| /* |
| * Copyright (C) 2008 The Android Open Source Project |
| * |
| * Licensed under the Apache License, Version 2.0 (the "License"); |
| * you may not use this file except in compliance with the License. |
| * You may obtain a copy of the License at |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| */ |
| |
| #include "jni_internal.h" |
| |
| #include <sys/mman.h> |
| #include <zlib.h> |
| |
| #include "base/logging.h" |
| #include "class_linker.h" |
| #include "class_linker-inl.h" |
| #include "dex_file-inl.h" |
| #include "gc/space/space.h" |
| #include "mirror/art_field-inl.h" |
| #include "mirror/art_method-inl.h" |
| #include "mirror/class-inl.h" |
| #include "mirror/object-inl.h" |
| #include "mirror/object_array-inl.h" |
| #include "mirror/throwable.h" |
| #include "object_utils.h" |
| #include "runtime.h" |
| #include "scoped_thread_state_change.h" |
| #include "thread.h" |
| |
| namespace art { |
| |
| static void JniAbort(const char* jni_function_name, const char* msg) { |
| Thread* self = Thread::Current(); |
| ScopedObjectAccess soa(self); |
| mirror::ArtMethod* current_method = self->GetCurrentMethod(nullptr); |
| |
| std::ostringstream os; |
| os << "JNI DETECTED ERROR IN APPLICATION: " << msg; |
| |
| if (jni_function_name != nullptr) { |
| os << "\n in call to " << jni_function_name; |
| } |
| // TODO: is this useful given that we're about to dump the calling thread's stack? |
| if (current_method != nullptr) { |
| os << "\n from " << PrettyMethod(current_method); |
| } |
| os << "\n"; |
| self->Dump(os); |
| |
| JavaVMExt* vm = Runtime::Current()->GetJavaVM(); |
| if (vm->check_jni_abort_hook != nullptr) { |
| vm->check_jni_abort_hook(vm->check_jni_abort_hook_data, os.str()); |
| } else { |
| // Ensure that we get a native stack trace for this thread. |
| self->TransitionFromRunnableToSuspended(kNative); |
| LOG(FATAL) << os.str(); |
| self->TransitionFromSuspendedToRunnable(); // Unreachable, keep annotalysis happy. |
| } |
| } |
| |
| static void JniAbortV(const char* jni_function_name, const char* fmt, va_list ap) { |
| std::string msg; |
| StringAppendV(&msg, fmt, ap); |
| JniAbort(jni_function_name, msg.c_str()); |
| } |
| |
| void JniAbortF(const char* jni_function_name, const char* fmt, ...) { |
| va_list args; |
| va_start(args, fmt); |
| JniAbortV(jni_function_name, fmt, args); |
| va_end(args); |
| } |
| |
| /* |
| * =========================================================================== |
| * JNI function helpers |
| * =========================================================================== |
| */ |
| |
| static bool IsSirtLocalRef(JNIEnv* env, jobject localRef) { |
| return GetIndirectRefKind(localRef) == kSirtOrInvalid && |
| reinterpret_cast<JNIEnvExt*>(env)->self->SirtContains(localRef); |
| } |
| |
| // Flags passed into ScopedCheck. |
| #define kFlag_Default 0x0000 |
| |
| #define kFlag_CritBad 0x0000 // Calling while in critical is not allowed. |
| #define kFlag_CritOkay 0x0001 // Calling while in critical is allowed. |
| #define kFlag_CritGet 0x0002 // This is a critical "get". |
| #define kFlag_CritRelease 0x0003 // This is a critical "release". |
| #define kFlag_CritMask 0x0003 // Bit mask to get "crit" value. |
| |
| #define kFlag_ExcepBad 0x0000 // Raised exceptions are not allowed. |
| #define kFlag_ExcepOkay 0x0004 // Raised exceptions are allowed. |
| |
| #define kFlag_Release 0x0010 // Are we in a non-critical release function? |
| #define kFlag_NullableUtf 0x0020 // Are our UTF parameters nullable? |
| |
| #define kFlag_Invocation 0x8000 // Part of the invocation interface (JavaVM*). |
| |
| #define kFlag_ForceTrace 0x80000000 // Add this to a JNI function's flags if you want to trace every call. |
| |
| static const char* gBuiltInPrefixes[] = { |
| "Landroid/", |
| "Lcom/android/", |
| "Lcom/google/android/", |
| "Ldalvik/", |
| "Ljava/", |
| "Ljavax/", |
| "Llibcore/", |
| "Lorg/apache/harmony/", |
| nullptr |
| }; |
| |
| static bool ShouldTrace(JavaVMExt* vm, mirror::ArtMethod* method) |
| SHARED_LOCKS_REQUIRED(Locks::mutator_lock_) { |
| // If both "-Xcheck:jni" and "-Xjnitrace:" are enabled, we print trace messages |
| // when a native method that matches the -Xjnitrace argument calls a JNI function |
| // such as NewByteArray. |
| // If -verbose:third-party-jni is on, we want to log any JNI function calls |
| // made by a third-party native method. |
| std::string class_name(MethodHelper(method).GetDeclaringClassDescriptor()); |
| if (!vm->trace.empty() && class_name.find(vm->trace) != std::string::npos) { |
| return true; |
| } |
| if (VLOG_IS_ON(third_party_jni)) { |
| // Return true if we're trying to log all third-party JNI activity and 'method' doesn't look |
| // like part of Android. |
| for (size_t i = 0; gBuiltInPrefixes[i] != nullptr; ++i) { |
| if (StartsWith(class_name, gBuiltInPrefixes[i])) { |
| return false; |
| } |
| } |
| return true; |
| } |
| return false; |
| } |
| |
| class ScopedCheck { |
| public: |
| // For JNIEnv* functions. |
| explicit ScopedCheck(JNIEnv* env, int flags, const char* functionName) |
| SHARED_LOCK_FUNCTION(Locks::mutator_lock_) |
| : soa_(env) { |
| Init(flags, functionName, true); |
| CheckThread(flags); |
| } |
| |
| // For JavaVM* functions. |
| // TODO: it's not correct that this is a lock function, but making it so aids annotalysis. |
| explicit ScopedCheck(JavaVM* vm, bool has_method, const char* functionName) |
| SHARED_LOCK_FUNCTION(Locks::mutator_lock_) |
| : soa_(vm) { |
| Init(kFlag_Invocation, functionName, has_method); |
| } |
| |
| ~ScopedCheck() UNLOCK_FUNCTION(Locks::mutator_lock_) {} |
| |
| const ScopedObjectAccess& soa() { |
| return soa_; |
| } |
| |
| bool ForceCopy() { |
| return Runtime::Current()->GetJavaVM()->force_copy; |
| } |
| |
| // Checks that 'class_name' is a valid "fully-qualified" JNI class name, like "java/lang/Thread" |
| // or "[Ljava/lang/Object;". A ClassLoader can actually normalize class names a couple of |
| // times, so using "java.lang.Thread" instead of "java/lang/Thread" might work in some |
| // circumstances, but this is incorrect. |
| void CheckClassName(const char* class_name) { |
| if (!IsValidJniClassName(class_name)) { |
| JniAbortF(function_name_, |
| "illegal class name '%s'\n" |
| " (should be of the form 'package/Class', [Lpackage/Class;' or '[[B')", |
| class_name); |
| } |
| } |
| |
| /* |
| * Verify that the field is of the appropriate type. If the field has an |
| * object type, "java_object" is the object we're trying to assign into it. |
| * |
| * Works for both static and instance fields. |
| */ |
| void CheckFieldType(jvalue value, jfieldID fid, char prim, bool isStatic) |
| SHARED_LOCKS_REQUIRED(Locks::mutator_lock_) { |
| mirror::ArtField* f = CheckFieldID(fid); |
| if (f == nullptr) { |
| return; |
| } |
| mirror::Class* field_type = FieldHelper(f).GetType(); |
| if (!field_type->IsPrimitive()) { |
| jobject java_object = value.l; |
| if (java_object != nullptr) { |
| mirror::Object* obj = soa_.Decode<mirror::Object*>(java_object); |
| // If java_object is a weak global ref whose referent has been cleared, |
| // obj will be NULL. Otherwise, obj should always be non-NULL |
| // and valid. |
| if (!Runtime::Current()->GetHeap()->IsValidObjectAddress(obj)) { |
| Runtime::Current()->GetHeap()->DumpSpaces(); |
| JniAbortF(function_name_, "field operation on invalid %s: %p", |
| ToStr<IndirectRefKind>(GetIndirectRefKind(java_object)).c_str(), java_object); |
| return; |
| } else { |
| if (!obj->InstanceOf(field_type)) { |
| JniAbortF(function_name_, "attempt to set field %s with value of wrong type: %s", |
| PrettyField(f).c_str(), PrettyTypeOf(obj).c_str()); |
| return; |
| } |
| } |
| } |
| } else if (field_type != Runtime::Current()->GetClassLinker()->FindPrimitiveClass(prim)) { |
| JniAbortF(function_name_, "attempt to set field %s with value of wrong type: %c", |
| PrettyField(f).c_str(), prim); |
| return; |
| } |
| |
| if (isStatic != f->IsStatic()) { |
| if (isStatic) { |
| JniAbortF(function_name_, "accessing non-static field %s as static", PrettyField(f).c_str()); |
| } else { |
| JniAbortF(function_name_, "accessing static field %s as non-static", PrettyField(f).c_str()); |
| } |
| return; |
| } |
| } |
| |
| /* |
| * Verify that this instance field ID is valid for this object. |
| * |
| * Assumes "jobj" has already been validated. |
| */ |
| void CheckInstanceFieldID(jobject java_object, jfieldID fid) |
| SHARED_LOCKS_REQUIRED(Locks::mutator_lock_) { |
| mirror::Object* o = soa_.Decode<mirror::Object*>(java_object); |
| if (o == nullptr || !Runtime::Current()->GetHeap()->IsValidObjectAddress(o)) { |
| Runtime::Current()->GetHeap()->DumpSpaces(); |
| JniAbortF(function_name_, "field operation on invalid %s: %p", |
| ToStr<IndirectRefKind>(GetIndirectRefKind(java_object)).c_str(), java_object); |
| return; |
| } |
| |
| mirror::ArtField* f = CheckFieldID(fid); |
| if (f == nullptr) { |
| return; |
| } |
| mirror::Class* c = o->GetClass(); |
| FieldHelper fh(f); |
| if (c->FindInstanceField(fh.GetName(), fh.GetTypeDescriptor()) == nullptr) { |
| JniAbortF(function_name_, "jfieldID %s not valid for an object of class %s", |
| PrettyField(f).c_str(), PrettyTypeOf(o).c_str()); |
| } |
| } |
| |
| /* |
| * Verify that the pointer value is non-NULL. |
| */ |
| void CheckNonNull(const void* ptr) { |
| if (ptr == nullptr) { |
| JniAbortF(function_name_, "non-nullable argument was NULL"); |
| } |
| } |
| |
| /* |
| * Verify that the method's return type matches the type of call. |
| * 'expectedType' will be "L" for all objects, including arrays. |
