063 8035663: Suspicious failure of test java/util/concurrent/Phaser/FickleRegister.java
dholmes
parents: 20415
diff changeset
349 // granularity: from a lock per-field through to a single global lock. The latter is
f46871c6c063 8035663: Suspicious failure of test java/util/concurrent/Phaser/FickleRegister.java
dholmes
parents: 20415
diff changeset
350 // the simplest and is used for the current implementation. Note that the Java object
f46871c6c063 8035663: Suspicious failure of test java/util/concurrent/Phaser/FickleRegister.java
dholmes
parents: 20415
diff changeset
351 // that contains the field, can not, in general, be used for locking. To do so can lead
f46871c6c063 8035663: Suspicious failure of test java/util/concurrent/Phaser/FickleRegister.java
dholmes
parents: 20415
diff changeset
352 // to deadlocks as we may introduce locking into what appears to the Java code to be a
f46871c6c063 8035663: Suspicious failure of test java/util/concurrent/Phaser/FickleRegister.java
dholmes
parents: 20415
diff changeset
353 // lock-free path.
f46871c6c063 8035663: Suspicious failure of test java/util/concurrent/Phaser/FickleRegister.java
dholmes
parents: 20415
diff changeset
354 //
f46871c6c063 8035663: Suspicious failure of test java/util/concurrent/Phaser/FickleRegister.java
dholmes
parents: 20415
diff changeset
355 // As all the locked-regions are very short and themselves non-blocking we can treat
f46871c6c063 8035663: Suspicious failure of test java/util/concurrent/Phaser/FickleRegister.java
dholmes
parents: 20415
diff changeset
356 // them as leaf routines and elide safepoint checks (ie we don't perform any thread
f46871c6c063 8035663: Suspicious failure of test java/util/concurrent/Phaser/FickleRegister.java
dholmes
parents: 20415
diff changeset
357 // state transitions even when blocking for the lock). Note that if we do choose to
f46871c6c063 8035663: Suspicious failure of test java/util/concurrent/Phaser/FickleRegister.java
dholmes
parents: 20415
diff changeset
358 // add safepoint checks and thread state transitions, we must ensure that we calculate
f46871c6c063 8035663: Suspicious failure of test java/util/concurrent/Phaser/FickleRegister.java
dholmes
parents: 20415
diff changeset
359 // the address of the field _after_ we have acquired the lock, else the object may have
f46871c6c063 8035663: Suspicious failure of test java/util/concurrent/Phaser/FickleRegister.java
dholmes
parents: 20415
diff changeset
360 // been moved by the GC
0
a61af66fc99e Initial load
duke
parents:
diff changeset
361
a61af66fc99e Initial load
duke
parents:
diff changeset
362 UNSAFE_ENTRY(jlong, Unsafe_GetLongVolatile(JNIEnv *env, jobject unsafe, jobject obj, jlong offset))
a61af66fc99e Initial load
duke
parents:
diff changeset
363 UnsafeWrapper("Unsafe_GetLongVolatile");
a61af66fc99e Initial load
duke
parents:
diff changeset
364 {
a61af66fc99e Initial load
duke
parents:
diff changeset
365 if (VM_Version::supports_cx8()) {
a61af66fc99e Initial load
duke
parents:
diff changeset
366 GET_FIELD_VOLATILE(obj, offset, jlong, v);
a61af66fc99e Initial load
duke
parents:
diff changeset
367 return v;
a61af66fc99e Initial load
duke
parents:
diff changeset
368 }
a61af66fc99e Initial load
duke
parents:
diff changeset
369 else {
a61af66fc99e Initial load
duke
parents:
diff changeset
370 Handle p (THREAD, JNIHandles::resolve(obj));
a61af66fc99e Initial load
duke
parents:
diff changeset
371 jlong* addr = (jlong*)(index_oop_from_field_offset_long(p(), offset));
22797
f46871c6c063 8035663: Suspicious failure of test java/util/concurrent/Phaser/FickleRegister.java
dholmes
parents: 20415
diff changeset
372 MutexLockerEx mu(UnsafeJlong_lock, Mutex::_no_safepoint_check_flag);
f46871c6c063 8035663: Suspicious failure of test java/util/concurrent/Phaser/FickleRegister.java
dholmes
parents: 20415
diff changeset
373 jlong value = Atomic::load(addr);
0
a61af66fc99e Initial load
duke
parents:
diff changeset
374 return value;
a61af66fc99e Initial load
duke
parents:
diff changeset
375 }
a61af66fc99e Initial load
duke
parents:
diff changeset
376 }
a61af66fc99e Initial load
duke
parents:
diff changeset
377 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
378
a61af66fc99e Initial load
duke
parents:
diff changeset
379 UNSAFE_ENTRY(void, Unsafe_SetLongVolatile(JNIEnv *env, jobject unsafe, jobject obj, jlong offset, jlong x))
a61af66fc99e Initial load
duke
parents:
diff changeset
380 UnsafeWrapper("Unsafe_SetLongVolatile");
a61af66fc99e Initial load
duke
parents:
diff changeset
381 {
a61af66fc99e Initial load
duke
parents:
diff changeset
382 if (VM_Version::supports_cx8()) {
a61af66fc99e Initial load
duke
parents:
diff changeset
383 SET_FIELD_VOLATILE(obj, offset, jlong, x);
a61af66fc99e Initial load
duke
parents:
diff changeset
384 }
a61af66fc99e Initial load
duke
parents:
diff changeset
385 else {
a61af66fc99e Initial load
duke
parents:
diff changeset
386 Handle p (THREAD, JNIHandles::resolve(obj));
a61af66fc99e Initial load
duke
parents:
diff changeset
387 jlong* addr = (jlong*)(index_oop_from_field_offset_long(p(), offset));
22797
f46871c6c063 8035663: Suspicious failure of test java/util/concurrent/Phaser/FickleRegister.java
dholmes
parents: 20415
diff changeset
388 MutexLockerEx mu(UnsafeJlong_lock, Mutex::_no_safepoint_check_flag);
f46871c6c063 8035663: Suspicious failure of test java/util/concurrent/Phaser/FickleRegister.java
dholmes
parents: 20415
diff changeset
389 Atomic::store(x, addr);
0
a61af66fc99e Initial load
duke
parents:
diff changeset
390 }
a61af66fc99e Initial load
duke
parents:
diff changeset
391 }
a61af66fc99e Initial load
duke
parents:
diff changeset
392 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
393
10235
6b388e7d4905 8013633: Cleanup platform ifdefs in unsafe.cpp
bpittore
parents: 8866
diff changeset
394 #endif // not SUPPORTS_NATIVE_CX8
0
a61af66fc99e Initial load
duke
parents:
diff changeset
395
a61af66fc99e Initial load
duke
parents:
diff changeset
396 #define DEFINE_GETSETOOP(jboolean, Boolean) \
a61af66fc99e Initial load
duke
parents:
diff changeset
397 \
a61af66fc99e Initial load
duke
parents:
diff changeset
398 UNSAFE_ENTRY(jboolean, Unsafe_Get##Boolean##140(JNIEnv *env, jobject unsafe, jobject obj, jint offset)) \
a61af66fc99e Initial load
duke
parents:
diff changeset
399 UnsafeWrapper("Unsafe_Get"#Boolean); \
a61af66fc99e Initial load
duke
parents:
diff changeset
400 if (obj == NULL) THROW_0(vmSymbols::java_lang_NullPointerException()); \
a61af66fc99e Initial load
duke
parents:
diff changeset
401 GET_FIELD(obj, offset, jboolean, v); \
a61af66fc99e Initial load
duke
parents:
diff changeset
402 return v; \
a61af66fc99e Initial load
duke
parents:
diff changeset
403 UNSAFE_END \
a61af66fc99e Initial load
duke
parents:
diff changeset
404 \
a61af66fc99e Initial load
duke
parents:
diff changeset
405 UNSAFE_ENTRY(void, Unsafe_Set##Boolean##140(JNIEnv *env, jobject unsafe, jobject obj, jint offset, jboolean x)) \
a61af66fc99e Initial load
duke
parents:
diff changeset
406 UnsafeWrapper("Unsafe_Set"#Boolean); \
a61af66fc99e Initial load
duke
parents:
diff changeset
407 if (obj == NULL) THROW(vmSymbols::java_lang_NullPointerException()); \
a61af66fc99e Initial load
duke
parents:
diff changeset
408 SET_FIELD(obj, offset, jboolean, x); \
a61af66fc99e Initial load
duke
parents:
diff changeset
409 UNSAFE_END \
a61af66fc99e Initial load
duke
parents:
diff changeset
410 \
a61af66fc99e Initial load
duke
parents:
diff changeset
411 UNSAFE_ENTRY(jboolean, Unsafe_Get##Boolean(JNIEnv *env, jobject unsafe, jobject obj, jlong offset)) \
a61af66fc99e Initial load
duke
parents:
diff changeset
412 UnsafeWrapper("Unsafe_Get"#Boolean); \
a61af66fc99e Initial load
duke
parents:
diff changeset
413 GET_FIELD(obj, offset, jboolean, v); \
a61af66fc99e Initial load
duke
parents:
diff changeset
414 return v; \
a61af66fc99e Initial load
duke
parents:
diff changeset
415 UNSAFE_END \
a61af66fc99e Initial load
duke
parents:
diff changeset
416 \
a61af66fc99e Initial load
duke
parents:
diff changeset
417 UNSAFE_ENTRY(void, Unsafe_Set##Boolean(JNIEnv *env, jobject unsafe, jobject obj, jlong offset, jboolean x)) \
a61af66fc99e Initial load
duke
parents:
diff changeset
418 UnsafeWrapper("Unsafe_Set"#Boolean); \
a61af66fc99e Initial load
duke
parents:
diff changeset
419 SET_FIELD(obj, offset, jboolean, x); \
a61af66fc99e Initial load
duke
parents:
diff changeset
420 UNSAFE_END \
a61af66fc99e Initial load
duke
parents:
diff changeset
421 \
a61af66fc99e Initial load
duke
parents:
diff changeset
422 // END DEFINE_GETSETOOP.
a61af66fc99e Initial load
duke
parents:
diff changeset
423
2114
4fc084dac61e 7009756: volatile variables could be broken throw reflection API
kvn
parents: 1972
diff changeset
424 DEFINE_GETSETOOP(jboolean, Boolean)
4fc084dac61e 7009756: volatile variables could be broken throw reflection API
kvn
parents: 1972
diff changeset
425 DEFINE_GETSETOOP(jbyte, Byte)
4fc084dac61e 7009756: volatile variables could be broken throw reflection API
kvn
parents: 1972
diff changeset
426 DEFINE_GETSETOOP(jshort, Short);
4fc084dac61e 7009756: volatile variables could be broken throw reflection API
kvn
parents: 1972
diff changeset
427 DEFINE_GETSETOOP(jchar, Char);
4fc084dac61e 7009756: volatile variables could be broken throw reflection API
kvn
parents: 1972
diff changeset
428 DEFINE_GETSETOOP(jint, Int);
4fc084dac61e 7009756: volatile variables could be broken throw reflection API
kvn
parents: 1972
diff changeset
429 DEFINE_GETSETOOP(jlong, Long);
4fc084dac61e 7009756: volatile variables could be broken throw reflection API
kvn
parents: 1972
diff changeset
430 DEFINE_GETSETOOP(jfloat, Float);
4fc084dac61e 7009756: volatile variables could be broken throw reflection API
kvn
parents: 1972
diff changeset
431 DEFINE_GETSETOOP(jdouble, Double);
4fc084dac61e 7009756: volatile variables could be broken throw reflection API
kvn
parents: 1972
diff changeset
432
4fc084dac61e 7009756: volatile variables could be broken throw reflection API
kvn
parents: 1972
diff changeset
433 #undef DEFINE_GETSETOOP
0
a61af66fc99e Initial load
duke
parents:
diff changeset
434
a61af66fc99e Initial load
duke
parents:
diff changeset
435 #define DEFINE_GETSETOOP_VOLATILE(jboolean, Boolean) \
a61af66fc99e Initial load
duke
parents:
diff changeset
436 \
a61af66fc99e Initial load
duke
parents:
diff changeset
437 UNSAFE_ENTRY(jboolean, Unsafe_Get##Boolean##Volatile(JNIEnv *env, jobject unsafe, jobject obj, jlong offset)) \
a61af66fc99e Initial load
duke
parents:
diff changeset
438 UnsafeWrapper("Unsafe_Get"#Boolean); \
a61af66fc99e Initial load
duke
parents:
diff changeset
439 GET_FIELD_VOLATILE(obj, offset, jboolean, v); \
a61af66fc99e Initial load
duke
parents:
diff changeset
440 return v; \
a61af66fc99e Initial load
duke
parents:
diff changeset
441 UNSAFE_END \
a61af66fc99e Initial load
duke
parents:
diff changeset
442 \
a61af66fc99e Initial load
duke
parents:
diff changeset
443 UNSAFE_ENTRY(void, Unsafe_Set##Boolean##Volatile(JNIEnv *env, jobject unsafe, jobject obj, jlong offset, jboolean x)) \
a61af66fc99e Initial load
duke
parents:
diff changeset
444 UnsafeWrapper("Unsafe_Set"#Boolean); \
a61af66fc99e Initial load
duke
parents:
diff changeset
445 SET_FIELD_VOLATILE(obj, offset, jboolean, x); \
a61af66fc99e Initial load
duke
parents:
diff changeset
446 UNSAFE_END \
a61af66fc99e Initial load
duke
parents:
diff changeset
447 \
a61af66fc99e Initial load
duke
parents:
diff changeset
448 // END DEFINE_GETSETOOP_VOLATILE.
a61af66fc99e Initial load
duke
parents:
diff changeset
449
a61af66fc99e Initial load
duke
parents:
diff changeset
450 DEFINE_GETSETOOP_VOLATILE(jboolean, Boolean)
a61af66fc99e Initial load
duke
parents:
diff changeset
451 DEFINE_GETSETOOP_VOLATILE(jbyte, Byte)
a61af66fc99e Initial load
duke
parents:
diff changeset
452 DEFINE_GETSETOOP_VOLATILE(jshort, Short);
a61af66fc99e Initial load
duke
parents:
diff changeset
453 DEFINE_GETSETOOP_VOLATILE(jchar, Char);
a61af66fc99e Initial load
duke
parents:
diff changeset
454 DEFINE_GETSETOOP_VOLATILE(jint, Int);
a61af66fc99e Initial load
duke
parents:
diff changeset
455 DEFINE_GETSETOOP_VOLATILE(jfloat, Float);
a61af66fc99e Initial load
duke
parents:
diff changeset
456 DEFINE_GETSETOOP_VOLATILE(jdouble, Double);
a61af66fc99e Initial load
duke
parents:
diff changeset
457
10235
6b388e7d4905 8013633: Cleanup platform ifdefs in unsafe.cpp
bpittore
parents: 8866
diff changeset
458 #ifdef SUPPORTS_NATIVE_CX8
2114
4fc084dac61e 7009756: volatile variables could be broken throw reflection API
kvn
parents: 1972
diff changeset
459 DEFINE_GETSETOOP_VOLATILE(jlong, Long);
4fc084dac61e 7009756: volatile variables could be broken throw reflection API
kvn
parents: 1972
diff changeset
460 #endif
4fc084dac61e 7009756: volatile variables could be broken throw reflection API
kvn
parents: 1972
diff changeset
461
4fc084dac61e 7009756: volatile variables could be broken throw reflection API
kvn
parents: 1972
diff changeset
462 #undef DEFINE_GETSETOOP_VOLATILE
0
a61af66fc99e Initial load
duke
parents:
diff changeset
463
a61af66fc99e Initial load
duke
parents:
diff changeset
464 // The non-intrinsified versions of setOrdered just use setVolatile
a61af66fc99e Initial load
duke
parents:
diff changeset
465
2114
4fc084dac61e 7009756: volatile variables could be broken throw reflection API
kvn
parents: 1972
diff changeset
466 UNSAFE_ENTRY(void, Unsafe_SetOrderedInt(JNIEnv *env, jobject unsafe, jobject obj, jlong offset, jint x))
4fc084dac61e 7009756: volatile variables could be broken throw reflection API
kvn
parents: 1972
diff changeset
467 UnsafeWrapper("Unsafe_SetOrderedInt");
4fc084dac61e 7009756: volatile variables could be broken throw reflection API
kvn
parents: 1972
diff changeset
468 SET_FIELD_VOLATILE(obj, offset, jint, x);
0
a61af66fc99e Initial load
duke
parents:
diff changeset
469 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
470
a61af66fc99e Initial load
duke
parents:
diff changeset
471 UNSAFE_ENTRY(void, Unsafe_SetOrderedObject(JNIEnv *env, jobject unsafe, jobject obj, jlong offset, jobject x_h))
a61af66fc99e Initial load
duke
parents:
diff changeset
472 UnsafeWrapper("Unsafe_SetOrderedObject");
a61af66fc99e Initial load
duke
parents:
diff changeset
473 oop x = JNIHandles::resolve(x_h);
a61af66fc99e Initial load
duke
parents:
diff changeset
474 oop p = JNIHandles::resolve(obj);
2114
4fc084dac61e 7009756: volatile variables could be broken throw reflection API
kvn
parents: 1972
diff changeset
475 void* addr = index_oop_from_field_offset_long(p, offset);
4fc084dac61e 7009756: volatile variables could be broken throw reflection API
kvn
parents: 1972
diff changeset
476 OrderAccess::release();
113
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
477 if (UseCompressedOops) {
2114
4fc084dac61e 7009756: volatile variables could be broken throw reflection API
kvn
parents: 1972
diff changeset
478 oop_store((narrowOop*)addr, x);
113
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
479 } else {
2114
4fc084dac61e 7009756: volatile variables could be broken throw reflection API
kvn
parents: 1972
diff changeset
480 oop_store((oop*)addr, x);
113
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
481 }
0
a61af66fc99e Initial load
duke
parents:
diff changeset
482 OrderAccess::fence();
a61af66fc99e Initial load
duke
parents:
diff changeset
483 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
484
a61af66fc99e Initial load
duke
parents:
diff changeset
485 UNSAFE_ENTRY(void, Unsafe_SetOrderedLong(JNIEnv *env, jobject unsafe, jobject obj, jlong offset, jlong x))
a61af66fc99e Initial load
duke
parents:
diff changeset
486 UnsafeWrapper("Unsafe_SetOrderedLong");
10235
6b388e7d4905 8013633: Cleanup platform ifdefs in unsafe.cpp
bpittore
parents: 8866
diff changeset
487 #ifdef SUPPORTS_NATIVE_CX8
2114
4fc084dac61e 7009756: volatile variables could be broken throw reflection API
kvn
parents: 1972
diff changeset
488 SET_FIELD_VOLATILE(obj, offset, jlong, x);
4fc084dac61e 7009756: volatile variables could be broken throw reflection API
kvn
parents: 1972
diff changeset
489 #else
4fc084dac61e 7009756: volatile variables could be broken throw reflection API
kvn
parents: 1972
diff changeset
490 // Keep old code for platforms which may not have atomic long (8 bytes) instructions
0
a61af66fc99e Initial load
duke
parents:
diff changeset
491 {
a61af66fc99e Initial load
duke
parents:
diff changeset
492 if (VM_Version::supports_cx8()) {
a61af66fc99e Initial load
duke
parents:
diff changeset
493 SET_FIELD_VOLATILE(obj, offset, jlong, x);
a61af66fc99e Initial load
duke
parents:
diff changeset
494 }
a61af66fc99e Initial load
duke
parents:
diff changeset
495 else {
a61af66fc99e Initial load
duke
parents:
diff changeset
496 Handle p (THREAD, JNIHandles::resolve(obj));
a61af66fc99e Initial load
duke
parents:
diff changeset
497 jlong* addr = (jlong*)(index_oop_from_field_offset_long(p(), offset));
22797
f46871c6c063 8035663: Suspicious failure of test java/util/concurrent/Phaser/FickleRegister.java
dholmes
parents: 20415
diff changeset
498 MutexLockerEx mu(UnsafeJlong_lock, Mutex::_no_safepoint_check_flag);
f46871c6c063 8035663: Suspicious failure of test java/util/concurrent/Phaser/FickleRegister.java
dholmes
parents: 20415
diff changeset
499 Atomic::store(x, addr);
0
a61af66fc99e Initial load
duke
parents:
diff changeset
500 }
a61af66fc99e Initial load
duke
parents:
diff changeset
501 }
2114
4fc084dac61e 7009756: volatile variables could be broken throw reflection API
kvn
parents: 1972
diff changeset
502 #endif
0
a61af66fc99e Initial load
duke
parents:
diff changeset
503 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
504
7425
1e41b0bc58a0 8004318: JEP-171: Support Unsafe fences intrinsics
kvn
parents: 7185
diff changeset
505 UNSAFE_ENTRY(void, Unsafe_LoadFence(JNIEnv *env, jobject unsafe))
1e41b0bc58a0 8004318: JEP-171: Support Unsafe fences intrinsics
kvn
parents: 7185
diff changeset
506 UnsafeWrapper("Unsafe_LoadFence");
1e41b0bc58a0 8004318: JEP-171: Support Unsafe fences intrinsics
kvn
parents: 7185
diff changeset
507 OrderAccess::acquire();
1e41b0bc58a0 8004318: JEP-171: Support Unsafe fences intrinsics
kvn
parents: 7185
diff changeset
508 UNSAFE_END
1e41b0bc58a0 8004318: JEP-171: Support Unsafe fences intrinsics
kvn
parents: 7185
diff changeset
509
1e41b0bc58a0 8004318: JEP-171: Support Unsafe fences intrinsics
kvn
parents: 7185
diff changeset
510 UNSAFE_ENTRY(void, Unsafe_StoreFence(JNIEnv *env, jobject unsafe))
1e41b0bc58a0 8004318: JEP-171: Support Unsafe fences intrinsics
kvn
parents: 7185
diff changeset
511 UnsafeWrapper("Unsafe_StoreFence");
1e41b0bc58a0 8004318: JEP-171: Support Unsafe fences intrinsics
kvn
parents: 7185
diff changeset
512 OrderAccess::release();
1e41b0bc58a0 8004318: JEP-171: Support Unsafe fences intrinsics
kvn
parents: 7185
diff changeset
513 UNSAFE_END
1e41b0bc58a0 8004318: JEP-171: Support Unsafe fences intrinsics
kvn
parents: 7185
diff changeset
514
1e41b0bc58a0 8004318: JEP-171: Support Unsafe fences intrinsics
kvn
parents: 7185
diff changeset
515 UNSAFE_ENTRY(void, Unsafe_FullFence(JNIEnv *env, jobject unsafe))
1e41b0bc58a0 8004318: JEP-171: Support Unsafe fences intrinsics
kvn
parents: 7185
diff changeset
516 UnsafeWrapper("Unsafe_FullFence");
1e41b0bc58a0 8004318: JEP-171: Support Unsafe fences intrinsics
kvn
parents: 7185
diff changeset
517 OrderAccess::fence();
1e41b0bc58a0 8004318: JEP-171: Support Unsafe fences intrinsics
kvn
parents: 7185
diff changeset
518 UNSAFE_END
1e41b0bc58a0 8004318: JEP-171: Support Unsafe fences intrinsics
kvn
parents: 7185
diff changeset
519
0
a61af66fc99e Initial load
duke
parents:
diff changeset
520 ////// Data in the C heap.
