blob: 7398778d1570de6af464cac892afc45fd395fa47 [file] [log] [blame]
Sebastien Hertz8ece0502013-08-07 11:26:41 +02001/*
2 * Copyright (C) 2012 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#ifndef ART_RUNTIME_INTERPRETER_INTERPRETER_COMMON_H_
18#define ART_RUNTIME_INTERPRETER_INTERPRETER_COMMON_H_
19
20#include "interpreter.h"
21
22#include <math.h>
23
Ian Rogerscf7f1912014-10-22 22:06:39 -070024#include <iostream>
Ian Rogersc7dd2952014-10-21 23:31:19 -070025#include <sstream>
26
Mathieu Chartierc7853442015-03-27 14:35:38 -070027#include "art_field-inl.h"
Mathieu Chartiere401d142015-04-22 13:56:20 -070028#include "art_method-inl.h"
Sebastien Hertz8ece0502013-08-07 11:26:41 +020029#include "base/logging.h"
Andreas Gampe794ad762015-02-23 08:12:24 -080030#include "base/macros.h"
Sebastien Hertz8ece0502013-08-07 11:26:41 +020031#include "class_linker-inl.h"
32#include "common_throws.h"
33#include "dex_file-inl.h"
34#include "dex_instruction-inl.h"
Mingyao Yang98d1cc82014-05-15 17:02:16 -070035#include "entrypoints/entrypoint_utils-inl.h"
Mathieu Chartier0cd81352014-05-22 16:48:55 -070036#include "handle_scope-inl.h"
Igor Murashkine2facc52015-07-10 13:49:08 -070037#include "lambda/box_table.h"
Sebastien Hertz8ece0502013-08-07 11:26:41 +020038#include "mirror/class-inl.h"
Igor Murashkin2ee54e22015-06-18 10:05:11 -070039#include "mirror/method.h"
Sebastien Hertz8ece0502013-08-07 11:26:41 +020040#include "mirror/object-inl.h"
41#include "mirror/object_array-inl.h"
Douglas Leung4965c022014-06-11 11:41:11 -070042#include "mirror/string-inl.h"
Sebastien Hertz8ece0502013-08-07 11:26:41 +020043#include "thread.h"
44#include "well_known_classes.h"
45
Mathieu Chartiere401d142015-04-22 13:56:20 -070046using ::art::ArtMethod;
Sebastien Hertz8ece0502013-08-07 11:26:41 +020047using ::art::mirror::Array;
48using ::art::mirror::BooleanArray;
49using ::art::mirror::ByteArray;
50using ::art::mirror::CharArray;
51using ::art::mirror::Class;
52using ::art::mirror::ClassLoader;
53using ::art::mirror::IntArray;
54using ::art::mirror::LongArray;
55using ::art::mirror::Object;
56using ::art::mirror::ObjectArray;
57using ::art::mirror::ShortArray;
58using ::art::mirror::String;
59using ::art::mirror::Throwable;
60
61namespace art {
62namespace interpreter {
63
64// External references to both interpreter implementations.
65
Sebastien Hertzd2fe10a2014-01-15 10:20:56 +010066template<bool do_access_check, bool transaction_active>
Ian Rogerse94652f2014-12-02 11:13:19 -080067extern JValue ExecuteSwitchImpl(Thread* self, const DexFile::CodeItem* code_item,
Sebastien Hertzc6714852013-09-30 16:42:32 +020068 ShadowFrame& shadow_frame, JValue result_register);
Sebastien Hertz8ece0502013-08-07 11:26:41 +020069
Sebastien Hertzd2fe10a2014-01-15 10:20:56 +010070template<bool do_access_check, bool transaction_active>
Ian Rogerse94652f2014-12-02 11:13:19 -080071extern JValue ExecuteGotoImpl(Thread* self, const DexFile::CodeItem* code_item,
Sebastien Hertzc6714852013-09-30 16:42:32 +020072 ShadowFrame& shadow_frame, JValue result_register);
Sebastien Hertz8ece0502013-08-07 11:26:41 +020073
Nicolas Geoffray0aa50ce2015-03-10 11:03:29 +000074void ThrowNullPointerExceptionFromInterpreter()
Mathieu Chartier90443472015-07-16 20:32:27 -070075 SHARED_REQUIRES(Locks::mutator_lock_);
Sebastien Hertzda843e12014-05-28 19:28:31 +020076
Sebastien Hertz8ece0502013-08-07 11:26:41 +020077static inline void DoMonitorEnter(Thread* self, Object* ref) NO_THREAD_SAFETY_ANALYSIS {
78 ref->MonitorEnter(self);
79}
80
81static inline void DoMonitorExit(Thread* self, Object* ref) NO_THREAD_SAFETY_ANALYSIS {
82 ref->MonitorExit(self);
83}
84
Sebastien Hertz45b15972015-04-03 16:07:05 +020085void AbortTransactionF(Thread* self, const char* fmt, ...)
86 __attribute__((__format__(__printf__, 2, 3)))
Mathieu Chartier90443472015-07-16 20:32:27 -070087 SHARED_REQUIRES(Locks::mutator_lock_);
Sebastien Hertz45b15972015-04-03 16:07:05 +020088
89void AbortTransactionV(Thread* self, const char* fmt, va_list args)
Mathieu Chartier90443472015-07-16 20:32:27 -070090 SHARED_REQUIRES(Locks::mutator_lock_);
Mathieu Chartierb2c7ead2014-04-29 11:13:16 -070091
Sebastien Hertzd2fe10a2014-01-15 10:20:56 +010092void RecordArrayElementsInTransaction(mirror::Array* array, int32_t count)
Mathieu Chartier90443472015-07-16 20:32:27 -070093 SHARED_REQUIRES(Locks::mutator_lock_);
Sebastien Hertzd2fe10a2014-01-15 10:20:56 +010094
Sebastien Hertzc6714852013-09-30 16:42:32 +020095// Invokes the given method. This is part of the invocation support and is used by DoInvoke and
96// DoInvokeVirtualQuick functions.
97// Returns true on success, otherwise throws an exception and returns false.
Sebastien Hertzc61124b2013-09-10 11:44:19 +020098template<bool is_range, bool do_assignability_check>
Ian Rogerse94652f2014-12-02 11:13:19 -080099bool DoCall(ArtMethod* called_method, Thread* self, ShadowFrame& shadow_frame,
Sebastien Hertzc6714852013-09-30 16:42:32 +0200100 const Instruction* inst, uint16_t inst_data, JValue* result);
Sebastien Hertzc61124b2013-09-10 11:44:19 +0200101
Igor Murashkin158f35c2015-06-10 15:55:30 -0700102// Invokes the given lambda closure. This is part of the invocation support and is used by
103// DoLambdaInvoke functions.