| */ |
| void CheckSig(jmethodID mid, const char* expectedType, bool isStatic) |
| SHARED_LOCKS_REQUIRED(Locks::mutator_lock_) { |
| mirror::ArtMethod* m = CheckMethodID(mid); |
| if (m == nullptr) { |
| return; |
| } |
| if (*expectedType != MethodHelper(m).GetShorty()[0]) { |
| JniAbortF(function_name_, "the return type of %s does not match %s", |
| function_name_, PrettyMethod(m).c_str()); |
| } |
| if (isStatic != m->IsStatic()) { |
| if (isStatic) { |
| JniAbortF(function_name_, "calling non-static method %s with %s", |
| PrettyMethod(m).c_str(), function_name_); |
| } else { |
| JniAbortF(function_name_, "calling static method %s with %s", |
| PrettyMethod(m).c_str(), function_name_); |
| } |
| } |
| } |
| |
| /* |
| * Verify that this static field ID is valid for this class. |
| * |
| * Assumes "java_class" has already been validated. |
| */ |
| void CheckStaticFieldID(jclass java_class, jfieldID fid) |
| SHARED_LOCKS_REQUIRED(Locks::mutator_lock_) { |
| mirror::Class* c = soa_.Decode<mirror::Class*>(java_class); |
| mirror::ArtField* f = CheckFieldID(fid); |
| if (f == nullptr) { |
| return; |
| } |
| if (f->GetDeclaringClass() != c) { |
| JniAbortF(function_name_, "static jfieldID %p not valid for class %s", |
| fid, PrettyClass(c).c_str()); |
| } |
| } |
| |
| /* |
| * Verify that "mid" is appropriate for "java_class". |
| * |
| * A mismatch isn't dangerous, because the jmethodID defines the class. In |
| * fact, java_class is unused in the implementation. It's best if we don't |
| * allow bad code in the system though. |
| * |
| * Instances of "java_class" must be instances of the method's declaring class. |
| */ |
| void CheckStaticMethod(jclass java_class, jmethodID mid) |
| SHARED_LOCKS_REQUIRED(Locks::mutator_lock_) { |
| mirror::ArtMethod* m = CheckMethodID(mid); |
| if (m == nullptr) { |
| return; |
| } |
| mirror::Class* c = soa_.Decode<mirror::Class*>(java_class); |
| if (!m->GetDeclaringClass()->IsAssignableFrom(c)) { |
| JniAbortF(function_name_, "can't call static %s on class %s", |
| PrettyMethod(m).c_str(), PrettyClass(c).c_str()); |
| } |
| } |
| |
| /* |
| * Verify that "mid" is appropriate for "jobj". |
| * |
| * Make sure the object is an instance of the method's declaring class. |
| * (Note the mid might point to a declaration in an interface; this |
| * will be handled automatically by the instanceof check.) |
| */ |
| void CheckVirtualMethod(jobject java_object, jmethodID mid) |
| SHARED_LOCKS_REQUIRED(Locks::mutator_lock_) { |
| mirror::ArtMethod* m = CheckMethodID(mid); |
| if (m == nullptr) { |
| return; |
| } |
| mirror::Object* o = soa_.Decode<mirror::Object*>(java_object); |
| if (!o->InstanceOf(m->GetDeclaringClass())) { |
| JniAbortF(function_name_, "can't call %s on instance of %s", |
| PrettyMethod(m).c_str(), PrettyTypeOf(o).c_str()); |
| } |
| } |
| |
| /** |
| * The format string is a sequence of the following characters, |
| * and must be followed by arguments of the corresponding types |
| * in the same order. |
| * |
| * Java primitive types: |
| * B - jbyte |
| * C - jchar |
| * D - jdouble |
| * F - jfloat |
| * I - jint |
| * J - jlong |
| * S - jshort |
| * Z - jboolean (shown as true and false) |
| * V - void |
| * |
| * Java reference types: |
| * L - jobject |
| * a - jarray |
| * c - jclass |
| * s - jstring |
| * |
| * JNI types: |
| * b - jboolean (shown as JNI_TRUE and JNI_FALSE) |
| * f - jfieldID |
| * m - jmethodID |
| * p - void* |
| * r - jint (for release mode arguments) |
| * u - const char* (Modified UTF-8) |
| * z - jsize (for lengths; use i if negative values are okay) |
| * v - JavaVM* |
| * E - JNIEnv* |
| * . - no argument; just print "..." (used for varargs JNI calls) |
| * |
| * Use the kFlag_NullableUtf flag where 'u' field(s) are nullable. |
| */ |
| void Check(bool entry, const char* fmt0, ...) SHARED_LOCKS_REQUIRED(Locks::mutator_lock_) { |
| va_list ap; |
| |
| mirror::ArtMethod* traceMethod = nullptr; |
| if (has_method_ && (!soa_.Vm()->trace.empty() || VLOG_IS_ON(third_party_jni))) { |
| // We need to guard some of the invocation interface's calls: a bad caller might |
| // use DetachCurrentThread or GetEnv on a thread that's not yet attached. |
| Thread* self = Thread::Current(); |
| if ((flags_ & kFlag_Invocation) == 0 || self != nullptr) { |
| traceMethod = self->GetCurrentMethod(nullptr); |
| } |
| } |
| |
| if (((flags_ & kFlag_ForceTrace) != 0) || |
| (traceMethod != nullptr && ShouldTrace(soa_.Vm(), traceMethod))) { |
| va_start(ap, fmt0); |
| std::string msg; |
| for (const char* fmt = fmt0; *fmt;) { |
| char ch = *fmt++; |
| if (ch == 'B') { // jbyte |
| jbyte b = va_arg(ap, int); |
| if (b >= 0 && b < 10) { |
| StringAppendF(&msg, "%d", b); |
| } else { |
| StringAppendF(&msg, "%#x (%d)", b, b); |
| } |
| } else if (ch == 'C') { // jchar |
| jchar c = va_arg(ap, int); |
| if (c < 0x7f && c >= ' ') { |
| StringAppendF(&msg, "U+%x ('%c')", c, c); |
| } else { |
| StringAppendF(&msg, "U+%x", c); |
| } |
| } else if (ch == 'F' || ch == 'D') { // jfloat, jdouble |
| StringAppendF(&msg, "%g", va_arg(ap, double)); |
| } else if (ch == 'I' || ch == 'S') { // jint, jshort |
| StringAppendF(&msg, "%d", va_arg(ap, int)); |
| } else if (ch == 'J') { // jlong |
| StringAppendF(&msg, "%" PRId64, va_arg(ap, jlong)); |
| } else if (ch == 'Z') { // jboolean |
| StringAppendF(&msg, "%s", va_arg(ap, int) ? "true" : "false"); |
| } else if (ch == 'V') { // void |
| msg += "void"; |
| } else if (ch == 'v') { // JavaVM* |
| JavaVM* vm = va_arg(ap, JavaVM*); |
| StringAppendF(&msg, "(JavaVM*)%p", vm); |
| } else if (ch == 'E') { // JNIEnv* |
| JNIEnv* env = va_arg(ap, JNIEnv*); |
| StringAppendF(&msg, "(JNIEnv*)%p", env); |
| } else if (ch == 'L' || ch == 'a' || ch == 's') { // jobject, jarray, jstring |
| // For logging purposes, these are identical. |
| jobject o = va_arg(ap, jobject); |
| if (o == nullptr) { |
| msg += "NULL"; |
| } else { |
| StringAppendF(&msg, "%p", o); |
| } |
| } else if (ch == 'b') { // jboolean (JNI-style) |
| jboolean b = va_arg(ap, int); |
| msg += (b ? "JNI_TRUE" : "JNI_FALSE"); |
| } else if (ch == 'c') { // jclass |
| jclass jc = va_arg(ap, jclass); |
| mirror::Class* c = reinterpret_cast<mirror::Class*>(Thread::Current()->DecodeJObject(jc)); |
| if (c == nullptr) { |
| msg += "NULL"; |
| } else if (c == kInvalidIndirectRefObject || |
| !Runtime::Current()->GetHeap()->IsValidObjectAddress(c)) { |
| StringAppendF(&msg, "INVALID POINTER:%p", jc); |
| } else if (!c->IsClass()) { |
| msg += "INVALID NON-CLASS OBJECT OF TYPE:" + PrettyTypeOf(c); |
| } else { |
| msg += PrettyClass(c); |
| if (!entry) { |
| StringAppendF(&msg, " (%p)", jc); |
| } |
| } |
| } else if (ch == 'f') { // jfieldID |
| jfieldID fid = va_arg(ap, jfieldID); |
| mirror::ArtField* f = reinterpret_cast<mirror::ArtField*>(fid); |
| msg += PrettyField(f); |
| if (!entry) { |
| StringAppendF(&msg, " (%p)", fid); |
| } |
| } else if (ch == 'z') { // non-negative jsize |
| // You might expect jsize to be size_t, but it's not; it's the same as jint. |
| // We only treat this specially so we can do the non-negative check. |
| // TODO: maybe this wasn't worth it? |
| jint i = va_arg(ap, jint); |
| StringAppendF(&msg, "%d", i); |
| } else if (ch == 'm') { // jmethodID |
| jmethodID mid = va_arg(ap, jmethodID); |
| mirror::ArtMethod* m = reinterpret_cast<mirror::ArtMethod*>(mid); |
| msg += PrettyMethod(m); |
| if (!entry) { |
| StringAppendF(&msg, " (%p)", mid); |
| } |
| } else if (ch == 'p') { // void* ("pointer") |
| void* p = va_arg(ap, void*); |
| if (p == nullptr) { |
| msg += "NULL"; |
| } else { |
| StringAppendF(&msg, "(void*) %p", p); |
| } |
| } else if (ch == 'r') { // jint (release mode) |
| jint releaseMode = va_arg(ap, jint); |
| if (releaseMode == 0) { |
| msg += "0"; |
| } else if (releaseMode == JNI_ABORT) { |
| msg += "JNI_ABORT"; |
| } else if (releaseMode == JNI_COMMIT) { |
| msg += "JNI_COMMIT"; |
| } else { |
| StringAppendF(&msg, "invalid release mode %d", releaseMode); |
| } |
| } else if (ch == 'u') { // const char* (Modified UTF-8) |
| const char* utf = va_arg(ap, const char*); |
| if (utf == nullptr) { |
| msg += "NULL"; |
| } else { |
| StringAppendF(&msg, "\"%s\"", utf); |
| } |
| } else if (ch == '.') { |
| msg += "..."; |
| } else { |
| JniAbortF(function_name_, "unknown trace format specifier: %c", ch); |
| return; |
| } |
| if (*fmt) { |
| StringAppendF(&msg, ", "); |
| } |
| } |
| va_end(ap); |
| |
| if ((flags_ & kFlag_ForceTrace) != 0) { |
| LOG(INFO) << "JNI: call to " << function_name_ << "(" << msg << ")"; |
| } else if (entry) { |
| if (has_method_) { |
| std::string methodName(PrettyMethod(traceMethod, false)); |
| LOG(INFO) << "JNI: " << methodName << " -> " << function_name_ << "(" << msg << ")"; |
| indent_ = methodName.size() + 1; |
| } else { |
| LOG(INFO) << "JNI: -> " << function_name_ << "(" << msg << ")"; |
| indent_ = 0; |
| } |
| } else { |
| LOG(INFO) << StringPrintf("JNI: %*s<- %s returned %s", indent_, "", function_name_, msg.c_str()); |
| } |
| } |
| |
| // We always do the thorough checks on entry, and never on exit... |
| if (entry) { |
| va_start(ap, fmt0); |
| for (const char* fmt = fmt0; *fmt; ++fmt) { |
| char ch = *fmt; |
| if (ch == 'a') { |
| CheckArray(va_arg(ap, jarray)); |
| } else if (ch == 'c') { |
| CheckInstance(kClass, va_arg(ap, jclass)); |
| } else if (ch == 'L') { |
| CheckObject(va_arg(ap, jobject)); |
| } else if (ch == 'r') { |
| CheckReleaseMode(va_arg(ap, jint)); |
| } else if (ch == 's') { |
| CheckInstance(kString, va_arg(ap, jstring)); |
| } else if (ch == 'u') { |