a61af66fc99e Initial load
duke
parents:
diff changeset
521
a61af66fc99e Initial load
duke
parents:
diff changeset
522 // Note: These do not throw NullPointerException for bad pointers.
a61af66fc99e Initial load
duke
parents:
diff changeset
523 // They just crash. Only a oop base pointer can generate a NullPointerException.
a61af66fc99e Initial load
duke
parents:
diff changeset
524 //
a61af66fc99e Initial load
duke
parents:
diff changeset
525 #define DEFINE_GETSETNATIVE(java_type, Type, native_type) \
a61af66fc99e Initial load
duke
parents:
diff changeset
526 \
a61af66fc99e Initial load
duke
parents:
diff changeset
527 UNSAFE_ENTRY(java_type, Unsafe_GetNative##Type(JNIEnv *env, jobject unsafe, jlong addr)) \
a61af66fc99e Initial load
duke
parents:
diff changeset
528 UnsafeWrapper("Unsafe_GetNative"#Type); \
a61af66fc99e Initial load
duke
parents:
diff changeset
529 void* p = addr_from_java(addr); \
a61af66fc99e Initial load
duke
parents:
diff changeset
530 JavaThread* t = JavaThread::current(); \
a61af66fc99e Initial load
duke
parents:
diff changeset
531 t->set_doing_unsafe_access(true); \
a61af66fc99e Initial load
duke
parents:
diff changeset
532 java_type x = *(volatile native_type*)p; \
a61af66fc99e Initial load
duke
parents:
diff changeset
533 t->set_doing_unsafe_access(false); \
a61af66fc99e Initial load
duke
parents:
diff changeset
534 return x; \
a61af66fc99e Initial load
duke
parents:
diff changeset
535 UNSAFE_END \
a61af66fc99e Initial load
duke
parents:
diff changeset
536 \
a61af66fc99e Initial load
duke
parents:
diff changeset
537 UNSAFE_ENTRY(void, Unsafe_SetNative##Type(JNIEnv *env, jobject unsafe, jlong addr, java_type x)) \
a61af66fc99e Initial load
duke
parents:
diff changeset
538 UnsafeWrapper("Unsafe_SetNative"#Type); \
a61af66fc99e Initial load
duke
parents:
diff changeset
539 JavaThread* t = JavaThread::current(); \
a61af66fc99e Initial load
duke
parents:
diff changeset
540 t->set_doing_unsafe_access(true); \
a61af66fc99e Initial load
duke
parents:
diff changeset
541 void* p = addr_from_java(addr); \
a61af66fc99e Initial load
duke
parents:
diff changeset
542 *(volatile native_type*)p = x; \
a61af66fc99e Initial load
duke
parents:
diff changeset
543 t->set_doing_unsafe_access(false); \
a61af66fc99e Initial load
duke
parents:
diff changeset
544 UNSAFE_END \
a61af66fc99e Initial load
duke
parents:
diff changeset
545 \
a61af66fc99e Initial load
duke
parents:
diff changeset
546 // END DEFINE_GETSETNATIVE.
a61af66fc99e Initial load
duke
parents:
diff changeset
547
a61af66fc99e Initial load
duke
parents:
diff changeset
548 DEFINE_GETSETNATIVE(jbyte, Byte, signed char)
a61af66fc99e Initial load
duke
parents:
diff changeset
549 DEFINE_GETSETNATIVE(jshort, Short, signed short);
a61af66fc99e Initial load
duke
parents:
diff changeset
550 DEFINE_GETSETNATIVE(jchar, Char, unsigned short);
a61af66fc99e Initial load
duke
parents:
diff changeset
551 DEFINE_GETSETNATIVE(jint, Int, jint);
a61af66fc99e Initial load
duke
parents:
diff changeset
552 // no long -- handled specially
a61af66fc99e Initial load
duke
parents:
diff changeset
553 DEFINE_GETSETNATIVE(jfloat, Float, float);
a61af66fc99e Initial load
duke
parents:
diff changeset
554 DEFINE_GETSETNATIVE(jdouble, Double, double);
a61af66fc99e Initial load
duke
parents:
diff changeset
555
a61af66fc99e Initial load
duke
parents:
diff changeset
556 #undef DEFINE_GETSETNATIVE
a61af66fc99e Initial load
duke
parents:
diff changeset
557
a61af66fc99e Initial load
duke
parents:
diff changeset
558 UNSAFE_ENTRY(jlong, Unsafe_GetNativeLong(JNIEnv *env, jobject unsafe, jlong addr))
a61af66fc99e Initial load
duke
parents:
diff changeset
559 UnsafeWrapper("Unsafe_GetNativeLong");
a61af66fc99e Initial load
duke
parents:
diff changeset
560 JavaThread* t = JavaThread::current();
a61af66fc99e Initial load
duke
parents:
diff changeset
561 // We do it this way to avoid problems with access to heap using 64
a61af66fc99e Initial load
duke
parents:
diff changeset
562 // bit loads, as jlong in heap could be not 64-bit aligned, and on
a61af66fc99e Initial load
duke
parents:
diff changeset
563 // some CPUs (SPARC) it leads to SIGBUS.
a61af66fc99e Initial load
duke
parents:
diff changeset
564 t->set_doing_unsafe_access(true);
a61af66fc99e Initial load
duke
parents:
diff changeset
565 void* p = addr_from_java(addr);
a61af66fc99e Initial load
duke
parents:
diff changeset
566 jlong x;
a61af66fc99e Initial load
duke
parents:
diff changeset
567 if (((intptr_t)p & 7) == 0) {
a61af66fc99e Initial load
duke
parents:
diff changeset
568 // jlong is aligned, do a volatile access
a61af66fc99e Initial load
duke
parents:
diff changeset
569 x = *(volatile jlong*)p;
a61af66fc99e Initial load
duke
parents:
diff changeset
570 } else {
a61af66fc99e Initial load
duke
parents:
diff changeset
571 jlong_accessor acc;
a61af66fc99e Initial load
duke
parents:
diff changeset
572 acc.words[0] = ((volatile jint*)p)[0];
a61af66fc99e Initial load
duke
parents:
diff changeset
573 acc.words[1] = ((volatile jint*)p)[1];
a61af66fc99e Initial load
duke
parents:
diff changeset
574 x = acc.long_value;
a61af66fc99e Initial load
duke
parents:
diff changeset
575 }
a61af66fc99e Initial load
duke
parents:
diff changeset
576 t->set_doing_unsafe_access(false);
a61af66fc99e Initial load
duke
parents:
diff changeset
577 return x;
a61af66fc99e Initial load
duke
parents:
diff changeset
578 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
579
a61af66fc99e Initial load
duke
parents:
diff changeset
580 UNSAFE_ENTRY(void, Unsafe_SetNativeLong(JNIEnv *env, jobject unsafe, jlong addr, jlong x))
a61af66fc99e Initial load
duke
parents:
diff changeset
581 UnsafeWrapper("Unsafe_SetNativeLong");
a61af66fc99e Initial load
duke
parents:
diff changeset
582 JavaThread* t = JavaThread::current();
a61af66fc99e Initial load
duke
parents:
diff changeset
583 // see comment for Unsafe_GetNativeLong
a61af66fc99e Initial load
duke
parents:
diff changeset
584 t->set_doing_unsafe_access(true);
a61af66fc99e Initial load
duke
parents:
diff changeset
585 void* p = addr_from_java(addr);
a61af66fc99e Initial load
duke
parents:
diff changeset
586 if (((intptr_t)p & 7) == 0) {
a61af66fc99e Initial load
duke
parents:
diff changeset
587 // jlong is aligned, do a volatile access
a61af66fc99e Initial load
duke
parents:
diff changeset
588 *(volatile jlong*)p = x;
a61af66fc99e Initial load
duke
parents:
diff changeset
589 } else {
a61af66fc99e Initial load
duke
parents:
diff changeset
590 jlong_accessor acc;
a61af66fc99e Initial load
duke
parents:
diff changeset
591 acc.long_value = x;
a61af66fc99e Initial load
duke
parents:
diff changeset
592 ((volatile jint*)p)[0] = acc.words[0];
a61af66fc99e Initial load
duke
parents:
diff changeset
593 ((volatile jint*)p)[1] = acc.words[1];
a61af66fc99e Initial load
duke
parents:
diff changeset
594 }
a61af66fc99e Initial load
duke
parents:
diff changeset
595 t->set_doing_unsafe_access(false);
a61af66fc99e Initial load
duke
parents:
diff changeset
596 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
597
a61af66fc99e Initial load
duke
parents:
diff changeset
598
a61af66fc99e Initial load
duke
parents:
diff changeset
599 UNSAFE_ENTRY(jlong, Unsafe_GetNativeAddress(JNIEnv *env, jobject unsafe, jlong addr))
a61af66fc99e Initial load
duke
parents:
diff changeset
600 UnsafeWrapper("Unsafe_GetNativeAddress");
a61af66fc99e Initial load
duke
parents:
diff changeset
601 void* p = addr_from_java(addr);
a61af66fc99e Initial load
duke
parents:
diff changeset
602 return addr_to_java(*(void**)p);
a61af66fc99e Initial load
duke
parents:
diff changeset
603 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
604
a61af66fc99e Initial load
duke
parents:
diff changeset
605 UNSAFE_ENTRY(void, Unsafe_SetNativeAddress(JNIEnv *env, jobject unsafe, jlong addr, jlong x))
a61af66fc99e Initial load
duke
parents:
diff changeset
606 UnsafeWrapper("Unsafe_SetNativeAddress");
a61af66fc99e Initial load
duke
parents:
diff changeset
607 void* p = addr_from_java(addr);
a61af66fc99e Initial load
duke
parents:
diff changeset
608 *(void**)p = addr_from_java(x);
a61af66fc99e Initial load
duke
parents:
diff changeset
609 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
610
a61af66fc99e Initial load
duke
parents:
diff changeset
611
a61af66fc99e Initial load
duke
parents:
diff changeset
612 ////// Allocation requests
a61af66fc99e Initial load
duke
parents:
diff changeset
613
a61af66fc99e Initial load
duke
parents:
diff changeset
614 UNSAFE_ENTRY(jobject, Unsafe_AllocateInstance(JNIEnv *env, jobject unsafe, jclass cls))
a61af66fc99e Initial load
duke
parents:
diff changeset
615 UnsafeWrapper("Unsafe_AllocateInstance");
a61af66fc99e Initial load
duke
parents:
diff changeset
616 {
a61af66fc99e Initial load
duke
parents:
diff changeset
617 ThreadToNativeFromVM ttnfv(thread);
a61af66fc99e Initial load
duke
parents:
diff changeset
618 return env->AllocObject(cls);
a61af66fc99e Initial load
duke
parents:
diff changeset
619 }
a61af66fc99e Initial load
duke
parents:
diff changeset
620 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
621
a61af66fc99e Initial load
duke
parents:
diff changeset
622 UNSAFE_ENTRY(jlong, Unsafe_AllocateMemory(JNIEnv *env, jobject unsafe, jlong size))
a61af66fc99e Initial load
duke
parents:
diff changeset
623 UnsafeWrapper("Unsafe_AllocateMemory");
a61af66fc99e Initial load
duke
parents:
diff changeset
624 size_t sz = (size_t)size;
a61af66fc99e Initial load
duke
parents:
diff changeset
625 if (sz != (julong)size || size < 0) {
a61af66fc99e Initial load
duke
parents:
diff changeset
626 THROW_0(vmSymbols::java_lang_IllegalArgumentException());
a61af66fc99e Initial load
duke
parents:
diff changeset
627 }
a61af66fc99e Initial load
duke
parents:
diff changeset
628 if (sz == 0) {
a61af66fc99e Initial load
duke
parents:
diff changeset
629 return 0;
a61af66fc99e Initial load
duke
parents:
diff changeset
630 }
a61af66fc99e Initial load
duke
parents:
diff changeset
631 sz = round_to(sz, HeapWordSize);
6197
d2a62e0f25eb 6995781: Native Memory Tracking (Phase 1)
zgu
parents: 4043
diff changeset
632 void* x = os::malloc(sz, mtInternal);
0
a61af66fc99e Initial load
duke
parents:
diff changeset
633 if (x == NULL) {
a61af66fc99e Initial load
duke
parents:
diff changeset
634 THROW_0(vmSymbols::java_lang_OutOfMemoryError());
a61af66fc99e Initial load
duke
parents:
diff changeset
635 }
a61af66fc99e Initial load
duke
parents:
diff changeset
636 //Copy::fill_to_words((HeapWord*)x, sz / HeapWordSize);
a61af66fc99e Initial load
duke
parents:
diff changeset
637 return addr_to_java(x);
a61af66fc99e Initial load
duke
parents:
diff changeset
638 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
639
a61af66fc99e Initial load
duke
parents:
diff changeset
640 UNSAFE_ENTRY(jlong, Unsafe_ReallocateMemory(JNIEnv *env, jobject unsafe, jlong addr, jlong size))
a61af66fc99e Initial load
duke
parents:
diff changeset
641 UnsafeWrapper("Unsafe_ReallocateMemory");
a61af66fc99e Initial load
duke
parents:
diff changeset
642 void* p = addr_from_java(addr);
a61af66fc99e Initial load
duke
parents:
diff changeset
643 size_t sz = (size_t)size;
a61af66fc99e Initial load
duke
parents:
diff changeset
644 if (sz != (julong)size || size < 0) {
a61af66fc99e Initial load
duke
parents:
diff changeset
645 THROW_0(vmSymbols::java_lang_IllegalArgumentException());
a61af66fc99e Initial load
duke
parents:
diff changeset
646 }
a61af66fc99e Initial load
duke
parents:
diff changeset
647 if (sz == 0) {
a61af66fc99e Initial load
duke
parents:
diff changeset
648 os::free(p);
a61af66fc99e Initial load
duke
parents:
diff changeset
649 return 0;
a61af66fc99e Initial load
duke
parents:
diff changeset
650 }
a61af66fc99e Initial load
duke
parents:
diff changeset
651 sz = round_to(sz, HeapWordSize);
6197
d2a62e0f25eb 6995781: Native Memory Tracking (Phase 1)
zgu
parents: 4043
diff changeset
652 void* x = (p == NULL) ? os::malloc(sz, mtInternal) : os::realloc(p, sz, mtInternal);
0
a61af66fc99e Initial load
duke
parents:
diff changeset
653 if (x == NULL) {
a61af66fc99e Initial load
duke
parents:
diff changeset
654 THROW_0(vmSymbols::java_lang_OutOfMemoryError());
a61af66fc99e Initial load
duke
parents:
diff changeset
655 }
a61af66fc99e Initial load
duke
parents:
diff changeset
656 return addr_to_java(x);
a61af66fc99e Initial load
duke
parents:
diff changeset
657 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
658
a61af66fc99e Initial load
duke
parents:
diff changeset
659 UNSAFE_ENTRY(void, Unsafe_FreeMemory(JNIEnv *env, jobject unsafe, jlong addr))
a61af66fc99e Initial load
duke
parents:
diff changeset
660 UnsafeWrapper("Unsafe_FreeMemory");
a61af66fc99e Initial load
duke
parents:
diff changeset
661 void* p = addr_from_java(addr);
a61af66fc99e Initial load
duke
parents:
diff changeset
662 if (p == NULL) {
a61af66fc99e Initial load
duke
parents:
diff changeset
663 return;
a61af66fc99e Initial load
duke
parents:
diff changeset
664 }
a61af66fc99e Initial load
duke
parents:
diff changeset
665 os::free(p);
a61af66fc99e Initial load
duke
parents:
diff changeset
666 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
667
a61af66fc99e Initial load
duke
parents:
diff changeset
668 UNSAFE_ENTRY(void, Unsafe_SetMemory(JNIEnv *env, jobject unsafe, jlong addr, jlong size, jbyte value))
a61af66fc99e Initial load
duke
parents:
diff changeset
669 UnsafeWrapper("Unsafe_SetMemory");
a61af66fc99e Initial load
duke
parents:
diff changeset
670 size_t sz = (size_t)size;
a61af66fc99e Initial load
duke
parents:
diff changeset
671 if (sz != (julong)size || size < 0) {
a61af66fc99e Initial load
duke
parents:
diff changeset
672 THROW(vmSymbols::java_lang_IllegalArgumentException());
a61af66fc99e Initial load
duke
parents:
diff changeset
673 }
a61af66fc99e Initial load
duke
parents:
diff changeset
674 char* p = (char*) addr_from_java(addr);
a61af66fc99e Initial load
duke
parents:
diff changeset
675 Copy::fill_to_memory_atomic(p, sz, value);
a61af66fc99e Initial load
duke
parents:
diff changeset
676 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
677
a61af66fc99e Initial load
duke
parents:
diff changeset
678 UNSAFE_ENTRY(void, Unsafe_SetMemory2(JNIEnv *env, jobject unsafe, jobject obj, jlong offset, jlong size, jbyte value))
a61af66fc99e Initial load
duke
parents:
diff changeset
679 UnsafeWrapper("Unsafe_SetMemory");
a61af66fc99e Initial load
duke
parents:
diff changeset
680 size_t sz = (size_t)size;
a61af66fc99e Initial load
duke
parents:
diff changeset
681 if (sz != (julong)size || size < 0) {
a61af66fc99e Initial load
duke
parents:
diff changeset
682 THROW(vmSymbols::java_lang_IllegalArgumentException());
a61af66fc99e Initial load
duke
parents:
diff changeset
683 }
a61af66fc99e Initial load
duke
parents:
diff changeset
684 oop base = JNIHandles::resolve(obj);
a61af66fc99e Initial load
duke
parents:
diff changeset
685 void* p = index_oop_from_field_offset_long(base, offset);
a61af66fc99e Initial load
duke
parents:
diff changeset
686 Copy::fill_to_memory_atomic(p, sz, value);
a61af66fc99e Initial load
duke
parents:
diff changeset
687 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
688
a61af66fc99e Initial load
duke
parents:
diff changeset
689 UNSAFE_ENTRY(void, Unsafe_CopyMemory(JNIEnv *env, jobject unsafe, jlong srcAddr, jlong dstAddr, jlong size))
a61af66fc99e Initial load
duke
parents:
diff changeset
690 UnsafeWrapper("Unsafe_CopyMemory");
a61af66fc99e Initial load
duke
parents:
diff changeset
691 if (size == 0) {
a61af66fc99e Initial load
duke
parents:
diff changeset
692 return;
a61af66fc99e Initial load
duke
parents:
diff changeset
693 }
a61af66fc99e Initial load
duke
parents:
diff changeset
694 size_t sz = (size_t)size;
a61af66fc99e Initial load
duke
parents:
diff changeset
695 if (sz != (julong)size || size < 0) {
a61af66fc99e Initial load
duke
parents:
diff changeset
696 THROW(vmSymbols::java_lang_IllegalArgumentException());
a61af66fc99e Initial load
duke
parents:
diff changeset
697 }
a61af66fc99e Initial load
duke
parents:
diff changeset
698 void* src = addr_from_java(srcAddr);
a61af66fc99e Initial load
duke
parents:
diff changeset
699 void* dst = addr_from_java(dstAddr);
a61af66fc99e Initial load
duke
parents:
diff changeset
700 Copy::conjoint_memory_atomic(src, dst, sz);
a61af66fc99e Initial load
duke
parents:
diff changeset
701 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
702
a61af66fc99e Initial load
duke
parents:
diff changeset
703 UNSAFE_ENTRY(void, Unsafe_CopyMemory2(JNIEnv *env, jobject unsafe, jobject srcObj, jlong srcOffset, jobject dstObj, jlong dstOffset, jlong size))
a61af66fc99e Initial load
duke
parents:
diff changeset
704 UnsafeWrapper("Unsafe_CopyMemory");
a61af66fc99e Initial load
duke
parents:
diff changeset
705 if (size == 0) {
a61af66fc99e Initial load
duke
parents:
diff changeset
706 return;
a61af66fc99e Initial load
duke
parents:
diff changeset
707 }
a61af66fc99e Initial load
duke
parents:
diff changeset
708 size_t sz = (size_t)size;
a61af66fc99e Initial load
duke
parents:
diff changeset
709 if (sz != (julong)size || size < 0) {
a61af66fc99e Initial load
duke
parents:
diff changeset
710 THROW(vmSymbols::java_lang_IllegalArgumentException());
a61af66fc99e Initial load
duke
parents:
diff changeset
711 }
a61af66fc99e Initial load
duke
parents:
diff changeset
712 oop srcp = JNIHandles::resolve(srcObj);
a61af66fc99e Initial load
duke
parents:
diff changeset
713 oop dstp = JNIHandles::resolve(dstObj);
a61af66fc99e Initial load
duke
parents:
diff changeset
714 if (dstp != NULL && !dstp->is_typeArray()) {
a61af66fc99e Initial load
duke
parents:
diff changeset
715 // NYI: This works only for non-oop arrays at present.