104// Returns true on success, otherwise throws an exception and returns false.
105template<bool is_range, bool do_assignability_check>
106bool DoLambdaCall(ArtMethod* called_method, Thread* self, ShadowFrame& shadow_frame,
107 const Instruction* inst, uint16_t inst_data, JValue* result);
108
109// Validates that the art method corresponding to a lambda method target
110// is semantically valid:
111//
112// Must be ACC_STATIC and ACC_LAMBDA. Must be a concrete managed implementation
113// (i.e. not native, not proxy, not abstract, ...).
114//
115// If the validation fails, return false and raise an exception.
116static inline bool IsValidLambdaTargetOrThrow(ArtMethod* called_method)
Mathieu Chartier90443472015-07-16 20:32:27 -0700117 SHARED_REQUIRES(Locks::mutator_lock_) {
Igor Murashkin158f35c2015-06-10 15:55:30 -0700118 bool success = false;
119
120 if (UNLIKELY(called_method == nullptr)) {
121 // The shadow frame should already be pushed, so we don't need to update it.
122 } else if (UNLIKELY(called_method->IsAbstract())) {
123 ThrowAbstractMethodError(called_method);
124 // TODO(iam): Also handle the case when the method is non-static, what error do we throw?
125 // TODO(iam): Also make sure that ACC_LAMBDA is set.
126 } else if (UNLIKELY(called_method->GetCodeItem() == nullptr)) {
127 // Method could be native, proxy method, etc. Lambda targets have to be concrete impls,
128 // so don't allow this.
129 } else {
130 success = true;
131 }
132
133 return success;
134}
135
Igor Murashkin2ee54e22015-06-18 10:05:11 -0700136// Write out the 'ArtMethod*' into vreg and vreg+1
137static inline void WriteLambdaClosureIntoVRegs(ShadowFrame& shadow_frame,
138 const ArtMethod& called_method,
139 uint32_t vreg) {
140 // Split the method into a lo and hi 32 bits so we can encode them into 2 virtual registers.
141 uint32_t called_method_lo = static_cast<uint32_t>(reinterpret_cast<uintptr_t>(&called_method));
142 uint32_t called_method_hi = static_cast<uint32_t>(reinterpret_cast<uint64_t>(&called_method)
143 >> BitSizeOf<uint32_t>());
144 // Use uint64_t instead of uintptr_t to allow shifting past the max on 32-bit.
145 static_assert(sizeof(uint64_t) >= sizeof(uintptr_t), "Impossible");
146
147 DCHECK_NE(called_method_lo | called_method_hi, 0u);
148
149 shadow_frame.SetVReg(vreg, called_method_lo);
150 shadow_frame.SetVReg(vreg + 1, called_method_hi);
151}
152
Igor Murashkin158f35c2015-06-10 15:55:30 -0700153// Handles create-lambda instructions.
154// Returns true on success, otherwise throws an exception and returns false.
155// (Exceptions are thrown by creating a new exception and then being put in the thread TLS)
156//
157// As a work-in-progress implementation, this shoves the ArtMethod object corresponding
158// to the target dex method index into the target register vA and vA + 1.
159template<bool do_access_check>
160static inline bool DoCreateLambda(Thread* self, ShadowFrame& shadow_frame,
161 const Instruction* inst) {
162 /*
163 * create-lambda is opcode 0x21c
164 * - vA is the target register where the closure will be stored into
165 * (also stores into vA + 1)
166 * - vB is the method index which will be the target for a later invoke-lambda
167 */
168 const uint32_t method_idx = inst->VRegB_21c();
169 mirror::Object* receiver = nullptr; // Always static. (see 'kStatic')
170 ArtMethod* sf_method = shadow_frame.GetMethod();
171 ArtMethod* const called_method = FindMethodFromCode<kStatic, do_access_check>(
Andreas Gampe3a357142015-08-07 17:20:11 -0700172 method_idx, &receiver, sf_method, self);
Igor Murashkin158f35c2015-06-10 15:55:30 -0700173
174 uint32_t vregA = inst->VRegA_21c();
175
176 if (UNLIKELY(!IsValidLambdaTargetOrThrow(called_method))) {
177 CHECK(self->IsExceptionPending());
178 shadow_frame.SetVReg(vregA, 0u);
179 shadow_frame.SetVReg(vregA + 1, 0u);
180 return false;
181 }
182
Igor Murashkin2ee54e22015-06-18 10:05:11 -0700183 WriteLambdaClosureIntoVRegs(shadow_frame, *called_method, vregA);
Igor Murashkin158f35c2015-06-10 15:55:30 -0700184 return true;
185}
186
Igor Murashkin2ee54e22015-06-18 10:05:11 -0700187// Reads out the 'ArtMethod*' stored inside of vreg and vreg+1
188//
189// Validates that the art method points to a valid lambda function, otherwise throws
190// an exception and returns null.
191// (Exceptions are thrown by creating a new exception and then being put in the thread TLS)
192static inline ArtMethod* ReadLambdaClosureFromVRegsOrThrow(ShadowFrame& shadow_frame,
193 uint32_t vreg)
Mathieu Chartier90443472015-07-16 20:32:27 -0700194 SHARED_REQUIRES(Locks::mutator_lock_) {
Igor Murashkin2ee54e22015-06-18 10:05:11 -0700195 // TODO(iam): Introduce a closure abstraction that will contain the captured variables
196 // instead of just an ArtMethod.
197 // This is temporarily using 2 vregs because a native ArtMethod can be up to 64-bit,
198 // but once proper variable capture is implemented it will only use 1 vreg.
199 uint32_t vc_value_lo = shadow_frame.GetVReg(vreg);
200 uint32_t vc_value_hi = shadow_frame.GetVReg(vreg + 1);
201
202 uint64_t vc_value_ptr = (static_cast<uint64_t>(vc_value_hi) << BitSizeOf<uint32_t>())
203 | vc_value_lo;
204
205 // Use uint64_t instead of uintptr_t to allow left-shifting past the max on 32-bit.
206 static_assert(sizeof(uint64_t) >= sizeof(uintptr_t), "Impossible");
207 ArtMethod* const called_method = reinterpret_cast<ArtMethod* const>(vc_value_ptr);
208
209 // Guard against the user passing a null closure, which is odd but (sadly) semantically valid.