| if ((flags_ & kFlag_Release) != 0) { |
| CheckNonNull(va_arg(ap, const char*)); |
| } else { |
| bool nullable = ((flags_ & kFlag_NullableUtf) != 0); |
| CheckUtfString(va_arg(ap, const char*), nullable); |
| } |
| } else if (ch == 'z') { |
| CheckLengthPositive(va_arg(ap, jsize)); |
| } else if (strchr("BCISZbfmpEv", ch) != nullptr) { |
| va_arg(ap, uint32_t); // Skip this argument. |
| } else if (ch == 'D' || ch == 'F') { |
| va_arg(ap, double); // Skip this argument. |
| } else if (ch == 'J') { |
| va_arg(ap, uint64_t); // Skip this argument. |
| } else if (ch == '.') { |
| } else { |
| LOG(FATAL) << "Unknown check format specifier: " << ch; |
| } |
| } |
| va_end(ap); |
| } |
| } |
| |
| enum InstanceKind { |
| kClass, |
| kDirectByteBuffer, |
| kObject, |
| kString, |
| kThrowable, |
| }; |
| |
| /* |
| * Verify that "jobj" is a valid non-NULL object reference, and points to |
| * an instance of expectedClass. |
| * |
| * Because we're looking at an object on the GC heap, we have to switch |
| * to "running" mode before doing the checks. |
| */ |
| bool CheckInstance(InstanceKind kind, jobject java_object) |
| SHARED_LOCKS_REQUIRED(Locks::mutator_lock_) { |
| const char* what = nullptr; |
| switch (kind) { |
| case kClass: |
| what = "jclass"; |
| break; |
| case kDirectByteBuffer: |
| what = "direct ByteBuffer"; |
| break; |
| case kObject: |
| what = "jobject"; |
| break; |
| case kString: |
| what = "jstring"; |
| break; |
| case kThrowable: |
| what = "jthrowable"; |
| break; |
| default: |
| LOG(FATAL) << "Unknown kind " << static_cast<int>(kind); |
| } |
| |
| if (java_object == nullptr) { |
| JniAbortF(function_name_, "%s received null %s", function_name_, what); |
| return false; |
| } |
| |
| mirror::Object* obj = soa_.Decode<mirror::Object*>(java_object); |
| if (!Runtime::Current()->GetHeap()->IsValidObjectAddress(obj)) { |
| Runtime::Current()->GetHeap()->DumpSpaces(); |
| JniAbortF(function_name_, "%s is an invalid %s: %p (%p)", |
| what, ToStr<IndirectRefKind>(GetIndirectRefKind(java_object)).c_str(), java_object, obj); |
| return false; |
| } |
| |
| bool okay = true; |
| switch (kind) { |
| case kClass: |
| okay = obj->IsClass(); |
| break; |
| case kDirectByteBuffer: |
| UNIMPLEMENTED(FATAL); |
| break; |
| case kString: |
| okay = obj->GetClass()->IsStringClass(); |
| break; |
| case kThrowable: |
| okay = obj->GetClass()->IsThrowableClass(); |
| break; |
| case kObject: |
| break; |
| } |
| if (!okay) { |
| JniAbortF(function_name_, "%s has wrong type: %s", what, PrettyTypeOf(obj).c_str()); |
| return false; |
| } |
| |
| return true; |
| } |
| |
| private: |
| // Set "has_method" to true if we have a valid thread with a method pointer. |
| // We won't have one before attaching a thread, after detaching a thread, or |
| // when shutting down the runtime. |
| void Init(int flags, const char* functionName, bool has_method) { |
| flags_ = flags; |
| function_name_ = functionName; |
| has_method_ = has_method; |
| } |
| |
| /* |
| * Verify that "array" is non-NULL and points to an Array object. |
| * |
| * Since we're dealing with objects, switch to "running" mode. |
| */ |
| void CheckArray(jarray java_array) SHARED_LOCKS_REQUIRED(Locks::mutator_lock_) { |
| if (java_array == nullptr) { |
| JniAbortF(function_name_, "jarray was NULL"); |
| return; |
| } |
| |
| mirror::Array* a = soa_.Decode<mirror::Array*>(java_array); |
| if (!Runtime::Current()->GetHeap()->IsValidObjectAddress(a)) { |
| Runtime::Current()->GetHeap()->DumpSpaces(); |
| JniAbortF(function_name_, "jarray is an invalid %s: %p (%p)", |
| ToStr<IndirectRefKind>(GetIndirectRefKind(java_array)).c_str(), java_array, a); |
| } else if (!a->IsArrayInstance()) { |
| JniAbortF(function_name_, "jarray argument has non-array type: %s", PrettyTypeOf(a).c_str()); |
| } |
| } |
| |
| void CheckLengthPositive(jsize length) { |
| if (length < 0) { |
| JniAbortF(function_name_, "negative jsize: %d", length); |
| } |
| } |
| |
| mirror::ArtField* CheckFieldID(jfieldID fid) SHARED_LOCKS_REQUIRED(Locks::mutator_lock_) { |
| if (fid == nullptr) { |
| JniAbortF(function_name_, "jfieldID was NULL"); |
| return nullptr; |
| } |
| mirror::ArtField* f = soa_.DecodeField(fid); |
| if (!Runtime::Current()->GetHeap()->IsValidObjectAddress(f) || !f->IsArtField()) { |
| Runtime::Current()->GetHeap()->DumpSpaces(); |
| JniAbortF(function_name_, "invalid jfieldID: %p", fid); |
| return nullptr; |
| } |
| return f; |
| } |
| |
| mirror::ArtMethod* CheckMethodID(jmethodID mid) SHARED_LOCKS_REQUIRED(Locks::mutator_lock_) { |
| if (mid == nullptr) { |
| JniAbortF(function_name_, "jmethodID was NULL"); |
| return nullptr; |
| } |
| mirror::ArtMethod* m = soa_.DecodeMethod(mid); |
| if (!Runtime::Current()->GetHeap()->IsValidObjectAddress(m) || !m->IsArtMethod()) { |
| Runtime::Current()->GetHeap()->DumpSpaces(); |
| JniAbortF(function_name_, "invalid jmethodID: %p", mid); |
| return nullptr; |
| } |
| return m; |
| } |
| |
| /* |
| * Verify that "jobj" is a valid object, and that it's an object that JNI |
| * is allowed to know about. We allow NULL references. |
| * |
| * Switches to "running" mode before performing checks. |
| */ |
| void CheckObject(jobject java_object) |
| SHARED_LOCKS_REQUIRED(Locks::mutator_lock_) { |
| if (java_object == nullptr) { |
| return; |
| } |
| |
| mirror::Object* o = soa_.Decode<mirror::Object*>(java_object); |
| if (!Runtime::Current()->GetHeap()->IsValidObjectAddress(o)) { |
| Runtime::Current()->GetHeap()->DumpSpaces(); |
| // TODO: when we remove work_around_app_jni_bugs, this should be impossible. |
| JniAbortF(function_name_, "native code passing in reference to invalid %s: %p", |
| ToStr<IndirectRefKind>(GetIndirectRefKind(java_object)).c_str(), java_object); |
| } |
| } |
| |
| /* |
| * Verify that the "mode" argument passed to a primitive array Release |
| * function is one of the valid values. |
| */ |
| void CheckReleaseMode(jint mode) { |
| if (mode != 0 && mode != JNI_COMMIT && mode != JNI_ABORT) { |
| JniAbortF(function_name_, "unknown value for release mode: %d", mode); |
| } |
| } |
| |
| void CheckThread(int flags) SHARED_LOCKS_REQUIRED(Locks::mutator_lock_) { |
| Thread* self = Thread::Current(); |
| if (self == nullptr) { |
| JniAbortF(function_name_, "a thread (tid %d) is making JNI calls without being attached", GetTid()); |
| return; |
| } |
| |
| // Get the *correct* JNIEnv by going through our TLS pointer. |
| JNIEnvExt* threadEnv = self->GetJniEnv(); |
| |
| // Verify that the current thread is (a) attached and (b) associated with |
| // this particular instance of JNIEnv. |
| if (soa_.Env() != threadEnv) { |
| if (soa_.Vm()->work_around_app_jni_bugs) { |
| // If we're keeping broken code limping along, we need to suppress the abort... |
| LOG(ERROR) << "APP BUG DETECTED: thread " << *self << " using JNIEnv* from thread " << *soa_.Self(); |
| } else { |
| JniAbortF(function_name_, "thread %s using JNIEnv* from thread %s", |
| ToStr<Thread>(*self).c_str(), ToStr<Thread>(*soa_.Self()).c_str()); |
| return; |
| } |
| } |
| |
| // Verify that, if this thread previously made a critical "get" call, we |
| // do the corresponding "release" call before we try anything else. |
| switch (flags & kFlag_CritMask) { |
| case kFlag_CritOkay: // okay to call this method |
| break; |
| case kFlag_CritBad: // not okay to call |
| if (threadEnv->critical) { |
| JniAbortF(function_name_, "thread %s using JNI after critical get", ToStr<Thread>(*self).c_str()); |
| return; |
| } |
| break; |
| case kFlag_CritGet: // this is a "get" call |
| // Don't check here; we allow nested gets. |
| threadEnv->critical++; |
| break; |
| case kFlag_CritRelease: // this is a "release" call |
| threadEnv->critical--; |
| if (threadEnv->critical < 0) { |
| JniAbortF(function_name_, "thread %s called too many critical releases", ToStr<Thread>(*self).c_str()); |
| return; |
| } |
| break; |
| default: |
| LOG(FATAL) << "Bad flags (internal error): " << flags; |
| } |
| |
| // Verify that, if an exception has been raised, the native code doesn't |
| // make any JNI calls other than the Exception* methods. |
| if ((flags & kFlag_ExcepOkay) == 0 && self->IsExceptionPending()) { |
| ThrowLocation throw_location; |
| mirror::Throwable* exception = self->GetException(&throw_location); |
| std::string type(PrettyTypeOf(exception)); |
| JniAbortF(function_name_, "JNI %s called with pending exception '%s' thrown in %s", |
| function_name_, type.c_str(), throw_location.Dump().c_str()); |
| return; |
| } |
| } |
| |
| // Verifies that "bytes" points to valid Modified UTF-8 data. |
| void CheckUtfString(const char* bytes, bool nullable) { |
| if (bytes == nullptr) { |
| if (!nullable) { |
| JniAbortF(function_name_, "non-nullable const char* was NULL"); |
| return; |
| } |
| return; |
| } |
| |
| const char* errorKind = nullptr; |
| uint8_t utf8 = CheckUtfBytes(bytes, &errorKind); |
| if (errorKind != nullptr) { |
| JniAbortF(function_name_, |
| "input is not valid Modified UTF-8: illegal %s byte %#x\n" |
| " string: '%s'", errorKind, utf8, bytes); |
| return; |
| } |
| } |
| |
| static uint8_t CheckUtfBytes(const char* bytes, const char** errorKind) { |
| while (*bytes != '\0') { |
| uint8_t utf8 = *(bytes++); |
| // Switch on the high four bits. |
| switch (utf8 >> 4) { |
| case 0x00: |
| case 0x01: |
| case 0x02: |
| case 0x03: |
| case 0x04: |
| case 0x05: |
| case 0x06: |
| case 0x07: |
| // Bit pattern 0xxx. No need for any extra bytes. |
| break; |
| case 0x08: |
| case 0x09: |
| case 0x0a: |
| case 0x0b: |
| case 0x0f: |
| /* |