a61af66fc99e Initial load
duke
parents:
diff changeset
716 // Generalizing it would be reasonable, but requires card marking.
a61af66fc99e Initial load
duke
parents:
diff changeset
717 // Also, autoboxing a Long from 0L in copyMemory(x,y, 0L,z, n) would be bad.
a61af66fc99e Initial load
duke
parents:
diff changeset
718 THROW(vmSymbols::java_lang_IllegalArgumentException());
a61af66fc99e Initial load
duke
parents:
diff changeset
719 }
a61af66fc99e Initial load
duke
parents:
diff changeset
720 void* src = index_oop_from_field_offset_long(srcp, srcOffset);
a61af66fc99e Initial load
duke
parents:
diff changeset
721 void* dst = index_oop_from_field_offset_long(dstp, dstOffset);
a61af66fc99e Initial load
duke
parents:
diff changeset
722 Copy::conjoint_memory_atomic(src, dst, sz);
a61af66fc99e Initial load
duke
parents:
diff changeset
723 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
724
a61af66fc99e Initial load
duke
parents:
diff changeset
725
a61af66fc99e Initial load
duke
parents:
diff changeset
726 ////// Random queries
a61af66fc99e Initial load
duke
parents:
diff changeset
727
a61af66fc99e Initial load
duke
parents:
diff changeset
728 // See comment at file start about UNSAFE_LEAF
a61af66fc99e Initial load
duke
parents:
diff changeset
729 //UNSAFE_LEAF(jint, Unsafe_AddressSize())
a61af66fc99e Initial load
duke
parents:
diff changeset
730 UNSAFE_ENTRY(jint, Unsafe_AddressSize(JNIEnv *env, jobject unsafe))
a61af66fc99e Initial load
duke
parents:
diff changeset
731 UnsafeWrapper("Unsafe_AddressSize");
a61af66fc99e Initial load
duke
parents:
diff changeset
732 return sizeof(void*);
a61af66fc99e Initial load
duke
parents:
diff changeset
733 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
734
a61af66fc99e Initial load
duke
parents:
diff changeset
735 // See comment at file start about UNSAFE_LEAF
a61af66fc99e Initial load
duke
parents:
diff changeset
736 //UNSAFE_LEAF(jint, Unsafe_PageSize())
a61af66fc99e Initial load
duke
parents:
diff changeset
737 UNSAFE_ENTRY(jint, Unsafe_PageSize(JNIEnv *env, jobject unsafe))
a61af66fc99e Initial load
duke
parents:
diff changeset
738 UnsafeWrapper("Unsafe_PageSize");
a61af66fc99e Initial load
duke
parents:
diff changeset
739 return os::vm_page_size();
a61af66fc99e Initial load
duke
parents:
diff changeset
740 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
741
a61af66fc99e Initial load
duke
parents:
diff changeset
742 jint find_field_offset(jobject field, int must_be_static, TRAPS) {
a61af66fc99e Initial load
duke
parents:
diff changeset
743 if (field == NULL) {
a61af66fc99e Initial load
duke
parents:
diff changeset
744 THROW_0(vmSymbols::java_lang_NullPointerException());
a61af66fc99e Initial load
duke
parents:
diff changeset
745 }
a61af66fc99e Initial load
duke
parents:
diff changeset
746
a61af66fc99e Initial load
duke
parents:
diff changeset
747 oop reflected = JNIHandles::resolve_non_null(field);
a61af66fc99e Initial load
duke
parents:
diff changeset
748 oop mirror = java_lang_reflect_Field::clazz(reflected);
6725
da91efe96a93 6964458: Reimplement class meta-data storage to use native memory
coleenp
parents: 6266
diff changeset
749 Klass* k = java_lang_Class::as_Klass(mirror);
0
a61af66fc99e Initial load
duke
parents:
diff changeset
750 int slot = java_lang_reflect_Field::slot(reflected);
a61af66fc99e Initial load
duke
parents:
diff changeset
751 int modifiers = java_lang_reflect_Field::modifiers(reflected);
a61af66fc99e Initial load
duke
parents:
diff changeset
752
a61af66fc99e Initial load
duke
parents:
diff changeset
753 if (must_be_static >= 0) {
a61af66fc99e Initial load
duke
parents:
diff changeset
754 int really_is_static = ((modifiers & JVM_ACC_STATIC) != 0);
a61af66fc99e Initial load
duke
parents:
diff changeset
755 if (must_be_static != really_is_static) {
a61af66fc99e Initial load
duke
parents:
diff changeset
756 THROW_0(vmSymbols::java_lang_IllegalArgumentException());
a61af66fc99e Initial load
duke
parents:
diff changeset
757 }
a61af66fc99e Initial load
duke
parents:
diff changeset
758 }
a61af66fc99e Initial load
duke
parents:
diff changeset
759
6725
da91efe96a93 6964458: Reimplement class meta-data storage to use native memory
coleenp
parents: 6266
diff changeset
760 int offset = InstanceKlass::cast(k)->field_offset(slot);
0
a61af66fc99e Initial load
duke
parents:
diff changeset
761 return field_offset_from_byte_offset(offset);
a61af66fc99e Initial load
duke
parents:
diff changeset
762 }
a61af66fc99e Initial load
duke
parents:
diff changeset
763
a61af66fc99e Initial load
duke
parents:
diff changeset
764 UNSAFE_ENTRY(jlong, Unsafe_ObjectFieldOffset(JNIEnv *env, jobject unsafe, jobject field))
a61af66fc99e Initial load
duke
parents:
diff changeset
765 UnsafeWrapper("Unsafe_ObjectFieldOffset");
a61af66fc99e Initial load
duke
parents:
diff changeset
766 return find_field_offset(field, 0, THREAD);
a61af66fc99e Initial load
duke
parents:
diff changeset
767 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
768
a61af66fc99e Initial load
duke
parents:
diff changeset
769 UNSAFE_ENTRY(jlong, Unsafe_StaticFieldOffset(JNIEnv *env, jobject unsafe, jobject field))
a61af66fc99e Initial load
duke
parents:
diff changeset
770 UnsafeWrapper("Unsafe_StaticFieldOffset");
a61af66fc99e Initial load
duke
parents:
diff changeset
771 return find_field_offset(field, 1, THREAD);
a61af66fc99e Initial load
duke
parents:
diff changeset
772 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
773
a61af66fc99e Initial load
duke
parents:
diff changeset
774 UNSAFE_ENTRY(jobject, Unsafe_StaticFieldBaseFromField(JNIEnv *env, jobject unsafe, jobject field))
a61af66fc99e Initial load
duke
parents:
diff changeset
775 UnsafeWrapper("Unsafe_StaticFieldBase");
a61af66fc99e Initial load
duke
parents:
diff changeset
776 // Note: In this VM implementation, a field address is always a short
a61af66fc99e Initial load
duke
parents:
diff changeset
777 // offset from the base of a a klass metaobject. Thus, the full dynamic
a61af66fc99e Initial load
duke
parents:
diff changeset
778 // range of the return type is never used. However, some implementations
a61af66fc99e Initial load
duke
parents:
diff changeset
779 // might put the static field inside an array shared by many classes,
a61af66fc99e Initial load
duke
parents:
diff changeset
780 // or even at a fixed address, in which case the address could be quite
a61af66fc99e Initial load
duke
parents:
diff changeset
781 // large. In that last case, this function would return NULL, since
a61af66fc99e Initial load
duke
parents:
diff changeset
782 // the address would operate alone, without any base pointer.
a61af66fc99e Initial load
duke
parents:
diff changeset
783
a61af66fc99e Initial load
duke
parents:
diff changeset
784 if (field == NULL) THROW_0(vmSymbols::java_lang_NullPointerException());
a61af66fc99e Initial load
duke
parents:
diff changeset
785
a61af66fc99e Initial load
duke
parents:
diff changeset
786 oop reflected = JNIHandles::resolve_non_null(field);
a61af66fc99e Initial load
duke
parents:
diff changeset
787 oop mirror = java_lang_reflect_Field::clazz(reflected);
a61af66fc99e Initial load
duke
parents:
diff changeset
788 int modifiers = java_lang_reflect_Field::modifiers(reflected);
a61af66fc99e Initial load
duke
parents:
diff changeset
789
a61af66fc99e Initial load
duke
parents:
diff changeset
790 if ((modifiers & JVM_ACC_STATIC) == 0) {
a61af66fc99e Initial load
duke
parents:
diff changeset
791 THROW_0(vmSymbols::java_lang_IllegalArgumentException());
a61af66fc99e Initial load
duke
parents:
diff changeset
792 }
a61af66fc99e Initial load
duke
parents:
diff changeset
793
2376
c7f3d0b4570f 7017732: move static fields into Class to prepare for perm gen removal
never
parents: 2316
diff changeset
794 return JNIHandles::make_local(env, mirror);
0
a61af66fc99e Initial load
duke
parents:
diff changeset
795 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
796
a61af66fc99e Initial load
duke
parents:
diff changeset
797 //@deprecated
a61af66fc99e Initial load
duke
parents:
diff changeset
798 UNSAFE_ENTRY(jint, Unsafe_FieldOffset(JNIEnv *env, jobject unsafe, jobject field))
a61af66fc99e Initial load
duke
parents:
diff changeset
799 UnsafeWrapper("Unsafe_FieldOffset");
a61af66fc99e Initial load
duke
parents:
diff changeset
800 // tries (but fails) to be polymorphic between static and non-static:
a61af66fc99e Initial load
duke
parents:
diff changeset
801 jlong offset = find_field_offset(field, -1, THREAD);
a61af66fc99e Initial load
duke
parents:
diff changeset
802 guarantee(offset == (jint)offset, "offset fits in 32 bits");
a61af66fc99e Initial load
duke
parents:
diff changeset
803 return (jint)offset;
a61af66fc99e Initial load
duke
parents:
diff changeset
804 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
805
a61af66fc99e Initial load
duke
parents:
diff changeset
806 //@deprecated
a61af66fc99e Initial load
duke
parents:
diff changeset
807 UNSAFE_ENTRY(jobject, Unsafe_StaticFieldBaseFromClass(JNIEnv *env, jobject unsafe, jobject clazz))
a61af66fc99e Initial load
duke
parents:
diff changeset
808 UnsafeWrapper("Unsafe_StaticFieldBase");
a61af66fc99e Initial load
duke
parents:
diff changeset
809 if (clazz == NULL) {
a61af66fc99e Initial load
duke
parents:
diff changeset
810 THROW_0(vmSymbols::java_lang_NullPointerException());
a61af66fc99e Initial load
duke
parents:
diff changeset
811 }
2376
c7f3d0b4570f 7017732: move static fields into Class to prepare for perm gen removal
never
parents: 2316
diff changeset
812 return JNIHandles::make_local(env, JNIHandles::resolve_non_null(clazz));
0
a61af66fc99e Initial load
duke
parents:
diff changeset
813 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
814
6266
1d7922586cf6 7023639: JSR 292 method handle invocation needs a fast path for compiled code
twisti
parents: 6226
diff changeset
815 UNSAFE_ENTRY(void, Unsafe_EnsureClassInitialized(JNIEnv *env, jobject unsafe, jobject clazz)) {
0
a61af66fc99e Initial load
duke
parents:
diff changeset
816 UnsafeWrapper("Unsafe_EnsureClassInitialized");
a61af66fc99e Initial load
duke
parents:
diff changeset
817 if (clazz == NULL) {
a61af66fc99e Initial load
duke
parents:
diff changeset
818 THROW(vmSymbols::java_lang_NullPointerException());
a61af66fc99e Initial load
duke
parents:
diff changeset
819 }
a61af66fc99e Initial load
duke
parents:
diff changeset
820 oop mirror = JNIHandles::resolve_non_null(clazz);
6266
1d7922586cf6 7023639: JSR 292 method handle invocation needs a fast path for compiled code
twisti
parents: 6226
diff changeset
821
6725
da91efe96a93 6964458: Reimplement class meta-data storage to use native memory
coleenp
parents: 6266
diff changeset
822 Klass* klass = java_lang_Class::as_Klass(mirror);
6983
070d523b96a7 8001471: Klass::cast() does nothing
hseigel
parents: 6889
diff changeset
823 if (klass != NULL && klass->should_be_initialized()) {
6725
da91efe96a93 6964458: Reimplement class meta-data storage to use native memory
coleenp
parents: 6266
diff changeset
824 InstanceKlass* k = InstanceKlass::cast(klass);
0
a61af66fc99e Initial load
duke
parents:
diff changeset
825 k->initialize(CHECK);
a61af66fc99e Initial load
duke
parents:
diff changeset
826 }
6266
1d7922586cf6 7023639: JSR 292 method handle invocation needs a fast path for compiled code
twisti
parents: 6226
diff changeset
827 }
1d7922586cf6 7023639: JSR 292 method handle invocation needs a fast path for compiled code
twisti
parents: 6226
diff changeset
828 UNSAFE_END
1d7922586cf6 7023639: JSR 292 method handle invocation needs a fast path for compiled code
twisti
parents: 6226
diff changeset
829
1d7922586cf6 7023639: JSR 292 method handle invocation needs a fast path for compiled code
twisti
parents: 6226
diff changeset
830 UNSAFE_ENTRY(jboolean, Unsafe_ShouldBeInitialized(JNIEnv *env, jobject unsafe, jobject clazz)) {
1d7922586cf6 7023639: JSR 292 method handle invocation needs a fast path for compiled code
twisti
parents: 6226
diff changeset
831 UnsafeWrapper("Unsafe_ShouldBeInitialized");
1d7922586cf6 7023639: JSR 292 method handle invocation needs a fast path for compiled code
twisti
parents: 6226
diff changeset
832 if (clazz == NULL) {
1d7922586cf6 7023639: JSR 292 method handle invocation needs a fast path for compiled code
twisti
parents: 6226
diff changeset
833 THROW_(vmSymbols::java_lang_NullPointerException(), false);
1d7922586cf6 7023639: JSR 292 method handle invocation needs a fast path for compiled code
twisti
parents: 6226
diff changeset
834 }
1d7922586cf6 7023639: JSR 292 method handle invocation needs a fast path for compiled code
twisti
parents: 6226
diff changeset
835 oop mirror = JNIHandles::resolve_non_null(clazz);
6725
da91efe96a93 6964458: Reimplement class meta-data storage to use native memory
coleenp
parents: 6266
diff changeset
836 Klass* klass = java_lang_Class::as_Klass(mirror);
6983
070d523b96a7 8001471: Klass::cast() does nothing
hseigel
parents: 6889
diff changeset
837 if (klass != NULL && klass->should_be_initialized()) {
6266
1d7922586cf6 7023639: JSR 292 method handle invocation needs a fast path for compiled code
twisti
parents: 6226
diff changeset
838 return true;
1d7922586cf6 7023639: JSR 292 method handle invocation needs a fast path for compiled code
twisti
parents: 6226
diff changeset
839 }
1d7922586cf6 7023639: JSR 292 method handle invocation needs a fast path for compiled code
twisti
parents: 6226
diff changeset
840 return false;
1d7922586cf6 7023639: JSR 292 method handle invocation needs a fast path for compiled code
twisti
parents: 6226
diff changeset
841 }
0
a61af66fc99e Initial load
duke
parents:
diff changeset
842 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
843
a61af66fc99e Initial load
duke
parents:
diff changeset
844 static void getBaseAndScale(int& base, int& scale, jclass acls, TRAPS) {
a61af66fc99e Initial load
duke
parents:
diff changeset
845 if (acls == NULL) {
a61af66fc99e Initial load
duke
parents:
diff changeset
846 THROW(vmSymbols::java_lang_NullPointerException());
a61af66fc99e Initial load
duke
parents:
diff changeset
847 }
a61af66fc99e Initial load
duke
parents:
diff changeset
848 oop mirror = JNIHandles::resolve_non_null(acls);
6725
da91efe96a93 6964458: Reimplement class meta-data storage to use native memory
coleenp
parents: 6266
diff changeset
849 Klass* k = java_lang_Class::as_Klass(mirror);
da91efe96a93 6964458: Reimplement class meta-data storage to use native memory
coleenp
parents: 6266
diff changeset
850 if (k == NULL || !k->oop_is_array()) {
0
a61af66fc99e Initial load
duke
parents:
diff changeset
851 THROW(vmSymbols::java_lang_InvalidClassException());
6725
da91efe96a93 6964458: Reimplement class meta-data storage to use native memory
coleenp
parents: 6266
diff changeset
852 } else if (k->oop_is_objArray()) {
0
a61af66fc99e Initial load
duke
parents:
diff changeset
853 base = arrayOopDesc::base_offset_in_bytes(T_OBJECT);
113
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
854 scale = heapOopSize;
6725
da91efe96a93 6964458: Reimplement class meta-data storage to use native memory
coleenp
parents: 6266
diff changeset
855 } else if (k->oop_is_typeArray()) {
6831
d8ce2825b193 8000213: NPG: Should have renamed arrayKlass and typeArrayKlass
coleenp
parents: 6725
diff changeset
856 TypeArrayKlass* tak = TypeArrayKlass::cast(k);
0
a61af66fc99e Initial load
duke
parents:
diff changeset
857 base = tak->array_header_in_bytes();
a61af66fc99e Initial load
duke
parents:
diff changeset
858 assert(base == arrayOopDesc::base_offset_in_bytes(tak->element_type()), "array_header_size semantics ok");
a61af66fc99e Initial load
duke
parents:
diff changeset
859 scale = (1 << tak->log2_element_size());
a61af66fc99e Initial load
duke
parents:
diff changeset
860 } else {
a61af66fc99e Initial load
duke
parents:
diff changeset
861 ShouldNotReachHere();
a61af66fc99e Initial load
duke
parents:
diff changeset
862 }
a61af66fc99e Initial load
duke
parents:
diff changeset
863 }
a61af66fc99e Initial load
duke
parents:
diff changeset
864
a61af66fc99e Initial load
duke
parents:
diff changeset
865 UNSAFE_ENTRY(jint, Unsafe_ArrayBaseOffset(JNIEnv *env, jobject unsafe, jclass acls))
a61af66fc99e Initial load
duke
parents:
diff changeset
866 UnsafeWrapper("Unsafe_ArrayBaseOffset");
23822
626f594dffa6 8139040: Fix initializations before ShouldNotReachHere() etc. and enable -Wuninitialized on linux.