210 if (UNLIKELY(called_method == nullptr)) {
211 ThrowNullPointerExceptionFromInterpreter();
212 return nullptr;
213 } else if (UNLIKELY(!IsValidLambdaTargetOrThrow(called_method))) {
214 return nullptr;
215 }
216
217 return called_method;
218}
219
Igor Murashkin158f35c2015-06-10 15:55:30 -0700220template<bool do_access_check>
221static inline bool DoInvokeLambda(Thread* self, ShadowFrame& shadow_frame, const Instruction* inst,
222 uint16_t inst_data, JValue* result) {
223 /*
224 * invoke-lambda is opcode 0x25
225 *
226 * - vC is the closure register (both vC and vC + 1 will be used to store the closure).
227 * - vB is the number of additional registers up to |{vD,vE,vF,vG}| (4)
228 * - the rest of the registers are always var-args
229 *
230 * - reading var-args for 0x25 gets us vD,vE,vF,vG (but not vB)
231 */
232 uint32_t vC = inst->VRegC_25x();
Igor Murashkin2ee54e22015-06-18 10:05:11 -0700233 ArtMethod* const called_method = ReadLambdaClosureFromVRegsOrThrow(shadow_frame, vC);
Igor Murashkin158f35c2015-06-10 15:55:30 -0700234
Igor Murashkin2ee54e22015-06-18 10:05:11 -0700235 // Failed lambda target runtime check, an exception was raised.
Igor Murashkin158f35c2015-06-10 15:55:30 -0700236 if (UNLIKELY(called_method == nullptr)) {
Igor Murashkin158f35c2015-06-10 15:55:30 -0700237 CHECK(self->IsExceptionPending());
238 result->SetJ(0);
239 return false;
Igor Murashkin158f35c2015-06-10 15:55:30 -0700240 }
Igor Murashkin2ee54e22015-06-18 10:05:11 -0700241
242 // Invoke a non-range lambda
243 return DoLambdaCall<false, do_access_check>(called_method, self, shadow_frame, inst, inst_data,
244 result);
Igor Murashkin158f35c2015-06-10 15:55:30 -0700245}
246
Sebastien Hertzc6714852013-09-30 16:42:32 +0200247// Handles invoke-XXX/range instructions.
248// Returns true on success, otherwise throws an exception and returns false.
Sebastien Hertzc61124b2013-09-10 11:44:19 +0200249template<InvokeType type, bool is_range, bool do_access_check>
250static inline bool DoInvoke(Thread* self, ShadowFrame& shadow_frame, const Instruction* inst,
251 uint16_t inst_data, JValue* result) {
252 const uint32_t method_idx = (is_range) ? inst->VRegB_3rc() : inst->VRegB_35c();
253 const uint32_t vregC = (is_range) ? inst->VRegC_3rc() : inst->VRegC_35c();
Mathieu Chartiere861ebd2013-10-09 15:01:21 -0700254 Object* receiver = (type == kStatic) ? nullptr : shadow_frame.GetVRegReference(vregC);
Mathieu Chartiere401d142015-04-22 13:56:20 -0700255 ArtMethod* sf_method = shadow_frame.GetMethod();
Ian Rogerse94652f2014-12-02 11:13:19 -0800256 ArtMethod* const called_method = FindMethodFromCode<type, do_access_check>(
Andreas Gampe3a357142015-08-07 17:20:11 -0700257 method_idx, &receiver, sf_method, self);
Mathieu Chartier0cd81352014-05-22 16:48:55 -0700258 // The shadow frame should already be pushed, so we don't need to update it.
Ian Rogerse94652f2014-12-02 11:13:19 -0800259 if (UNLIKELY(called_method == nullptr)) {
Sebastien Hertzc61124b2013-09-10 11:44:19 +0200260 CHECK(self->IsExceptionPending());
261 result->SetJ(0);
262 return false;
Ian Rogerse94652f2014-12-02 11:13:19 -0800263 } else if (UNLIKELY(called_method->IsAbstract())) {
264 ThrowAbstractMethodError(called_method);
Sebastien Hertzc61124b2013-09-10 11:44:19 +0200265 result->SetJ(0);
266 return false;
267 } else {
Nicolas Geoffray5550ca82015-08-21 18:38:30 +0100268 if (type == kVirtual || type == kInterface) {
269 instrumentation::Instrumentation* instrumentation = Runtime::Current()->GetInstrumentation();
270 if (UNLIKELY(instrumentation->HasInvokeVirtualOrInterfaceListeners())) {
271 instrumentation->InvokeVirtualOrInterface(
272 self, receiver, sf_method, shadow_frame.GetDexPC(), called_method);
273 }
274 }
Ian Rogerse94652f2014-12-02 11:13:19 -0800275 return DoCall<is_range, do_access_check>(called_method, self, shadow_frame, inst, inst_data,
276 result);
Sebastien Hertzc61124b2013-09-10 11:44:19 +0200277 }
278}
Sebastien Hertz8ece0502013-08-07 11:26:41 +0200279
Sebastien Hertzc6714852013-09-30 16:42:32 +0200280// Handles invoke-virtual-quick and invoke-virtual-quick-range instructions.
281// Returns true on success, otherwise throws an exception and returns false.
Sebastien Hertzc61124b2013-09-10 11:44:19 +0200282template<bool is_range>
283static inline bool DoInvokeVirtualQuick(Thread* self, ShadowFrame& shadow_frame,
284 const Instruction* inst, uint16_t inst_data,
285 JValue* result) {
286 const uint32_t vregC = (is_range) ? inst->VRegC_3rc() : inst->VRegC_35c();
287 Object* const receiver = shadow_frame.GetVRegReference(vregC);
Sebastien Hertzd4beb6b2013-10-02 17:07:20 +0200288 if (UNLIKELY(receiver == nullptr)) {
Sebastien Hertzc61124b2013-09-10 11:44:19 +0200289 // We lost the reference to the method index so we cannot get a more
290 // precised exception message.
