2 * Copyright (C) 2008 The Android Open Source Project
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
8 * http://www.apache.org/licenses/LICENSE-2.0
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
17 #include "check_jni.h"
23 #include "android-base/stringprintf.h"
25 #include "art_field-inl.h"
26 #include "art_method-inl.h"
27 #include "base/logging.h"
28 #include "base/to_str.h"
29 #include "class_linker.h"
30 #include "class_linker-inl.h"
31 #include "dex_file-inl.h"
32 #include "gc/space/space.h"
33 #include "java_vm_ext.h"
34 #include "jni_internal.h"
35 #include "mirror/class-inl.h"
36 #include "mirror/object-inl.h"
37 #include "mirror/object_array-inl.h"
38 #include "mirror/string-inl.h"
39 #include "mirror/throwable.h"
41 #include "scoped_thread_state_change-inl.h"
43 #include "well_known_classes.h"
47 using android::base::StringAppendF;
48 using android::base::StringPrintf;
51 * ===========================================================================
52 * JNI function helpers
53 * ===========================================================================
56 // Flags passed into ScopedCheck.
57 #define kFlag_Default 0x0000
59 #define kFlag_CritBad 0x0000 // Calling while in critical is not allowed.
60 #define kFlag_CritOkay 0x0001 // Calling while in critical is allowed.
61 #define kFlag_CritGet 0x0002 // This is a critical "get".
62 #define kFlag_CritRelease 0x0003 // This is a critical "release".
63 #define kFlag_CritMask 0x0003 // Bit mask to get "crit" value.
65 #define kFlag_ExcepBad 0x0000 // Raised exceptions are not allowed.
66 #define kFlag_ExcepOkay 0x0004 // Raised exceptions are allowed.
68 #define kFlag_Release 0x0010 // Are we in a non-critical release function?
69 #define kFlag_NullableUtf 0x0020 // Are our UTF parameters nullable?
71 #define kFlag_Invocation 0x8000 // Part of the invocation interface (JavaVM*).
73 #define kFlag_ForceTrace 0x80000000 // Add this to a JNI function's flags if you want to trace every call.
77 * Java primitive types:
85 * Z - jboolean (shown as true and false)
88 * Java reference types:
96 * b - jboolean (shown as JNI_TRUE and JNI_FALSE)
98 * i - JNI error value (JNI_OK, JNI_ERR, JNI_EDETACHED, JNI_EVERSION)
101 * r - jint (for release mode arguments)
102 * u - const char* (Modified UTF-8)
103 * z - jsize (for lengths; use i if negative values are okay)
107 * . - no argument; just print "..." (used for varargs JNI calls)
117 const void* p; // Pointer.
118 jint r; // Release mode.
121 const char* u; // Modified UTF-8.
134 const void* V; // void
140 * A structure containing all the information needed to validate varargs arguments.
142 * Note that actually getting the arguments from this structure mutates it so should only be done on
147 VarArgs(jmethodID m, va_list var) : m_(m), type_(kTypeVaList), cnt_(0) {
148 va_copy(vargs_, var);
151 VarArgs(jmethodID m, const jvalue* vals) : m_(m), type_(kTypePtr), cnt_(0), ptr_(vals) {}
154 if (type_ == kTypeVaList) {
159 VarArgs(VarArgs&& other) {
163 if (other.type_ == kTypeVaList) {
164 va_copy(vargs_, other.vargs_);
170 // This method is const because we need to ensure that one only uses the GetValue method on an
171 // owned copy of the VarArgs. This is because getting the next argument from a va_list is a
172 // mutating operation. Therefore we pass around these VarArgs with the 'const' qualifier and when
173 // we want to use one we need to Clone() it.
174 VarArgs Clone() const {
175 if (type_ == kTypeVaList) {
176 // const_cast needed to make sure the compiler is okay with va_copy, which (being a macro) is
177 // messed up if the source argument is not the exact type 'va_list'.
178 return VarArgs(m_, cnt_, const_cast<VarArgs*>(this)->vargs_);
180 return VarArgs(m_, cnt_, ptr_);
184 jmethodID GetMethodID() const {
188 JniValueType GetValue(char fmt) {
190 if (type_ == kTypeVaList) {
192 case 'Z': o.Z = static_cast<jboolean>(va_arg(vargs_, jint)); break;
193 case 'B': o.B = static_cast<jbyte>(va_arg(vargs_, jint)); break;
194 case 'C': o.C = static_cast<jchar>(va_arg(vargs_, jint)); break;
195 case 'S': o.S = static_cast<jshort>(va_arg(vargs_, jint)); break;
196 case 'I': o.I = va_arg(vargs_, jint); break;
197 case 'J': o.J = va_arg(vargs_, jlong); break;
198 case 'F': o.F = static_cast<jfloat>(va_arg(vargs_, jdouble)); break;
199 case 'D': o.D = va_arg(vargs_, jdouble); break;
200 case 'L': o.L = va_arg(vargs_, jobject); break;
202 LOG(FATAL) << "Illegal type format char " << fmt;
206 CHECK(type_ == kTypePtr);
207 jvalue v = ptr_[cnt_];
210 case 'Z': o.Z = v.z; break;
211 case 'B': o.B = v.b; break;
212 case 'C': o.C = v.c; break;
213 case 'S': o.S = v.s; break;
214 case 'I': o.I = v.i; break;
215 case 'J': o.J = v.j; break;
216 case 'F': o.F = v.f; break;
217 case 'D': o.D = v.d; break;
218 case 'L': o.L = v.l; break;
220 LOG(FATAL) << "Illegal type format char " << fmt;
228 VarArgs(jmethodID m, uint32_t cnt, va_list var) : m_(m), type_(kTypeVaList), cnt_(cnt) {
229 va_copy(vargs_, var);
232 VarArgs(jmethodID m, uint32_t cnt, const jvalue* vals) : m_(m), type_(kTypePtr), cnt_(cnt), ptr_(vals) {}
250 ScopedCheck(int flags, const char* functionName, bool has_method = true)
251 : function_name_(functionName), flags_(flags), indent_(0), has_method_(has_method) {
256 // Checks that 'class_name' is a valid "fully-qualified" JNI class name, like "java/lang/Thread"
257 // or "[Ljava/lang/Object;". A ClassLoader can actually normalize class names a couple of
258 // times, so using "java.lang.Thread" instead of "java/lang/Thread" might work in some
259 // circumstances, but this is incorrect.
260 bool CheckClassName(const char* class_name) {
261 if ((class_name == nullptr) || !IsValidJniClassName(class_name)) {
262 AbortF("illegal class name '%s'\n"
263 " (should be of the form 'package/Class', [Lpackage/Class;' or '[[B')",
271 * Verify that this instance field ID is valid for this object.
273 * Assumes "jobj" has already been validated.
275 bool CheckInstanceFieldID(ScopedObjectAccess& soa, jobject java_object, jfieldID fid)
276 REQUIRES_SHARED(Locks::mutator_lock_) {
277 ObjPtr<mirror::Object> o = soa.Decode<mirror::Object>(java_object);
279 AbortF("field operation on NULL object: %p", java_object);
282 if (!Runtime::Current()->GetHeap()->IsValidObjectAddress(o.Ptr())) {
283 Runtime::Current()->GetHeap()->DumpSpaces(LOG_STREAM(ERROR));
284 AbortF("field operation on invalid %s: %p",
285 GetIndirectRefKindString(IndirectReferenceTable::GetIndirectRefKind(java_object)),
290 ArtField* f = CheckFieldID(fid);
294 mirror::Class* c = o->GetClass();
295 if (c->FindInstanceField(f->GetName(), f->GetTypeDescriptor()) == nullptr) {
296 AbortF("jfieldID %s not valid for an object of class %s",
297 f->PrettyField().c_str(), o->PrettyTypeOf().c_str());
304 * Verify that the pointer value is non-null.
306 bool CheckNonNull(const void* ptr) {
307 if (UNLIKELY(ptr == nullptr)) {
308 AbortF("non-nullable argument was NULL");
315 * Verify that the method's return type matches the type of call.
316 * 'expectedType' will be "L" for all objects, including arrays.