csahu
parents: 22797
diff changeset
867 int base = 0, scale = 0;
0
a61af66fc99e Initial load
duke
parents:
diff changeset
868 getBaseAndScale(base, scale, acls, CHECK_0);
a61af66fc99e Initial load
duke
parents:
diff changeset
869 return field_offset_from_byte_offset(base);
a61af66fc99e Initial load
duke
parents:
diff changeset
870 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
871
a61af66fc99e Initial load
duke
parents:
diff changeset
872
a61af66fc99e Initial load
duke
parents:
diff changeset
873 UNSAFE_ENTRY(jint, Unsafe_ArrayIndexScale(JNIEnv *env, jobject unsafe, jclass acls))
a61af66fc99e Initial load
duke
parents:
diff changeset
874 UnsafeWrapper("Unsafe_ArrayIndexScale");
23822
626f594dffa6 8139040: Fix initializations before ShouldNotReachHere() etc. and enable -Wuninitialized on linux.
csahu
parents: 22797
diff changeset
875 int base = 0, scale = 0;
0
a61af66fc99e Initial load
duke
parents:
diff changeset
876 getBaseAndScale(base, scale, acls, CHECK_0);
a61af66fc99e Initial load
duke
parents:
diff changeset
877 // This VM packs both fields and array elements down to the byte.
a61af66fc99e Initial load
duke
parents:
diff changeset
878 // But watch out: If this changes, so that array references for
a61af66fc99e Initial load
duke
parents:
diff changeset
879 // a given primitive type (say, T_BOOLEAN) use different memory units
a61af66fc99e Initial load
duke
parents:
diff changeset
880 // than fields, this method MUST return zero for such arrays.
a61af66fc99e Initial load
duke
parents:
diff changeset
881 // For example, the VM used to store sub-word sized fields in full
a61af66fc99e Initial load
duke
parents:
diff changeset
882 // words in the object layout, so that accessors like getByte(Object,int)
a61af66fc99e Initial load
duke
parents:
diff changeset
883 // did not really do what one might expect for arrays. Therefore,
a61af66fc99e Initial load
duke
parents:
diff changeset
884 // this function used to report a zero scale factor, so that the user
a61af66fc99e Initial load
duke
parents:
diff changeset
885 // would know not to attempt to access sub-word array elements.
a61af66fc99e Initial load
duke
parents:
diff changeset
886 // // Code for unpacked fields:
a61af66fc99e Initial load
duke
parents:
diff changeset
887 // if (scale < wordSize) return 0;
a61af66fc99e Initial load
duke
parents:
diff changeset
888
a61af66fc99e Initial load
duke
parents:
diff changeset
889 // The following allows for a pretty general fieldOffset cookie scheme,
a61af66fc99e Initial load
duke
parents:
diff changeset
890 // but requires it to be linear in byte offset.
a61af66fc99e Initial load
duke
parents:
diff changeset
891 return field_offset_from_byte_offset(scale) - field_offset_from_byte_offset(0);
a61af66fc99e Initial load
duke
parents:
diff changeset
892 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
893
a61af66fc99e Initial load
duke
parents:
diff changeset
894
a61af66fc99e Initial load
duke
parents:
diff changeset
895 static inline void throw_new(JNIEnv *env, const char *ename) {
a61af66fc99e Initial load
duke
parents:
diff changeset
896 char buf[100];
a61af66fc99e Initial load
duke
parents:
diff changeset
897 strcpy(buf, "java/lang/");
a61af66fc99e Initial load
duke
parents:
diff changeset
898 strcat(buf, ename);
a61af66fc99e Initial load
duke
parents:
diff changeset
899 jclass cls = env->FindClass(buf);
17704
56cd09c4a5c9 8028785: [parfait] warnings from b116 for hotspot.src.share.vm.prims: JNI exception pending
ccheung
parents: 12316
diff changeset
900 if (env->ExceptionCheck()) {
56cd09c4a5c9 8028785: [parfait] warnings from b116 for hotspot.src.share.vm.prims: JNI exception pending
ccheung
parents: 12316
diff changeset
901 env->ExceptionClear();
56cd09c4a5c9 8028785: [parfait] warnings from b116 for hotspot.src.share.vm.prims: JNI exception pending
ccheung
parents: 12316
diff changeset
902 tty->print_cr("Unsafe: cannot throw %s because FindClass has failed", buf);
56cd09c4a5c9 8028785: [parfait] warnings from b116 for hotspot.src.share.vm.prims: JNI exception pending
ccheung
parents: 12316
diff changeset
903 return;
56cd09c4a5c9 8028785: [parfait] warnings from b116 for hotspot.src.share.vm.prims: JNI exception pending
ccheung
parents: 12316
diff changeset
904 }
0
a61af66fc99e Initial load
duke
parents:
diff changeset
905 char* msg = NULL;
a61af66fc99e Initial load
duke
parents:
diff changeset
906 env->ThrowNew(cls, msg);
a61af66fc99e Initial load
duke
parents:
diff changeset
907 }
a61af66fc99e Initial load
duke
parents:
diff changeset
908
8866
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
909 static jclass Unsafe_DefineClass_impl(JNIEnv *env, jstring name, jbyteArray data, int offset, int length, jobject loader, jobject pd) {
0
a61af66fc99e Initial load
duke
parents:
diff changeset
910 {
a61af66fc99e Initial load
duke
parents:
diff changeset
911 // Code lifted from JDK 1.3 ClassLoader.c
a61af66fc99e Initial load
duke
parents:
diff changeset
912
a61af66fc99e Initial load
duke
parents:
diff changeset
913 jbyte *body;
a61af66fc99e Initial load
duke
parents:
diff changeset
914 char *utfName;
a61af66fc99e Initial load
duke
parents:
diff changeset
915 jclass result = 0;
a61af66fc99e Initial load
duke
parents:
diff changeset
916 char buf[128];
a61af66fc99e Initial load
duke
parents:
diff changeset
917
a61af66fc99e Initial load
duke
parents:
diff changeset
918 if (UsePerfData) {
a61af66fc99e Initial load
duke
parents:
diff changeset
919 ClassLoader::unsafe_defineClassCallCounter()->inc();
a61af66fc99e Initial load
duke
parents:
diff changeset
920 }
a61af66fc99e Initial load
duke
parents:
diff changeset
921
a61af66fc99e Initial load
duke
parents:
diff changeset
922 if (data == NULL) {
a61af66fc99e Initial load
duke
parents:
diff changeset
923 throw_new(env, "NullPointerException");
a61af66fc99e Initial load
duke
parents:
diff changeset
924 return 0;
a61af66fc99e Initial load
duke
parents:
diff changeset
925 }
a61af66fc99e Initial load
duke
parents:
diff changeset
926
a61af66fc99e Initial load
duke
parents:
diff changeset
927 /* Work around 4153825. malloc crashes on Solaris when passed a
a61af66fc99e Initial load
duke
parents:
diff changeset
928 * negative size.
a61af66fc99e Initial load
duke
parents:
diff changeset
929 */
a61af66fc99e Initial load
duke
parents:
diff changeset
930 if (length < 0) {
a61af66fc99e Initial load
duke
parents:
diff changeset
931 throw_new(env, "ArrayIndexOutOfBoundsException");
a61af66fc99e Initial load
duke
parents:
diff changeset
932 return 0;
a61af66fc99e Initial load
duke
parents:
diff changeset
933 }
a61af66fc99e Initial load
duke
parents:
diff changeset
934
6197
d2a62e0f25eb 6995781: Native Memory Tracking (Phase 1)
zgu
parents: 4043
diff changeset
935 body = NEW_C_HEAP_ARRAY(jbyte, length, mtInternal);
0
a61af66fc99e Initial load
duke
parents:
diff changeset
936
a61af66fc99e Initial load
duke
parents:
diff changeset
937 if (body == 0) {
a61af66fc99e Initial load
duke
parents:
diff changeset
938 throw_new(env, "OutOfMemoryError");
a61af66fc99e Initial load
duke
parents:
diff changeset
939 return 0;
a61af66fc99e Initial load
duke
parents:
diff changeset
940 }
a61af66fc99e Initial load
duke
parents:
diff changeset
941
a61af66fc99e Initial load
duke
parents:
diff changeset
942 env->GetByteArrayRegion(data, offset, length, body);
a61af66fc99e Initial load
duke
parents:
diff changeset
943
a61af66fc99e Initial load
duke
parents:
diff changeset
944 if (env->ExceptionOccurred())
a61af66fc99e Initial load
duke
parents:
diff changeset
945 goto free_body;
a61af66fc99e Initial load
duke
parents:
diff changeset
946
a61af66fc99e Initial load
duke
parents:
diff changeset
947 if (name != NULL) {
a61af66fc99e Initial load
duke
parents:
diff changeset
948 uint len = env->GetStringUTFLength(name);
a61af66fc99e Initial load
duke
parents:
diff changeset
949 int unicode_len = env->GetStringLength(name);
a61af66fc99e Initial load
duke
parents:
diff changeset
950 if (len >= sizeof(buf)) {
6197
d2a62e0f25eb 6995781: Native Memory Tracking (Phase 1)
zgu
parents: 4043
diff changeset
951 utfName = NEW_C_HEAP_ARRAY(char, len + 1, mtInternal);
0
a61af66fc99e Initial load
duke
parents:
diff changeset
952 if (utfName == NULL) {
a61af66fc99e Initial load
duke
parents:
diff changeset
953 throw_new(env, "OutOfMemoryError");
a61af66fc99e Initial load
duke
parents:
diff changeset
954 goto free_body;
a61af66fc99e Initial load
duke
parents:
diff changeset
955 }
a61af66fc99e Initial load
duke
parents:
diff changeset
956 } else {
a61af66fc99e Initial load
duke
parents:
diff changeset
957 utfName = buf;
a61af66fc99e Initial load
duke
parents:
diff changeset
958 }
a61af66fc99e Initial load
duke
parents:
diff changeset
959 env->GetStringUTFRegion(name, 0, unicode_len, utfName);
a61af66fc99e Initial load
duke
parents:
diff changeset
960 //VerifyFixClassname(utfName);
a61af66fc99e Initial load
duke
parents:
diff changeset
961 for (uint i = 0; i < len; i++) {
a61af66fc99e Initial load
duke
parents:
diff changeset
962 if (utfName[i] == '.') utfName[i] = '/';
a61af66fc99e Initial load
duke
parents:
diff changeset
963 }
a61af66fc99e Initial load
duke
parents:
diff changeset
964 } else {
a61af66fc99e Initial load
duke
parents:
diff changeset
965 utfName = NULL;
a61af66fc99e Initial load
duke
parents:
diff changeset
966 }
a61af66fc99e Initial load
duke
parents:
diff changeset
967
a61af66fc99e Initial load
duke
parents:
diff changeset
968 result = JVM_DefineClass(env, utfName, loader, body, length, pd);
a61af66fc99e Initial load
duke
parents:
diff changeset
969
a61af66fc99e Initial load
duke
parents:
diff changeset
970 if (utfName && utfName != buf)
6197
d2a62e0f25eb 6995781: Native Memory Tracking (Phase 1)
zgu
parents: 4043
diff changeset
971 FREE_C_HEAP_ARRAY(char, utfName, mtInternal);
0
a61af66fc99e Initial load
duke
parents:
diff changeset
972
a61af66fc99e Initial load
duke
parents:
diff changeset
973 free_body:
6197
d2a62e0f25eb 6995781: Native Memory Tracking (Phase 1)
zgu
parents: 4043
diff changeset
974 FREE_C_HEAP_ARRAY(jbyte, body, mtInternal);
0
a61af66fc99e Initial load
duke
parents:
diff changeset
975 return result;
a61af66fc99e Initial load
duke
parents:
diff changeset
976 }
a61af66fc99e Initial load
duke
parents:
diff changeset
977 }
a61af66fc99e Initial load
duke
parents:
diff changeset
978
a61af66fc99e Initial load
duke
parents:
diff changeset
979
8866
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
980 UNSAFE_ENTRY(jclass, Unsafe_DefineClass(JNIEnv *env, jobject unsafe, jstring name, jbyteArray data, int offset, int length, jobject loader, jobject pd))
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
981 UnsafeWrapper("Unsafe_DefineClass");
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
982 {
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
983 ThreadToNativeFromVM ttnfv(thread);
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
984 return Unsafe_DefineClass_impl(env, name, data, offset, length, loader, pd);
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
985 }
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
986 UNSAFE_END
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
987
20415
47e3110c47e8 6642881: Improve performance of Class.getClassLoader()
coleenp
parents: 20198
diff changeset
988 static jobject get_class_loader(JNIEnv* env, jclass cls) {
47e3110c47e8 6642881: Improve performance of Class.getClassLoader()
coleenp
parents: 20198
diff changeset
989 if (java_lang_Class::is_primitive(JNIHandles::resolve_non_null(cls))) {
47e3110c47e8 6642881: Improve performance of Class.getClassLoader()
coleenp
parents: 20198
diff changeset
990 return NULL;
47e3110c47e8 6642881: Improve performance of Class.getClassLoader()
coleenp
parents: 20198
diff changeset
991 }
47e3110c47e8 6642881: Improve performance of Class.getClassLoader()
coleenp
parents: 20198
diff changeset
992 Klass* k = java_lang_Class::as_Klass(JNIHandles::resolve_non_null(cls));
47e3110c47e8 6642881: Improve performance of Class.getClassLoader()
coleenp
parents: 20198
diff changeset
993 oop loader = k->class_loader();
47e3110c47e8 6642881: Improve performance of Class.getClassLoader()
coleenp
parents: 20198
diff changeset
994 return JNIHandles::make_local(env, loader);
47e3110c47e8 6642881: Improve performance of Class.getClassLoader()
coleenp
parents: 20198
diff changeset
995 }
8866
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
996
0
a61af66fc99e Initial load
duke
parents:
diff changeset
997 UNSAFE_ENTRY(jclass, Unsafe_DefineClass0(JNIEnv *env, jobject unsafe, jstring name, jbyteArray data, int offset, int length))
a61af66fc99e Initial load
duke
parents:
diff changeset
998 UnsafeWrapper("Unsafe_DefineClass");
a61af66fc99e Initial load
duke
parents:
diff changeset
999 {
a61af66fc99e Initial load
duke
parents:
diff changeset
1000 ThreadToNativeFromVM ttnfv(thread);
a61af66fc99e Initial load
duke
parents:
diff changeset
1001
a61af66fc99e Initial load
duke
parents:
diff changeset
1002 int depthFromDefineClass0 = 1;
a61af66fc99e Initial load
duke
parents:
diff changeset
1003 jclass caller = JVM_GetCallerClass(env, depthFromDefineClass0);
20415
47e3110c47e8 6642881: Improve performance of Class.getClassLoader()
coleenp
parents: 20198
diff changeset
1004 jobject loader = (caller == NULL) ? NULL : get_class_loader(env, caller);
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1005 jobject pd = (caller == NULL) ? NULL : JVM_GetProtectionDomain(env, caller);
a61af66fc99e Initial load
duke
parents:
diff changeset
1006
8866
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1007 return Unsafe_DefineClass_impl(env, name, data, offset, length, loader, pd);
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1008 }
a61af66fc99e Initial load
duke
parents:
diff changeset
1009 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
1010
a61af66fc99e Initial load
duke
parents:
diff changeset
1011
431
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1012 #define DAC_Args CLS"[B["OBJ
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1013 // define a class but do not make it known to the class loader or system dictionary
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1014 // - host_class: supplies context for linkage, access control, protection domain, and class loader
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1015 // - data: bytes of a class file, a raw memory address (length gives the number of bytes)
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1016 // - cp_patches: where non-null entries exist, they replace corresponding CP entries in data
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1017
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1018 // When you load an anonymous class U, it works as if you changed its name just before loading,
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1019 // to a name that you will never use again. Since the name is lost, no other class can directly
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1020 // link to any member of U. Just after U is loaded, the only way to use it is reflectively,
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1021 // through java.lang.Class methods like Class.newInstance.