Nicolas Geoffray0aa50ce2015-03-10 11:03:29 +0000291 ThrowNullPointerExceptionFromDexPC();
Sebastien Hertzc61124b2013-09-10 11:44:19 +0200292 return false;
293 }
294 const uint32_t vtable_idx = (is_range) ? inst->VRegB_3rc() : inst->VRegB_35c();
Mingyao Yang2cdbad72014-07-16 10:44:41 -0700295 CHECK(receiver->GetClass()->ShouldHaveEmbeddedImtAndVTable());
Mathieu Chartiere401d142015-04-22 13:56:20 -0700296 ArtMethod* const called_method = receiver->GetClass()->GetEmbeddedVTableEntry(
297 vtable_idx, sizeof(void*));
Ian Rogerse94652f2014-12-02 11:13:19 -0800298 if (UNLIKELY(called_method == nullptr)) {
Sebastien Hertzc61124b2013-09-10 11:44:19 +0200299 CHECK(self->IsExceptionPending());
300 result->SetJ(0);
301 return false;
Ian Rogerse94652f2014-12-02 11:13:19 -0800302 } else if (UNLIKELY(called_method->IsAbstract())) {
303 ThrowAbstractMethodError(called_method);
Sebastien Hertzc61124b2013-09-10 11:44:19 +0200304 result->SetJ(0);
305 return false;
306 } else {
Nicolas Geoffray5550ca82015-08-21 18:38:30 +0100307 instrumentation::Instrumentation* instrumentation = Runtime::Current()->GetInstrumentation();
308 if (UNLIKELY(instrumentation->HasInvokeVirtualOrInterfaceListeners())) {
309 instrumentation->InvokeVirtualOrInterface(
310 self, receiver, shadow_frame.GetMethod(), shadow_frame.GetDexPC(), called_method);
311 }
Sebastien Hertzc61124b2013-09-10 11:44:19 +0200312 // No need to check since we've been quickened.
Ian Rogerse94652f2014-12-02 11:13:19 -0800313 return DoCall<is_range, false>(called_method, self, shadow_frame, inst, inst_data, result);
Sebastien Hertzc61124b2013-09-10 11:44:19 +0200314 }
315}
Sebastien Hertz8ece0502013-08-07 11:26:41 +0200316
Sebastien Hertzc6714852013-09-30 16:42:32 +0200317// Handles iget-XXX and sget-XXX instructions.
318// Returns true on success, otherwise throws an exception and returns false.
Sebastien Hertz8ece0502013-08-07 11:26:41 +0200319template<FindFieldType find_type, Primitive::Type field_type, bool do_access_check>
Ian Rogers54874942014-06-10 16:31:03 -0700320bool DoFieldGet(Thread* self, ShadowFrame& shadow_frame, const Instruction* inst,
Mathieu Chartier90443472015-07-16 20:32:27 -0700321 uint16_t inst_data) SHARED_REQUIRES(Locks::mutator_lock_);
Sebastien Hertz8ece0502013-08-07 11:26:41 +0200322
Sebastien Hertzc6714852013-09-30 16:42:32 +0200323// Handles iget-quick, iget-wide-quick and iget-object-quick instructions.
324// Returns true on success, otherwise throws an exception and returns false.
Sebastien Hertz8ece0502013-08-07 11:26:41 +0200325template<Primitive::Type field_type>
Ian Rogers54874942014-06-10 16:31:03 -0700326bool DoIGetQuick(ShadowFrame& shadow_frame, const Instruction* inst, uint16_t inst_data)
Mathieu Chartier90443472015-07-16 20:32:27 -0700327 SHARED_REQUIRES(Locks::mutator_lock_);
Sebastien Hertz479fc1e2014-04-04 17:51:34 +0200328
Sebastien Hertzc6714852013-09-30 16:42:32 +0200329// Handles iput-XXX and sput-XXX instructions.
330// Returns true on success, otherwise throws an exception and returns false.
Ian Rogers54874942014-06-10 16:31:03 -0700331template<FindFieldType find_type, Primitive::Type field_type, bool do_access_check,
332 bool transaction_active>
333bool DoFieldPut(Thread* self, const ShadowFrame& shadow_frame, const Instruction* inst,
Mathieu Chartier90443472015-07-16 20:32:27 -0700334 uint16_t inst_data) SHARED_REQUIRES(Locks::mutator_lock_);
Sebastien Hertz8ece0502013-08-07 11:26:41 +0200335
Sebastien Hertzc6714852013-09-30 16:42:32 +0200336// Handles iput-quick, iput-wide-quick and iput-object-quick instructions.
337// Returns true on success, otherwise throws an exception and returns false.
Sebastien Hertzd2fe10a2014-01-15 10:20:56 +0100338template<Primitive::Type field_type, bool transaction_active>
Ian Rogers54874942014-06-10 16:31:03 -0700339bool DoIPutQuick(const ShadowFrame& shadow_frame, const Instruction* inst, uint16_t inst_data)
Mathieu Chartier90443472015-07-16 20:32:27 -0700340 SHARED_REQUIRES(Locks::mutator_lock_);
Ian Rogers54874942014-06-10 16:31:03 -0700341
Sebastien Hertz8ece0502013-08-07 11:26:41 +0200342
Sebastien Hertzc6714852013-09-30 16:42:32 +0200343// Handles string resolution for const-string and const-string-jumbo instructions. Also ensures the
344// java.lang.String class is initialized.
Ian Rogers6786a582014-10-28 12:49:06 -0700345static inline String* ResolveString(Thread* self, ShadowFrame& shadow_frame, uint32_t string_idx)
Mathieu Chartier90443472015-07-16 20:32:27 -0700346 SHARED_REQUIRES(Locks::mutator_lock_) {
Sebastien Hertz8ece0502013-08-07 11:26:41 +0200347 Class* java_lang_string_class = String::GetJavaLangString();
348 if (UNLIKELY(!java_lang_string_class->IsInitialized())) {
349 ClassLinker* class_linker = Runtime::Current()->GetClassLinker();
Mathieu Chartiereb8167a2014-05-07 15:43:14 -0700350 StackHandleScope<1> hs(self);
351 Handle<mirror::Class> h_class(hs.NewHandle(java_lang_string_class));
Ian Rogers7b078e82014-09-10 14:44:24 -0700352 if (UNLIKELY(!class_linker->EnsureInitialized(self, h_class, true, true))) {
Sebastien Hertz8ece0502013-08-07 11:26:41 +0200353 DCHECK(self->IsExceptionPending());
Mathieu Chartierc528dba2013-11-26 12:00:11 -0800354 return nullptr;
Sebastien Hertz8ece0502013-08-07 11:26:41 +0200355 }
356 }
Mathieu Chartiere401d142015-04-22 13:56:20 -0700357 ArtMethod* method = shadow_frame.GetMethod();
Mathieu Chartiereace4582014-11-24 18:29:54 -0800358 mirror::Class* declaring_class = method->GetDeclaringClass();
Vladimir Marko05792b92015-08-03 11:56:49 +0100359 // MethodVerifier refuses methods with string_idx out of bounds.