318 bool CheckMethodAndSig(ScopedObjectAccess& soa, jobject jobj, jclass jc,
319 jmethodID mid, Primitive::Type type, InvokeType invoke)
320 REQUIRES_SHARED(Locks::mutator_lock_) {
321 ArtMethod* m = CheckMethodID(mid);
325 if (type != Primitive::GetType(m->GetShorty()[0])) {
326 AbortF("the return type of %s does not match %s", function_name_, m->PrettyMethod().c_str());
329 bool is_static = (invoke == kStatic);
330 if (is_static != m->IsStatic()) {
332 AbortF("calling non-static method %s with %s",
333 m->PrettyMethod().c_str(), function_name_);
335 AbortF("calling static method %s with %s",
336 m->PrettyMethod().c_str(), function_name_);
340 if (invoke != kVirtual) {
341 ObjPtr<mirror::Class> c = soa.Decode<mirror::Class>(jc);
342 if (!m->GetDeclaringClass()->IsAssignableFrom(c)) {
343 AbortF("can't call %s %s with class %s", invoke == kStatic ? "static" : "nonvirtual",
344 m->PrettyMethod().c_str(), mirror::Class::PrettyClass(c).c_str());
348 if (invoke != kStatic) {
349 ObjPtr<mirror::Object> o = soa.Decode<mirror::Object>(jobj);
351 AbortF("can't call %s on null object", m->PrettyMethod().c_str());
353 } else if (!o->InstanceOf(m->GetDeclaringClass())) {
354 AbortF("can't call %s on instance of %s", m->PrettyMethod().c_str(),
355 o->PrettyTypeOf().c_str());
363 * Verify that this static field ID is valid for this class.
365 * Assumes "java_class" has already been validated.
367 bool CheckStaticFieldID(ScopedObjectAccess& soa, jclass java_class, jfieldID fid)
368 REQUIRES_SHARED(Locks::mutator_lock_) {
369 ObjPtr<mirror::Class> c = soa.Decode<mirror::Class>(java_class);
370 ArtField* f = CheckFieldID(fid);
374 if (c != f->GetDeclaringClass()) {
375 AbortF("static jfieldID %p not valid for class %s", fid,
376 mirror::Class::PrettyClass(c).c_str());
383 * Verify that "mid" is appropriate for "java_class".
385 * A mismatch isn't dangerous, because the jmethodID defines the class. In
386 * fact, java_class is unused in the implementation. It's best if we don't
387 * allow bad code in the system though.
389 * Instances of "java_class" must be instances of the method's declaring class.
391 bool CheckStaticMethod(ScopedObjectAccess& soa, jclass java_class, jmethodID mid)
392 REQUIRES_SHARED(Locks::mutator_lock_) {
393 ArtMethod* m = CheckMethodID(mid);
397 ObjPtr<mirror::Class> c = soa.Decode<mirror::Class>(java_class);
398 if (!m->GetDeclaringClass()->IsAssignableFrom(c)) {
399 AbortF("can't call static %s on class %s", m->PrettyMethod().c_str(),
400 mirror::Class::PrettyClass(c).c_str());
407 * Verify that "mid" is appropriate for "jobj".
409 * Make sure the object is an instance of the method's declaring class.
410 * (Note the mid might point to a declaration in an interface; this
411 * will be handled automatically by the instanceof check.)
413 bool CheckVirtualMethod(ScopedObjectAccess& soa, jobject java_object, jmethodID mid)
414 REQUIRES_SHARED(Locks::mutator_lock_) {
415 ArtMethod* m = CheckMethodID(mid);
419 ObjPtr<mirror::Object> o = soa.Decode<mirror::Object>(java_object);
421 AbortF("can't call %s on null object", m->PrettyMethod().c_str());
423 } else if (!o->InstanceOf(m->GetDeclaringClass())) {
424 AbortF("can't call %s on instance of %s", m->PrettyMethod().c_str(),
425 o->PrettyTypeOf().c_str());
432 * The format string is a sequence of the following characters,
433 * and must be followed by arguments of the corresponding types
436 * Java primitive types:
444 * Z - jboolean (shown as true and false)
447 * Java reference types:
454 * b - jboolean (shown as JNI_TRUE and JNI_FALSE)
458 * r - jint (for release mode arguments)
459 * u - const char* (Modified UTF-8)
460 * z - jsize (for lengths; use i if negative values are okay)
463 * . - VarArgs* for Jni calls with variable length arguments
465 * Use the kFlag_NullableUtf flag where 'u' field(s) are nullable.
467 bool Check(ScopedObjectAccess& soa, bool entry, const char* fmt, JniValueType* args)
468 REQUIRES_SHARED(Locks::mutator_lock_) {
469 ArtMethod* traceMethod = nullptr;
470 if (has_method_ && soa.Vm()->IsTracingEnabled()) {
471 // We need to guard some of the invocation interface's calls: a bad caller might
472 // use DetachCurrentThread or GetEnv on a thread that's not yet attached.
473 Thread* self = Thread::Current();
474 if ((flags_ & kFlag_Invocation) == 0 || self != nullptr) {
475 traceMethod = self->GetCurrentMethod(nullptr);
479 if (((flags_ & kFlag_ForceTrace) != 0) ||
480 (traceMethod != nullptr && soa.Vm()->ShouldTrace(traceMethod))) {
482 for (size_t i = 0; fmt[i] != '\0'; ++i) {
483 TracePossibleHeapValue(soa, entry, fmt[i], args[i], &msg);
484 if (fmt[i + 1] != '\0') {
485 StringAppendF(&msg, ", ");
489 if ((flags_ & kFlag_ForceTrace) != 0) {
490 LOG(INFO) << "JNI: call to " << function_name_ << "(" << msg << ")";
493 std::string methodName(ArtMethod::PrettyMethod(traceMethod, false));
494 LOG(INFO) << "JNI: " << methodName << " -> " << function_name_ << "(" << msg << ")";
495 indent_ = methodName.size() + 1;
497 LOG(INFO) << "JNI: -> " << function_name_ << "(" << msg << ")";
501 LOG(INFO) << StringPrintf("JNI: %*s<- %s returned %s", indent_, "", function_name_, msg.c_str());
505 // We always do the thorough checks on entry, and never on exit...
507 for (size_t i = 0; fmt[i] != '\0'; ++i) {
508 if (!CheckPossibleHeapValue(soa, fmt[i], args[i])) {
516 bool CheckNonHeap(JavaVMExt* vm, bool entry, const char* fmt, JniValueType* args) {
517 bool should_trace = (flags_ & kFlag_ForceTrace) != 0;
518 if (!should_trace && vm != nullptr && vm->IsTracingEnabled()) {
519 // We need to guard some of the invocation interface's calls: a bad caller might
520 // use DetachCurrentThread or GetEnv on a thread that's not yet attached.
521 Thread* self = Thread::Current();
522 if ((flags_ & kFlag_Invocation) == 0 || self != nullptr) {
523 ScopedObjectAccess soa(self);
524 ArtMethod* traceMethod = self->GetCurrentMethod(nullptr);
525 should_trace = (traceMethod != nullptr && vm->ShouldTrace(traceMethod));
530 for (size_t i = 0; fmt[i] != '\0'; ++i) {
531 TraceNonHeapValue(fmt[i], args[i], &msg);
532 if (fmt[i + 1] != '\0') {
533 StringAppendF(&msg, ", ");
537 if ((flags_ & kFlag_ForceTrace) != 0) {
538 LOG(INFO) << "JNI: call to " << function_name_ << "(" << msg << ")";
541 Thread* self = Thread::Current();
542 ScopedObjectAccess soa(self);
543 ArtMethod* traceMethod = self->GetCurrentMethod(nullptr);
544 std::string methodName(ArtMethod::PrettyMethod(traceMethod, false));
545 LOG(INFO) << "JNI: " << methodName << " -> " << function_name_ << "(" << msg << ")";
546 indent_ = methodName.size() + 1;
548 LOG(INFO) << "JNI: -> " << function_name_ << "(" << msg << ")";
552 LOG(INFO) << StringPrintf("JNI: %*s<- %s returned %s", indent_, "", function_name_, msg.c_str());
556 // We always do the thorough checks on entry, and never on exit...