| * Bit pattern 10xx or 1111, which are illegal start bytes. |
| * Note: 1111 is valid for normal UTF-8, but not the |
| * Modified UTF-8 used here. |
| */ |
| *errorKind = "start"; |
| return utf8; |
| case 0x0e: |
| // Bit pattern 1110, so there are two additional bytes. |
| utf8 = *(bytes++); |
| if ((utf8 & 0xc0) != 0x80) { |
| *errorKind = "continuation"; |
| return utf8; |
| } |
| // Fall through to take care of the final byte. |
| case 0x0c: |
| case 0x0d: |
| // Bit pattern 110x, so there is one additional byte. |
| utf8 = *(bytes++); |
| if ((utf8 & 0xc0) != 0x80) { |
| *errorKind = "continuation"; |
| return utf8; |
| } |
| break; |
| } |
| } |
| return 0; |
| } |
| |
| const ScopedObjectAccess soa_; |
| const char* function_name_; |
| int flags_; |
| bool has_method_; |
| int indent_; |
| |
| DISALLOW_COPY_AND_ASSIGN(ScopedCheck); |
| }; |
| |
| #define CHECK_JNI_ENTRY(flags, types, args...) \ |
| ScopedCheck sc(env, flags, __FUNCTION__); \ |
| sc.Check(true, types, ##args) |
| |
| #define CHECK_JNI_EXIT(type, exp) ({ \ |
| auto _rc = (exp); \ |
| sc.Check(false, type, _rc); \ |
| _rc; }) |
| #define CHECK_JNI_EXIT_VOID() \ |
| sc.Check(false, "V") |
| |
| /* |
| * =========================================================================== |
| * Guarded arrays |
| * =========================================================================== |
| */ |
| |
| #define kGuardLen 512 /* must be multiple of 2 */ |
| #define kGuardPattern 0xd5e3 /* uncommon values; d5e3d5e3 invalid addr */ |
| #define kGuardMagic 0xffd5aa96 |
| |
| /* this gets tucked in at the start of the buffer; struct size must be even */ |
| struct GuardedCopy { |
| uint32_t magic; |
| uLong adler; |
| size_t original_length; |
| const void* original_ptr; |
| |
| /* find the GuardedCopy given the pointer into the "live" data */ |
| static inline const GuardedCopy* FromData(const void* dataBuf) { |
| return reinterpret_cast<const GuardedCopy*>(ActualBuffer(dataBuf)); |
| } |
| |
| /* |
| * Create an over-sized buffer to hold the contents of "buf". Copy it in, |
| * filling in the area around it with guard data. |
| * |
| * We use a 16-bit pattern to make a rogue memset less likely to elude us. |
| */ |
| static void* Create(const void* buf, size_t len, bool modOkay) { |
| size_t newLen = ActualLength(len); |
| uint8_t* newBuf = DebugAlloc(newLen); |
| |
| // Fill it in with a pattern. |
| uint16_t* pat = reinterpret_cast<uint16_t*>(newBuf); |
| for (size_t i = 0; i < newLen / 2; i++) { |
| *pat++ = kGuardPattern; |
| } |
| |
| // Copy the data in; note "len" could be zero. |
| memcpy(newBuf + kGuardLen / 2, buf, len); |
| |
| // If modification is not expected, grab a checksum. |
| uLong adler = 0; |
| if (!modOkay) { |
| adler = adler32(0L, Z_NULL, 0); |
| adler = adler32(adler, reinterpret_cast<const Bytef*>(buf), len); |
| *reinterpret_cast<uLong*>(newBuf) = adler; |
| } |
| |
| GuardedCopy* pExtra = reinterpret_cast<GuardedCopy*>(newBuf); |
| pExtra->magic = kGuardMagic; |
| pExtra->adler = adler; |
| pExtra->original_ptr = buf; |
| pExtra->original_length = len; |
| |
| return newBuf + kGuardLen / 2; |
| } |
| |
| /* |
| * Free up the guard buffer, scrub it, and return the original pointer. |
| */ |
| static void* Destroy(void* dataBuf) { |
| const GuardedCopy* pExtra = GuardedCopy::FromData(dataBuf); |
| void* original_ptr = const_cast<void*>(pExtra->original_ptr); |
| size_t len = pExtra->original_length; |
| DebugFree(dataBuf, len); |
| return original_ptr; |
| } |
| |
| /* |
| * Verify the guard area and, if "modOkay" is false, that the data itself |
| * has not been altered. |
| * |
| * The caller has already checked that "dataBuf" is non-NULL. |
| */ |
| static void Check(const char* functionName, const void* dataBuf, bool modOkay) { |
| static const uint32_t kMagicCmp = kGuardMagic; |
| const uint8_t* fullBuf = ActualBuffer(dataBuf); |
| const GuardedCopy* pExtra = GuardedCopy::FromData(dataBuf); |
| |
| // Before we do anything with "pExtra", check the magic number. We |
| // do the check with memcmp rather than "==" in case the pointer is |
| // unaligned. If it points to completely bogus memory we're going |
| // to crash, but there's no easy way around that. |
| if (memcmp(&pExtra->magic, &kMagicCmp, 4) != 0) { |
| uint8_t buf[4]; |
| memcpy(buf, &pExtra->magic, 4); |
| JniAbortF(functionName, |
| "guard magic does not match (found 0x%02x%02x%02x%02x) -- incorrect data pointer %p?", |
| buf[3], buf[2], buf[1], buf[0], dataBuf); // Assumes little-endian. |
| } |
| |
| size_t len = pExtra->original_length; |
| |
| // Check bottom half of guard; skip over optional checksum storage. |
| const uint16_t* pat = reinterpret_cast<const uint16_t*>(fullBuf); |
| for (size_t i = sizeof(GuardedCopy) / 2; i < (kGuardLen / 2 - sizeof(GuardedCopy)) / 2; i++) { |
| if (pat[i] != kGuardPattern) { |
| JniAbortF(functionName, "guard pattern(1) disturbed at %p +%zd", fullBuf, i*2); |
| } |
| } |
| |
| int offset = kGuardLen / 2 + len; |
| if (offset & 0x01) { |
| // Odd byte; expected value depends on endian. |
| const uint16_t patSample = kGuardPattern; |
| uint8_t expected_byte = reinterpret_cast<const uint8_t*>(&patSample)[1]; |
| if (fullBuf[offset] != expected_byte) { |
| JniAbortF(functionName, "guard pattern disturbed in odd byte after %p +%d 0x%02x 0x%02x", |
| fullBuf, offset, fullBuf[offset], expected_byte); |
| } |
| offset++; |
| } |
| |
| // Check top half of guard. |
| pat = reinterpret_cast<const uint16_t*>(fullBuf + offset); |
| for (size_t i = 0; i < kGuardLen / 4; i++) { |
| if (pat[i] != kGuardPattern) { |
| JniAbortF(functionName, "guard pattern(2) disturbed at %p +%zd", fullBuf, offset + i*2); |
| } |
| } |
| |
| // If modification is not expected, verify checksum. Strictly speaking |
| // this is wrong: if we told the client that we made a copy, there's no |
| // reason they can't alter the buffer. |
| if (!modOkay) { |
| uLong adler = adler32(0L, Z_NULL, 0); |
| adler = adler32(adler, (const Bytef*)dataBuf, len); |
| if (pExtra->adler != adler) { |
| JniAbortF(functionName, "buffer modified (0x%08lx vs 0x%08lx) at address %p", |
| pExtra->adler, adler, dataBuf); |
| } |
| } |
| } |
| |
| private: |
| static uint8_t* DebugAlloc(size_t len) { |
| void* result = mmap(nullptr, len, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANON, -1, 0); |
| if (result == MAP_FAILED) { |
| PLOG(FATAL) << "GuardedCopy::create mmap(" << len << ") failed"; |
| } |
| return reinterpret_cast<uint8_t*>(result); |
| } |
| |
| static void DebugFree(void* dataBuf, size_t len) { |
| uint8_t* fullBuf = ActualBuffer(dataBuf); |
| size_t totalByteCount = ActualLength(len); |
| // TODO: we could mprotect instead, and keep the allocation around for a while. |
| // This would be even more expensive, but it might catch more errors. |
| // if (mprotect(fullBuf, totalByteCount, PROT_NONE) != 0) { |
| // PLOG(WARNING) << "mprotect(PROT_NONE) failed"; |
| // } |
| if (munmap(fullBuf, totalByteCount) != 0) { |
| PLOG(FATAL) << "munmap(" << reinterpret_cast<void*>(fullBuf) << ", " << totalByteCount << ") failed"; |
| } |
| } |
| |
| static const uint8_t* ActualBuffer(const void* dataBuf) { |
| return reinterpret_cast<const uint8_t*>(dataBuf) - kGuardLen / 2; |
| } |
| |
| static uint8_t* ActualBuffer(void* dataBuf) { |
| return reinterpret_cast<uint8_t*>(dataBuf) - kGuardLen / 2; |
| } |
| |
| // Underlying length of a user allocation of 'length' bytes. |
| static size_t ActualLength(size_t length) { |
| return (length + kGuardLen + 1) & ~0x01; |
| } |
| }; |
| |
| /* |
| * Create a guarded copy of a primitive array. Modifications to the copied |
| * data are allowed. Returns a pointer to the copied data. |
| */ |
| static void* CreateGuardedPACopy(JNIEnv* env, const jarray java_array, jboolean* isCopy) { |
| ScopedObjectAccess soa(env); |
| |
| mirror::Array* a = soa.Decode<mirror::Array*>(java_array); |
| size_t component_size = a->GetClass()->GetComponentSize(); |
| size_t byte_count = a->GetLength() * component_size; |
| void* result = GuardedCopy::Create(a->GetRawData(component_size, 0), byte_count, true); |
| if (isCopy != nullptr) { |
| *isCopy = JNI_TRUE; |
| } |
| return result; |
| } |
| |
| /* |
| * Perform the array "release" operation, which may or may not copy data |
| * back into the managed heap, and may or may not release the underlying storage. |
| */ |
| static void ReleaseGuardedPACopy(JNIEnv* env, jarray java_array, void* dataBuf, int mode) { |
| ScopedObjectAccess soa(env); |
| mirror::Array* a = soa.Decode<mirror::Array*>(java_array); |
| |
| GuardedCopy::Check(__FUNCTION__, dataBuf, true); |
| |
| if (mode != JNI_ABORT) { |
| size_t len = GuardedCopy::FromData(dataBuf)->original_length; |
| memcpy(a->GetRawData(a->GetClass()->GetComponentSize(), 0), dataBuf, len); |
| } |
| if (mode != JNI_COMMIT) { |
| GuardedCopy::Destroy(dataBuf); |
| } |
| } |
| |
| /* |
| * =========================================================================== |
| * JNI functions |
| * =========================================================================== |
| */ |
| |
| class CheckJNI { |
| public: |
| static jint GetVersion(JNIEnv* env) { |
| CHECK_JNI_ENTRY(kFlag_Default, "E", env); |
| return CHECK_JNI_EXIT("I", baseEnv(env)->GetVersion(env)); |
| } |
| |
| static jclass DefineClass(JNIEnv* env, const char* name, jobject loader, const jbyte* buf, jsize bufLen) { |
| CHECK_JNI_ENTRY(kFlag_Default, "EuLpz", env, name, loader, buf, bufLen); |
| sc.CheckClassName(name); |
| return CHECK_JNI_EXIT("c", baseEnv(env)->DefineClass(env, name, loader, buf, bufLen)); |