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1022
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1023 // Access checks for linkage sites within U continue to follow the same rules as for named classes.
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1024 // The package of an anonymous class is given by the package qualifier on the name under which it was loaded.
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1025 // An anonymous class also has special privileges to access any member of its host class.
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1026 // This is the main reason why this loading operation is unsafe. The purpose of this is to
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1027 // allow language implementations to simulate "open classes"; a host class in effect gets
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1028 // new code when an anonymous class is loaded alongside it. A less convenient but more
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1029 // standard way to do this is with reflection, which can also be set to ignore access
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1030 // restrictions.
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1031
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1032 // Access into an anonymous class is possible only through reflection. Therefore, there
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1033 // are no special access rules for calling into an anonymous class. The relaxed access
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1034 // rule for the host class is applied in the opposite direction: A host class reflectively
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1035 // access one of its anonymous classes.
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1036
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1037 // If you load the same bytecodes twice, you get two different classes. You can reload
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1038 // the same bytecodes with or without varying CP patches.
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1039
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1040 // By using the CP patching array, you can have a new anonymous class U2 refer to an older one U1.
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1041 // The bytecodes for U2 should refer to U1 by a symbolic name (doesn't matter what the name is).
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1042 // The CONSTANT_Class entry for that name can be patched to refer directly to U1.
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1043
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1044 // This allows, for example, U2 to use U1 as a superclass or super-interface, or as
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1045 // an outer class (so that U2 is an anonymous inner class of anonymous U1).
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1046 // It is not possible for a named class, or an older anonymous class, to refer by
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1047 // name (via its CP) to a newer anonymous class.
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1048
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1049 // CP patching may also be used to modify (i.e., hack) the names of methods, classes,
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1050 // or type descriptors used in the loaded anonymous class.
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1051
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1052 // Finally, CP patching may be used to introduce "live" objects into the constant pool,
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1053 // instead of "dead" strings. A compiled statement like println((Object)"hello") can
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1054 // be changed to println(greeting), where greeting is an arbitrary object created before
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1055 // the anonymous class is loaded. This is useful in dynamic languages, in which
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1056 // various kinds of metaobjects must be introduced as constants into bytecode.
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1057 // Note the cast (Object), which tells the verifier to expect an arbitrary object,
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1058 // not just a literal string. For such ldc instructions, the verifier uses the
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1059 // type Object instead of String, if the loaded constant is not in fact a String.
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1060
7185
90273fc0a981 8000662: NPG: nashorn ant clean test262 out-of-memory with Java heap
coleenp
parents: 6983
diff changeset
1061 static instanceKlassHandle
431
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1062 Unsafe_DefineAnonymousClass_impl(JNIEnv *env,
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1063 jclass host_class, jbyteArray data, jobjectArray cp_patches_jh,
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1064 HeapWord* *temp_alloc,
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1065 TRAPS) {
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1066
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1067 if (UsePerfData) {
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1068 ClassLoader::unsafe_defineClassCallCounter()->inc();
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1069 }
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1070
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1071 if (data == NULL) {
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1072 THROW_0(vmSymbols::java_lang_NullPointerException());
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1073 }
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1074
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1075 jint length = typeArrayOop(JNIHandles::resolve_non_null(data))->length();
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1076 jint word_length = (length + sizeof(HeapWord)-1) / sizeof(HeapWord);
6197
d2a62e0f25eb 6995781: Native Memory Tracking (Phase 1)
zgu
parents: 4043
diff changeset
1077 HeapWord* body = NEW_C_HEAP_ARRAY(HeapWord, word_length, mtInternal);
431
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1078 if (body == NULL) {
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1079 THROW_0(vmSymbols::java_lang_OutOfMemoryError());
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1080 }
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1081
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1082 // caller responsible to free it:
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1083 (*temp_alloc) = body;
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1084
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1085 {
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1086 jbyte* array_base = typeArrayOop(JNIHandles::resolve_non_null(data))->byte_at_addr(0);
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1087 Copy::conjoint_words((HeapWord*) array_base, body, word_length);
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1088 }
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1089
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1090 u1* class_bytes = (u1*) body;
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1091 int class_bytes_length = (int) length;
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1092 if (class_bytes_length < 0) class_bytes_length = 0;
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1093 if (class_bytes == NULL
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1094 || host_class == NULL
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1095 || length != class_bytes_length)
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1096 THROW_0(vmSymbols::java_lang_IllegalArgumentException());
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1097
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1098 objArrayHandle cp_patches_h;
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1099 if (cp_patches_jh != NULL) {
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1100 oop p = JNIHandles::resolve_non_null(cp_patches_jh);
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1101 if (!p->is_objArray())
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1102 THROW_0(vmSymbols::java_lang_IllegalArgumentException());
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1103 cp_patches_h = objArrayHandle(THREAD, (objArrayOop)p);
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1104 }
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1105
6725
da91efe96a93 6964458: Reimplement class meta-data storage to use native memory
coleenp
parents: 6266
diff changeset
1106 KlassHandle host_klass(THREAD, java_lang_Class::as_Klass(JNIHandles::resolve_non_null(host_class)));
431
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1107 const char* host_source = host_klass->external_name();
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1108 Handle host_loader(THREAD, host_klass->class_loader());
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1109 Handle host_domain(THREAD, host_klass->protection_domain());
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1110
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1111 GrowableArray<Handle>* cp_patches = NULL;
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1112 if (cp_patches_h.not_null()) {
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1113 int alen = cp_patches_h->length();
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1114 for (int i = alen-1; i >= 0; i--) {
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1115 oop p = cp_patches_h->obj_at(i);
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1116 if (p != NULL) {
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1117 Handle patch(THREAD, p);
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1118 if (cp_patches == NULL)
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1119 cp_patches = new GrowableArray<Handle>(i+1, i+1, Handle());
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1120 cp_patches->at_put(i, patch);
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1121 }
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1122 }
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1123 }
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1124
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1125 ClassFileStream st(class_bytes, class_bytes_length, (char*) host_source);
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1126
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1127 instanceKlassHandle anon_klass;
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1128 {
2177
3582bf76420e 6990754: Use native memory and reference counting to implement SymbolTable
coleenp
parents: 2114
diff changeset
1129 Symbol* no_class_name = NULL;
6725
da91efe96a93 6964458: Reimplement class meta-data storage to use native memory
coleenp
parents: 6266
diff changeset
1130 Klass* anonk = SystemDictionary::parse_stream(no_class_name,
431
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1131 host_loader, host_domain,
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1132 &st, host_klass, cp_patches,
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1133 CHECK_NULL);
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1134 if (anonk == NULL) return NULL;
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1135 anon_klass = instanceKlassHandle(THREAD, anonk);
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1136 }
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1137
7185
90273fc0a981 8000662: NPG: nashorn ant clean test262 out-of-memory with Java heap
coleenp
parents: 6983
diff changeset
1138 return anon_klass;
431
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1139 }
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1140
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1141 UNSAFE_ENTRY(jclass, Unsafe_DefineAnonymousClass(JNIEnv *env, jobject unsafe, jclass host_class, jbyteArray data, jobjectArray cp_patches_jh))
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1142 {
7185
90273fc0a981 8000662: NPG: nashorn ant clean test262 out-of-memory with Java heap
coleenp
parents: 6983
diff changeset
1143 instanceKlassHandle anon_klass;
90273fc0a981 8000662: NPG: nashorn ant clean test262 out-of-memory with Java heap
coleenp
parents: 6983
diff changeset
1144 jobject res_jh = NULL;
90273fc0a981 8000662: NPG: nashorn ant clean test262 out-of-memory with Java heap
coleenp
parents: 6983
diff changeset
1145
431
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1146 UnsafeWrapper("Unsafe_DefineAnonymousClass");
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1147 ResourceMark rm(THREAD);
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1148
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1149 HeapWord* temp_alloc = NULL;
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1150
7185
90273fc0a981 8000662: NPG: nashorn ant clean test262 out-of-memory with Java heap
coleenp
parents: 6983
diff changeset
1151 anon_klass = Unsafe_DefineAnonymousClass_impl(env, host_class, data,
90273fc0a981 8000662: NPG: nashorn ant clean test262 out-of-memory with Java heap
coleenp
parents: 6983
diff changeset
1152 cp_patches_jh,
431
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1153 &temp_alloc, THREAD);
7185
90273fc0a981 8000662: NPG: nashorn ant clean test262 out-of-memory with Java heap
coleenp
parents: 6983
diff changeset
1154 if (anon_klass() != NULL)
90273fc0a981 8000662: NPG: nashorn ant clean test262 out-of-memory with Java heap
coleenp
parents: 6983
diff changeset
1155 res_jh = JNIHandles::make_local(env, anon_klass->java_mirror());
431
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1156
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1157 // try/finally clause:
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1158 if (temp_alloc != NULL) {
6197
d2a62e0f25eb 6995781: Native Memory Tracking (Phase 1)
zgu
parents: 4043
diff changeset
1159 FREE_C_HEAP_ARRAY(HeapWord, temp_alloc, mtInternal);
431
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1160 }
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1161
7185
90273fc0a981 8000662: NPG: nashorn ant clean test262 out-of-memory with Java heap
coleenp
parents: 6983
diff changeset
1162 // The anonymous class loader data has been artificially been kept alive to
90273fc0a981 8000662: NPG: nashorn ant clean test262 out-of-memory with Java heap
coleenp
parents: 6983
diff changeset
1163 // this point. The mirror and any instances of this class have to keep
90273fc0a981 8000662: NPG: nashorn ant clean test262 out-of-memory with Java heap
coleenp
parents: 6983
diff changeset
1164 // it alive afterwards.
90273fc0a981 8000662: NPG: nashorn ant clean test262 out-of-memory with Java heap
coleenp
parents: 6983
diff changeset
1165 if (anon_klass() != NULL) {
90273fc0a981 8000662: NPG: nashorn ant clean test262 out-of-memory with Java heap
coleenp
parents: 6983
diff changeset
1166 anon_klass->class_loader_data()->set_keep_alive(false);
90273fc0a981 8000662: NPG: nashorn ant clean test262 out-of-memory with Java heap
coleenp
parents: 6983
diff changeset
1167 }
90273fc0a981 8000662: NPG: nashorn ant clean test262 out-of-memory with Java heap
coleenp
parents: 6983
diff changeset
1168
90273fc0a981 8000662: NPG: nashorn ant clean test262 out-of-memory with Java heap
coleenp
parents: 6983
diff changeset
1169 // let caller initialize it as needed...
90273fc0a981 8000662: NPG: nashorn ant clean test262 out-of-memory with Java heap
coleenp
parents: 6983
diff changeset
1170
431
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1171 return (jclass) res_jh;
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1172 }
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1173 UNSAFE_END
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1174
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1175
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1176
a61af66fc99e Initial load
duke
parents:
diff changeset
1177 UNSAFE_ENTRY(void, Unsafe_MonitorEnter(JNIEnv *env, jobject unsafe, jobject jobj))
a61af66fc99e Initial load
duke
parents:
diff changeset
1178 UnsafeWrapper("Unsafe_MonitorEnter");
a61af66fc99e Initial load
duke
parents:
diff changeset
1179 {
a61af66fc99e Initial load
duke
parents:
diff changeset
1180 if (jobj == NULL) {
a61af66fc99e Initial load
duke
parents:
diff changeset
1181 THROW(vmSymbols::java_lang_NullPointerException());
a61af66fc99e Initial load
duke
parents:
diff changeset
1182 }
a61af66fc99e Initial load
duke
parents:
diff changeset
1183 Handle obj(thread, JNIHandles::resolve_non_null(jobj));
a61af66fc99e Initial load
duke
parents:
diff changeset
1184 ObjectSynchronizer::jni_enter(obj, CHECK);
a61af66fc99e Initial load
duke
parents:
diff changeset
1185 }
a61af66fc99e Initial load
duke
parents:
diff changeset
1186 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
1187
a61af66fc99e Initial load
duke
parents:
diff changeset
1188
a61af66fc99e Initial load
duke
parents:
diff changeset
1189 UNSAFE_ENTRY(jboolean, Unsafe_TryMonitorEnter(JNIEnv *env, jobject unsafe, jobject jobj))
a61af66fc99e Initial load
duke
parents:
diff changeset
1190 UnsafeWrapper("Unsafe_TryMonitorEnter");
a61af66fc99e Initial load
duke
parents:
diff changeset
1191 {
a61af66fc99e Initial load
duke
parents:
diff changeset
1192 if (jobj == NULL) {
a61af66fc99e Initial load
duke
parents:
diff changeset
1193 THROW_(vmSymbols::java_lang_NullPointerException(), JNI_FALSE);
a61af66fc99e Initial load
duke
parents:
diff changeset
1194 }
a61af66fc99e Initial load
duke
parents:
diff changeset
1195 Handle obj(thread, JNIHandles::resolve_non_null(jobj));
a61af66fc99e Initial load
duke
parents:
diff changeset
1196 bool res = ObjectSynchronizer::jni_try_enter(obj, CHECK_0);
a61af66fc99e Initial load
duke
parents:
diff changeset
1197 return (res ? JNI_TRUE : JNI_FALSE);
a61af66fc99e Initial load
duke
parents:
diff changeset
1198 }
a61af66fc99e Initial load
duke
parents:
diff changeset
1199 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
1200
a61af66fc99e Initial load
duke
parents:
diff changeset
1201
a61af66fc99e Initial load
duke
parents:
diff changeset
1202 UNSAFE_ENTRY(void, Unsafe_MonitorExit(JNIEnv *env, jobject unsafe, jobject jobj))
a61af66fc99e Initial load
duke
parents:
diff changeset
1203 UnsafeWrapper("Unsafe_MonitorExit");
a61af66fc99e Initial load
duke
parents:
diff changeset
1204 {
a61af66fc99e Initial load
duke
parents:
diff changeset
1205 if (jobj == NULL) {
a61af66fc99e Initial load
duke
parents:
diff changeset
1206 THROW(vmSymbols::java_lang_NullPointerException());
a61af66fc99e Initial load
duke
parents:
diff changeset
1207 }
a61af66fc99e Initial load