558 for (size_t i = 0; fmt[i] != '\0'; ++i) {
559 if (!CheckNonHeapValue(fmt[i], args[i])) {
567 bool CheckReflectedMethod(ScopedObjectAccess& soa, jobject jmethod)
568 REQUIRES_SHARED(Locks::mutator_lock_) {
569 ObjPtr<mirror::Object> method = soa.Decode<mirror::Object>(jmethod);
570 if (method == nullptr) {
571 AbortF("expected non-null method");
574 mirror::Class* c = method->GetClass();
575 if (soa.Decode<mirror::Class>(WellKnownClasses::java_lang_reflect_Method) != c &&
576 soa.Decode<mirror::Class>(WellKnownClasses::java_lang_reflect_Constructor) != c) {
577 AbortF("expected java.lang.reflect.Method or "
578 "java.lang.reflect.Constructor but got object of type %s: %p",
579 method->PrettyTypeOf().c_str(), jmethod);
585 bool CheckConstructor(jmethodID mid) REQUIRES_SHARED(Locks::mutator_lock_) {
586 ArtMethod* method = jni::DecodeArtMethod(mid);
587 if (method == nullptr) {
588 AbortF("expected non-null constructor");
591 if (!method->IsConstructor() || method->IsStatic()) {
592 AbortF("expected a constructor but %s: %p", method->PrettyMethod().c_str(), mid);
598 bool CheckReflectedField(ScopedObjectAccess& soa, jobject jfield)
599 REQUIRES_SHARED(Locks::mutator_lock_) {
600 ObjPtr<mirror::Object> field = soa.Decode<mirror::Object>(jfield);
601 if (field == nullptr) {
602 AbortF("expected non-null java.lang.reflect.Field");
605 mirror::Class* c = field->GetClass();
606 if (soa.Decode<mirror::Class>(WellKnownClasses::java_lang_reflect_Field) != c) {
607 AbortF("expected java.lang.reflect.Field but got object of type %s: %p",
608 field->PrettyTypeOf().c_str(), jfield);
614 bool CheckThrowable(ScopedObjectAccess& soa, jthrowable jobj)
615 REQUIRES_SHARED(Locks::mutator_lock_) {
616 ObjPtr<mirror::Object> obj = soa.Decode<mirror::Object>(jobj);
617 if (!obj->GetClass()->IsThrowableClass()) {
618 AbortF("expected java.lang.Throwable but got object of type "
619 "%s: %p", obj->PrettyTypeOf().c_str(), obj.Ptr());
625 bool CheckThrowableClass(ScopedObjectAccess& soa, jclass jc)
626 REQUIRES_SHARED(Locks::mutator_lock_) {
627 ObjPtr<mirror::Class> c = soa.Decode<mirror::Class>(jc);
628 if (!c->IsThrowableClass()) {
629 AbortF("expected java.lang.Throwable class but got object of "
630 "type %s: %p", c->PrettyDescriptor().c_str(), c.Ptr());
636 bool CheckReferenceKind(IndirectRefKind expected_kind, Thread* self, jobject obj) {
637 IndirectRefKind found_kind;
638 if (expected_kind == kLocal) {
639 found_kind = IndirectReferenceTable::GetIndirectRefKind(obj);
640 if (found_kind == kHandleScopeOrInvalid && self->HandleScopeContains(obj)) {
644 found_kind = IndirectReferenceTable::GetIndirectRefKind(obj);
646 if (obj != nullptr && found_kind != expected_kind) {
647 AbortF("expected reference of kind %s but found %s: %p",
648 GetIndirectRefKindString(expected_kind),
649 GetIndirectRefKindString(IndirectReferenceTable::GetIndirectRefKind(obj)),
656 bool CheckInstantiableNonArray(ScopedObjectAccess& soa, jclass jc)
657 REQUIRES_SHARED(Locks::mutator_lock_) {
658 ObjPtr<mirror::Class> c = soa.Decode<mirror::Class>(jc);
659 if (!c->IsInstantiableNonArray()) {
660 AbortF("can't make objects of type %s: %p", c->PrettyDescriptor().c_str(), c.Ptr());
666 bool CheckPrimitiveArrayType(ScopedObjectAccess& soa, jarray array, Primitive::Type type)
667 REQUIRES_SHARED(Locks::mutator_lock_) {
668 if (!CheckArray(soa, array)) {
671 ObjPtr<mirror::Array> a = soa.Decode<mirror::Array>(array);
672 if (a->GetClass()->GetComponentType()->GetPrimitiveType() != type) {
673 AbortF("incompatible array type %s expected %s[]: %p",
674 a->GetClass()->PrettyDescriptor().c_str(), PrettyDescriptor(type).c_str(), array);
680 bool CheckFieldAccess(ScopedObjectAccess& soa, jobject obj, jfieldID fid, bool is_static,
681 Primitive::Type type)
682 REQUIRES_SHARED(Locks::mutator_lock_) {
683 if (is_static && !CheckStaticFieldID(soa, down_cast<jclass>(obj), fid)) {
686 if (!is_static && !CheckInstanceFieldID(soa, obj, fid)) {
689 ArtField* field = jni::DecodeArtField(fid);
690 DCHECK(field != nullptr); // Already checked by Check.
691 if (is_static != field->IsStatic()) {
692 AbortF("attempt to access %s field %s: %p",
693 field->IsStatic() ? "static" : "non-static", field->PrettyField().c_str(), fid);
696 if (type != field->GetTypeAsPrimitiveType()) {
697 AbortF("attempt to access field %s of type %s with the wrong type %s: %p",
698 field->PrettyField().c_str(),
699 PrettyDescriptor(field->GetTypeDescriptor()).c_str(),
700 PrettyDescriptor(type).c_str(), fid);
704 ObjPtr<mirror::Object> o = soa.Decode<mirror::Object>(obj);
705 if (o == nullptr || !o->IsClass()) {
706 AbortF("attempt to access static field %s with a class argument of type %s: %p",
707 field->PrettyField().c_str(), o->PrettyTypeOf().c_str(), fid);
710 ObjPtr<mirror::Class> c = o->AsClass();
711 if (c != field->GetDeclaringClass()) {
712 AbortF("attempt to access static field %s with an incompatible class argument of %s: %p",
713 field->PrettyField().c_str(), mirror::Class::PrettyDescriptor(c).c_str(), fid);
717 ObjPtr<mirror::Object> o = soa.Decode<mirror::Object>(obj);
718 if (o == nullptr || !field->GetDeclaringClass()->IsAssignableFrom(o->GetClass())) {
719 AbortF("attempt to access field %s from an object argument of type %s: %p",
720 field->PrettyField().c_str(), o->PrettyTypeOf().c_str(), fid);
737 * Verify that "jobj" is a valid non-null object reference, and points to
738 * an instance of expectedClass.
740 * Because we're looking at an object on the GC heap, we have to switch
741 * to "running" mode before doing the checks.
743 bool CheckInstance(ScopedObjectAccess& soa, InstanceKind kind, jobject java_object, bool null_ok)
744 REQUIRES_SHARED(Locks::mutator_lock_) {
745 const char* what = nullptr;
750 case kDirectByteBuffer:
751 what = "direct ByteBuffer";
763 LOG(FATAL) << "Unknown kind " << static_cast<int>(kind);
766 if (java_object == nullptr) {
770 AbortF("%s received NULL %s", function_name_, what);
775 ObjPtr<mirror::Object> obj = soa.Decode<mirror::Object>(java_object);
776 if (obj == nullptr) {
777 // Either java_object is invalid or is a cleared weak.
778 IndirectRef ref = reinterpret_cast<IndirectRef>(java_object);
780 if (IndirectReferenceTable::GetIndirectRefKind(ref) != kWeakGlobal) {
783 obj = soa.Vm()->DecodeWeakGlobal(soa.Self(), ref);
784 okay = Runtime::Current()->IsClearedJniWeakGlobal(obj);
787 AbortF("%s is an invalid %s: %p (%p)",
789 GetIndirectRefKindString(IndirectReferenceTable::GetIndirectRefKind(java_object)),
796 if (!Runtime::Current()->GetHeap()->IsValidObjectAddress(obj.Ptr())) {
797 Runtime::Current()->GetHeap()->DumpSpaces(LOG_STREAM(ERROR));
798 AbortF("%s is an invalid %s: %p (%p)",
800 GetIndirectRefKindString(IndirectReferenceTable::GetIndirectRefKind(java_object)),
809 okay = obj->IsClass();
811 case kDirectByteBuffer:
812 UNIMPLEMENTED(FATAL);
815 okay = obj->GetClass()->IsStringClass();
818 okay = obj->GetClass()->IsThrowableClass();
824 AbortF("%s has wrong type: %s", what, mirror::Object::PrettyTypeOf(obj).c_str());
832 * Verify that the "mode" argument passed to a primitive array Release
833 * function is one of the valid values.
835 bool CheckReleaseMode(jint mode) {
836 if (mode != 0 && mode != JNI_COMMIT && mode != JNI_ABORT) {
837 AbortF("unknown value for release mode: %d", mode);
843 bool CheckPossibleHeapValue(ScopedObjectAccess& soa, char fmt, JniValueType arg)
844 REQUIRES_SHARED(Locks::mutator_lock_) {
847 return CheckArray(soa, arg.a);
849 return CheckInstance(soa, kClass, arg.c, false);
850 case 'f': // jfieldID
851 return CheckFieldID(arg.f) != nullptr;
852 case 'm': // jmethodID
853 return CheckMethodID(arg.m) != nullptr;
854 case 'r': // release int
855 return CheckReleaseMode(arg.r);
857 return CheckInstance(soa, kString, arg.s, false);
858 case 't': // jthrowable
859 return CheckInstance(soa, kThrowable, arg.t, false);
861 return CheckThread(arg.E);
863 return CheckInstance(soa, kObject, arg.L, true);
864 case '.': // A VarArgs list
865 return CheckVarArgs(soa, arg.va);
867 return CheckNonHeapValue(fmt, arg);
871 bool CheckVarArgs(ScopedObjectAccess& soa, const VarArgs* args_p)
872 REQUIRES_SHARED(Locks::mutator_lock_) {
873 CHECK(args_p != nullptr);
874 VarArgs args(args_p->Clone());
875 ArtMethod* m = CheckMethodID(args.GetMethodID());
880 const char* shorty = m->GetShorty(&len);
881 // Skip the return type
885 for (uint32_t i = 0; i < len; i++) {
886 if (!CheckPossibleHeapValue(soa, shorty[i], args.GetValue(shorty[i]))) {
893 bool CheckNonHeapValue(char fmt, JniValueType arg) {
895 case 'p': // TODO: pointer - null or readable?