| } |
| |
| static jclass FindClass(JNIEnv* env, const char* name) { |
| CHECK_JNI_ENTRY(kFlag_Default, "Eu", env, name); |
| sc.CheckClassName(name); |
| return CHECK_JNI_EXIT("c", baseEnv(env)->FindClass(env, name)); |
| } |
| |
| static jclass GetSuperclass(JNIEnv* env, jclass c) { |
| CHECK_JNI_ENTRY(kFlag_Default, "Ec", env, c); |
| return CHECK_JNI_EXIT("c", baseEnv(env)->GetSuperclass(env, c)); |
| } |
| |
| static jboolean IsAssignableFrom(JNIEnv* env, jclass c1, jclass c2) { |
| CHECK_JNI_ENTRY(kFlag_Default, "Ecc", env, c1, c2); |
| return CHECK_JNI_EXIT("b", baseEnv(env)->IsAssignableFrom(env, c1, c2)); |
| } |
| |
| static jmethodID FromReflectedMethod(JNIEnv* env, jobject method) { |
| CHECK_JNI_ENTRY(kFlag_Default, "EL", env, method); |
| // TODO: check that 'field' is a java.lang.reflect.Method. |
| return CHECK_JNI_EXIT("m", baseEnv(env)->FromReflectedMethod(env, method)); |
| } |
| |
| static jfieldID FromReflectedField(JNIEnv* env, jobject field) { |
| CHECK_JNI_ENTRY(kFlag_Default, "EL", env, field); |
| // TODO: check that 'field' is a java.lang.reflect.Field. |
| return CHECK_JNI_EXIT("f", baseEnv(env)->FromReflectedField(env, field)); |
| } |
| |
| static jobject ToReflectedMethod(JNIEnv* env, jclass cls, jmethodID mid, jboolean isStatic) { |
| CHECK_JNI_ENTRY(kFlag_Default, "Ecmb", env, cls, mid, isStatic); |
| return CHECK_JNI_EXIT("L", baseEnv(env)->ToReflectedMethod(env, cls, mid, isStatic)); |
| } |
| |
| static jobject ToReflectedField(JNIEnv* env, jclass cls, jfieldID fid, jboolean isStatic) { |
| CHECK_JNI_ENTRY(kFlag_Default, "Ecfb", env, cls, fid, isStatic); |
| return CHECK_JNI_EXIT("L", baseEnv(env)->ToReflectedField(env, cls, fid, isStatic)); |
| } |
| |
| static jint Throw(JNIEnv* env, jthrowable obj) { |
| CHECK_JNI_ENTRY(kFlag_Default, "EL", env, obj); |
| // TODO: check that 'obj' is a java.lang.Throwable. |
| return CHECK_JNI_EXIT("I", baseEnv(env)->Throw(env, obj)); |
| } |
| |
| static jint ThrowNew(JNIEnv* env, jclass c, const char* message) { |
| CHECK_JNI_ENTRY(kFlag_NullableUtf, "Ecu", env, c, message); |
| return CHECK_JNI_EXIT("I", baseEnv(env)->ThrowNew(env, c, message)); |
| } |
| |
| static jthrowable ExceptionOccurred(JNIEnv* env) { |
| CHECK_JNI_ENTRY(kFlag_ExcepOkay, "E", env); |
| return CHECK_JNI_EXIT("L", baseEnv(env)->ExceptionOccurred(env)); |
| } |
| |
| static void ExceptionDescribe(JNIEnv* env) { |
| CHECK_JNI_ENTRY(kFlag_ExcepOkay, "E", env); |
| baseEnv(env)->ExceptionDescribe(env); |
| CHECK_JNI_EXIT_VOID(); |
| } |
| |
| static void ExceptionClear(JNIEnv* env) { |
| CHECK_JNI_ENTRY(kFlag_ExcepOkay, "E", env); |
| baseEnv(env)->ExceptionClear(env); |
| CHECK_JNI_EXIT_VOID(); |
| } |
| |
| static void FatalError(JNIEnv* env, const char* msg) { |
| // The JNI specification doesn't say it's okay to call FatalError with a pending exception, |
| // but you're about to abort anyway, and it's quite likely that you have a pending exception, |
| // and it's not unimaginable that you don't know that you do. So we allow it. |
| CHECK_JNI_ENTRY(kFlag_ExcepOkay | kFlag_NullableUtf, "Eu", env, msg); |
| baseEnv(env)->FatalError(env, msg); |
| CHECK_JNI_EXIT_VOID(); |
| } |
| |
| static jint PushLocalFrame(JNIEnv* env, jint capacity) { |
| CHECK_JNI_ENTRY(kFlag_Default | kFlag_ExcepOkay, "EI", env, capacity); |
| return CHECK_JNI_EXIT("I", baseEnv(env)->PushLocalFrame(env, capacity)); |
| } |
| |
| static jobject PopLocalFrame(JNIEnv* env, jobject res) { |
| CHECK_JNI_ENTRY(kFlag_Default | kFlag_ExcepOkay, "EL", env, res); |
| return CHECK_JNI_EXIT("L", baseEnv(env)->PopLocalFrame(env, res)); |
| } |
| |
| static jobject NewGlobalRef(JNIEnv* env, jobject obj) { |
| CHECK_JNI_ENTRY(kFlag_Default, "EL", env, obj); |
| return CHECK_JNI_EXIT("L", baseEnv(env)->NewGlobalRef(env, obj)); |
| } |
| |
| static jobject NewLocalRef(JNIEnv* env, jobject ref) { |
| CHECK_JNI_ENTRY(kFlag_Default, "EL", env, ref); |
| return CHECK_JNI_EXIT("L", baseEnv(env)->NewLocalRef(env, ref)); |
| } |
| |
| static void DeleteGlobalRef(JNIEnv* env, jobject globalRef) { |
| CHECK_JNI_ENTRY(kFlag_Default | kFlag_ExcepOkay, "EL", env, globalRef); |
| if (globalRef != nullptr && GetIndirectRefKind(globalRef) != kGlobal) { |
| JniAbortF(__FUNCTION__, "DeleteGlobalRef on %s: %p", |
| ToStr<IndirectRefKind>(GetIndirectRefKind(globalRef)).c_str(), globalRef); |
| } else { |
| baseEnv(env)->DeleteGlobalRef(env, globalRef); |
| CHECK_JNI_EXIT_VOID(); |
| } |
| } |
| |
| static void DeleteWeakGlobalRef(JNIEnv* env, jweak weakGlobalRef) { |
| CHECK_JNI_ENTRY(kFlag_Default | kFlag_ExcepOkay, "EL", env, weakGlobalRef); |
| if (weakGlobalRef != nullptr && GetIndirectRefKind(weakGlobalRef) != kWeakGlobal) { |
| JniAbortF(__FUNCTION__, "DeleteWeakGlobalRef on %s: %p", |
| ToStr<IndirectRefKind>(GetIndirectRefKind(weakGlobalRef)).c_str(), weakGlobalRef); |
| } else { |
| baseEnv(env)->DeleteWeakGlobalRef(env, weakGlobalRef); |
| CHECK_JNI_EXIT_VOID(); |
| } |
| } |
| |
| static void DeleteLocalRef(JNIEnv* env, jobject localRef) { |
| CHECK_JNI_ENTRY(kFlag_Default | kFlag_ExcepOkay, "EL", env, localRef); |
| if (localRef != nullptr && GetIndirectRefKind(localRef) != kLocal && !IsSirtLocalRef(env, localRef)) { |
| JniAbortF(__FUNCTION__, "DeleteLocalRef on %s: %p", |
| ToStr<IndirectRefKind>(GetIndirectRefKind(localRef)).c_str(), localRef); |
| } else { |
| baseEnv(env)->DeleteLocalRef(env, localRef); |
| CHECK_JNI_EXIT_VOID(); |
| } |
| } |
| |
| static jint EnsureLocalCapacity(JNIEnv *env, jint capacity) { |
| CHECK_JNI_ENTRY(kFlag_Default, "EI", env, capacity); |
| return CHECK_JNI_EXIT("I", baseEnv(env)->EnsureLocalCapacity(env, capacity)); |
| } |
| |
| static jboolean IsSameObject(JNIEnv* env, jobject ref1, jobject ref2) { |
| CHECK_JNI_ENTRY(kFlag_Default, "ELL", env, ref1, ref2); |
| return CHECK_JNI_EXIT("b", baseEnv(env)->IsSameObject(env, ref1, ref2)); |
| } |
| |
| static jobject AllocObject(JNIEnv* env, jclass c) { |
| CHECK_JNI_ENTRY(kFlag_Default, "Ec", env, c); |
| return CHECK_JNI_EXIT("L", baseEnv(env)->AllocObject(env, c)); |
| } |
| |
| static jobject NewObject(JNIEnv* env, jclass c, jmethodID mid, ...) { |
| CHECK_JNI_ENTRY(kFlag_Default, "Ecm.", env, c, mid); |
| va_list args; |
| va_start(args, mid); |
| jobject result = baseEnv(env)->NewObjectV(env, c, mid, args); |
| va_end(args); |
| return CHECK_JNI_EXIT("L", result); |
| } |
| |
| static jobject NewObjectV(JNIEnv* env, jclass c, jmethodID mid, va_list args) { |
| CHECK_JNI_ENTRY(kFlag_Default, "Ecm.", env, c, mid); |
| return CHECK_JNI_EXIT("L", baseEnv(env)->NewObjectV(env, c, mid, args)); |
| } |
| |
| static jobject NewObjectA(JNIEnv* env, jclass c, jmethodID mid, jvalue* args) { |
| CHECK_JNI_ENTRY(kFlag_Default, "Ecm.", env, c, mid); |
| return CHECK_JNI_EXIT("L", baseEnv(env)->NewObjectA(env, c, mid, args)); |
| } |
| |
| static jclass GetObjectClass(JNIEnv* env, jobject obj) { |
| CHECK_JNI_ENTRY(kFlag_Default, "EL", env, obj); |
| return CHECK_JNI_EXIT("c", baseEnv(env)->GetObjectClass(env, obj)); |
| } |
| |
| static jboolean IsInstanceOf(JNIEnv* env, jobject obj, jclass c) { |
| CHECK_JNI_ENTRY(kFlag_Default, "ELc", env, obj, c); |
| return CHECK_JNI_EXIT("b", baseEnv(env)->IsInstanceOf(env, obj, c)); |
| } |
| |
| static jmethodID GetMethodID(JNIEnv* env, jclass c, const char* name, const char* sig) { |
| CHECK_JNI_ENTRY(kFlag_Default, "Ecuu", env, c, name, sig); |
| return CHECK_JNI_EXIT("m", baseEnv(env)->GetMethodID(env, c, name, sig)); |
| } |
| |
| static jfieldID GetFieldID(JNIEnv* env, jclass c, const char* name, const char* sig) { |
| CHECK_JNI_ENTRY(kFlag_Default, "Ecuu", env, c, name, sig); |
| return CHECK_JNI_EXIT("f", baseEnv(env)->GetFieldID(env, c, name, sig)); |
| } |
| |
| static jmethodID GetStaticMethodID(JNIEnv* env, jclass c, const char* name, const char* sig) { |
| CHECK_JNI_ENTRY(kFlag_Default, "Ecuu", env, c, name, sig); |
| return CHECK_JNI_EXIT("m", baseEnv(env)->GetStaticMethodID(env, c, name, sig)); |
| } |
| |
| static jfieldID GetStaticFieldID(JNIEnv* env, jclass c, const char* name, const char* sig) { |
| CHECK_JNI_ENTRY(kFlag_Default, "Ecuu", env, c, name, sig); |
| return CHECK_JNI_EXIT("f", baseEnv(env)->GetStaticFieldID(env, c, name, sig)); |
| } |
| |
| #define FIELD_ACCESSORS(_ctype, _jname, _jvalue_type, _type) \ |
| static _ctype GetStatic##_jname##Field(JNIEnv* env, jclass c, jfieldID fid) { \ |
| CHECK_JNI_ENTRY(kFlag_Default, "Ecf", env, c, fid); \ |
| sc.CheckStaticFieldID(c, fid); \ |
| return CHECK_JNI_EXIT(_type, baseEnv(env)->GetStatic##_jname##Field(env, c, fid)); \ |
| } \ |
| static _ctype Get##_jname##Field(JNIEnv* env, jobject obj, jfieldID fid) { \ |
| CHECK_JNI_ENTRY(kFlag_Default, "ELf", env, obj, fid); \ |
| sc.CheckInstanceFieldID(obj, fid); \ |
| return CHECK_JNI_EXIT(_type, baseEnv(env)->Get##_jname##Field(env, obj, fid)); \ |
| } \ |
| static void SetStatic##_jname##Field(JNIEnv* env, jclass c, jfieldID fid, _ctype value) { \ |
| CHECK_JNI_ENTRY(kFlag_Default, "Ecf" _type, env, c, fid, value); \ |
| sc.CheckStaticFieldID(c, fid); \ |
| /* "value" arg only used when type == ref */ \ |
| jvalue java_type_value; \ |
| java_type_value._jvalue_type = value; \ |
| sc.CheckFieldType(java_type_value, fid, _type[0], true); \ |
| baseEnv(env)->SetStatic##_jname##Field(env, c, fid, value); \ |
| CHECK_JNI_EXIT_VOID(); \ |
| } \ |
| static void Set##_jname##Field(JNIEnv* env, jobject obj, jfieldID fid, _ctype value) { \ |
| CHECK_JNI_ENTRY(kFlag_Default, "ELf" _type, env, obj, fid, value); \ |
| sc.CheckInstanceFieldID(obj, fid); \ |