360 DCHECK_LT(string_idx, declaring_class->GetDexCache()->NumStrings());
361 mirror::String* s = declaring_class->GetDexCacheStrings()[string_idx].Read();
Ian Rogers6786a582014-10-28 12:49:06 -0700362 if (UNLIKELY(s == nullptr)) {
363 StackHandleScope<1> hs(self);
Mathieu Chartiereace4582014-11-24 18:29:54 -0800364 Handle<mirror::DexCache> dex_cache(hs.NewHandle(declaring_class->GetDexCache()));
Ian Rogers6786a582014-10-28 12:49:06 -0700365 s = Runtime::Current()->GetClassLinker()->ResolveString(*method->GetDexFile(), string_idx,
366 dex_cache);
367 }
368 return s;
Sebastien Hertz8ece0502013-08-07 11:26:41 +0200369}
370
Sebastien Hertzc6714852013-09-30 16:42:32 +0200371// Handles div-int, div-int/2addr, div-int/li16 and div-int/lit8 instructions.
372// Returns true on success, otherwise throws a java.lang.ArithmeticException and return false.
Sebastien Hertz8ece0502013-08-07 11:26:41 +0200373static inline bool DoIntDivide(ShadowFrame& shadow_frame, size_t result_reg,
374 int32_t dividend, int32_t divisor)
Mathieu Chartier90443472015-07-16 20:32:27 -0700375 SHARED_REQUIRES(Locks::mutator_lock_) {
Ian Rogersf72a11d2014-10-30 15:41:08 -0700376 constexpr int32_t kMinInt = std::numeric_limits<int32_t>::min();
Sebastien Hertz8ece0502013-08-07 11:26:41 +0200377 if (UNLIKELY(divisor == 0)) {
378 ThrowArithmeticExceptionDivideByZero();
379 return false;
380 }
381 if (UNLIKELY(dividend == kMinInt && divisor == -1)) {
382 shadow_frame.SetVReg(result_reg, kMinInt);
383 } else {
384 shadow_frame.SetVReg(result_reg, dividend / divisor);
385 }
386 return true;
387}
388
Sebastien Hertzc6714852013-09-30 16:42:32 +0200389// Handles rem-int, rem-int/2addr, rem-int/li16 and rem-int/lit8 instructions.
390// Returns true on success, otherwise throws a java.lang.ArithmeticException and return false.
Sebastien Hertz8ece0502013-08-07 11:26:41 +0200391static inline bool DoIntRemainder(ShadowFrame& shadow_frame, size_t result_reg,
392 int32_t dividend, int32_t divisor)
Mathieu Chartier90443472015-07-16 20:32:27 -0700393 SHARED_REQUIRES(Locks::mutator_lock_) {
Ian Rogersf72a11d2014-10-30 15:41:08 -0700394 constexpr int32_t kMinInt = std::numeric_limits<int32_t>::min();
Sebastien Hertz8ece0502013-08-07 11:26:41 +0200395 if (UNLIKELY(divisor == 0)) {
396 ThrowArithmeticExceptionDivideByZero();
397 return false;
398 }
399 if (UNLIKELY(dividend == kMinInt && divisor == -1)) {
400 shadow_frame.SetVReg(result_reg, 0);
401 } else {
402 shadow_frame.SetVReg(result_reg, dividend % divisor);
403 }
404 return true;
405}
406
Sebastien Hertzc6714852013-09-30 16:42:32 +0200407// Handles div-long and div-long-2addr instructions.
408// Returns true on success, otherwise throws a java.lang.ArithmeticException and return false.
Sebastien Hertz8ece0502013-08-07 11:26:41 +0200409static inline bool DoLongDivide(ShadowFrame& shadow_frame, size_t result_reg,
410 int64_t dividend, int64_t divisor)
Mathieu Chartier90443472015-07-16 20:32:27 -0700411 SHARED_REQUIRES(Locks::mutator_lock_) {
Ian Rogers2e2deeb2013-09-23 11:58:57 -0700412 const int64_t kMinLong = std::numeric_limits<int64_t>::min();
Sebastien Hertz8ece0502013-08-07 11:26:41 +0200413 if (UNLIKELY(divisor == 0)) {
414 ThrowArithmeticExceptionDivideByZero();
415 return false;
416 }
417 if (UNLIKELY(dividend == kMinLong && divisor == -1)) {
418 shadow_frame.SetVRegLong(result_reg, kMinLong);
419 } else {
420 shadow_frame.SetVRegLong(result_reg, dividend / divisor);
421 }
422 return true;
423}
424
Sebastien Hertzc6714852013-09-30 16:42:32 +0200425// Handles rem-long and rem-long-2addr instructions.
426// Returns true on success, otherwise throws a java.lang.ArithmeticException and return false.
Sebastien Hertz8ece0502013-08-07 11:26:41 +0200427static inline bool DoLongRemainder(ShadowFrame& shadow_frame, size_t result_reg,
428 int64_t dividend, int64_t divisor)
Mathieu Chartier90443472015-07-16 20:32:27 -0700429 SHARED_REQUIRES(Locks::mutator_lock_) {
Ian Rogers2e2deeb2013-09-23 11:58:57 -0700430 const int64_t kMinLong = std::numeric_limits<int64_t>::min();
Sebastien Hertz8ece0502013-08-07 11:26:41 +0200431 if (UNLIKELY(divisor == 0)) {
432 ThrowArithmeticExceptionDivideByZero();
433 return false;
434 }
435 if (UNLIKELY(dividend == kMinLong && divisor == -1)) {
436 shadow_frame.SetVRegLong(result_reg, 0);
437 } else {
438 shadow_frame.SetVRegLong(result_reg, dividend % divisor);
439 }
440 return true;
441}
442
Sebastien Hertzc6714852013-09-30 16:42:32 +0200443// Handles filled-new-array and filled-new-array-range instructions.
Sebastien Hertz8ece0502013-08-07 11:26:41 +0200444// Returns true on success, otherwise throws an exception and returns false.
Sebastien Hertzd2fe10a2014-01-15 10:20:56 +0100445template <bool is_range, bool do_access_check, bool transaction_active>
Sebastien Hertz8ece0502013-08-07 11:26:41 +0200446bool DoFilledNewArray(const Instruction* inst, const ShadowFrame& shadow_frame,
Sebastien Hertzc6714852013-09-30 16:42:32 +0200447 Thread* self, JValue* result);
Sebastien Hertz8ece0502013-08-07 11:26:41 +0200448
Sebastien Hertzc6714852013-09-30 16:42:32 +0200449// Handles packed-switch instruction.
450// Returns the branch offset to the next instruction to execute.