905 case 'b': // jboolean, why two? Fall-through.
907 return CheckBoolean(arg.Z);
909 if ((flags_ & kFlag_Release) != 0) {
910 return CheckNonNull(arg.u);
912 bool nullable = ((flags_ & kFlag_NullableUtf) != 0);
913 return CheckUtfString(arg.u, nullable);
915 case 'w': // jobjectRefType
917 case JNIInvalidRefType:
918 case JNILocalRefType:
919 case JNIGlobalRefType:
920 case JNIWeakGlobalRefType:
923 AbortF("Unknown reference type");
928 return CheckLengthPositive(arg.z);
930 AbortF("unknown format specifier: '%c'", fmt);
936 void TracePossibleHeapValue(ScopedObjectAccess& soa, bool entry, char fmt, JniValueType arg,
938 REQUIRES_SHARED(Locks::mutator_lock_) {
940 case 'L': // jobject fall-through.
941 case 'a': // jarray fall-through.
942 case 's': // jstring fall-through.
943 case 't': // jthrowable fall-through.
944 if (arg.L == nullptr) {
947 StringAppendF(msg, "%p", arg.L);
950 case 'c': { // jclass
952 ObjPtr<mirror::Class> c = soa.Decode<mirror::Class>(jc);
955 } else if (!Runtime::Current()->GetHeap()->IsValidObjectAddress(c.Ptr())) {
956 StringAppendF(msg, "INVALID POINTER:%p", jc);
957 } else if (!c->IsClass()) {
958 *msg += "INVALID NON-CLASS OBJECT OF TYPE:" + c->PrettyTypeOf();
960 *msg += c->PrettyClass();
962 StringAppendF(msg, " (%p)", jc);
967 case 'f': { // jfieldID
968 jfieldID fid = arg.f;
969 ArtField* f = jni::DecodeArtField(fid);
970 *msg += ArtField::PrettyField(f);
972 StringAppendF(msg, " (%p)", fid);
976 case 'm': { // jmethodID
977 jmethodID mid = arg.m;
978 ArtMethod* m = jni::DecodeArtMethod(mid);
979 *msg += ArtMethod::PrettyMethod(m);
981 StringAppendF(msg, " (%p)", mid);
986 const VarArgs* va = arg.va;
987 VarArgs args(va->Clone());
988 ArtMethod* m = jni::DecodeArtMethod(args.GetMethodID());
990 const char* shorty = m->GetShorty(&len);
992 // Skip past return value.
995 // Remove the previous ', ' from the message.
996 msg->erase(msg->length() - 2);
997 for (uint32_t i = 0; i < len; i++) {
999 TracePossibleHeapValue(soa, entry, shorty[i], args.GetValue(shorty[i]), msg);
1004 TraceNonHeapValue(fmt, arg, msg);
1009 void TraceNonHeapValue(char fmt, JniValueType arg, std::string* msg) {
1012 if (arg.B >= 0 && arg.B < 10) {
1013 StringAppendF(msg, "%d", arg.B);
1015 StringAppendF(msg, "%#x (%d)", arg.B, arg.B);
1019 if (arg.C < 0x7f && arg.C >= ' ') {
1020 StringAppendF(msg, "U+%x ('%c')", arg.C, arg.C);
1022 StringAppendF(msg, "U+%x", arg.C);
1026 StringAppendF(msg, "%g", arg.F);
1028 case 'D': // jdouble
1029 StringAppendF(msg, "%g", arg.D);
1032 StringAppendF(msg, "%d", arg.S);
1034 case 'i': // jint - fall-through.
1036 StringAppendF(msg, "%d", arg.I);
1039 StringAppendF(msg, "%" PRId64, arg.J);
1041 case 'Z': // jboolean
1042 case 'b': // jboolean (JNI-style)
1043 *msg += arg.b == JNI_TRUE ? "true" : "false";
1046 DCHECK(arg.V == nullptr);
1049 case 'v': // JavaVM*
1050 StringAppendF(msg, "(JavaVM*)%p", arg.v);
1053 StringAppendF(msg, "(JNIEnv*)%p", arg.E);
1055 case 'z': // non-negative jsize
1056 // You might expect jsize to be size_t, but it's not; it's the same as jint.
1057 // We only treat this specially so we can do the non-negative check.
1058 // TODO: maybe this wasn't worth it?
1059 StringAppendF(msg, "%d", arg.z);
1061 case 'p': // void* ("pointer")
1062 if (arg.p == nullptr) {
1065 StringAppendF(msg, "(void*) %p", arg.p);
1068 case 'r': { // jint (release mode)
1069 jint releaseMode = arg.r;
1070 if (releaseMode == 0) {
1072 } else if (releaseMode == JNI_ABORT) {
1073 *msg += "JNI_ABORT";
1074 } else if (releaseMode == JNI_COMMIT) {
1075 *msg += "JNI_COMMIT";
1077 StringAppendF(msg, "invalid release mode %d", releaseMode);
1081 case 'u': // const char* (Modified UTF-8)
1082 if (arg.u == nullptr) {
1085 StringAppendF(msg, "\"%s\"", arg.u);
1088 case 'w': // jobjectRefType
1090 case JNIInvalidRefType:
1091 *msg += "invalid reference type";
1093 case JNILocalRefType:
1094 *msg += "local ref type";
1096 case JNIGlobalRefType:
1097 *msg += "global ref type";
1099 case JNIWeakGlobalRefType:
1100 *msg += "weak global ref type";
1103 *msg += "unknown ref type";
1108 LOG(FATAL) << function_name_ << ": unknown trace format specifier: '" << fmt << "'";
1112 * Verify that "array" is non-null and points to an Array object.
1114 * Since we're dealing with objects, switch to "running" mode.
1116 bool CheckArray(ScopedObjectAccess& soa, jarray java_array)
1117 REQUIRES_SHARED(Locks::mutator_lock_) {
1118 if (UNLIKELY(java_array == nullptr)) {
1119 AbortF("jarray was NULL");
1123 ObjPtr<mirror::Array> a = soa.Decode<mirror::Array>(java_array);
1124 if (UNLIKELY(!Runtime::Current()->GetHeap()->IsValidObjectAddress(a.Ptr()))) {
1125 Runtime::Current()->GetHeap()->DumpSpaces(LOG_STREAM(ERROR));
1126 AbortF("jarray is an invalid %s: %p (%p)",
1127 GetIndirectRefKindString(IndirectReferenceTable::GetIndirectRefKind(java_array)),
1131 } else if (!a->IsArrayInstance()) {
1132 AbortF("jarray argument has non-array type: %s", a->PrettyTypeOf().c_str());
1138 bool CheckBoolean(jboolean z) {
1139 if (z != JNI_TRUE && z != JNI_FALSE) {
1140 AbortF("unexpected jboolean value: %d", z);
1146 bool CheckLengthPositive(jsize length) {
1148 AbortF("negative jsize: %d", length);
1154 ArtField* CheckFieldID(jfieldID fid) REQUIRES_SHARED(Locks::mutator_lock_) {
1155 if (fid == nullptr) {
1156 AbortF("jfieldID was NULL");
1159 ArtField* f = jni::DecodeArtField(fid);
1160 // TODO: Better check here.
1161 if (!Runtime::Current()->GetHeap()->IsValidObjectAddress(f->GetDeclaringClass().Ptr())) {
1162 Runtime::Current()->GetHeap()->DumpSpaces(LOG_STREAM(ERROR));
1163 AbortF("invalid jfieldID: %p", fid);
1169 ArtMethod* CheckMethodID(jmethodID mid) REQUIRES_SHARED(Locks::mutator_lock_) {
1170 if (mid == nullptr) {
1171 AbortF("jmethodID was NULL");
1174 ArtMethod* m = jni::DecodeArtMethod(mid);
1175 // TODO: Better check here.
1176 if (!Runtime::Current()->GetHeap()->IsValidObjectAddress(m->GetDeclaringClass())) {
1177 Runtime::Current()->GetHeap()->DumpSpaces(LOG_STREAM(ERROR));
1178 AbortF("invalid jmethodID: %p", mid);
1184 bool CheckThread(JNIEnv* env) REQUIRES_SHARED(Locks::mutator_lock_) {
1185 Thread* self = Thread::Current();
1186 if (self == nullptr) {
1187 AbortF("a thread (tid %d) is making JNI calls without being attached", GetTid());
1191 // Get the current thread's JNIEnv by going through our TLS pointer.