duke
parents:
diff changeset
1208 Handle obj(THREAD, JNIHandles::resolve_non_null(jobj));
a61af66fc99e Initial load
duke
parents:
diff changeset
1209 ObjectSynchronizer::jni_exit(obj(), CHECK);
a61af66fc99e Initial load
duke
parents:
diff changeset
1210 }
a61af66fc99e Initial load
duke
parents:
diff changeset
1211 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
1212
a61af66fc99e Initial load
duke
parents:
diff changeset
1213
a61af66fc99e Initial load
duke
parents:
diff changeset
1214 UNSAFE_ENTRY(void, Unsafe_ThrowException(JNIEnv *env, jobject unsafe, jthrowable thr))
a61af66fc99e Initial load
duke
parents:
diff changeset
1215 UnsafeWrapper("Unsafe_ThrowException");
a61af66fc99e Initial load
duke
parents:
diff changeset
1216 {
a61af66fc99e Initial load
duke
parents:
diff changeset
1217 ThreadToNativeFromVM ttnfv(thread);
a61af66fc99e Initial load
duke
parents:
diff changeset
1218 env->Throw(thr);
a61af66fc99e Initial load
duke
parents:
diff changeset
1219 }
a61af66fc99e Initial load
duke
parents:
diff changeset
1220 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
1221
a61af66fc99e Initial load
duke
parents:
diff changeset
1222 // JSR166 ------------------------------------------------------------------
a61af66fc99e Initial load
duke
parents:
diff changeset
1223
a61af66fc99e Initial load
duke
parents:
diff changeset
1224 UNSAFE_ENTRY(jboolean, Unsafe_CompareAndSwapObject(JNIEnv *env, jobject unsafe, jobject obj, jlong offset, jobject e_h, jobject x_h))
a61af66fc99e Initial load
duke
parents:
diff changeset
1225 UnsafeWrapper("Unsafe_CompareAndSwapObject");
a61af66fc99e Initial load
duke
parents:
diff changeset
1226 oop x = JNIHandles::resolve(x_h);
a61af66fc99e Initial load
duke
parents:
diff changeset
1227 oop e = JNIHandles::resolve(e_h);
a61af66fc99e Initial load
duke
parents:
diff changeset
1228 oop p = JNIHandles::resolve(obj);
113
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
1229 HeapWord* addr = (HeapWord *)index_oop_from_field_offset_long(p, offset);
6725
da91efe96a93 6964458: Reimplement class meta-data storage to use native memory
coleenp
parents: 6266
diff changeset
1230 oop res = oopDesc::atomic_compare_exchange_oop(x, addr, e, true);
113
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
1231 jboolean success = (res == e);
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1232 if (success)
113
ba764ed4b6f2 6420645: Create a vm that uses compressed oops for up to 32gb heapsizes
coleenp
parents: 0
diff changeset
1233 update_barrier_set((void*)addr, x);
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1234 return success;
a61af66fc99e Initial load
duke
parents:
diff changeset
1235 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
1236
a61af66fc99e Initial load
duke
parents:
diff changeset
1237 UNSAFE_ENTRY(jboolean, Unsafe_CompareAndSwapInt(JNIEnv *env, jobject unsafe, jobject obj, jlong offset, jint e, jint x))
a61af66fc99e Initial load
duke
parents:
diff changeset
1238 UnsafeWrapper("Unsafe_CompareAndSwapInt");
a61af66fc99e Initial load
duke
parents:
diff changeset
1239 oop p = JNIHandles::resolve(obj);
a61af66fc99e Initial load
duke
parents:
diff changeset
1240 jint* addr = (jint *) index_oop_from_field_offset_long(p, offset);
a61af66fc99e Initial load
duke
parents:
diff changeset
1241 return (jint)(Atomic::cmpxchg(x, addr, e)) == e;
a61af66fc99e Initial load
duke
parents:
diff changeset
1242 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
1243
a61af66fc99e Initial load
duke
parents:
diff changeset
1244 UNSAFE_ENTRY(jboolean, Unsafe_CompareAndSwapLong(JNIEnv *env, jobject unsafe, jobject obj, jlong offset, jlong e, jlong x))
a61af66fc99e Initial load
duke
parents:
diff changeset
1245 UnsafeWrapper("Unsafe_CompareAndSwapLong");
a61af66fc99e Initial load
duke
parents:
diff changeset
1246 Handle p (THREAD, JNIHandles::resolve(obj));
a61af66fc99e Initial load
duke
parents:
diff changeset
1247 jlong* addr = (jlong*)(index_oop_from_field_offset_long(p(), offset));
22797
f46871c6c063 8035663: Suspicious failure of test java/util/concurrent/Phaser/FickleRegister.java
dholmes
parents: 20415
diff changeset
1248 #ifdef SUPPORTS_NATIVE_CX8
f46871c6c063 8035663: Suspicious failure of test java/util/concurrent/Phaser/FickleRegister.java
dholmes
parents: 20415
diff changeset
1249 return (jlong)(Atomic::cmpxchg(x, addr, e)) == e;
f46871c6c063 8035663: Suspicious failure of test java/util/concurrent/Phaser/FickleRegister.java
dholmes
parents: 20415
diff changeset
1250 #else
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1251 if (VM_Version::supports_cx8())
a61af66fc99e Initial load
duke
parents:
diff changeset
1252 return (jlong)(Atomic::cmpxchg(x, addr, e)) == e;
a61af66fc99e Initial load
duke
parents:
diff changeset
1253 else {
a61af66fc99e Initial load
duke
parents:
diff changeset
1254 jboolean success = false;
22797
f46871c6c063 8035663: Suspicious failure of test java/util/concurrent/Phaser/FickleRegister.java
dholmes
parents: 20415
diff changeset
1255 MutexLockerEx mu(UnsafeJlong_lock, Mutex::_no_safepoint_check_flag);
f46871c6c063 8035663: Suspicious failure of test java/util/concurrent/Phaser/FickleRegister.java
dholmes
parents: 20415
diff changeset
1256 jlong val = Atomic::load(addr);
f46871c6c063 8035663: Suspicious failure of test java/util/concurrent/Phaser/FickleRegister.java
dholmes
parents: 20415
diff changeset
1257 if (val == e) { Atomic::store(x, addr); success = true; }
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1258 return success;
a61af66fc99e Initial load
duke
parents:
diff changeset
1259 }
22797
f46871c6c063 8035663: Suspicious failure of test java/util/concurrent/Phaser/FickleRegister.java
dholmes
parents: 20415
diff changeset
1260 #endif
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1261 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
1262
a61af66fc99e Initial load
duke
parents:
diff changeset
1263 UNSAFE_ENTRY(void, Unsafe_Park(JNIEnv *env, jobject unsafe, jboolean isAbsolute, jlong time))
a61af66fc99e Initial load
duke
parents:
diff changeset
1264 UnsafeWrapper("Unsafe_Park");
10405
f2110083203d 8005849: JEP 167: Event-Based JVM Tracing
sla
parents: 10399
diff changeset
1265 EventThreadPark event;
4006
436b4a3231bf 7098194: integrate macosx-port changes
dcubed
parents: 3938
diff changeset
1266 #ifndef USDT2
1324
e392695de029 6935224: Adding new DTrace probes to work with Palantir
fparain
parents: 845
diff changeset
1267 HS_DTRACE_PROBE3(hotspot, thread__park__begin, thread->parker(), (int) isAbsolute, time);
4006
436b4a3231bf 7098194: integrate macosx-port changes
dcubed
parents: 3938
diff changeset
1268 #else /* USDT2 */
436b4a3231bf 7098194: integrate macosx-port changes
dcubed
parents: 3938
diff changeset
1269 HOTSPOT_THREAD_PARK_BEGIN(
436b4a3231bf 7098194: integrate macosx-port changes
dcubed
parents: 3938
diff changeset
1270 (uintptr_t) thread->parker(), (int) isAbsolute, time);
436b4a3231bf 7098194: integrate macosx-port changes
dcubed
parents: 3938
diff changeset
1271 #endif /* USDT2 */
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1272 JavaThreadParkedState jtps(thread, time != 0);
a61af66fc99e Initial load
duke
parents:
diff changeset
1273 thread->parker()->park(isAbsolute != 0, time);
4006
436b4a3231bf 7098194: integrate macosx-port changes
dcubed
parents: 3938
diff changeset
1274 #ifndef USDT2
1324
e392695de029 6935224: Adding new DTrace probes to work with Palantir
fparain
parents: 845
diff changeset
1275 HS_DTRACE_PROBE1(hotspot, thread__park__end, thread->parker());
4006
436b4a3231bf 7098194: integrate macosx-port changes
dcubed
parents: 3938
diff changeset
1276 #else /* USDT2 */
436b4a3231bf 7098194: integrate macosx-port changes
dcubed
parents: 3938
diff changeset
1277 HOTSPOT_THREAD_PARK_END(
436b4a3231bf 7098194: integrate macosx-port changes
dcubed
parents: 3938
diff changeset
1278 (uintptr_t) thread->parker());
436b4a3231bf 7098194: integrate macosx-port changes
dcubed
parents: 3938
diff changeset
1279 #endif /* USDT2 */
10405
f2110083203d 8005849: JEP 167: Event-Based JVM Tracing
sla
parents: 10399
diff changeset
1280 if (event.should_commit()) {
f2110083203d 8005849: JEP 167: Event-Based JVM Tracing
sla
parents: 10399
diff changeset
1281 oop obj = thread->current_park_blocker();
12316
190899198332 7195622: CheckUnhandledOops has limited usefulness now
hseigel
parents: 10405
diff changeset
1282 event.set_klass((obj != NULL) ? obj->klass() : NULL);
10405
f2110083203d 8005849: JEP 167: Event-Based JVM Tracing
sla
parents: 10399
diff changeset
1283 event.set_timeout(time);
12316
190899198332 7195622: CheckUnhandledOops has limited usefulness now
hseigel
parents: 10405
diff changeset
1284 event.set_address((obj != NULL) ? (TYPE_ADDRESS) cast_from_oop<uintptr_t>(obj) : 0);
10405
f2110083203d 8005849: JEP 167: Event-Based JVM Tracing
sla
parents: 10399
diff changeset
1285 event.commit();
f2110083203d 8005849: JEP 167: Event-Based JVM Tracing
sla
parents: 10399
diff changeset
1286 }
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1287 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
1288
a61af66fc99e Initial load
duke
parents:
diff changeset
1289 UNSAFE_ENTRY(void, Unsafe_Unpark(JNIEnv *env, jobject unsafe, jobject jthread))
a61af66fc99e Initial load
duke
parents:
diff changeset
1290 UnsafeWrapper("Unsafe_Unpark");
a61af66fc99e Initial load
duke
parents:
diff changeset
1291 Parker* p = NULL;
a61af66fc99e Initial load
duke
parents:
diff changeset
1292 if (jthread != NULL) {
a61af66fc99e Initial load
duke
parents:
diff changeset
1293 oop java_thread = JNIHandles::resolve_non_null(jthread);
a61af66fc99e Initial load
duke
parents:
diff changeset
1294 if (java_thread != NULL) {
a61af66fc99e Initial load
duke
parents:
diff changeset
1295 jlong lp = java_lang_Thread::park_event(java_thread);
a61af66fc99e Initial load
duke
parents:
diff changeset
1296 if (lp != 0) {
a61af66fc99e Initial load
duke
parents:
diff changeset
1297 // This cast is OK even though the jlong might have been read
a61af66fc99e Initial load
duke
parents:
diff changeset
1298 // non-atomically on 32bit systems, since there, one word will
a61af66fc99e Initial load
duke
parents:
diff changeset
1299 // always be zero anyway and the value set is always the same
a61af66fc99e Initial load
duke
parents:
diff changeset
1300 p = (Parker*)addr_from_java(lp);
a61af66fc99e Initial load
duke
parents:
diff changeset
1301 } else {
a61af66fc99e Initial load
duke
parents:
diff changeset
1302 // Grab lock if apparently null or using older version of library
a61af66fc99e Initial load
duke
parents:
diff changeset
1303 MutexLocker mu(Threads_lock);
a61af66fc99e Initial load
duke
parents:
diff changeset
1304 java_thread = JNIHandles::resolve_non_null(jthread);
a61af66fc99e Initial load
duke
parents:
diff changeset
1305 if (java_thread != NULL) {
a61af66fc99e Initial load
duke
parents:
diff changeset
1306 JavaThread* thr = java_lang_Thread::thread(java_thread);
a61af66fc99e Initial load
duke
parents:
diff changeset
1307 if (thr != NULL) {
a61af66fc99e Initial load
duke
parents:
diff changeset
1308 p = thr->parker();
a61af66fc99e Initial load
duke
parents:
diff changeset
1309 if (p != NULL) { // Bind to Java thread for next time.
a61af66fc99e Initial load
duke
parents:
diff changeset
1310 java_lang_Thread::set_park_event(java_thread, addr_to_java(p));
a61af66fc99e Initial load
duke
parents:
diff changeset
1311 }
a61af66fc99e Initial load
duke
parents:
diff changeset
1312 }
a61af66fc99e Initial load
duke
parents:
diff changeset
1313 }
a61af66fc99e Initial load
duke
parents:
diff changeset
1314 }
a61af66fc99e Initial load
duke
parents:
diff changeset
1315 }
a61af66fc99e Initial load
duke
parents:
diff changeset
1316 }
a61af66fc99e Initial load
duke
parents:
diff changeset
1317 if (p != NULL) {
4006
436b4a3231bf 7098194: integrate macosx-port changes
dcubed
parents: 3938
diff changeset
1318 #ifndef USDT2
1324
e392695de029 6935224: Adding new DTrace probes to work with Palantir
fparain
parents: 845
diff changeset
1319 HS_DTRACE_PROBE1(hotspot, thread__unpark, p);
4006
436b4a3231bf 7098194: integrate macosx-port changes
dcubed
parents: 3938
diff changeset
1320 #else /* USDT2 */
436b4a3231bf 7098194: integrate macosx-port changes
dcubed
parents: 3938
diff changeset
1321 HOTSPOT_THREAD_UNPARK(
436b4a3231bf 7098194: integrate macosx-port changes
dcubed
parents: 3938
diff changeset
1322 (uintptr_t) p);
436b4a3231bf 7098194: integrate macosx-port changes
dcubed
parents: 3938
diff changeset
1323 #endif /* USDT2 */
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1324 p->unpark();
a61af66fc99e Initial load
duke
parents:
diff changeset
1325 }
a61af66fc99e Initial load
duke
parents:
diff changeset
1326 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
1327
a61af66fc99e Initial load
duke
parents:
diff changeset
1328 UNSAFE_ENTRY(jint, Unsafe_Loadavg(JNIEnv *env, jobject unsafe, jdoubleArray loadavg, jint nelem))
a61af66fc99e Initial load
duke
parents:
diff changeset
1329 UnsafeWrapper("Unsafe_Loadavg");
a61af66fc99e Initial load
duke
parents:
diff changeset
1330 const int max_nelem = 3;
a61af66fc99e Initial load
duke
parents:
diff changeset
1331 double la[max_nelem];
a61af66fc99e Initial load
duke
parents:
diff changeset
1332 jint ret;
a61af66fc99e Initial load
duke
parents:
diff changeset
1333
a61af66fc99e Initial load
duke
parents:
diff changeset
1334 typeArrayOop a = typeArrayOop(JNIHandles::resolve_non_null(loadavg));
a61af66fc99e Initial load
duke
parents:
diff changeset
1335 assert(a->is_typeArray(), "must be type array");
a61af66fc99e Initial load
duke
parents:
diff changeset
1336
a61af66fc99e Initial load
duke
parents:
diff changeset
1337 if (nelem < 0 || nelem > max_nelem || a->length() < nelem) {
a61af66fc99e Initial load
duke
parents:
diff changeset
1338 ThreadToNativeFromVM ttnfv(thread);
a61af66fc99e Initial load
duke
parents:
diff changeset
1339 throw_new(env, "ArrayIndexOutOfBoundsException");
a61af66fc99e Initial load
duke
parents:
diff changeset
1340 return -1;
a61af66fc99e Initial load
duke
parents:
diff changeset
1341 }
a61af66fc99e Initial load
duke
parents:
diff changeset
1342
a61af66fc99e Initial load
duke
parents:
diff changeset
1343 ret = os::loadavg(la, nelem);
a61af66fc99e Initial load
duke
parents:
diff changeset
1344 if (ret == -1) return -1;
a61af66fc99e Initial load
duke
parents:
diff changeset
1345
a61af66fc99e Initial load
duke
parents:
diff changeset
1346 // if successful, ret is the number of samples actually retrieved.
a61af66fc99e Initial load
duke
parents:
diff changeset
1347 assert(ret >= 0 && ret <= max_nelem, "Unexpected loadavg return value");
a61af66fc99e Initial load
duke
parents:
diff changeset
1348 switch(ret) {
a61af66fc99e Initial load
duke
parents:
diff changeset
1349 case 3: a->double_at_put(2, (jdouble)la[2]); // fall through
a61af66fc99e Initial load
duke
parents:
diff changeset
1350 case 2: a->double_at_put(1, (jdouble)la[1]); // fall through
a61af66fc99e Initial load
duke
parents:
diff changeset
1351 case 1: a->double_at_put(0, (jdouble)la[0]); break;
a61af66fc99e Initial load
duke
parents:
diff changeset
1352 }
a61af66fc99e Initial load
duke
parents:
diff changeset
1353 return ret;
a61af66fc99e Initial load
duke
parents:
diff changeset
1354 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
1355
a61af66fc99e Initial load
duke
parents:
diff changeset
1356 UNSAFE_ENTRY(void, Unsafe_PrefetchRead(JNIEnv* env, jclass ignored, jobject obj, jlong offset))
a61af66fc99e Initial load
duke
parents:
diff changeset
1357 UnsafeWrapper("Unsafe_PrefetchRead");
a61af66fc99e Initial load
duke
parents:
diff changeset
1358 oop p = JNIHandles::resolve(obj);
a61af66fc99e Initial load
duke
parents:
diff changeset
1359 void* addr = index_oop_from_field_offset_long(p, 0);
a61af66fc99e Initial load
duke
parents:
diff changeset
1360 Prefetch::read(addr, (intx)offset);
a61af66fc99e Initial load
duke
parents:
diff changeset
1361 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
1362
a61af66fc99e Initial load
duke
parents:
diff changeset
1363 UNSAFE_ENTRY(void, Unsafe_PrefetchWrite(JNIEnv* env, jclass ignored, jobject obj, jlong offset))
a61af66fc99e Initial load
duke
parents:
diff changeset
1364 UnsafeWrapper("Unsafe_PrefetchWrite");
a61af66fc99e Initial load
duke
parents:
diff changeset
1365 oop p = JNIHandles::resolve(obj);
a61af66fc99e Initial load
duke
parents:
diff changeset
1366 void* addr = index_oop_from_field_offset_long(p, 0);
a61af66fc99e Initial load
duke
parents:
diff changeset
1367 Prefetch::write(addr, (intx)offset);
a61af66fc99e Initial load
duke
parents:
diff changeset
1368 UNSAFE_END
a61af66fc99e Initial load
duke
parents:
diff changeset
1369
a61af66fc99e Initial load
duke
parents:
diff changeset
1370
a61af66fc99e Initial load
duke
parents:
diff changeset
1371 /// JVM_RegisterUnsafeMethods
a61af66fc99e Initial load
duke
parents:
diff changeset
1372
a61af66fc99e Initial load
duke
parents:
diff changeset
1373 #define ADR "J"
a61af66fc99e Initial load
duke
parents:
diff changeset
1374
a61af66fc99e Initial load
duke
parents:
diff changeset
1375 #define LANG "Ljava/lang/"
a61af66fc99e Initial load
duke
parents:
diff changeset
1376
a61af66fc99e Initial load
duke
parents:
diff changeset
1377 #define OBJ LANG"Object;"
a61af66fc99e Initial load
duke
parents:
diff changeset
1378 #define CLS LANG"Class;"
a61af66fc99e Initial load
duke
parents:
diff changeset
1379 #define CTR LANG"reflect/Constructor;"
a61af66fc99e Initial load
duke
parents:
diff changeset
1380 #define FLD LANG"reflect/Field;"
a61af66fc99e Initial load
duke
parents:
diff changeset
1381 #define MTH LANG"reflect/Method;"
a61af66fc99e Initial load
duke
parents:
diff changeset
1382 #define THR LANG"Throwable;"
a61af66fc99e Initial load
duke
parents:
diff changeset
1383
a61af66fc99e Initial load
duke
parents:
diff changeset
1384 #define DC0_Args LANG"String;[BII"
8866
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1385 #define DC_Args DC0_Args LANG"ClassLoader;" "Ljava/security/ProtectionDomain;"
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1386
a61af66fc99e Initial load
duke
parents:
diff changeset
1387 #define CC (char*) /*cast a literal from (const char*)*/
a61af66fc99e Initial load
duke
parents:
diff changeset
1388 #define FN_PTR(f) CAST_FROM_FN_PTR(void*, &f)
a61af66fc99e Initial load
duke
parents:
diff changeset
1389
a61af66fc99e Initial load
duke
parents:
diff changeset
1390 // define deprecated accessors for compabitility with 1.4.0
a61af66fc99e Initial load
duke
parents:
diff changeset
1391 #define DECLARE_GETSETOOP_140(Boolean, Z) \
a61af66fc99e Initial load
duke
parents:
diff changeset
1392 {CC"get"#Boolean, CC"("OBJ"I)"#Z, FN_PTR(Unsafe_Get##Boolean##140)}, \
a61af66fc99e Initial load
duke
parents:
diff changeset
1393 {CC"put"#Boolean, CC"("OBJ"I"#Z")V", FN_PTR(Unsafe_Set##Boolean##140)}
a61af66fc99e Initial load
duke
parents:
diff changeset
1394
a61af66fc99e Initial load
duke
parents:
diff changeset
1395 // Note: In 1.4.1, getObject and kin take both int and long offsets.