Sebastien Hertz3b588e02013-09-11 14:33:18 +0200451static inline int32_t DoPackedSwitch(const Instruction* inst, const ShadowFrame& shadow_frame,
452 uint16_t inst_data)
Mathieu Chartier90443472015-07-16 20:32:27 -0700453 SHARED_REQUIRES(Locks::mutator_lock_) {
Sebastien Hertz8ece0502013-08-07 11:26:41 +0200454 DCHECK(inst->Opcode() == Instruction::PACKED_SWITCH);
455 const uint16_t* switch_data = reinterpret_cast<const uint16_t*>(inst) + inst->VRegB_31t();
Sebastien Hertz3b588e02013-09-11 14:33:18 +0200456 int32_t test_val = shadow_frame.GetVReg(inst->VRegA_31t(inst_data));
Sebastien Hertz8ece0502013-08-07 11:26:41 +0200457 DCHECK_EQ(switch_data[0], static_cast<uint16_t>(Instruction::kPackedSwitchSignature));
458 uint16_t size = switch_data[1];
David Brazdil2ef645b2015-06-17 18:20:52 +0100459 if (size == 0) {
460 // Empty packed switch, move forward by 3 (size of PACKED_SWITCH).
461 return 3;
462 }
Sebastien Hertz8ece0502013-08-07 11:26:41 +0200463 const int32_t* keys = reinterpret_cast<const int32_t*>(&switch_data[2]);
Roland Levillain14d90572015-07-16 10:52:26 +0100464 DCHECK_ALIGNED(keys, 4);
Sebastien Hertz8ece0502013-08-07 11:26:41 +0200465 int32_t first_key = keys[0];
466 const int32_t* targets = reinterpret_cast<const int32_t*>(&switch_data[4]);
Roland Levillain14d90572015-07-16 10:52:26 +0100467 DCHECK_ALIGNED(targets, 4);
Sebastien Hertz8ece0502013-08-07 11:26:41 +0200468 int32_t index = test_val - first_key;
469 if (index >= 0 && index < size) {
470 return targets[index];
471 } else {
472 // No corresponding value: move forward by 3 (size of PACKED_SWITCH).
473 return 3;
474 }
475}
476
Sebastien Hertzc6714852013-09-30 16:42:32 +0200477// Handles sparse-switch instruction.
478// Returns the branch offset to the next instruction to execute.
Sebastien Hertz3b588e02013-09-11 14:33:18 +0200479static inline int32_t DoSparseSwitch(const Instruction* inst, const ShadowFrame& shadow_frame,
480 uint16_t inst_data)
Mathieu Chartier90443472015-07-16 20:32:27 -0700481 SHARED_REQUIRES(Locks::mutator_lock_) {
Sebastien Hertz8ece0502013-08-07 11:26:41 +0200482 DCHECK(inst->Opcode() == Instruction::SPARSE_SWITCH);
483 const uint16_t* switch_data = reinterpret_cast<const uint16_t*>(inst) + inst->VRegB_31t();
Sebastien Hertz3b588e02013-09-11 14:33:18 +0200484 int32_t test_val = shadow_frame.GetVReg(inst->VRegA_31t(inst_data));
Sebastien Hertz8ece0502013-08-07 11:26:41 +0200485 DCHECK_EQ(switch_data[0], static_cast<uint16_t>(Instruction::kSparseSwitchSignature));
486 uint16_t size = switch_data[1];
Jeff Hao935e01a2015-03-20 19:44:35 -0700487 // Return length of SPARSE_SWITCH if size is 0.
488 if (size == 0) {
489 return 3;
490 }
Sebastien Hertz8ece0502013-08-07 11:26:41 +0200491 const int32_t* keys = reinterpret_cast<const int32_t*>(&switch_data[2]);
Roland Levillain14d90572015-07-16 10:52:26 +0100492 DCHECK_ALIGNED(keys, 4);
Sebastien Hertz8ece0502013-08-07 11:26:41 +0200493 const int32_t* entries = keys + size;
Roland Levillain14d90572015-07-16 10:52:26 +0100494 DCHECK_ALIGNED(entries, 4);
Sebastien Hertz8ece0502013-08-07 11:26:41 +0200495 int lo = 0;
496 int hi = size - 1;
497 while (lo <= hi) {
498 int mid = (lo + hi) / 2;
499 int32_t foundVal = keys[mid];
500 if (test_val < foundVal) {
501 hi = mid - 1;
502 } else if (test_val > foundVal) {
503 lo = mid + 1;
504 } else {
505 return entries[mid];
506 }
507 }
508 // No corresponding value: move forward by 3 (size of SPARSE_SWITCH).
509 return 3;
510}
511
Igor Murashkin2ee54e22015-06-18 10:05:11 -0700512template <bool _do_check>
513static inline bool DoBoxLambda(Thread* self, ShadowFrame& shadow_frame, const Instruction* inst,
Mathieu Chartier90443472015-07-16 20:32:27 -0700514 uint16_t inst_data) SHARED_REQUIRES(Locks::mutator_lock_) {
Igor Murashkin2ee54e22015-06-18 10:05:11 -0700515 /*
516 * box-lambda vA, vB /// opcode 0xf8, format 22x
517 * - vA is the target register where the Object representation of the closure will be stored into
518 * - vB is a closure (made by create-lambda)
519 * (also reads vB + 1)
520 */
521 uint32_t vreg_target_object = inst->VRegA_22x(inst_data);
522 uint32_t vreg_source_closure = inst->VRegB_22x();
523
Igor Murashkine2facc52015-07-10 13:49:08 -0700524 ArtMethod* closure_method = ReadLambdaClosureFromVRegsOrThrow(shadow_frame,
525 vreg_source_closure);
Igor Murashkin2ee54e22015-06-18 10:05:11 -0700526
527 // Failed lambda target runtime check, an exception was raised.
528 if (UNLIKELY(closure_method == nullptr)) {
529 CHECK(self->IsExceptionPending());
530 return false;
531 }
532
Igor Murashkine2facc52015-07-10 13:49:08 -0700533 mirror::Object* closure_as_object =
534 Runtime::Current()->GetLambdaBoxTable()->BoxLambda(closure_method);
Igor Murashkin2ee54e22015-06-18 10:05:11 -0700535
Igor Murashkine2facc52015-07-10 13:49:08 -0700536 // Failed to box the lambda, an exception was raised.