1192 JNIEnvExt* threadEnv = self->GetJniEnv();
1194 // Verify that the current thread is (a) attached and (b) associated with
1195 // this particular instance of JNIEnv.
1196 if (env != threadEnv) {
1197 // Get the thread owning the JNIEnv that's being used.
1198 Thread* envThread = reinterpret_cast<JNIEnvExt*>(env)->self;
1199 AbortF("thread %s using JNIEnv* from thread %s",
1200 ToStr<Thread>(*self).c_str(), ToStr<Thread>(*envThread).c_str());
1204 // Verify that, if this thread previously made a critical "get" call, we
1205 // do the corresponding "release" call before we try anything else.
1206 switch (flags_ & kFlag_CritMask) {
1207 case kFlag_CritOkay: // okay to call this method
1209 case kFlag_CritBad: // not okay to call
1210 if (threadEnv->critical) {
1211 AbortF("thread %s using JNI after critical get",
1212 ToStr<Thread>(*self).c_str());
1216 case kFlag_CritGet: // this is a "get" call
1217 // Don't check here; we allow nested gets.
1218 threadEnv->critical++;
1220 case kFlag_CritRelease: // this is a "release" call
1221 threadEnv->critical--;
1222 if (threadEnv->critical < 0) {
1223 AbortF("thread %s called too many critical releases",
1224 ToStr<Thread>(*self).c_str());
1229 LOG(FATAL) << "Bad flags (internal error): " << flags_;
1232 // Verify that, if an exception has been raised, the native code doesn't
1233 // make any JNI calls other than the Exception* methods.
1234 if ((flags_ & kFlag_ExcepOkay) == 0 && self->IsExceptionPending()) {
1235 mirror::Throwable* exception = self->GetException();
1236 AbortF("JNI %s called with pending exception %s",
1238 exception->Dump().c_str());
1244 // Verifies that "bytes" points to valid Modified UTF-8 data.
1245 bool CheckUtfString(const char* bytes, bool nullable) {
1246 if (bytes == nullptr) {
1248 AbortF("non-nullable const char* was NULL");
1254 const char* errorKind = nullptr;
1255 const uint8_t* utf8 = CheckUtfBytes(bytes, &errorKind);
1256 if (errorKind != nullptr) {
1257 // This is an expensive loop that will resize often, but this isn't supposed to hit in
1258 // practice anyways.
1259 std::ostringstream oss;
1261 const uint8_t* tmp = reinterpret_cast<const uint8_t*>(bytes);
1266 oss << "0x" << std::setfill('0') << std::setw(2) << static_cast<uint32_t>(*tmp);
1276 AbortF("input is not valid Modified UTF-8: illegal %s byte %#x\n"
1277 " string: '%s'\n input: '%s'", errorKind, *utf8, bytes, oss.str().c_str());
1283 // Checks whether |bytes| is valid modified UTF-8. We also accept 4 byte UTF
1284 // sequences in place of encoded surrogate pairs.
1285 static const uint8_t* CheckUtfBytes(const char* bytes, const char** errorKind) {
1286 while (*bytes != '\0') {
1287 const uint8_t* utf8 = reinterpret_cast<const uint8_t*>(bytes++);
1288 // Switch on the high four bits.
1289 switch (*utf8 >> 4) {
1298 // Bit pattern 0xxx. No need for any extra bytes.
1304 // Bit patterns 10xx, which are illegal start bytes.
1305 *errorKind = "start";
1308 // Bit pattern 1111, which might be the start of a 4 byte sequence.
1309 if ((*utf8 & 0x08) == 0) {
1310 // Bit pattern 1111 0xxx, which is the start of a 4 byte sequence.
1311 // We consume one continuation byte here, and fall through to consume two more.
1312 utf8 = reinterpret_cast<const uint8_t*>(bytes++);
1313 if ((*utf8 & 0xc0) != 0x80) {
1314 *errorKind = "continuation";
1318 *errorKind = "start";
1322 // Fall through to the cases below to consume two more continuation bytes.
1323 FALLTHROUGH_INTENDED;
1325 // Bit pattern 1110, so there are two additional bytes.
1326 utf8 = reinterpret_cast<const uint8_t*>(bytes++);
1327 if ((*utf8 & 0xc0) != 0x80) {
1328 *errorKind = "continuation";
1332 // Fall through to consume one more continuation byte.
1333 FALLTHROUGH_INTENDED;
1336 // Bit pattern 110x, so there is one additional byte.
1337 utf8 = reinterpret_cast<const uint8_t*>(bytes++);
1338 if ((*utf8 & 0xc0) != 0x80) {
1339 *errorKind = "continuation";
1348 void AbortF(const char* fmt, ...) __attribute__((__format__(__printf__, 2, 3))) {
1350 va_start(args, fmt);
1351 Runtime::Current()->GetJavaVM()->JniAbortV(function_name_, fmt, args);
1355 // The name of the JNI function being checked.
1356 const char* const function_name_;
1361 const bool has_method_;
1363 DISALLOW_COPY_AND_ASSIGN(ScopedCheck);
1367 * ===========================================================================
1369 * ===========================================================================
1372 /* this gets tucked in at the start of the buffer; struct size must be even */
1376 * Create an over-sized buffer to hold the contents of "buf". Copy it in,
1377 * filling in the area around it with guard data.
1379 static void* Create(void* original_buf, size_t len, bool mod_okay) {
1380 const size_t new_len = LengthIncludingRedZones(len);
1381 uint8_t* const new_buf = DebugAlloc(new_len);
1383 // If modification is not expected, grab a checksum.
1386 adler = adler32(adler32(0L, Z_NULL, 0), reinterpret_cast<const Bytef*>(original_buf), len);
1389 GuardedCopy* copy = new (new_buf) GuardedCopy(original_buf, len, adler);
1391 // Fill begin region with canary pattern.
1392 const size_t kStartCanaryLength = (GuardedCopy::kRedZoneSize / 2) - sizeof(GuardedCopy);
1393 for (size_t i = 0, j = 0; i < kStartCanaryLength; ++i) {
1394 const_cast<char*>(copy->StartRedZone())[i] = kCanary[j];
1395 if (kCanary[j] == '\0') {
1402 // Copy the data in; note "len" could be zero.
1403 memcpy(const_cast<uint8_t*>(copy->BufferWithinRedZones()), original_buf, len);
1405 // Fill end region with canary pattern.
1406 for (size_t i = 0, j = 0; i < kEndCanaryLength; ++i) {
1407 const_cast<char*>(copy->EndRedZone())[i] = kCanary[j];
1408 if (kCanary[j] == '\0') {
1415 return const_cast<uint8_t*>(copy->BufferWithinRedZones());
1419 * Create a guarded copy of a primitive array. Modifications to the copied
1420 * data are allowed. Returns a pointer to the copied data.
1422 static void* CreateGuardedPACopy(JNIEnv* env, const jarray java_array, jboolean* is_copy,
1423 void* original_ptr) {
1424 ScopedObjectAccess soa(env);
1426 ObjPtr<mirror::Array> a = soa.Decode<mirror::Array>(java_array);
1427 size_t component_size = a->GetClass()->GetComponentSize();
1428 size_t byte_count = a->GetLength() * component_size;
1429 void* result = Create(original_ptr, byte_count, true);
1430 if (is_copy != nullptr) {
1431 *is_copy = JNI_TRUE;
1437 * Perform the array "release" operation, which may or may not copy data
1438 * back into the managed heap, and may or may not release the underlying storage.
1440 static void* ReleaseGuardedPACopy(const char* function_name, JNIEnv* env,
1441 jarray java_array ATTRIBUTE_UNUSED, void* embedded_buf,
1443 ScopedObjectAccess soa(env);
1444 if (!GuardedCopy::Check(function_name, embedded_buf, true)) {
1447 GuardedCopy* const copy = FromEmbedded(embedded_buf);
1448 void* original_ptr = copy->original_ptr_;
1449 if (mode != JNI_ABORT) {
1450 memcpy(original_ptr, embedded_buf, copy->original_length_);
1452 if (mode != JNI_COMMIT) {
1453 Destroy(embedded_buf);
1455 return original_ptr;
1460 * Free up the guard buffer, scrub it, and return the original pointer.
1462 static void* Destroy(void* embedded_buf) {
1463 GuardedCopy* copy = FromEmbedded(embedded_buf);
1464 void* original_ptr = const_cast<void*>(copy->original_ptr_);
1465 size_t len = LengthIncludingRedZones(copy->original_length_);
1466 DebugFree(copy, len);
1467 return original_ptr;
1471 * Verify the guard area and, if "modOkay" is false, that the data itself
1472 * has not been altered.
1474 * The caller has already checked that "dataBuf" is non-null.