| /* "value" arg only used when type == ref */ \ |
| jvalue java_type_value; \ |
| java_type_value._jvalue_type = value; \ |
| sc.CheckFieldType(java_type_value, fid, _type[0], false); \ |
| baseEnv(env)->Set##_jname##Field(env, obj, fid, value); \ |
| CHECK_JNI_EXIT_VOID(); \ |
| } |
| |
| FIELD_ACCESSORS(jobject, Object, l, "L"); |
| FIELD_ACCESSORS(jboolean, Boolean, z, "Z"); |
| FIELD_ACCESSORS(jbyte, Byte, b, "B"); |
| FIELD_ACCESSORS(jchar, Char, c, "C"); |
| FIELD_ACCESSORS(jshort, Short, s, "S"); |
| FIELD_ACCESSORS(jint, Int, i, "I"); |
| FIELD_ACCESSORS(jlong, Long, j, "J"); |
| FIELD_ACCESSORS(jfloat, Float, f, "F"); |
| FIELD_ACCESSORS(jdouble, Double, d, "D"); |
| |
| #define CALL(_ctype, _jname, _retdecl, _retasgn, _retok, _retsig) \ |
| /* Virtual... */ \ |
| static _ctype Call##_jname##Method(JNIEnv* env, jobject obj, \ |
| jmethodID mid, ...) \ |
| { \ |
| CHECK_JNI_ENTRY(kFlag_Default, "ELm.", env, obj, mid); /* TODO: args! */ \ |
| sc.CheckSig(mid, _retsig, false); \ |
| sc.CheckVirtualMethod(obj, mid); \ |
| _retdecl; \ |
| va_list args; \ |
| va_start(args, mid); \ |
| _retasgn(baseEnv(env)->Call##_jname##MethodV(env, obj, mid, args)); \ |
| va_end(args); \ |
| _retok; \ |
| } \ |
| static _ctype Call##_jname##MethodV(JNIEnv* env, jobject obj, \ |
| jmethodID mid, va_list args) \ |
| { \ |
| CHECK_JNI_ENTRY(kFlag_Default, "ELm.", env, obj, mid); /* TODO: args! */ \ |
| sc.CheckSig(mid, _retsig, false); \ |
| sc.CheckVirtualMethod(obj, mid); \ |
| _retdecl; \ |
| _retasgn(baseEnv(env)->Call##_jname##MethodV(env, obj, mid, args)); \ |
| _retok; \ |
| } \ |
| static _ctype Call##_jname##MethodA(JNIEnv* env, jobject obj, \ |
| jmethodID mid, jvalue* args) \ |
| { \ |
| CHECK_JNI_ENTRY(kFlag_Default, "ELm.", env, obj, mid); /* TODO: args! */ \ |
| sc.CheckSig(mid, _retsig, false); \ |
| sc.CheckVirtualMethod(obj, mid); \ |
| _retdecl; \ |
| _retasgn(baseEnv(env)->Call##_jname##MethodA(env, obj, mid, args)); \ |
| _retok; \ |
| } \ |
| /* Non-virtual... */ \ |
| static _ctype CallNonvirtual##_jname##Method(JNIEnv* env, \ |
| jobject obj, jclass c, jmethodID mid, ...) \ |
| { \ |
| CHECK_JNI_ENTRY(kFlag_Default, "ELcm.", env, obj, c, mid); /* TODO: args! */ \ |
| sc.CheckSig(mid, _retsig, false); \ |
| sc.CheckVirtualMethod(obj, mid); \ |
| _retdecl; \ |
| va_list args; \ |
| va_start(args, mid); \ |
| _retasgn(baseEnv(env)->CallNonvirtual##_jname##MethodV(env, obj, c, mid, args)); \ |
| va_end(args); \ |
| _retok; \ |
| } \ |
| static _ctype CallNonvirtual##_jname##MethodV(JNIEnv* env, \ |
| jobject obj, jclass c, jmethodID mid, va_list args) \ |
| { \ |
| CHECK_JNI_ENTRY(kFlag_Default, "ELcm.", env, obj, c, mid); /* TODO: args! */ \ |
| sc.CheckSig(mid, _retsig, false); \ |
| sc.CheckVirtualMethod(obj, mid); \ |
| _retdecl; \ |
| _retasgn(baseEnv(env)->CallNonvirtual##_jname##MethodV(env, obj, c, mid, args)); \ |
| _retok; \ |
| } \ |
| static _ctype CallNonvirtual##_jname##MethodA(JNIEnv* env, \ |
| jobject obj, jclass c, jmethodID mid, jvalue* args) \ |
| { \ |
| CHECK_JNI_ENTRY(kFlag_Default, "ELcm.", env, obj, c, mid); /* TODO: args! */ \ |
| sc.CheckSig(mid, _retsig, false); \ |
| sc.CheckVirtualMethod(obj, mid); \ |
| _retdecl; \ |
| _retasgn(baseEnv(env)->CallNonvirtual##_jname##MethodA(env, obj, c, mid, args)); \ |
| _retok; \ |
| } \ |
| /* Static... */ \ |
| static _ctype CallStatic##_jname##Method(JNIEnv* env, jclass c, jmethodID mid, ...) \ |
| { \ |
| CHECK_JNI_ENTRY(kFlag_Default, "Ecm.", env, c, mid); /* TODO: args! */ \ |
| sc.CheckSig(mid, _retsig, true); \ |
| sc.CheckStaticMethod(c, mid); \ |
| _retdecl; \ |
| va_list args; \ |
| va_start(args, mid); \ |
| _retasgn(baseEnv(env)->CallStatic##_jname##MethodV(env, c, mid, args)); \ |
| va_end(args); \ |
| _retok; \ |
| } \ |
| static _ctype CallStatic##_jname##MethodV(JNIEnv* env, jclass c, jmethodID mid, va_list args) \ |
| { \ |
| CHECK_JNI_ENTRY(kFlag_Default, "Ecm.", env, c, mid); /* TODO: args! */ \ |
| sc.CheckSig(mid, _retsig, true); \ |
| sc.CheckStaticMethod(c, mid); \ |
| _retdecl; \ |
| _retasgn(baseEnv(env)->CallStatic##_jname##MethodV(env, c, mid, args)); \ |
| _retok; \ |
| } \ |
| static _ctype CallStatic##_jname##MethodA(JNIEnv* env, jclass c, jmethodID mid, jvalue* args) \ |
| { \ |
| CHECK_JNI_ENTRY(kFlag_Default, "Ecm.", env, c, mid); /* TODO: args! */ \ |
| sc.CheckSig(mid, _retsig, true); \ |
| sc.CheckStaticMethod(c, mid); \ |
| _retdecl; \ |
| _retasgn(baseEnv(env)->CallStatic##_jname##MethodA(env, c, mid, args)); \ |
| _retok; \ |
| } |
| |
| #define NON_VOID_RETURN(_retsig, _ctype) return CHECK_JNI_EXIT(_retsig, (_ctype) result) |
| #define VOID_RETURN CHECK_JNI_EXIT_VOID() |
| |
| CALL(jobject, Object, mirror::Object* result, result = reinterpret_cast<mirror::Object*>, NON_VOID_RETURN("L", jobject), "L"); |
| CALL(jboolean, Boolean, jboolean result, result =, NON_VOID_RETURN("Z", jboolean), "Z"); |
| CALL(jbyte, Byte, jbyte result, result =, NON_VOID_RETURN("B", jbyte), "B"); |
| CALL(jchar, Char, jchar result, result =, NON_VOID_RETURN("C", jchar), "C"); |
| CALL(jshort, Short, jshort result, result =, NON_VOID_RETURN("S", jshort), "S"); |
| CALL(jint, Int, jint result, result =, NON_VOID_RETURN("I", jint), "I"); |
| CALL(jlong, Long, jlong result, result =, NON_VOID_RETURN("J", jlong), "J"); |
| CALL(jfloat, Float, jfloat result, result =, NON_VOID_RETURN("F", jfloat), "F"); |
| CALL(jdouble, Double, jdouble result, result =, NON_VOID_RETURN("D", jdouble), "D"); |
| CALL(void, Void, , , VOID_RETURN, "V"); |
| |
| static jstring NewString(JNIEnv* env, const jchar* unicodeChars, jsize len) { |
| CHECK_JNI_ENTRY(kFlag_Default, "Epz", env, unicodeChars, len); |
| return CHECK_JNI_EXIT("s", baseEnv(env)->NewString(env, unicodeChars, len)); |
| } |
| |
| static jsize GetStringLength(JNIEnv* env, jstring string) { |
| CHECK_JNI_ENTRY(kFlag_CritOkay, "Es", env, string); |
| return CHECK_JNI_EXIT("I", baseEnv(env)->GetStringLength(env, string)); |
| } |
| |
| static const jchar* GetStringChars(JNIEnv* env, jstring java_string, jboolean* isCopy) { |
| CHECK_JNI_ENTRY(kFlag_CritOkay, "Esp", env, java_string, isCopy); |
| const jchar* result = baseEnv(env)->GetStringChars(env, java_string, isCopy); |
| if (sc.ForceCopy() && result != nullptr) { |
| mirror::String* s = sc.soa().Decode<mirror::String*>(java_string); |
| int byteCount = s->GetLength() * 2; |
| result = (const jchar*) GuardedCopy::Create(result, byteCount, false); |
| if (isCopy != nullptr) { |
| *isCopy = JNI_TRUE; |
| } |
| } |
| return CHECK_JNI_EXIT("p", result); |
| } |
| |
| static void ReleaseStringChars(JNIEnv* env, jstring string, const jchar* chars) { |
| CHECK_JNI_ENTRY(kFlag_Default | kFlag_ExcepOkay, "Esp", env, string, chars); |
| sc.CheckNonNull(chars); |
| if (sc.ForceCopy()) { |
| GuardedCopy::Check(__FUNCTION__, chars, false); |
| chars = reinterpret_cast<const jchar*>(GuardedCopy::Destroy(const_cast<jchar*>(chars))); |
| } |
| baseEnv(env)->ReleaseStringChars(env, string, chars); |
| CHECK_JNI_EXIT_VOID(); |
| } |
| |
| static jstring NewStringUTF(JNIEnv* env, const char* bytes) { |
| CHECK_JNI_ENTRY(kFlag_NullableUtf, "Eu", env, bytes); // TODO: show pointer and truncate string. |
| return CHECK_JNI_EXIT("s", baseEnv(env)->NewStringUTF(env, bytes)); |
| } |
| |
| static jsize GetStringUTFLength(JNIEnv* env, jstring string) { |
| CHECK_JNI_ENTRY(kFlag_CritOkay, "Es", env, string); |
| return CHECK_JNI_EXIT("I", baseEnv(env)->GetStringUTFLength(env, string)); |
| } |
| |
| static const char* GetStringUTFChars(JNIEnv* env, jstring string, jboolean* isCopy) { |
| CHECK_JNI_ENTRY(kFlag_CritOkay, "Esp", env, string, isCopy); |
| const char* result = baseEnv(env)->GetStringUTFChars(env, string, isCopy); |
| if (sc.ForceCopy() && result != nullptr) { |
| result = (const char*) GuardedCopy::Create(result, strlen(result) + 1, false); |
| if (isCopy != nullptr) { |
| *isCopy = JNI_TRUE; |
| } |
| } |
| return CHECK_JNI_EXIT("u", result); // TODO: show pointer and truncate string. |
| } |
| |
| static void ReleaseStringUTFChars(JNIEnv* env, jstring string, const char* utf) { |
| CHECK_JNI_ENTRY(kFlag_ExcepOkay | kFlag_Release, "Esu", env, string, utf); // TODO: show pointer and truncate string. |
| if (sc.ForceCopy()) { |
| GuardedCopy::Check(__FUNCTION__, utf, false); |
| utf = reinterpret_cast<const char*>(GuardedCopy::Destroy(const_cast<char*>(utf))); |
| } |
| baseEnv(env)->ReleaseStringUTFChars(env, string, utf); |
| CHECK_JNI_EXIT_VOID(); |
| } |
| |
| static jsize GetArrayLength(JNIEnv* env, jarray array) { |
| CHECK_JNI_ENTRY(kFlag_CritOkay, "Ea", env, array); |
| return CHECK_JNI_EXIT("I", baseEnv(env)->GetArrayLength(env, array)); |
| } |
| |
| static jobjectArray NewObjectArray(JNIEnv* env, jsize length, jclass elementClass, jobject initialElement) { |
| CHECK_JNI_ENTRY(kFlag_Default, "EzcL", env, length, elementClass, initialElement); |
| return CHECK_JNI_EXIT("a", baseEnv(env)->NewObjectArray(env, length, elementClass, initialElement)); |
| } |
| |
| static jobject GetObjectArrayElement(JNIEnv* env, jobjectArray array, jsize index) { |
| CHECK_JNI_ENTRY(kFlag_Default, "EaI", env, array, index); |
| return CHECK_JNI_EXIT("L", baseEnv(env)->GetObjectArrayElement(env, array, index)); |
| } |
| |
| static void SetObjectArrayElement(JNIEnv* env, jobjectArray array, jsize index, jobject value) { |
| CHECK_JNI_ENTRY(kFlag_Default, "EaIL", env, array, index, value); |
| baseEnv(env)->SetObjectArrayElement(env, array, index, value); |
| CHECK_JNI_EXIT_VOID(); |
| } |
| |
| #define NEW_PRIMITIVE_ARRAY(_artype, _jname) \ |
| static _artype New##_jname##Array(JNIEnv* env, jsize length) { \ |