537 if (UNLIKELY(closure_as_object == nullptr)) {
Igor Murashkin2ee54e22015-06-18 10:05:11 -0700538 CHECK(self->IsExceptionPending());
539 return false;
540 }
541
Igor Murashkine2facc52015-07-10 13:49:08 -0700542 shadow_frame.SetVRegReference(vreg_target_object, closure_as_object);
Igor Murashkin2ee54e22015-06-18 10:05:11 -0700543 return true;
544}
545
Mathieu Chartier90443472015-07-16 20:32:27 -0700546template <bool _do_check> SHARED_REQUIRES(Locks::mutator_lock_)
Igor Murashkine2facc52015-07-10 13:49:08 -0700547static inline bool DoUnboxLambda(Thread* self,
Igor Murashkin2ee54e22015-06-18 10:05:11 -0700548 ShadowFrame& shadow_frame,
549 const Instruction* inst,
550 uint16_t inst_data) {
551 /*
552 * unbox-lambda vA, vB, [type id] /// opcode 0xf9, format 22c
553 * - vA is the target register where the closure will be written into
554 * (also writes vA + 1)
555 * - vB is the Object representation of the closure (made by box-lambda)
556 */
557 uint32_t vreg_target_closure = inst->VRegA_22c(inst_data);
558 uint32_t vreg_source_object = inst->VRegB_22c();
559
560 // Raise NullPointerException if object is null
561 mirror::Object* boxed_closure_object = shadow_frame.GetVRegReference(vreg_source_object);
562 if (UNLIKELY(boxed_closure_object == nullptr)) {
563 ThrowNullPointerExceptionFromInterpreter();
564 return false;
565 }
566
Igor Murashkine2facc52015-07-10 13:49:08 -0700567 ArtMethod* unboxed_closure = nullptr;
568 // Raise an exception if unboxing fails.
569 if (!Runtime::Current()->GetLambdaBoxTable()->UnboxLambda(boxed_closure_object,
Igor Murashkinb1d8c312015-08-04 11:18:43 -0700570 &unboxed_closure)) {
Igor Murashkine2facc52015-07-10 13:49:08 -0700571 CHECK(self->IsExceptionPending());
Igor Murashkin2ee54e22015-06-18 10:05:11 -0700572 return false;
573 }
574
Igor Murashkin2ee54e22015-06-18 10:05:11 -0700575 DCHECK(unboxed_closure != nullptr);
Igor Murashkin2ee54e22015-06-18 10:05:11 -0700576 WriteLambdaClosureIntoVRegs(shadow_frame, *unboxed_closure, vreg_target_closure);
577 return true;
578}
579
Ian Rogers54874942014-06-10 16:31:03 -0700580uint32_t FindNextInstructionFollowingException(Thread* self, ShadowFrame& shadow_frame,
Sebastien Hertz9f102032014-05-23 08:59:42 +0200581 uint32_t dex_pc, const instrumentation::Instrumentation* instrumentation)
Mathieu Chartier90443472015-07-16 20:32:27 -0700582 SHARED_REQUIRES(Locks::mutator_lock_);
Sebastien Hertz8ece0502013-08-07 11:26:41 +0200583
Andreas Gampe794ad762015-02-23 08:12:24 -0800584NO_RETURN void UnexpectedOpcode(const Instruction* inst, const ShadowFrame& shadow_frame)
585 __attribute__((cold))
Mathieu Chartier90443472015-07-16 20:32:27 -0700586 SHARED_REQUIRES(Locks::mutator_lock_);
Sebastien Hertz8ece0502013-08-07 11:26:41 +0200587
Sebastien Hertz8ece0502013-08-07 11:26:41 +0200588static inline void TraceExecution(const ShadowFrame& shadow_frame, const Instruction* inst,
Ian Rogerse94652f2014-12-02 11:13:19 -0800589 const uint32_t dex_pc)
Mathieu Chartier90443472015-07-16 20:32:27 -0700590 SHARED_REQUIRES(Locks::mutator_lock_) {
Mathieu Chartiere861ebd2013-10-09 15:01:21 -0700591 constexpr bool kTracing = false;
Sebastien Hertz8ece0502013-08-07 11:26:41 +0200592 if (kTracing) {
593#define TRACE_LOG std::cerr
Mathieu Chartiere861ebd2013-10-09 15:01:21 -0700594 std::ostringstream oss;
595 oss << PrettyMethod(shadow_frame.GetMethod())
596 << StringPrintf("\n0x%x: ", dex_pc)
Ian Rogerse94652f2014-12-02 11:13:19 -0800597 << inst->DumpString(shadow_frame.GetMethod()->GetDexFile()) << "\n";
Ian Rogersef7d42f2014-01-06 12:55:46 -0800598 for (uint32_t i = 0; i < shadow_frame.NumberOfVRegs(); ++i) {
Sebastien Hertz8ece0502013-08-07 11:26:41 +0200599 uint32_t raw_value = shadow_frame.GetVReg(i);
600 Object* ref_value = shadow_frame.GetVRegReference(i);
Ian Rogersef7d42f2014-01-06 12:55:46 -0800601 oss << StringPrintf(" vreg%u=0x%08X", i, raw_value);
Mathieu Chartier2cebb242015-04-21 16:50:40 -0700602 if (ref_value != nullptr) {
Sebastien Hertz8ece0502013-08-07 11:26:41 +0200603 if (ref_value->GetClass()->IsStringClass() &&
Jeff Hao848f70a2014-01-15 13:49:50 -0800604 ref_value->AsString()->GetValue() != nullptr) {
Mathieu Chartiere861ebd2013-10-09 15:01:21 -0700605 oss << "/java.lang.String \"" << ref_value->AsString()->ToModifiedUtf8() << "\"";
Sebastien Hertz8ece0502013-08-07 11:26:41 +0200606 } else {
Mathieu Chartiere861ebd2013-10-09 15:01:21 -0700607 oss << "/" << PrettyTypeOf(ref_value);
Sebastien Hertz8ece0502013-08-07 11:26:41 +0200608 }
609 }
610 }
Mathieu Chartiere861ebd2013-10-09 15:01:21 -0700611 TRACE_LOG << oss.str() << "\n";
Sebastien Hertz8ece0502013-08-07 11:26:41 +0200612#undef TRACE_LOG
613 }
614}
615
Sebastien Hertz1eda2262013-09-09 16:53:14 +0200616static inline bool IsBackwardBranch(int32_t branch_offset) {
617 return branch_offset <= 0;
618}
619
Sebastien Hertzc6714852013-09-30 16:42:32 +0200620// Explicitly instantiate all DoInvoke functions.