1476 static bool Check(const char* function_name, const void* embedded_buf, bool mod_okay) {
1477 const GuardedCopy* copy = FromEmbedded(embedded_buf);
1478 return copy->CheckHeader(function_name, mod_okay) && copy->CheckRedZones(function_name);
1482 GuardedCopy(void* original_buf, size_t len, uLong adler) :
1483 magic_(kGuardMagic), adler_(adler), original_ptr_(original_buf), original_length_(len) {
1486 static uint8_t* DebugAlloc(size_t len) {
1487 void* result = mmap(nullptr, len, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANON, -1, 0);
1488 if (result == MAP_FAILED) {
1489 PLOG(FATAL) << "GuardedCopy::create mmap(" << len << ") failed";
1491 return reinterpret_cast<uint8_t*>(result);
1494 static void DebugFree(void* buf, size_t len) {
1495 if (munmap(buf, len) != 0) {
1496 PLOG(FATAL) << "munmap(" << buf << ", " << len << ") failed";
1500 static size_t LengthIncludingRedZones(size_t len) {
1501 return len + kRedZoneSize;
1504 // Get the GuardedCopy from the interior pointer.
1505 static GuardedCopy* FromEmbedded(void* embedded_buf) {
1506 return reinterpret_cast<GuardedCopy*>(
1507 reinterpret_cast<uint8_t*>(embedded_buf) - (kRedZoneSize / 2));
1510 static const GuardedCopy* FromEmbedded(const void* embedded_buf) {
1511 return reinterpret_cast<const GuardedCopy*>(
1512 reinterpret_cast<const uint8_t*>(embedded_buf) - (kRedZoneSize / 2));
1515 static void AbortF(const char* jni_function_name, const char* fmt, ...) {
1517 va_start(args, fmt);
1518 Runtime::Current()->GetJavaVM()->JniAbortV(jni_function_name, fmt, args);
1522 bool CheckHeader(const char* function_name, bool mod_okay) const {
1523 static const uint32_t kMagicCmp = kGuardMagic;
1525 // Before we do anything with "pExtra", check the magic number. We
1526 // do the check with memcmp rather than "==" in case the pointer is
1527 // unaligned. If it points to completely bogus memory we're going
1528 // to crash, but there's no easy way around that.
1529 if (UNLIKELY(memcmp(&magic_, &kMagicCmp, 4) != 0)) {
1531 memcpy(buf, &magic_, 4);
1532 AbortF(function_name,
1533 "guard magic does not match (found 0x%02x%02x%02x%02x) -- incorrect data pointer %p?",
1534 buf[3], buf[2], buf[1], buf[0], this); // Assumes little-endian.
1538 // If modification is not expected, verify checksum. Strictly speaking this is wrong: if we
1539 // told the client that we made a copy, there's no reason they can't alter the buffer.
1541 uLong computed_adler =
1542 adler32(adler32(0L, Z_NULL, 0), BufferWithinRedZones(), original_length_);
1543 if (computed_adler != adler_) {
1544 AbortF(function_name, "buffer modified (0x%08lx vs 0x%08lx) at address %p",
1545 computed_adler, adler_, this);
1552 bool CheckRedZones(const char* function_name) const {
1553 // Check the begin red zone.
1554 const size_t kStartCanaryLength = (GuardedCopy::kRedZoneSize / 2) - sizeof(GuardedCopy);
1555 for (size_t i = 0, j = 0; i < kStartCanaryLength; ++i) {
1556 if (UNLIKELY(StartRedZone()[i] != kCanary[j])) {
1557 AbortF(function_name, "guard pattern before buffer disturbed at %p +%zd", this, i);
1560 if (kCanary[j] == '\0') {
1567 // Check end region.
1568 for (size_t i = 0, j = 0; i < kEndCanaryLength; ++i) {
1569 if (UNLIKELY(EndRedZone()[i] != kCanary[j])) {
1570 size_t offset_from_buffer_start =
1571 &(EndRedZone()[i]) - &(StartRedZone()[kStartCanaryLength]);
1572 AbortF(function_name, "guard pattern after buffer disturbed at %p +%zd", this,
1573 offset_from_buffer_start);
1576 if (kCanary[j] == '\0') {
1585 // Location that canary value will be written before the guarded region.
1586 const char* StartRedZone() const {
1587 const uint8_t* buf = reinterpret_cast<const uint8_t*>(this);
1588 return reinterpret_cast<const char*>(buf + sizeof(GuardedCopy));
1591 // Return the interior embedded buffer.
1592 const uint8_t* BufferWithinRedZones() const {
1593 const uint8_t* embedded_buf = reinterpret_cast<const uint8_t*>(this) + (kRedZoneSize / 2);
1594 return embedded_buf;
1597 // Location that canary value will be written after the guarded region.
1598 const char* EndRedZone() const {
1599 const uint8_t* buf = reinterpret_cast<const uint8_t*>(this);
1600 size_t buf_len = LengthIncludingRedZones(original_length_);
1601 return reinterpret_cast<const char*>(buf + (buf_len - (kRedZoneSize / 2)));
1604 static constexpr size_t kRedZoneSize = 512;
1605 static constexpr size_t kEndCanaryLength = kRedZoneSize / 2;
1607 // Value written before and after the guarded array.
1608 static const char* const kCanary;
1610 static constexpr uint32_t kGuardMagic = 0xffd5aa96;
1612 const uint32_t magic_;
1614 void* const original_ptr_;
1615 const size_t original_length_;
1617 const char* const GuardedCopy::kCanary = "JNI BUFFER RED ZONE";
1620 * ===========================================================================
1622 * ===========================================================================
1627 static jint GetVersion(JNIEnv* env) {
1628 ScopedObjectAccess soa(env);
1629 ScopedCheck sc(kFlag_Default, __FUNCTION__);
1630 JniValueType args[1] = {{.E = env }};
1631 if (sc.Check(soa, true, "E", args)) {
1632 JniValueType result;
1633 result.I = baseEnv(env)->GetVersion(env);
1634 if (sc.Check(soa, false, "I", &result)) {
1641 static jint GetJavaVM(JNIEnv *env, JavaVM **vm) {
1642 ScopedObjectAccess soa(env);
1643 ScopedCheck sc(kFlag_Default, __FUNCTION__);
1644 JniValueType args[2] = {{.E = env }, {.p = vm}};
1645 if (sc.Check(soa, true, "Ep", args)) {
1646 JniValueType result;
1647 result.i = baseEnv(env)->GetJavaVM(env, vm);
1648 if (sc.Check(soa, false, "i", &result)) {
1655 static jint RegisterNatives(JNIEnv* env, jclass c, const JNINativeMethod* methods, jint nMethods) {
1656 ScopedObjectAccess soa(env);
1657 ScopedCheck sc(kFlag_Default, __FUNCTION__);
1658 JniValueType args[4] = {{.E = env }, {.c = c}, {.p = methods}, {.I = nMethods}};
1659 if (sc.Check(soa, true, "EcpI", args)) {
1660 JniValueType result;
1661 result.i = baseEnv(env)->RegisterNatives(env, c, methods, nMethods);
1662 if (sc.Check(soa, false, "i", &result)) {
1669 static jint UnregisterNatives(JNIEnv* env, jclass c) {
1670 ScopedObjectAccess soa(env);
1671 ScopedCheck sc(kFlag_Default, __FUNCTION__);
1672 JniValueType args[2] = {{.E = env }, {.c = c}};
1673 if (sc.Check(soa, true, "Ec", args)) {
1674 JniValueType result;
1675 result.i = baseEnv(env)->UnregisterNatives(env, c);
1676 if (sc.Check(soa, false, "i", &result)) {
1683 static jobjectRefType GetObjectRefType(JNIEnv* env, jobject obj) {
1684 // Note: we use "EL" here but "Ep" has been used in the past on the basis that we'd like to
1685 // know the object is invalid. The spec says that passing invalid objects or even ones that
1686 // are deleted isn't supported.