a61af66fc99e Initial load
duke
parents:
diff changeset
1396 #define DECLARE_GETSETOOP_141(Boolean, Z) \
a61af66fc99e Initial load
duke
parents:
diff changeset
1397 {CC"get"#Boolean, CC"("OBJ"J)"#Z, FN_PTR(Unsafe_Get##Boolean)}, \
a61af66fc99e Initial load
duke
parents:
diff changeset
1398 {CC"put"#Boolean, CC"("OBJ"J"#Z")V", FN_PTR(Unsafe_Set##Boolean)}
a61af66fc99e Initial load
duke
parents:
diff changeset
1399
a61af66fc99e Initial load
duke
parents:
diff changeset
1400 // Note: In 1.5.0, there are volatile versions too
a61af66fc99e Initial load
duke
parents:
diff changeset
1401 #define DECLARE_GETSETOOP(Boolean, Z) \
a61af66fc99e Initial load
duke
parents:
diff changeset
1402 {CC"get"#Boolean, CC"("OBJ"J)"#Z, FN_PTR(Unsafe_Get##Boolean)}, \
a61af66fc99e Initial load
duke
parents:
diff changeset
1403 {CC"put"#Boolean, CC"("OBJ"J"#Z")V", FN_PTR(Unsafe_Set##Boolean)}, \
a61af66fc99e Initial load
duke
parents:
diff changeset
1404 {CC"get"#Boolean"Volatile", CC"("OBJ"J)"#Z, FN_PTR(Unsafe_Get##Boolean##Volatile)}, \
a61af66fc99e Initial load
duke
parents:
diff changeset
1405 {CC"put"#Boolean"Volatile", CC"("OBJ"J"#Z")V", FN_PTR(Unsafe_Set##Boolean##Volatile)}
a61af66fc99e Initial load
duke
parents:
diff changeset
1406
a61af66fc99e Initial load
duke
parents:
diff changeset
1407
a61af66fc99e Initial load
duke
parents:
diff changeset
1408 #define DECLARE_GETSETNATIVE(Byte, B) \
a61af66fc99e Initial load
duke
parents:
diff changeset
1409 {CC"get"#Byte, CC"("ADR")"#B, FN_PTR(Unsafe_GetNative##Byte)}, \
a61af66fc99e Initial load
duke
parents:
diff changeset
1410 {CC"put"#Byte, CC"("ADR#B")V", FN_PTR(Unsafe_SetNative##Byte)}
a61af66fc99e Initial load
duke
parents:
diff changeset
1411
a61af66fc99e Initial load
duke
parents:
diff changeset
1412
a61af66fc99e Initial load
duke
parents:
diff changeset
1413
8866
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1414 // These are the methods for 1.4.0
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1415 static JNINativeMethod methods_140[] = {
a61af66fc99e Initial load
duke
parents:
diff changeset
1416 {CC"getObject", CC"("OBJ"I)"OBJ"", FN_PTR(Unsafe_GetObject140)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1417 {CC"putObject", CC"("OBJ"I"OBJ")V", FN_PTR(Unsafe_SetObject140)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1418
a61af66fc99e Initial load
duke
parents:
diff changeset
1419 DECLARE_GETSETOOP_140(Boolean, Z),
a61af66fc99e Initial load
duke
parents:
diff changeset
1420 DECLARE_GETSETOOP_140(Byte, B),
a61af66fc99e Initial load
duke
parents:
diff changeset
1421 DECLARE_GETSETOOP_140(Short, S),
a61af66fc99e Initial load
duke
parents:
diff changeset
1422 DECLARE_GETSETOOP_140(Char, C),
a61af66fc99e Initial load
duke
parents:
diff changeset
1423 DECLARE_GETSETOOP_140(Int, I),
a61af66fc99e Initial load
duke
parents:
diff changeset
1424 DECLARE_GETSETOOP_140(Long, J),
a61af66fc99e Initial load
duke
parents:
diff changeset
1425 DECLARE_GETSETOOP_140(Float, F),
a61af66fc99e Initial load
duke
parents:
diff changeset
1426 DECLARE_GETSETOOP_140(Double, D),
a61af66fc99e Initial load
duke
parents:
diff changeset
1427
a61af66fc99e Initial load
duke
parents:
diff changeset
1428 DECLARE_GETSETNATIVE(Byte, B),
a61af66fc99e Initial load
duke
parents:
diff changeset
1429 DECLARE_GETSETNATIVE(Short, S),
a61af66fc99e Initial load
duke
parents:
diff changeset
1430 DECLARE_GETSETNATIVE(Char, C),
a61af66fc99e Initial load
duke
parents:
diff changeset
1431 DECLARE_GETSETNATIVE(Int, I),
a61af66fc99e Initial load
duke
parents:
diff changeset
1432 DECLARE_GETSETNATIVE(Long, J),
a61af66fc99e Initial load
duke
parents:
diff changeset
1433 DECLARE_GETSETNATIVE(Float, F),
a61af66fc99e Initial load
duke
parents:
diff changeset
1434 DECLARE_GETSETNATIVE(Double, D),
a61af66fc99e Initial load
duke
parents:
diff changeset
1435
a61af66fc99e Initial load
duke
parents:
diff changeset
1436 {CC"getAddress", CC"("ADR")"ADR, FN_PTR(Unsafe_GetNativeAddress)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1437 {CC"putAddress", CC"("ADR""ADR")V", FN_PTR(Unsafe_SetNativeAddress)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1438
a61af66fc99e Initial load
duke
parents:
diff changeset
1439 {CC"allocateMemory", CC"(J)"ADR, FN_PTR(Unsafe_AllocateMemory)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1440 {CC"reallocateMemory", CC"("ADR"J)"ADR, FN_PTR(Unsafe_ReallocateMemory)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1441 {CC"freeMemory", CC"("ADR")V", FN_PTR(Unsafe_FreeMemory)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1442
8866
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1443 {CC"fieldOffset", CC"("FLD")I", FN_PTR(Unsafe_FieldOffset)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1444 {CC"staticFieldBase", CC"("CLS")"OBJ, FN_PTR(Unsafe_StaticFieldBaseFromClass)},
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1445 {CC"ensureClassInitialized",CC"("CLS")V", FN_PTR(Unsafe_EnsureClassInitialized)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1446 {CC"arrayBaseOffset", CC"("CLS")I", FN_PTR(Unsafe_ArrayBaseOffset)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1447 {CC"arrayIndexScale", CC"("CLS")I", FN_PTR(Unsafe_ArrayIndexScale)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1448 {CC"addressSize", CC"()I", FN_PTR(Unsafe_AddressSize)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1449 {CC"pageSize", CC"()I", FN_PTR(Unsafe_PageSize)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1450
a61af66fc99e Initial load
duke
parents:
diff changeset
1451 {CC"defineClass", CC"("DC0_Args")"CLS, FN_PTR(Unsafe_DefineClass0)},
8866
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1452 {CC"defineClass", CC"("DC_Args")"CLS, FN_PTR(Unsafe_DefineClass)},
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1453 {CC"allocateInstance", CC"("CLS")"OBJ, FN_PTR(Unsafe_AllocateInstance)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1454 {CC"monitorEnter", CC"("OBJ")V", FN_PTR(Unsafe_MonitorEnter)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1455 {CC"monitorExit", CC"("OBJ")V", FN_PTR(Unsafe_MonitorExit)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1456 {CC"throwException", CC"("THR")V", FN_PTR(Unsafe_ThrowException)}
a61af66fc99e Initial load
duke
parents:
diff changeset
1457 };
a61af66fc99e Initial load
duke
parents:
diff changeset
1458
8866
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1459 // These are the methods prior to the JSR 166 changes in 1.5.0
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1460 static JNINativeMethod methods_141[] = {
a61af66fc99e Initial load
duke
parents:
diff changeset
1461 {CC"getObject", CC"("OBJ"J)"OBJ"", FN_PTR(Unsafe_GetObject)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1462 {CC"putObject", CC"("OBJ"J"OBJ")V", FN_PTR(Unsafe_SetObject)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1463
a61af66fc99e Initial load
duke
parents:
diff changeset
1464 DECLARE_GETSETOOP_141(Boolean, Z),
a61af66fc99e Initial load
duke
parents:
diff changeset
1465 DECLARE_GETSETOOP_141(Byte, B),
a61af66fc99e Initial load
duke
parents:
diff changeset
1466 DECLARE_GETSETOOP_141(Short, S),
a61af66fc99e Initial load
duke
parents:
diff changeset
1467 DECLARE_GETSETOOP_141(Char, C),
a61af66fc99e Initial load
duke
parents:
diff changeset
1468 DECLARE_GETSETOOP_141(Int, I),
a61af66fc99e Initial load
duke
parents:
diff changeset
1469 DECLARE_GETSETOOP_141(Long, J),
a61af66fc99e Initial load
duke
parents:
diff changeset
1470 DECLARE_GETSETOOP_141(Float, F),
a61af66fc99e Initial load
duke
parents:
diff changeset
1471 DECLARE_GETSETOOP_141(Double, D),
a61af66fc99e Initial load
duke
parents:
diff changeset
1472
a61af66fc99e Initial load
duke
parents:
diff changeset
1473 DECLARE_GETSETNATIVE(Byte, B),
a61af66fc99e Initial load
duke
parents:
diff changeset
1474 DECLARE_GETSETNATIVE(Short, S),
a61af66fc99e Initial load
duke
parents:
diff changeset
1475 DECLARE_GETSETNATIVE(Char, C),
a61af66fc99e Initial load
duke
parents:
diff changeset
1476 DECLARE_GETSETNATIVE(Int, I),
a61af66fc99e Initial load
duke
parents:
diff changeset
1477 DECLARE_GETSETNATIVE(Long, J),
a61af66fc99e Initial load
duke
parents:
diff changeset
1478 DECLARE_GETSETNATIVE(Float, F),
a61af66fc99e Initial load
duke
parents:
diff changeset
1479 DECLARE_GETSETNATIVE(Double, D),
a61af66fc99e Initial load
duke
parents:
diff changeset
1480
a61af66fc99e Initial load
duke
parents:
diff changeset
1481 {CC"getAddress", CC"("ADR")"ADR, FN_PTR(Unsafe_GetNativeAddress)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1482 {CC"putAddress", CC"("ADR""ADR")V", FN_PTR(Unsafe_SetNativeAddress)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1483
a61af66fc99e Initial load
duke
parents:
diff changeset
1484 {CC"allocateMemory", CC"(J)"ADR, FN_PTR(Unsafe_AllocateMemory)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1485 {CC"reallocateMemory", CC"("ADR"J)"ADR, FN_PTR(Unsafe_ReallocateMemory)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1486 {CC"freeMemory", CC"("ADR")V", FN_PTR(Unsafe_FreeMemory)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1487
a61af66fc99e Initial load
duke
parents:
diff changeset
1488 {CC"objectFieldOffset", CC"("FLD")J", FN_PTR(Unsafe_ObjectFieldOffset)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1489 {CC"staticFieldOffset", CC"("FLD")J", FN_PTR(Unsafe_StaticFieldOffset)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1490 {CC"staticFieldBase", CC"("FLD")"OBJ, FN_PTR(Unsafe_StaticFieldBaseFromField)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1491 {CC"ensureClassInitialized",CC"("CLS")V", FN_PTR(Unsafe_EnsureClassInitialized)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1492 {CC"arrayBaseOffset", CC"("CLS")I", FN_PTR(Unsafe_ArrayBaseOffset)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1493 {CC"arrayIndexScale", CC"("CLS")I", FN_PTR(Unsafe_ArrayIndexScale)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1494 {CC"addressSize", CC"()I", FN_PTR(Unsafe_AddressSize)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1495 {CC"pageSize", CC"()I", FN_PTR(Unsafe_PageSize)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1496
a61af66fc99e Initial load
duke
parents:
diff changeset
1497 {CC"defineClass", CC"("DC0_Args")"CLS, FN_PTR(Unsafe_DefineClass0)},
8866
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1498 {CC"defineClass", CC"("DC_Args")"CLS, FN_PTR(Unsafe_DefineClass)},
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1499 {CC"allocateInstance", CC"("CLS")"OBJ, FN_PTR(Unsafe_AllocateInstance)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1500 {CC"monitorEnter", CC"("OBJ")V", FN_PTR(Unsafe_MonitorEnter)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1501 {CC"monitorExit", CC"("OBJ")V", FN_PTR(Unsafe_MonitorExit)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1502 {CC"throwException", CC"("THR")V", FN_PTR(Unsafe_ThrowException)}
a61af66fc99e Initial load
duke
parents:
diff changeset
1503
a61af66fc99e Initial load
duke
parents:
diff changeset
1504 };
a61af66fc99e Initial load
duke
parents:
diff changeset
1505
8866
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1506 // These are the methods prior to the JSR 166 changes in 1.6.0
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1507 static JNINativeMethod methods_15[] = {
a61af66fc99e Initial load
duke
parents:
diff changeset
1508 {CC"getObject", CC"("OBJ"J)"OBJ"", FN_PTR(Unsafe_GetObject)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1509 {CC"putObject", CC"("OBJ"J"OBJ")V", FN_PTR(Unsafe_SetObject)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1510 {CC"getObjectVolatile",CC"("OBJ"J)"OBJ"", FN_PTR(Unsafe_GetObjectVolatile)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1511 {CC"putObjectVolatile",CC"("OBJ"J"OBJ")V", FN_PTR(Unsafe_SetObjectVolatile)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1512
a61af66fc99e Initial load
duke
parents:
diff changeset
1513
a61af66fc99e Initial load
duke
parents:
diff changeset
1514 DECLARE_GETSETOOP(Boolean, Z),
a61af66fc99e Initial load
duke
parents:
diff changeset
1515 DECLARE_GETSETOOP(Byte, B),
a61af66fc99e Initial load
duke
parents:
diff changeset
1516 DECLARE_GETSETOOP(Short, S),
a61af66fc99e Initial load
duke
parents:
diff changeset
1517 DECLARE_GETSETOOP(Char, C),
a61af66fc99e Initial load
duke
parents:
diff changeset
1518 DECLARE_GETSETOOP(Int, I),
a61af66fc99e Initial load
duke
parents:
diff changeset
1519 DECLARE_GETSETOOP(Long, J),
a61af66fc99e Initial load
duke
parents:
diff changeset
1520 DECLARE_GETSETOOP(Float, F),
a61af66fc99e Initial load
duke
parents:
diff changeset
1521 DECLARE_GETSETOOP(Double, D),
a61af66fc99e Initial load
duke
parents:
diff changeset
1522
a61af66fc99e Initial load
duke
parents:
diff changeset
1523 DECLARE_GETSETNATIVE(Byte, B),
a61af66fc99e Initial load
duke
parents:
diff changeset
1524 DECLARE_GETSETNATIVE(Short, S),
a61af66fc99e Initial load
duke
parents:
diff changeset
1525 DECLARE_GETSETNATIVE(Char, C),
a61af66fc99e Initial load
duke
parents:
diff changeset
1526 DECLARE_GETSETNATIVE(Int, I),
a61af66fc99e Initial load
duke
parents:
diff changeset
1527 DECLARE_GETSETNATIVE(Long, J),
a61af66fc99e Initial load
duke
parents:
diff changeset
1528 DECLARE_GETSETNATIVE(Float, F),
a61af66fc99e Initial load
duke
parents:
diff changeset
1529 DECLARE_GETSETNATIVE(Double, D),
a61af66fc99e Initial load
duke
parents:
diff changeset
1530
a61af66fc99e Initial load
duke
parents:
diff changeset
1531 {CC"getAddress", CC"("ADR")"ADR, FN_PTR(Unsafe_GetNativeAddress)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1532 {CC"putAddress", CC"("ADR""ADR")V", FN_PTR(Unsafe_SetNativeAddress)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1533
a61af66fc99e Initial load
duke
parents:
diff changeset
1534 {CC"allocateMemory", CC"(J)"ADR, FN_PTR(Unsafe_AllocateMemory)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1535 {CC"reallocateMemory", CC"("ADR"J)"ADR, FN_PTR(Unsafe_ReallocateMemory)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1536 {CC"freeMemory", CC"("ADR")V", FN_PTR(Unsafe_FreeMemory)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1537
a61af66fc99e Initial load
duke
parents:
diff changeset
1538 {CC"objectFieldOffset", CC"("FLD")J", FN_PTR(Unsafe_ObjectFieldOffset)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1539 {CC"staticFieldOffset", CC"("FLD")J", FN_PTR(Unsafe_StaticFieldOffset)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1540 {CC"staticFieldBase", CC"("FLD")"OBJ, FN_PTR(Unsafe_StaticFieldBaseFromField)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1541 {CC"ensureClassInitialized",CC"("CLS")V", FN_PTR(Unsafe_EnsureClassInitialized)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1542 {CC"arrayBaseOffset", CC"("CLS")I", FN_PTR(Unsafe_ArrayBaseOffset)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1543 {CC"arrayIndexScale", CC"("CLS")I", FN_PTR(Unsafe_ArrayIndexScale)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1544 {CC"addressSize", CC"()I", FN_PTR(Unsafe_AddressSize)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1545 {CC"pageSize", CC"()I", FN_PTR(Unsafe_PageSize)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1546
a61af66fc99e Initial load
duke
parents:
diff changeset
1547 {CC"defineClass", CC"("DC0_Args")"CLS, FN_PTR(Unsafe_DefineClass0)},
8866
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1548 {CC"defineClass", CC"("DC_Args")"CLS, FN_PTR(Unsafe_DefineClass)},
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1549 {CC"allocateInstance", CC"("CLS")"OBJ, FN_PTR(Unsafe_AllocateInstance)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1550 {CC"monitorEnter", CC"("OBJ")V", FN_PTR(Unsafe_MonitorEnter)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1551 {CC"monitorExit", CC"("OBJ")V", FN_PTR(Unsafe_MonitorExit)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1552 {CC"throwException", CC"("THR")V", FN_PTR(Unsafe_ThrowException)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1553 {CC"compareAndSwapObject", CC"("OBJ"J"OBJ""OBJ")Z", FN_PTR(Unsafe_CompareAndSwapObject)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1554 {CC"compareAndSwapInt", CC"("OBJ"J""I""I"")Z", FN_PTR(Unsafe_CompareAndSwapInt)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1555 {CC"compareAndSwapLong", CC"("OBJ"J""J""J"")Z", FN_PTR(Unsafe_CompareAndSwapLong)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1556 {CC"park", CC"(ZJ)V", FN_PTR(Unsafe_Park)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1557 {CC"unpark", CC"("OBJ")V", FN_PTR(Unsafe_Unpark)}
a61af66fc99e Initial load
duke
parents:
diff changeset
1558
a61af66fc99e Initial load
duke
parents:
diff changeset
1559 };
a61af66fc99e Initial load
duke
parents:
diff changeset
1560
8866
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1561 // These are the methods for 1.6.0 and 1.7.0
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1562 static JNINativeMethod methods_16[] = {
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1563 {CC"getObject", CC"("OBJ"J)"OBJ"", FN_PTR(Unsafe_GetObject)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1564 {CC"putObject", CC"("OBJ"J"OBJ")V", FN_PTR(Unsafe_SetObject)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1565 {CC"getObjectVolatile",CC"("OBJ"J)"OBJ"", FN_PTR(Unsafe_GetObjectVolatile)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1566 {CC"putObjectVolatile",CC"("OBJ"J"OBJ")V", FN_PTR(Unsafe_SetObjectVolatile)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1567
8866
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1568 DECLARE_GETSETOOP(Boolean, Z),
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1569 DECLARE_GETSETOOP(Byte, B),
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1570 DECLARE_GETSETOOP(Short, S),
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1571 DECLARE_GETSETOOP(Char, C),
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1572 DECLARE_GETSETOOP(Int, I),
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1573 DECLARE_GETSETOOP(Long, J),
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1574 DECLARE_GETSETOOP(Float, F),
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1575 DECLARE_GETSETOOP(Double, D),
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1576
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1577 DECLARE_GETSETNATIVE(Byte, B),
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1578 DECLARE_GETSETNATIVE(Short, S),
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1579 DECLARE_GETSETNATIVE(Char, C),
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1580 DECLARE_GETSETNATIVE(Int, I),
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1581 DECLARE_GETSETNATIVE(Long, J),
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1582 DECLARE_GETSETNATIVE(Float, F),
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1583 DECLARE_GETSETNATIVE(Double, D),
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1584
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1585 {CC"getAddress", CC"("ADR")"ADR, FN_PTR(Unsafe_GetNativeAddress)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1586 {CC"putAddress", CC"("ADR""ADR")V", FN_PTR(Unsafe_SetNativeAddress)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1587
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1588 {CC"allocateMemory", CC"(J)"ADR, FN_PTR(Unsafe_AllocateMemory)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1589 {CC"reallocateMemory", CC"("ADR"J)"ADR, FN_PTR(Unsafe_ReallocateMemory)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1590 {CC"freeMemory", CC"("ADR")V", FN_PTR(Unsafe_FreeMemory)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1591
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1592 {CC"objectFieldOffset", CC"("FLD")J", FN_PTR(Unsafe_ObjectFieldOffset)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1593 {CC"staticFieldOffset", CC"("FLD")J", FN_PTR(Unsafe_StaticFieldOffset)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1594 {CC"staticFieldBase", CC"("FLD")"OBJ, FN_PTR(Unsafe_StaticFieldBaseFromField)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1595 {CC"ensureClassInitialized",CC"("CLS")V", FN_PTR(Unsafe_EnsureClassInitialized)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1596 {CC"arrayBaseOffset", CC"("CLS")I", FN_PTR(Unsafe_ArrayBaseOffset)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1597 {CC"arrayIndexScale", CC"("CLS")I", FN_PTR(Unsafe_ArrayIndexScale)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1598 {CC"addressSize", CC"()I", FN_PTR(Unsafe_AddressSize)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1599 {CC"pageSize", CC"()I", FN_PTR(Unsafe_PageSize)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1600