Bernhard Rosenkränzer46053622013-12-12 02:15:52 +0100621#define EXPLICIT_DO_INVOKE_TEMPLATE_DECL(_type, _is_range, _do_check) \
Mathieu Chartier90443472015-07-16 20:32:27 -0700622 template SHARED_REQUIRES(Locks::mutator_lock_) \
Bernhard Rosenkränzer46053622013-12-12 02:15:52 +0100623 bool DoInvoke<_type, _is_range, _do_check>(Thread* self, ShadowFrame& shadow_frame, \
624 const Instruction* inst, uint16_t inst_data, \
625 JValue* result)
Sebastien Hertzc6714852013-09-30 16:42:32 +0200626
627#define EXPLICIT_DO_INVOKE_ALL_TEMPLATE_DECL(_type) \
628 EXPLICIT_DO_INVOKE_TEMPLATE_DECL(_type, false, false); \
629 EXPLICIT_DO_INVOKE_TEMPLATE_DECL(_type, false, true); \
630 EXPLICIT_DO_INVOKE_TEMPLATE_DECL(_type, true, false); \
631 EXPLICIT_DO_INVOKE_TEMPLATE_DECL(_type, true, true);
632
Andreas Gampec8ccf682014-09-29 20:07:43 -0700633EXPLICIT_DO_INVOKE_ALL_TEMPLATE_DECL(kStatic) // invoke-static/range.
634EXPLICIT_DO_INVOKE_ALL_TEMPLATE_DECL(kDirect) // invoke-direct/range.
635EXPLICIT_DO_INVOKE_ALL_TEMPLATE_DECL(kVirtual) // invoke-virtual/range.
636EXPLICIT_DO_INVOKE_ALL_TEMPLATE_DECL(kSuper) // invoke-super/range.
637EXPLICIT_DO_INVOKE_ALL_TEMPLATE_DECL(kInterface) // invoke-interface/range.
Sebastien Hertzc6714852013-09-30 16:42:32 +0200638#undef EXPLICIT_DO_INVOKE_ALL_TEMPLATE_DECL
639#undef EXPLICIT_DO_INVOKE_TEMPLATE_DECL
640
Sebastien Hertzc6714852013-09-30 16:42:32 +0200641// Explicitly instantiate all DoInvokeVirtualQuick functions.
Bernhard Rosenkränzer46053622013-12-12 02:15:52 +0100642#define EXPLICIT_DO_INVOKE_VIRTUAL_QUICK_TEMPLATE_DECL(_is_range) \
Mathieu Chartier90443472015-07-16 20:32:27 -0700643 template SHARED_REQUIRES(Locks::mutator_lock_) \
Bernhard Rosenkränzer46053622013-12-12 02:15:52 +0100644 bool DoInvokeVirtualQuick<_is_range>(Thread* self, ShadowFrame& shadow_frame, \
645 const Instruction* inst, uint16_t inst_data, \
646 JValue* result)
Sebastien Hertzc6714852013-09-30 16:42:32 +0200647
648EXPLICIT_DO_INVOKE_VIRTUAL_QUICK_TEMPLATE_DECL(false); // invoke-virtual-quick.
649EXPLICIT_DO_INVOKE_VIRTUAL_QUICK_TEMPLATE_DECL(true); // invoke-virtual-quick-range.
650#undef EXPLICIT_INSTANTIATION_DO_INVOKE_VIRTUAL_QUICK
651
Igor Murashkin158f35c2015-06-10 15:55:30 -0700652// Explicitly instantiate all DoCreateLambda functions.
653#define EXPLICIT_DO_CREATE_LAMBDA_DECL(_do_check) \
Mathieu Chartier90443472015-07-16 20:32:27 -0700654template SHARED_REQUIRES(Locks::mutator_lock_) \
Igor Murashkin158f35c2015-06-10 15:55:30 -0700655bool DoCreateLambda<_do_check>(Thread* self, ShadowFrame& shadow_frame, \
656 const Instruction* inst)
657
658EXPLICIT_DO_CREATE_LAMBDA_DECL(false); // create-lambda
659EXPLICIT_DO_CREATE_LAMBDA_DECL(true); // create-lambda
660#undef EXPLICIT_DO_CREATE_LAMBDA_DECL
661
662// Explicitly instantiate all DoInvokeLambda functions.
663#define EXPLICIT_DO_INVOKE_LAMBDA_DECL(_do_check) \
Mathieu Chartier90443472015-07-16 20:32:27 -0700664template SHARED_REQUIRES(Locks::mutator_lock_) \
Igor Murashkin158f35c2015-06-10 15:55:30 -0700665bool DoInvokeLambda<_do_check>(Thread* self, ShadowFrame& shadow_frame, const Instruction* inst, \
666 uint16_t inst_data, JValue* result);
667
668EXPLICIT_DO_INVOKE_LAMBDA_DECL(false); // invoke-lambda
669EXPLICIT_DO_INVOKE_LAMBDA_DECL(true); // invoke-lambda
670#undef EXPLICIT_DO_INVOKE_LAMBDA_DECL
671
Igor Murashkin2ee54e22015-06-18 10:05:11 -0700672// Explicitly instantiate all DoBoxLambda functions.
673#define EXPLICIT_DO_BOX_LAMBDA_DECL(_do_check) \
Mathieu Chartier90443472015-07-16 20:32:27 -0700674template SHARED_REQUIRES(Locks::mutator_lock_) \
Igor Murashkin2ee54e22015-06-18 10:05:11 -0700675bool DoBoxLambda<_do_check>(Thread* self, ShadowFrame& shadow_frame, const Instruction* inst, \
676 uint16_t inst_data);
677
678EXPLICIT_DO_BOX_LAMBDA_DECL(false); // box-lambda
679EXPLICIT_DO_BOX_LAMBDA_DECL(true); // box-lambda
680#undef EXPLICIT_DO_BOX_LAMBDA_DECL
681
682// Explicitly instantiate all DoUnBoxLambda functions.
683#define EXPLICIT_DO_UNBOX_LAMBDA_DECL(_do_check) \
Mathieu Chartier90443472015-07-16 20:32:27 -0700684template SHARED_REQUIRES(Locks::mutator_lock_) \
Igor Murashkin2ee54e22015-06-18 10:05:11 -0700685bool DoUnboxLambda<_do_check>(Thread* self, ShadowFrame& shadow_frame, const Instruction* inst, \
686 uint16_t inst_data);
687
688EXPLICIT_DO_UNBOX_LAMBDA_DECL(false); // unbox-lambda
689EXPLICIT_DO_UNBOX_LAMBDA_DECL(true); // unbox-lambda
690#undef EXPLICIT_DO_BOX_LAMBDA_DECL
691
Sebastien Hertzc6714852013-09-30 16:42:32 +0200692
Sebastien Hertz8ece0502013-08-07 11:26:41 +0200693} // namespace interpreter
694} // namespace art
695
696#endif // ART_RUNTIME_INTERPRETER_INTERPRETER_COMMON_H_