1687 ScopedObjectAccess soa(env);
1688 ScopedCheck sc(kFlag_Default, __FUNCTION__);
1689 JniValueType args[2] = {{.E = env }, {.L = obj}};
1690 if (sc.Check(soa, true, "EL", args)) {
1691 JniValueType result;
1692 result.w = baseEnv(env)->GetObjectRefType(env, obj);
1693 if (sc.Check(soa, false, "w", &result)) {
1697 return JNIInvalidRefType;
1700 static jclass DefineClass(JNIEnv* env, const char* name, jobject loader, const jbyte* buf,
1702 ScopedObjectAccess soa(env);
1703 ScopedCheck sc(kFlag_Default, __FUNCTION__);
1704 JniValueType args[5] = {{.E = env}, {.u = name}, {.L = loader}, {.p = buf}, {.z = bufLen}};
1705 if (sc.Check(soa, true, "EuLpz", args) && sc.CheckClassName(name)) {
1706 JniValueType result;
1707 result.c = baseEnv(env)->DefineClass(env, name, loader, buf, bufLen);
1708 if (sc.Check(soa, false, "c", &result)) {
1715 static jclass FindClass(JNIEnv* env, const char* name) {
1716 ScopedObjectAccess soa(env);
1717 ScopedCheck sc(kFlag_Default, __FUNCTION__);
1718 JniValueType args[2] = {{.E = env}, {.u = name}};
1719 if (sc.Check(soa, true, "Eu", args) && sc.CheckClassName(name)) {
1720 JniValueType result;
1721 result.c = baseEnv(env)->FindClass(env, name);
1722 if (sc.Check(soa, false, "c", &result)) {
1729 static jclass GetSuperclass(JNIEnv* env, jclass c) {
1730 ScopedObjectAccess soa(env);
1731 ScopedCheck sc(kFlag_Default, __FUNCTION__);
1732 JniValueType args[2] = {{.E = env}, {.c = c}};
1733 if (sc.Check(soa, true, "Ec", args)) {
1734 JniValueType result;
1735 result.c = baseEnv(env)->GetSuperclass(env, c);
1736 if (sc.Check(soa, false, "c", &result)) {
1743 static jboolean IsAssignableFrom(JNIEnv* env, jclass c1, jclass c2) {
1744 ScopedObjectAccess soa(env);
1745 ScopedCheck sc(kFlag_Default, __FUNCTION__);
1746 JniValueType args[3] = {{.E = env}, {.c = c1}, {.c = c2}};
1747 if (sc.Check(soa, true, "Ecc", args)) {
1748 JniValueType result;
1749 result.b = baseEnv(env)->IsAssignableFrom(env, c1, c2);
1750 if (sc.Check(soa, false, "b", &result)) {
1757 static jmethodID FromReflectedMethod(JNIEnv* env, jobject method) {
1758 ScopedObjectAccess soa(env);
1759 ScopedCheck sc(kFlag_Default, __FUNCTION__);
1760 JniValueType args[2] = {{.E = env}, {.L = method}};
1761 if (sc.Check(soa, true, "EL", args) && sc.CheckReflectedMethod(soa, method)) {
1762 JniValueType result;
1763 result.m = baseEnv(env)->FromReflectedMethod(env, method);
1764 if (sc.Check(soa, false, "m", &result)) {
1771 static jfieldID FromReflectedField(JNIEnv* env, jobject field) {
1772 ScopedObjectAccess soa(env);
1773 ScopedCheck sc(kFlag_Default, __FUNCTION__);
1774 JniValueType args[2] = {{.E = env}, {.L = field}};
1775 if (sc.Check(soa, true, "EL", args) && sc.CheckReflectedField(soa, field)) {
1776 JniValueType result;
1777 result.f = baseEnv(env)->FromReflectedField(env, field);
1778 if (sc.Check(soa, false, "f", &result)) {
1785 static jobject ToReflectedMethod(JNIEnv* env, jclass cls, jmethodID mid, jboolean isStatic) {
1786 ScopedObjectAccess soa(env);
1787 ScopedCheck sc(kFlag_Default, __FUNCTION__);
1788 JniValueType args[4] = {{.E = env}, {.c = cls}, {.m = mid}, {.b = isStatic}};
1789 if (sc.Check(soa, true, "Ecmb", args)) {
1790 JniValueType result;
1791 result.L = baseEnv(env)->ToReflectedMethod(env, cls, mid, isStatic);
1792 if (sc.Check(soa, false, "L", &result) && (result.L != nullptr)) {
1793 DCHECK(sc.CheckReflectedMethod(soa, result.L));
1800 static jobject ToReflectedField(JNIEnv* env, jclass cls, jfieldID fid, jboolean isStatic) {
1801 ScopedObjectAccess soa(env);
1802 ScopedCheck sc(kFlag_Default, __FUNCTION__);
1803 JniValueType args[4] = {{.E = env}, {.c = cls}, {.f = fid}, {.b = isStatic}};
1804 if (sc.Check(soa, true, "Ecfb", args)) {
1805 JniValueType result;
1806 result.L = baseEnv(env)->ToReflectedField(env, cls, fid, isStatic);
1807 if (sc.Check(soa, false, "L", &result) && (result.L != nullptr)) {
1808 DCHECK(sc.CheckReflectedField(soa, result.L));
1815 static jint Throw(JNIEnv* env, jthrowable obj) {
1816 ScopedObjectAccess soa(env);
1817 ScopedCheck sc(kFlag_Default, __FUNCTION__);
1818 JniValueType args[2] = {{.E = env}, {.t = obj}};
1819 if (sc.Check(soa, true, "Et", args) && sc.CheckThrowable(soa, obj)) {
1820 JniValueType result;
1821 result.i = baseEnv(env)->Throw(env, obj);
1822 if (sc.Check(soa, false, "i", &result)) {
1829 static jint ThrowNew(JNIEnv* env, jclass c, const char* message) {
1830 ScopedObjectAccess soa(env);
1831 ScopedCheck sc(kFlag_NullableUtf, __FUNCTION__);
1832 JniValueType args[3] = {{.E = env}, {.c = c}, {.u = message}};
1833 if (sc.Check(soa, true, "Ecu", args) && sc.CheckThrowableClass(soa, c)) {
1834 JniValueType result;
1835 result.i = baseEnv(env)->ThrowNew(env, c, message);
1836 if (sc.Check(soa, false, "i", &result)) {
1843 static jthrowable ExceptionOccurred(JNIEnv* env) {
1844 ScopedObjectAccess soa(env);
1845 ScopedCheck sc(kFlag_ExcepOkay, __FUNCTION__);
1846 JniValueType args[1] = {{.E = env}};
1847 if (sc.Check(soa, true, "E", args)) {
1848 JniValueType result;
1849 result.t = baseEnv(env)->ExceptionOccurred(env);
1850 if (sc.Check(soa, false, "t", &result)) {
1857 static void ExceptionDescribe(JNIEnv* env) {
1858 ScopedObjectAccess soa(env);
1859 ScopedCheck sc(kFlag_ExcepOkay, __FUNCTION__);
1860 JniValueType args[1] = {{.E = env}};
1861 if (sc.Check(soa, true, "E", args)) {
1862 JniValueType result;
1863 baseEnv(env)->ExceptionDescribe(env);
1865 sc.Check(soa, false, "V", &result);
1869 static void ExceptionClear(JNIEnv* env) {
1870 ScopedObjectAccess soa(env);
1871 ScopedCheck sc(kFlag_ExcepOkay, __FUNCTION__);
1872 JniValueType args[1] = {{.E = env}};
1873 if (sc.Check(soa, true, "E", args)) {
1874 JniValueType result;
1875 baseEnv(env)->ExceptionClear(env);
1877 sc.Check(soa, false, "V", &result);
1881 static jboolean ExceptionCheck(JNIEnv* env) {
1882 ScopedObjectAccess soa(env);
1883 ScopedCheck sc(kFlag_CritOkay | kFlag_ExcepOkay, __FUNCTION__);
1884 JniValueType args[1] = {{.E = env}};
1885 if (sc.Check(soa, true, "E", args)) {
1886 JniValueType result;
1887 result.b = baseEnv(env)->ExceptionCheck(env);
1888 if (sc.Check(soa, false, "b", &result)) {
1895 static void FatalError(JNIEnv* env, const char* msg) {
1896 // The JNI specification doesn't say it's okay to call FatalError with a pending exception,
1897 // but you're about to abort anyway, and it's quite likely that you have a pending exception,
1898 // and it's not unimaginable that you don't know that you do. So we allow it.