| CHECK_JNI_ENTRY(kFlag_Default, "Ez", env, length); \ |
| return CHECK_JNI_EXIT("a", baseEnv(env)->New##_jname##Array(env, length)); \ |
| } |
| NEW_PRIMITIVE_ARRAY(jbooleanArray, Boolean); |
| NEW_PRIMITIVE_ARRAY(jbyteArray, Byte); |
| NEW_PRIMITIVE_ARRAY(jcharArray, Char); |
| NEW_PRIMITIVE_ARRAY(jshortArray, Short); |
| NEW_PRIMITIVE_ARRAY(jintArray, Int); |
| NEW_PRIMITIVE_ARRAY(jlongArray, Long); |
| NEW_PRIMITIVE_ARRAY(jfloatArray, Float); |
| NEW_PRIMITIVE_ARRAY(jdoubleArray, Double); |
| |
| struct ForceCopyGetChecker { |
| public: |
| ForceCopyGetChecker(ScopedCheck& sc, jboolean* isCopy) { |
| force_copy = sc.ForceCopy(); |
| no_copy = 0; |
| if (force_copy && isCopy != nullptr) { |
| // Capture this before the base call tramples on it. |
| no_copy = *reinterpret_cast<uint32_t*>(isCopy); |
| } |
| } |
| |
| template<typename ResultT> |
| ResultT Check(JNIEnv* env, jarray array, jboolean* isCopy, ResultT result) { |
| if (force_copy && result != nullptr) { |
| result = reinterpret_cast<ResultT>(CreateGuardedPACopy(env, array, isCopy)); |
| } |
| return result; |
| } |
| |
| uint32_t no_copy; |
| bool force_copy; |
| }; |
| |
| #define GET_PRIMITIVE_ARRAY_ELEMENTS(_ctype, _jname) \ |
| static _ctype* Get##_jname##ArrayElements(JNIEnv* env, _ctype##Array array, jboolean* isCopy) { \ |
| CHECK_JNI_ENTRY(kFlag_Default, "Eap", env, array, isCopy); \ |
| _ctype* result = ForceCopyGetChecker(sc, isCopy).Check(env, array, isCopy, baseEnv(env)->Get##_jname##ArrayElements(env, array, isCopy)); \ |
| return CHECK_JNI_EXIT("p", result); \ |
| } |
| |
| #define RELEASE_PRIMITIVE_ARRAY_ELEMENTS(_ctype, _jname) \ |
| static void Release##_jname##ArrayElements(JNIEnv* env, _ctype##Array array, _ctype* elems, jint mode) { \ |
| CHECK_JNI_ENTRY(kFlag_Default | kFlag_ExcepOkay, "Eapr", env, array, elems, mode); \ |
| sc.CheckNonNull(elems); \ |
| if (sc.ForceCopy()) { \ |
| ReleaseGuardedPACopy(env, array, elems, mode); \ |
| } \ |
| baseEnv(env)->Release##_jname##ArrayElements(env, array, elems, mode); \ |
| CHECK_JNI_EXIT_VOID(); \ |
| } |
| |
| #define GET_PRIMITIVE_ARRAY_REGION(_ctype, _jname) \ |
| static void Get##_jname##ArrayRegion(JNIEnv* env, _ctype##Array array, jsize start, jsize len, _ctype* buf) { \ |
| CHECK_JNI_ENTRY(kFlag_Default, "EaIIp", env, array, start, len, buf); \ |
| baseEnv(env)->Get##_jname##ArrayRegion(env, array, start, len, buf); \ |
| CHECK_JNI_EXIT_VOID(); \ |
| } |
| |
| #define SET_PRIMITIVE_ARRAY_REGION(_ctype, _jname) \ |
| static void Set##_jname##ArrayRegion(JNIEnv* env, _ctype##Array array, jsize start, jsize len, const _ctype* buf) { \ |
| CHECK_JNI_ENTRY(kFlag_Default, "EaIIp", env, array, start, len, buf); \ |
| baseEnv(env)->Set##_jname##ArrayRegion(env, array, start, len, buf); \ |
| CHECK_JNI_EXIT_VOID(); \ |
| } |
| |
| #define PRIMITIVE_ARRAY_FUNCTIONS(_ctype, _jname, _typechar) \ |
| GET_PRIMITIVE_ARRAY_ELEMENTS(_ctype, _jname); \ |
| RELEASE_PRIMITIVE_ARRAY_ELEMENTS(_ctype, _jname); \ |
| GET_PRIMITIVE_ARRAY_REGION(_ctype, _jname); \ |
| SET_PRIMITIVE_ARRAY_REGION(_ctype, _jname); |
| |
| // TODO: verify primitive array type matches call type. |
| PRIMITIVE_ARRAY_FUNCTIONS(jboolean, Boolean, 'Z'); |
| PRIMITIVE_ARRAY_FUNCTIONS(jbyte, Byte, 'B'); |
| PRIMITIVE_ARRAY_FUNCTIONS(jchar, Char, 'C'); |
| PRIMITIVE_ARRAY_FUNCTIONS(jshort, Short, 'S'); |
| PRIMITIVE_ARRAY_FUNCTIONS(jint, Int, 'I'); |
| PRIMITIVE_ARRAY_FUNCTIONS(jlong, Long, 'J'); |
| PRIMITIVE_ARRAY_FUNCTIONS(jfloat, Float, 'F'); |
| PRIMITIVE_ARRAY_FUNCTIONS(jdouble, Double, 'D'); |
| |
| static jint RegisterNatives(JNIEnv* env, jclass c, const JNINativeMethod* methods, jint nMethods) { |
| CHECK_JNI_ENTRY(kFlag_Default, "EcpI", env, c, methods, nMethods); |
| return CHECK_JNI_EXIT("I", baseEnv(env)->RegisterNatives(env, c, methods, nMethods)); |
| } |
| |
| static jint UnregisterNatives(JNIEnv* env, jclass c) { |
| CHECK_JNI_ENTRY(kFlag_Default, "Ec", env, c); |
| return CHECK_JNI_EXIT("I", baseEnv(env)->UnregisterNatives(env, c)); |
| } |
| |
| static jint MonitorEnter(JNIEnv* env, jobject obj) { |
| CHECK_JNI_ENTRY(kFlag_Default, "EL", env, obj); |
| if (!sc.CheckInstance(ScopedCheck::kObject, obj)) { |
| return JNI_ERR; // Only for jni_internal_test. Real code will have aborted already. |
| } |
| return CHECK_JNI_EXIT("I", baseEnv(env)->MonitorEnter(env, obj)); |
| } |
| |
| static jint MonitorExit(JNIEnv* env, jobject obj) { |
| CHECK_JNI_ENTRY(kFlag_Default | kFlag_ExcepOkay, "EL", env, obj); |
| if (!sc.CheckInstance(ScopedCheck::kObject, obj)) { |
| return JNI_ERR; // Only for jni_internal_test. Real code will have aborted already. |
| } |
| return CHECK_JNI_EXIT("I", baseEnv(env)->MonitorExit(env, obj)); |
| } |
| |
| static jint GetJavaVM(JNIEnv *env, JavaVM **vm) { |
| CHECK_JNI_ENTRY(kFlag_Default, "Ep", env, vm); |
| return CHECK_JNI_EXIT("I", baseEnv(env)->GetJavaVM(env, vm)); |
| } |
| |
| static void GetStringRegion(JNIEnv* env, jstring str, jsize start, jsize len, jchar* buf) { |
| CHECK_JNI_ENTRY(kFlag_CritOkay, "EsIIp", env, str, start, len, buf); |
| baseEnv(env)->GetStringRegion(env, str, start, len, buf); |
| CHECK_JNI_EXIT_VOID(); |
| } |
| |
| static void GetStringUTFRegion(JNIEnv* env, jstring str, jsize start, jsize len, char* buf) { |
| CHECK_JNI_ENTRY(kFlag_CritOkay, "EsIIp", env, str, start, len, buf); |
| baseEnv(env)->GetStringUTFRegion(env, str, start, len, buf); |
| CHECK_JNI_EXIT_VOID(); |
| } |
| |
| static void* GetPrimitiveArrayCritical(JNIEnv* env, jarray array, jboolean* isCopy) { |
| CHECK_JNI_ENTRY(kFlag_CritGet, "Eap", env, array, isCopy); |
| void* result = baseEnv(env)->GetPrimitiveArrayCritical(env, array, isCopy); |
| if (sc.ForceCopy() && result != nullptr) { |
| result = CreateGuardedPACopy(env, array, isCopy); |
| } |
| return CHECK_JNI_EXIT("p", result); |
| } |
| |
| static void ReleasePrimitiveArrayCritical(JNIEnv* env, jarray array, void* carray, jint mode) { |
| CHECK_JNI_ENTRY(kFlag_CritRelease | kFlag_ExcepOkay, "Eapr", env, array, carray, mode); |
| sc.CheckNonNull(carray); |
| if (sc.ForceCopy()) { |
| ReleaseGuardedPACopy(env, array, carray, mode); |
| } |
| baseEnv(env)->ReleasePrimitiveArrayCritical(env, array, carray, mode); |
| CHECK_JNI_EXIT_VOID(); |
| } |
| |
| static const jchar* GetStringCritical(JNIEnv* env, jstring java_string, jboolean* isCopy) { |
| CHECK_JNI_ENTRY(kFlag_CritGet, "Esp", env, java_string, isCopy); |
| const jchar* result = baseEnv(env)->GetStringCritical(env, java_string, isCopy); |
| if (sc.ForceCopy() && result != nullptr) { |
| mirror::String* s = sc.soa().Decode<mirror::String*>(java_string); |
| int byteCount = s->GetLength() * 2; |
| result = (const jchar*) GuardedCopy::Create(result, byteCount, false); |
| if (isCopy != nullptr) { |
| *isCopy = JNI_TRUE; |
| } |
| } |
| return CHECK_JNI_EXIT("p", result); |
| } |
| |
| static void ReleaseStringCritical(JNIEnv* env, jstring string, const jchar* carray) { |
| CHECK_JNI_ENTRY(kFlag_CritRelease | kFlag_ExcepOkay, "Esp", env, string, carray); |
| sc.CheckNonNull(carray); |
| if (sc.ForceCopy()) { |
| GuardedCopy::Check(__FUNCTION__, carray, false); |
| carray = reinterpret_cast<const jchar*>(GuardedCopy::Destroy(const_cast<jchar*>(carray))); |
| } |
| baseEnv(env)->ReleaseStringCritical(env, string, carray); |
| CHECK_JNI_EXIT_VOID(); |
| } |
| |
| static jweak NewWeakGlobalRef(JNIEnv* env, jobject obj) { |
| CHECK_JNI_ENTRY(kFlag_Default, "EL", env, obj); |
| return CHECK_JNI_EXIT("L", baseEnv(env)->NewWeakGlobalRef(env, obj)); |
| } |
| |
| static jboolean ExceptionCheck(JNIEnv* env) { |
| CHECK_JNI_ENTRY(kFlag_CritOkay | kFlag_ExcepOkay, "E", env); |
| return CHECK_JNI_EXIT("b", baseEnv(env)->ExceptionCheck(env)); |
| } |
| |
| static jobjectRefType GetObjectRefType(JNIEnv* env, jobject obj) { |
| // Note: we use "Ep" rather than "EL" because this is the one JNI function |
| // that it's okay to pass an invalid reference to. |
| CHECK_JNI_ENTRY(kFlag_Default, "Ep", env, obj); |
| // TODO: proper decoding of jobjectRefType! |
| return CHECK_JNI_EXIT("I", baseEnv(env)->GetObjectRefType(env, obj)); |
| } |
| |
| static jobject NewDirectByteBuffer(JNIEnv* env, void* address, jlong capacity) { |
| CHECK_JNI_ENTRY(kFlag_Default, "EpJ", env, address, capacity); |
| if (address == nullptr) { |
| JniAbortF(__FUNCTION__, "non-nullable address is NULL"); |
| } |
| if (capacity < 0) { |
| JniAbortF(__FUNCTION__, "capacity must be non-negative: %" PRId64, capacity); |
| } |
| return CHECK_JNI_EXIT("L", baseEnv(env)->NewDirectByteBuffer(env, address, capacity)); |
| } |
| |
| static void* GetDirectBufferAddress(JNIEnv* env, jobject buf) { |
| CHECK_JNI_ENTRY(kFlag_Default, "EL", env, buf); |
| // TODO: check that 'buf' is a java.nio.Buffer. |
| return CHECK_JNI_EXIT("p", baseEnv(env)->GetDirectBufferAddress(env, buf)); |
| } |
| |
| static jlong GetDirectBufferCapacity(JNIEnv* env, jobject buf) { |
| CHECK_JNI_ENTRY(kFlag_Default, "EL", env, buf); |
| // TODO: check that 'buf' is a java.nio.Buffer. |
| return CHECK_JNI_EXIT("J", baseEnv(env)->GetDirectBufferCapacity(env, buf)); |
| } |
| |
| private: |
| static inline const JNINativeInterface* baseEnv(JNIEnv* env) { |
| return reinterpret_cast<JNIEnvExt*>(env)->unchecked_functions; |
| } |
| }; |
| |
| const JNINativeInterface gCheckNativeInterface = { |
| nullptr, // reserved0. |
| nullptr, // reserved1. |
| nullptr, // reserved2. |
| nullptr, // reserved3. |
| CheckJNI::GetVersion, |
| CheckJNI::DefineClass, |
| CheckJNI::FindClass, |
| CheckJNI::FromReflectedMethod, |
| CheckJNI::FromReflectedField, |