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1601 {CC"defineClass", CC"("DC0_Args")"CLS, FN_PTR(Unsafe_DefineClass0)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1602 {CC"defineClass", CC"("DC_Args")"CLS, FN_PTR(Unsafe_DefineClass)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1603 {CC"allocateInstance", CC"("CLS")"OBJ, FN_PTR(Unsafe_AllocateInstance)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1604 {CC"monitorEnter", CC"("OBJ")V", FN_PTR(Unsafe_MonitorEnter)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1605 {CC"monitorExit", CC"("OBJ")V", FN_PTR(Unsafe_MonitorExit)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1606 {CC"tryMonitorEnter", CC"("OBJ")Z", FN_PTR(Unsafe_TryMonitorEnter)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1607 {CC"throwException", CC"("THR")V", FN_PTR(Unsafe_ThrowException)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1608 {CC"compareAndSwapObject", CC"("OBJ"J"OBJ""OBJ")Z", FN_PTR(Unsafe_CompareAndSwapObject)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1609 {CC"compareAndSwapInt", CC"("OBJ"J""I""I"")Z", FN_PTR(Unsafe_CompareAndSwapInt)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1610 {CC"compareAndSwapLong", CC"("OBJ"J""J""J"")Z", FN_PTR(Unsafe_CompareAndSwapLong)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1611 {CC"putOrderedObject", CC"("OBJ"J"OBJ")V", FN_PTR(Unsafe_SetOrderedObject)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1612 {CC"putOrderedInt", CC"("OBJ"JI)V", FN_PTR(Unsafe_SetOrderedInt)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1613 {CC"putOrderedLong", CC"("OBJ"JJ)V", FN_PTR(Unsafe_SetOrderedLong)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1614 {CC"park", CC"(ZJ)V", FN_PTR(Unsafe_Park)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1615 {CC"unpark", CC"("OBJ")V", FN_PTR(Unsafe_Unpark)}
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1616 };
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1617
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1618 // These are the methods for 1.8.0
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1619 static JNINativeMethod methods_18[] = {
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1620 {CC"getObject", CC"("OBJ"J)"OBJ"", FN_PTR(Unsafe_GetObject)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1621 {CC"putObject", CC"("OBJ"J"OBJ")V", FN_PTR(Unsafe_SetObject)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1622 {CC"getObjectVolatile",CC"("OBJ"J)"OBJ"", FN_PTR(Unsafe_GetObjectVolatile)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1623 {CC"putObjectVolatile",CC"("OBJ"J"OBJ")V", FN_PTR(Unsafe_SetObjectVolatile)},
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1624
a61af66fc99e Initial load
duke
parents:
diff changeset
1625 DECLARE_GETSETOOP(Boolean, Z),
a61af66fc99e Initial load
duke
parents:
diff changeset
1626 DECLARE_GETSETOOP(Byte, B),
a61af66fc99e Initial load
duke
parents:
diff changeset
1627 DECLARE_GETSETOOP(Short, S),
a61af66fc99e Initial load
duke
parents:
diff changeset
1628 DECLARE_GETSETOOP(Char, C),
a61af66fc99e Initial load
duke
parents:
diff changeset
1629 DECLARE_GETSETOOP(Int, I),
a61af66fc99e Initial load
duke
parents:
diff changeset
1630 DECLARE_GETSETOOP(Long, J),
a61af66fc99e Initial load
duke
parents:
diff changeset
1631 DECLARE_GETSETOOP(Float, F),
a61af66fc99e Initial load
duke
parents:
diff changeset
1632 DECLARE_GETSETOOP(Double, D),
a61af66fc99e Initial load
duke
parents:
diff changeset
1633
a61af66fc99e Initial load
duke
parents:
diff changeset
1634 DECLARE_GETSETNATIVE(Byte, B),
a61af66fc99e Initial load
duke
parents:
diff changeset
1635 DECLARE_GETSETNATIVE(Short, S),
a61af66fc99e Initial load
duke
parents:
diff changeset
1636 DECLARE_GETSETNATIVE(Char, C),
a61af66fc99e Initial load
duke
parents:
diff changeset
1637 DECLARE_GETSETNATIVE(Int, I),
a61af66fc99e Initial load
duke
parents:
diff changeset
1638 DECLARE_GETSETNATIVE(Long, J),
a61af66fc99e Initial load
duke
parents:
diff changeset
1639 DECLARE_GETSETNATIVE(Float, F),
a61af66fc99e Initial load
duke
parents:
diff changeset
1640 DECLARE_GETSETNATIVE(Double, D),
a61af66fc99e Initial load
duke
parents:
diff changeset
1641
a61af66fc99e Initial load
duke
parents:
diff changeset
1642 {CC"getAddress", CC"("ADR")"ADR, FN_PTR(Unsafe_GetNativeAddress)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1643 {CC"putAddress", CC"("ADR""ADR")V", FN_PTR(Unsafe_SetNativeAddress)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1644
a61af66fc99e Initial load
duke
parents:
diff changeset
1645 {CC"allocateMemory", CC"(J)"ADR, FN_PTR(Unsafe_AllocateMemory)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1646 {CC"reallocateMemory", CC"("ADR"J)"ADR, FN_PTR(Unsafe_ReallocateMemory)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1647 {CC"freeMemory", CC"("ADR")V", FN_PTR(Unsafe_FreeMemory)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1648
a61af66fc99e Initial load
duke
parents:
diff changeset
1649 {CC"objectFieldOffset", CC"("FLD")J", FN_PTR(Unsafe_ObjectFieldOffset)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1650 {CC"staticFieldOffset", CC"("FLD")J", FN_PTR(Unsafe_StaticFieldOffset)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1651 {CC"staticFieldBase", CC"("FLD")"OBJ, FN_PTR(Unsafe_StaticFieldBaseFromField)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1652 {CC"ensureClassInitialized",CC"("CLS")V", FN_PTR(Unsafe_EnsureClassInitialized)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1653 {CC"arrayBaseOffset", CC"("CLS")I", FN_PTR(Unsafe_ArrayBaseOffset)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1654 {CC"arrayIndexScale", CC"("CLS")I", FN_PTR(Unsafe_ArrayIndexScale)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1655 {CC"addressSize", CC"()I", FN_PTR(Unsafe_AddressSize)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1656 {CC"pageSize", CC"()I", FN_PTR(Unsafe_PageSize)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1657
8866
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1658 {CC"defineClass", CC"("DC_Args")"CLS, FN_PTR(Unsafe_DefineClass)},
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1659 {CC"allocateInstance", CC"("CLS")"OBJ, FN_PTR(Unsafe_AllocateInstance)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1660 {CC"monitorEnter", CC"("OBJ")V", FN_PTR(Unsafe_MonitorEnter)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1661 {CC"monitorExit", CC"("OBJ")V", FN_PTR(Unsafe_MonitorExit)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1662 {CC"tryMonitorEnter", CC"("OBJ")Z", FN_PTR(Unsafe_TryMonitorEnter)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1663 {CC"throwException", CC"("THR")V", FN_PTR(Unsafe_ThrowException)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1664 {CC"compareAndSwapObject", CC"("OBJ"J"OBJ""OBJ")Z", FN_PTR(Unsafe_CompareAndSwapObject)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1665 {CC"compareAndSwapInt", CC"("OBJ"J""I""I"")Z", FN_PTR(Unsafe_CompareAndSwapInt)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1666 {CC"compareAndSwapLong", CC"("OBJ"J""J""J"")Z", FN_PTR(Unsafe_CompareAndSwapLong)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1667 {CC"putOrderedObject", CC"("OBJ"J"OBJ")V", FN_PTR(Unsafe_SetOrderedObject)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1668 {CC"putOrderedInt", CC"("OBJ"JI)V", FN_PTR(Unsafe_SetOrderedInt)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1669 {CC"putOrderedLong", CC"("OBJ"JJ)V", FN_PTR(Unsafe_SetOrderedLong)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1670 {CC"park", CC"(ZJ)V", FN_PTR(Unsafe_Park)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1671 {CC"unpark", CC"("OBJ")V", FN_PTR(Unsafe_Unpark)}
a61af66fc99e Initial load
duke
parents:
diff changeset
1672 };
a61af66fc99e Initial load
duke
parents:
diff changeset
1673
a61af66fc99e Initial load
duke
parents:
diff changeset
1674 JNINativeMethod loadavg_method[] = {
8866
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1675 {CC"getLoadAverage", CC"([DI)I", FN_PTR(Unsafe_Loadavg)}
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1676 };
a61af66fc99e Initial load
duke
parents:
diff changeset
1677
a61af66fc99e Initial load
duke
parents:
diff changeset
1678 JNINativeMethod prefetch_methods[] = {
a61af66fc99e Initial load
duke
parents:
diff changeset
1679 {CC"prefetchRead", CC"("OBJ"J)V", FN_PTR(Unsafe_PrefetchRead)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1680 {CC"prefetchWrite", CC"("OBJ"J)V", FN_PTR(Unsafe_PrefetchWrite)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1681 {CC"prefetchReadStatic", CC"("OBJ"J)V", FN_PTR(Unsafe_PrefetchRead)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1682 {CC"prefetchWriteStatic",CC"("OBJ"J)V", FN_PTR(Unsafe_PrefetchWrite)}
a61af66fc99e Initial load
duke
parents:
diff changeset
1683 };
a61af66fc99e Initial load
duke
parents:
diff changeset
1684
8866
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1685 JNINativeMethod memcopy_methods_17[] = {
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1686 {CC"copyMemory", CC"("OBJ"J"OBJ"JJ)V", FN_PTR(Unsafe_CopyMemory2)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1687 {CC"setMemory", CC"("OBJ"JJB)V", FN_PTR(Unsafe_SetMemory2)}
a61af66fc99e Initial load
duke
parents:
diff changeset
1688 };
a61af66fc99e Initial load
duke
parents:
diff changeset
1689
a61af66fc99e Initial load
duke
parents:
diff changeset
1690 JNINativeMethod memcopy_methods_15[] = {
a61af66fc99e Initial load
duke
parents:
diff changeset
1691 {CC"setMemory", CC"("ADR"JB)V", FN_PTR(Unsafe_SetMemory)},
a61af66fc99e Initial load
duke
parents:
diff changeset
1692 {CC"copyMemory", CC"("ADR ADR"J)V", FN_PTR(Unsafe_CopyMemory)}
a61af66fc99e Initial load
duke
parents:
diff changeset
1693 };
a61af66fc99e Initial load
duke
parents:
diff changeset
1694
431
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1695 JNINativeMethod anonk_methods[] = {
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1696 {CC"defineAnonymousClass", CC"("DAC_Args")"CLS, FN_PTR(Unsafe_DefineAnonymousClass)},
a45484ea312d 6653858: dynamic languages need to be able to load anonymous classes
jrose
parents: 356
diff changeset
1697 };
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1698
6266
1d7922586cf6 7023639: JSR 292 method handle invocation needs a fast path for compiled code
twisti
parents: 6226
diff changeset
1699 JNINativeMethod lform_methods[] = {
1d7922586cf6 7023639: JSR 292 method handle invocation needs a fast path for compiled code
twisti
parents: 6226
diff changeset
1700 {CC"shouldBeInitialized",CC"("CLS")Z", FN_PTR(Unsafe_ShouldBeInitialized)},
1d7922586cf6 7023639: JSR 292 method handle invocation needs a fast path for compiled code
twisti
parents: 6226
diff changeset
1701 };
1d7922586cf6 7023639: JSR 292 method handle invocation needs a fast path for compiled code
twisti
parents: 6226
diff changeset
1702
8866
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1703 JNINativeMethod fence_methods[] = {
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1704 {CC"loadFence", CC"()V", FN_PTR(Unsafe_LoadFence)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1705 {CC"storeFence", CC"()V", FN_PTR(Unsafe_StoreFence)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1706 {CC"fullFence", CC"()V", FN_PTR(Unsafe_FullFence)},
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1707 };
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1708
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1709 #undef CC
a61af66fc99e Initial load
duke
parents:
diff changeset
1710 #undef FN_PTR
a61af66fc99e Initial load
duke
parents:
diff changeset
1711
a61af66fc99e Initial load
duke
parents:
diff changeset
1712 #undef ADR
a61af66fc99e Initial load
duke
parents:
diff changeset
1713 #undef LANG
a61af66fc99e Initial load
duke
parents:
diff changeset
1714 #undef OBJ
a61af66fc99e Initial load
duke
parents:
diff changeset
1715 #undef CLS
a61af66fc99e Initial load
duke
parents:
diff changeset
1716 #undef CTR
a61af66fc99e Initial load
duke
parents:
diff changeset
1717 #undef FLD
a61af66fc99e Initial load
duke
parents:
diff changeset
1718 #undef MTH
a61af66fc99e Initial load
duke
parents:
diff changeset
1719 #undef THR
a61af66fc99e Initial load
duke
parents:
diff changeset
1720 #undef DC0_Args
8866
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1721 #undef DC_Args
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1722
a61af66fc99e Initial load
duke
parents:
diff changeset
1723 #undef DECLARE_GETSETOOP
a61af66fc99e Initial load
duke
parents:
diff changeset
1724 #undef DECLARE_GETSETNATIVE
a61af66fc99e Initial load
duke
parents:
diff changeset
1725
a61af66fc99e Initial load
duke
parents:
diff changeset
1726
8866
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1727 /**
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1728 * Helper method to register native methods.
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1729 */
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1730 static bool register_natives(const char* message, JNIEnv* env, jclass clazz, const JNINativeMethod* methods, jint nMethods) {
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1731 int status = env->RegisterNatives(clazz, methods, nMethods);
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1732 if (status < 0 || env->ExceptionOccurred()) {
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1733 if (PrintMiscellaneous && (Verbose || WizardMode)) {
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1734 tty->print_cr("Unsafe: failed registering %s", message);
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1735 }
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1736 env->ExceptionClear();
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1737 return false;
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1738 } else {
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1739 if (PrintMiscellaneous && (Verbose || WizardMode)) {
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1740 tty->print_cr("Unsafe: successfully registered %s", message);
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1741 }
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1742 return true;
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1743 }
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1744 }
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1745
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1746
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1747 // This one function is exported, used by NativeLookup.
a61af66fc99e Initial load
duke
parents:
diff changeset
1748 // The Unsafe_xxx functions above are called only from the interpreter.
a61af66fc99e Initial load
duke
parents:
diff changeset
1749 // The optimizer looks at names and signatures to recognize
a61af66fc99e Initial load
duke
parents:
diff changeset
1750 // individual functions.
a61af66fc99e Initial load
duke
parents:
diff changeset
1751
a61af66fc99e Initial load
duke
parents:
diff changeset
1752 JVM_ENTRY(void, JVM_RegisterUnsafeMethods(JNIEnv *env, jclass unsafecls))
a61af66fc99e Initial load
duke
parents:
diff changeset
1753 UnsafeWrapper("JVM_RegisterUnsafeMethods");
a61af66fc99e Initial load
duke
parents:
diff changeset
1754 {
a61af66fc99e Initial load
duke
parents:
diff changeset
1755 ThreadToNativeFromVM ttnfv(thread);
8866
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1756
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1757 // Unsafe methods
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1758 {
8866
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1759 bool success = false;
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1760 // We need to register the 1.6 methods first because the 1.8 methods would register fine on 1.7 and 1.6
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1761 if (!success) {
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1762 success = register_natives("1.6 methods", env, unsafecls, methods_16, sizeof(methods_16)/sizeof(JNINativeMethod));
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1763 }
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1764 if (!success) {
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1765 success = register_natives("1.8 methods", env, unsafecls, methods_18, sizeof(methods_18)/sizeof(JNINativeMethod));
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1766 }
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1767 if (!success) {
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1768 success = register_natives("1.5 methods", env, unsafecls, methods_15, sizeof(methods_15)/sizeof(JNINativeMethod));
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1769 }
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1770 if (!success) {
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1771 success = register_natives("1.4.1 methods", env, unsafecls, methods_141, sizeof(methods_141)/sizeof(JNINativeMethod));
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1772 }
8866
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1773 if (!success) {
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1774 success = register_natives("1.4.0 methods", env, unsafecls, methods_140, sizeof(methods_140)/sizeof(JNINativeMethod));
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1775 }
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1776 guarantee(success, "register unsafe natives");
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1777 }
8866
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1778
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1779 // Unsafe.getLoadAverage
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1780 register_natives("1.6 loadavg method", env, unsafecls, loadavg_method, sizeof(loadavg_method)/sizeof(JNINativeMethod));
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1781
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1782 // Prefetch methods
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1783 register_natives("1.6 prefetch methods", env, unsafecls, prefetch_methods, sizeof(prefetch_methods)/sizeof(JNINativeMethod));
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1784
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1785 // Memory copy methods
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1786 {
8866
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1787 bool success = false;
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1788 if (!success) {
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1789 success = register_natives("1.7 memory copy methods", env, unsafecls, memcopy_methods_17, sizeof(memcopy_methods_17)/sizeof(JNINativeMethod));
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1790 }
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1791 if (!success) {
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1792 success = register_natives("1.5 memory copy methods", env, unsafecls, memcopy_methods_15, sizeof(memcopy_methods_15)/sizeof(JNINativeMethod));
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1793 }
a61af66fc99e Initial load
duke
parents:
diff changeset
1794 }
8866
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1795
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1796 // Unsafe.defineAnonymousClass
2416
38fea01eb669 6817525: turn on method handle functionality by default for JSR 292
twisti
parents: 2376
diff changeset
1797 if (EnableInvokeDynamic) {
8866
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1798 register_natives("1.7 define anonymous class method", env, unsafecls, anonk_methods, sizeof(anonk_methods)/sizeof(JNINativeMethod));
6266
1d7922586cf6 7023639: JSR 292 method handle invocation needs a fast path for compiled code
twisti
parents: 6226
diff changeset
1799 }
8866
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1800
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1801 // Unsafe.shouldBeInitialized
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1802 if (EnableInvokeDynamic) {
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1803 register_natives("1.7 LambdaForm support", env, unsafecls, lform_methods, sizeof(lform_methods)/sizeof(JNINativeMethod));
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1804 }
8866
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1805
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1806 // Fence methods
16885e702c88 7198429: need checked categorization of caller-sensitive methods in the JDK
twisti
parents: 8001
diff changeset
1807 register_natives("1.8 fence methods", env, unsafecls, fence_methods, sizeof(fence_methods)/sizeof(JNINativeMethod));
0
a61af66fc99e Initial load
duke
parents:
diff changeset
1808 }
a61af66fc99e Initial load
duke
parents:
diff changeset
1809 JVM_END