| CheckJNI::ToReflectedMethod, |
| CheckJNI::GetSuperclass, |
| CheckJNI::IsAssignableFrom, |
| CheckJNI::ToReflectedField, |
| CheckJNI::Throw, |
| CheckJNI::ThrowNew, |
| CheckJNI::ExceptionOccurred, |
| CheckJNI::ExceptionDescribe, |
| CheckJNI::ExceptionClear, |
| CheckJNI::FatalError, |
| CheckJNI::PushLocalFrame, |
| CheckJNI::PopLocalFrame, |
| CheckJNI::NewGlobalRef, |
| CheckJNI::DeleteGlobalRef, |
| CheckJNI::DeleteLocalRef, |
| CheckJNI::IsSameObject, |
| CheckJNI::NewLocalRef, |
| CheckJNI::EnsureLocalCapacity, |
| CheckJNI::AllocObject, |
| CheckJNI::NewObject, |
| CheckJNI::NewObjectV, |
| CheckJNI::NewObjectA, |
| CheckJNI::GetObjectClass, |
| CheckJNI::IsInstanceOf, |
| CheckJNI::GetMethodID, |
| CheckJNI::CallObjectMethod, |
| CheckJNI::CallObjectMethodV, |
| CheckJNI::CallObjectMethodA, |
| CheckJNI::CallBooleanMethod, |
| CheckJNI::CallBooleanMethodV, |
| CheckJNI::CallBooleanMethodA, |
| CheckJNI::CallByteMethod, |
| CheckJNI::CallByteMethodV, |
| CheckJNI::CallByteMethodA, |
| CheckJNI::CallCharMethod, |
| CheckJNI::CallCharMethodV, |
| CheckJNI::CallCharMethodA, |
| CheckJNI::CallShortMethod, |
| CheckJNI::CallShortMethodV, |
| CheckJNI::CallShortMethodA, |
| CheckJNI::CallIntMethod, |
| CheckJNI::CallIntMethodV, |
| CheckJNI::CallIntMethodA, |
| CheckJNI::CallLongMethod, |
| CheckJNI::CallLongMethodV, |
| CheckJNI::CallLongMethodA, |
| CheckJNI::CallFloatMethod, |
| CheckJNI::CallFloatMethodV, |
| CheckJNI::CallFloatMethodA, |
| CheckJNI::CallDoubleMethod, |
| CheckJNI::CallDoubleMethodV, |
| CheckJNI::CallDoubleMethodA, |
| CheckJNI::CallVoidMethod, |
| CheckJNI::CallVoidMethodV, |
| CheckJNI::CallVoidMethodA, |
| CheckJNI::CallNonvirtualObjectMethod, |
| CheckJNI::CallNonvirtualObjectMethodV, |
| CheckJNI::CallNonvirtualObjectMethodA, |
| CheckJNI::CallNonvirtualBooleanMethod, |
| CheckJNI::CallNonvirtualBooleanMethodV, |
| CheckJNI::CallNonvirtualBooleanMethodA, |
| CheckJNI::CallNonvirtualByteMethod, |
| CheckJNI::CallNonvirtualByteMethodV, |
| CheckJNI::CallNonvirtualByteMethodA, |
| CheckJNI::CallNonvirtualCharMethod, |
| CheckJNI::CallNonvirtualCharMethodV, |
| CheckJNI::CallNonvirtualCharMethodA, |
| CheckJNI::CallNonvirtualShortMethod, |
| CheckJNI::CallNonvirtualShortMethodV, |
| CheckJNI::CallNonvirtualShortMethodA, |
| CheckJNI::CallNonvirtualIntMethod, |
| CheckJNI::CallNonvirtualIntMethodV, |
| CheckJNI::CallNonvirtualIntMethodA, |
| CheckJNI::CallNonvirtualLongMethod, |
| CheckJNI::CallNonvirtualLongMethodV, |
| CheckJNI::CallNonvirtualLongMethodA, |
| CheckJNI::CallNonvirtualFloatMethod, |
| CheckJNI::CallNonvirtualFloatMethodV, |
| CheckJNI::CallNonvirtualFloatMethodA, |
| CheckJNI::CallNonvirtualDoubleMethod, |
| CheckJNI::CallNonvirtualDoubleMethodV, |
| CheckJNI::CallNonvirtualDoubleMethodA, |
| CheckJNI::CallNonvirtualVoidMethod, |
| CheckJNI::CallNonvirtualVoidMethodV, |
| CheckJNI::CallNonvirtualVoidMethodA, |
| CheckJNI::GetFieldID, |
| CheckJNI::GetObjectField, |
| CheckJNI::GetBooleanField, |
| CheckJNI::GetByteField, |
| CheckJNI::GetCharField, |
| CheckJNI::GetShortField, |
| CheckJNI::GetIntField, |
| CheckJNI::GetLongField, |
| CheckJNI::GetFloatField, |
| CheckJNI::GetDoubleField, |
| CheckJNI::SetObjectField, |
| CheckJNI::SetBooleanField, |
| CheckJNI::SetByteField, |
| CheckJNI::SetCharField, |
| CheckJNI::SetShortField, |
| CheckJNI::SetIntField, |
| CheckJNI::SetLongField, |
| CheckJNI::SetFloatField, |
| CheckJNI::SetDoubleField, |
| CheckJNI::GetStaticMethodID, |
| CheckJNI::CallStaticObjectMethod, |
| CheckJNI::CallStaticObjectMethodV, |
| CheckJNI::CallStaticObjectMethodA, |
| CheckJNI::CallStaticBooleanMethod, |
| CheckJNI::CallStaticBooleanMethodV, |
| CheckJNI::CallStaticBooleanMethodA, |
| CheckJNI::CallStaticByteMethod, |
| CheckJNI::CallStaticByteMethodV, |
| CheckJNI::CallStaticByteMethodA, |
| CheckJNI::CallStaticCharMethod, |
| CheckJNI::CallStaticCharMethodV, |
| CheckJNI::CallStaticCharMethodA, |
| CheckJNI::CallStaticShortMethod, |
| CheckJNI::CallStaticShortMethodV, |
| CheckJNI::CallStaticShortMethodA, |
| CheckJNI::CallStaticIntMethod, |
| CheckJNI::CallStaticIntMethodV, |
| CheckJNI::CallStaticIntMethodA, |
| CheckJNI::CallStaticLongMethod, |
| CheckJNI::CallStaticLongMethodV, |
| CheckJNI::CallStaticLongMethodA, |
| CheckJNI::CallStaticFloatMethod, |
| CheckJNI::CallStaticFloatMethodV, |
| CheckJNI::CallStaticFloatMethodA, |
| CheckJNI::CallStaticDoubleMethod, |
| CheckJNI::CallStaticDoubleMethodV, |
| CheckJNI::CallStaticDoubleMethodA, |
| CheckJNI::CallStaticVoidMethod, |
| CheckJNI::CallStaticVoidMethodV, |
| CheckJNI::CallStaticVoidMethodA, |
| CheckJNI::GetStaticFieldID, |
| CheckJNI::GetStaticObjectField, |
| CheckJNI::GetStaticBooleanField, |
| CheckJNI::GetStaticByteField, |
| CheckJNI::GetStaticCharField, |
| CheckJNI::GetStaticShortField, |
| CheckJNI::GetStaticIntField, |
| CheckJNI::GetStaticLongField, |
| CheckJNI::GetStaticFloatField, |
| CheckJNI::GetStaticDoubleField, |
| CheckJNI::SetStaticObjectField, |
| CheckJNI::SetStaticBooleanField, |
| CheckJNI::SetStaticByteField, |
| CheckJNI::SetStaticCharField, |
| CheckJNI::SetStaticShortField, |
| CheckJNI::SetStaticIntField, |
| CheckJNI::SetStaticLongField, |
| CheckJNI::SetStaticFloatField, |
| CheckJNI::SetStaticDoubleField, |
| CheckJNI::NewString, |
| CheckJNI::GetStringLength, |
| CheckJNI::GetStringChars, |
| CheckJNI::ReleaseStringChars, |
| CheckJNI::NewStringUTF, |
| CheckJNI::GetStringUTFLength, |
| CheckJNI::GetStringUTFChars, |
| CheckJNI::ReleaseStringUTFChars, |
| CheckJNI::GetArrayLength, |
| CheckJNI::NewObjectArray, |
| CheckJNI::GetObjectArrayElement, |
| CheckJNI::SetObjectArrayElement, |
| CheckJNI::NewBooleanArray, |
| CheckJNI::NewByteArray, |
| CheckJNI::NewCharArray, |
| CheckJNI::NewShortArray, |
| CheckJNI::NewIntArray, |
| CheckJNI::NewLongArray, |
| CheckJNI::NewFloatArray, |
| CheckJNI::NewDoubleArray, |
| CheckJNI::GetBooleanArrayElements, |
| CheckJNI::GetByteArrayElements, |
| CheckJNI::GetCharArrayElements, |
| CheckJNI::GetShortArrayElements, |
| CheckJNI::GetIntArrayElements, |
| CheckJNI::GetLongArrayElements, |
| CheckJNI::GetFloatArrayElements, |
| CheckJNI::GetDoubleArrayElements, |
| CheckJNI::ReleaseBooleanArrayElements, |
| CheckJNI::ReleaseByteArrayElements, |
| CheckJNI::ReleaseCharArrayElements, |
| CheckJNI::ReleaseShortArrayElements, |
| CheckJNI::ReleaseIntArrayElements, |
| CheckJNI::ReleaseLongArrayElements, |
| CheckJNI::ReleaseFloatArrayElements, |
| CheckJNI::ReleaseDoubleArrayElements, |
| CheckJNI::GetBooleanArrayRegion, |
| CheckJNI::GetByteArrayRegion, |
| CheckJNI::GetCharArrayRegion, |
| CheckJNI::GetShortArrayRegion, |
| CheckJNI::GetIntArrayRegion, |
| CheckJNI::GetLongArrayRegion, |
| CheckJNI::GetFloatArrayRegion, |
| CheckJNI::GetDoubleArrayRegion, |
| CheckJNI::SetBooleanArrayRegion, |
| CheckJNI::SetByteArrayRegion, |
| CheckJNI::SetCharArrayRegion, |
| CheckJNI::SetShortArrayRegion, |
| CheckJNI::SetIntArrayRegion, |
| CheckJNI::SetLongArrayRegion, |
| CheckJNI::SetFloatArrayRegion, |
| CheckJNI::SetDoubleArrayRegion, |
| CheckJNI::RegisterNatives, |
| CheckJNI::UnregisterNatives, |
| CheckJNI::MonitorEnter, |
| CheckJNI::MonitorExit, |
| CheckJNI::GetJavaVM, |
| CheckJNI::GetStringRegion, |
| CheckJNI::GetStringUTFRegion, |
| CheckJNI::GetPrimitiveArrayCritical, |
| CheckJNI::ReleasePrimitiveArrayCritical, |
| CheckJNI::GetStringCritical, |
| CheckJNI::ReleaseStringCritical, |
| CheckJNI::NewWeakGlobalRef, |
| CheckJNI::DeleteWeakGlobalRef, |
| CheckJNI::ExceptionCheck, |
| CheckJNI::NewDirectByteBuffer, |
| CheckJNI::GetDirectBufferAddress, |
| CheckJNI::GetDirectBufferCapacity, |
| CheckJNI::GetObjectRefType, |
| }; |
| |
| const JNINativeInterface* GetCheckJniNativeInterface() { |
| return &gCheckNativeInterface; |
| } |
| |
| class CheckJII { |
| public: |
| static jint DestroyJavaVM(JavaVM* vm) { |
| ScopedCheck sc(vm, false, __FUNCTION__); |
| sc.Check(true, "v", vm); |
| return CHECK_JNI_EXIT("I", BaseVm(vm)->DestroyJavaVM(vm)); |
| } |
| |
| static jint AttachCurrentThread(JavaVM* vm, JNIEnv** p_env, void* thr_args) { |
| ScopedCheck sc(vm, false, __FUNCTION__); |
| sc.Check(true, "vpp", vm, p_env, thr_args); |
| return CHECK_JNI_EXIT("I", BaseVm(vm)->AttachCurrentThread(vm, p_env, thr_args)); |
| } |
| |
| static jint AttachCurrentThreadAsDaemon(JavaVM* vm, JNIEnv** p_env, void* thr_args) { |
| ScopedCheck sc(vm, false, __FUNCTION__); |
| sc.Check(true, "vpp", vm, p_env, thr_args); |
| return CHECK_JNI_EXIT("I", BaseVm(vm)->AttachCurrentThreadAsDaemon(vm, p_env, thr_args)); |
| } |
| |
| static jint DetachCurrentThread(JavaVM* vm) { |
| ScopedCheck sc(vm, true, __FUNCTION__); |
| sc.Check(true, "v", vm); |
| return CHECK_JNI_EXIT("I", BaseVm(vm)->DetachCurrentThread(vm)); |
| } |
| |
| static jint GetEnv(JavaVM* vm, void** env, jint version) { |
| ScopedCheck sc(vm, true, __FUNCTION__); |
| sc.Check(true, "vpI", vm); |
| return CHECK_JNI_EXIT("I", BaseVm(vm)->GetEnv(vm, env, version)); |
| } |
| |
| private: |
| static inline const JNIInvokeInterface* BaseVm(JavaVM* vm) { |
| return reinterpret_cast<JavaVMExt*>(vm)->unchecked_functions; |
| } |
| }; |
| |
| const JNIInvokeInterface gCheckInvokeInterface = { |
| nullptr, // reserved0 |
| nullptr, // reserved1 |
| nullptr, // reserved2 |
| CheckJII::DestroyJavaVM, |
| CheckJII::AttachCurrentThread, |
| CheckJII::DetachCurrentThread, |
| CheckJII::GetEnv, |
| CheckJII::AttachCurrentThreadAsDaemon |
| }; |
| |
| const JNIInvokeInterface* GetCheckJniInvokeInterface() { |
| return &gCheckInvokeInterface; |
| } |
| |
| } // namespace art |