1899 ScopedObjectAccess soa(env);
1900 ScopedCheck sc(kFlag_ExcepOkay | kFlag_NullableUtf, __FUNCTION__);
1901 JniValueType args[2] = {{.E = env}, {.u = msg}};
1902 if (sc.Check(soa, true, "Eu", args)) {
1903 JniValueType result;
1904 baseEnv(env)->FatalError(env, msg);
1907 sc.Check(soa, false, "V", &result);
1911 static jint PushLocalFrame(JNIEnv* env, jint capacity) {
1912 ScopedObjectAccess soa(env);
1913 ScopedCheck sc(kFlag_ExcepOkay, __FUNCTION__);
1914 JniValueType args[2] = {{.E = env}, {.I = capacity}};
1915 if (sc.Check(soa, true, "EI", args)) {
1916 JniValueType result;
1917 result.i = baseEnv(env)->PushLocalFrame(env, capacity);
1918 if (sc.Check(soa, false, "i", &result)) {
1925 static jobject PopLocalFrame(JNIEnv* env, jobject res) {
1926 ScopedObjectAccess soa(env);
1927 ScopedCheck sc(kFlag_ExcepOkay, __FUNCTION__);
1928 JniValueType args[2] = {{.E = env}, {.L = res}};
1929 if (sc.Check(soa, true, "EL", args)) {
1930 JniValueType result;
1931 result.L = baseEnv(env)->PopLocalFrame(env, res);
1932 sc.Check(soa, false, "L", &result);
1938 static jobject NewGlobalRef(JNIEnv* env, jobject obj) {
1939 return NewRef(__FUNCTION__, env, obj, kGlobal);
1942 static jobject NewLocalRef(JNIEnv* env, jobject obj) {
1943 return NewRef(__FUNCTION__, env, obj, kLocal);
1946 static jweak NewWeakGlobalRef(JNIEnv* env, jobject obj) {
1947 return NewRef(__FUNCTION__, env, obj, kWeakGlobal);
1950 static void DeleteGlobalRef(JNIEnv* env, jobject obj) {
1951 DeleteRef(__FUNCTION__, env, obj, kGlobal);
1954 static void DeleteWeakGlobalRef(JNIEnv* env, jweak obj) {
1955 DeleteRef(__FUNCTION__, env, obj, kWeakGlobal);
1958 static void DeleteLocalRef(JNIEnv* env, jobject obj) {
1959 DeleteRef(__FUNCTION__, env, obj, kLocal);
1962 static jint EnsureLocalCapacity(JNIEnv *env, jint capacity) {
1963 ScopedObjectAccess soa(env);
1964 ScopedCheck sc(kFlag_Default, __FUNCTION__);
1965 JniValueType args[2] = {{.E = env}, {.I = capacity}};
1966 if (sc.Check(soa, true, "EI", args)) {
1967 JniValueType result;
1968 result.i = baseEnv(env)->EnsureLocalCapacity(env, capacity);
1969 if (sc.Check(soa, false, "i", &result)) {
1976 static jboolean IsSameObject(JNIEnv* env, jobject ref1, jobject ref2) {
1977 ScopedObjectAccess soa(env);
1978 ScopedCheck sc(kFlag_Default, __FUNCTION__);
1979 JniValueType args[3] = {{.E = env}, {.L = ref1}, {.L = ref2}};
1980 if (sc.Check(soa, true, "ELL", args)) {
1981 JniValueType result;
1982 result.b = baseEnv(env)->IsSameObject(env, ref1, ref2);
1983 if (sc.Check(soa, false, "b", &result)) {
1990 static jobject AllocObject(JNIEnv* env, jclass c) {
1991 ScopedObjectAccess soa(env);
1992 ScopedCheck sc(kFlag_Default, __FUNCTION__);
1993 JniValueType args[2] = {{.E = env}, {.c = c}};
1994 if (sc.Check(soa, true, "Ec", args) && sc.CheckInstantiableNonArray(soa, c)) {
1995 JniValueType result;
1996 result.L = baseEnv(env)->AllocObject(env, c);
1997 if (sc.Check(soa, false, "L", &result)) {
2004 static jobject NewObjectV(JNIEnv* env, jclass c, jmethodID mid, va_list vargs) {
2005 ScopedObjectAccess soa(env);
2006 ScopedCheck sc(kFlag_Default, __FUNCTION__);
2007 VarArgs rest(mid, vargs);
2008 JniValueType args[4] = {{.E = env}, {.c = c}, {.m = mid}, {.va = &rest}};
2009 if (sc.Check(soa, true, "Ecm.", args) && sc.CheckInstantiableNonArray(soa, c) &&
2010 sc.CheckConstructor(mid)) {
2011 JniValueType result;
2012 result.L = baseEnv(env)->NewObjectV(env, c, mid, vargs);
2013 if (sc.Check(soa, false, "L", &result)) {
2020 static jobject NewObject(JNIEnv* env, jclass c, jmethodID mid, ...) {
2022 va_start(args, mid);
2023 jobject result = NewObjectV(env, c, mid, args);
2028 static jobject NewObjectA(JNIEnv* env, jclass c, jmethodID mid, jvalue* vargs) {
2029 ScopedObjectAccess soa(env);
2030 ScopedCheck sc(kFlag_Default, __FUNCTION__);
2031 VarArgs rest(mid, vargs);
2032 JniValueType args[4] = {{.E = env}, {.c = c}, {.m = mid}, {.va = &rest}};
2033 if (sc.Check(soa, true, "Ecm.", args) && sc.CheckInstantiableNonArray(soa, c) &&
2034 sc.CheckConstructor(mid)) {
2035 JniValueType result;
2036 result.L = baseEnv(env)->NewObjectA(env, c, mid, vargs);
2037 if (sc.Check(soa, false, "L", &result)) {
2044 static jclass GetObjectClass(JNIEnv* env, jobject obj) {
2045 ScopedObjectAccess soa(env);
2046 ScopedCheck sc(kFlag_Default, __FUNCTION__);
2047 JniValueType args[2] = {{.E = env}, {.L = obj}};
2048 if (sc.Check(soa, true, "EL", args)) {
2049 JniValueType result;
2050 result.c = baseEnv(env)->GetObjectClass(env, obj);
2051 if (sc.Check(soa, false, "c", &result)) {
2058 static jboolean IsInstanceOf(JNIEnv* env, jobject obj, jclass c) {
2059 ScopedObjectAccess soa(env);
2060 ScopedCheck sc(kFlag_Default, __FUNCTION__);
2061 JniValueType args[3] = {{.E = env}, {.L = obj}, {.c = c}};
2062 if (sc.Check(soa, true, "ELc", args)) {
2063 JniValueType result;
2064 result.b = baseEnv(env)->IsInstanceOf(env, obj, c);
2065 if (sc.Check(soa, false, "b", &result)) {
2072 static jmethodID GetMethodID(JNIEnv* env, jclass c, const char* name, const char* sig) {
2073 return GetMethodIDInternal(__FUNCTION__, env, c, name, sig, false);
2076 static jmethodID GetStaticMethodID(JNIEnv* env, jclass c, const char* name, const char* sig) {
2077 return GetMethodIDInternal(__FUNCTION__, env, c, name, sig, true);
2080 static jfieldID GetFieldID(JNIEnv* env, jclass c, const char* name, const char* sig) {
2081 return GetFieldIDInternal(__FUNCTION__, env, c, name, sig, false);
2084 static jfieldID GetStaticFieldID(JNIEnv* env, jclass c, const char* name, const char* sig) {
2085 return GetFieldIDInternal(__FUNCTION__, env, c, name, sig, true);
2088 #define FIELD_ACCESSORS(jtype, name, ptype, shorty) \
2089 static jtype GetStatic##name##Field(JNIEnv* env, jclass c, jfieldID fid) { \
2090 return GetField(__FUNCTION__, env, c, fid, true, ptype).shorty; \
2093 static jtype Get##name##Field(JNIEnv* env, jobject obj, jfieldID fid) { \
2094 return GetField(__FUNCTION__, env, obj, fid, false, ptype).shorty; \
2097 static void SetStatic##name##Field(JNIEnv* env, jclass c, jfieldID fid, jtype v) { \
2098 JniValueType value; \
2100 SetField(__FUNCTION__, env, c, fid, true, ptype, value); \
2103 static void Set##name##Field(JNIEnv* env, jobject obj, jfieldID fid, jtype v) { \
2104 JniValueType value; \
2106 SetField(__FUNCTION__, env, obj, fid, false, ptype, value); \
2109 FIELD_ACCESSORS(jobject, Object, Primitive::kPrimNot, L)
2110 FIELD_ACCESSORS(jboolean, Boolean, Primitive::kPrimBoolean, Z)
2111 FIELD_ACCESSORS(jbyte, Byte, Primitive::kPrimByte, B)
2112 FIELD_ACCESSORS(jchar, Char, Primitive::kPrimChar, C)
2113 FIELD_ACCESSORS(jshort, Short, Primitive::kPrimShort, S)
2114 FIELD_ACCESSORS(jint, Int, Primitive::kPrimInt, I)
2115 FIELD_ACCESSORS(jlong, Long, Primitive::kPrimLong, J)
2116 FIELD_ACCESSORS(jfloat, Float, Primitive::kPrimFloat, F)
2117 FIELD_ACCESSORS(jdouble, Double, Primitive::kPrimDouble, D)
2118 #undef FIELD_ACCESSORS
2120 static void CallVoidMethodA(JNIEnv* env, jobject obj, jmethodID mid, jvalue* vargs) {
2121 CallMethodA(__FUNCTION__, env, obj, nullptr, mid, vargs, Primitive::kPrimVoid, kVirtual);
2124 static void CallNonvirtualVoidMethodA(JNIEnv* env, jobject obj, jclass c, jmethodID mid,
2126 CallMethodA(__FUNCTION__, env, obj, c, mid, vargs, Primitive::kPrimVoid, kDirect);
2129 static void CallStaticVoidMethodA(JNIEnv* env, jclass c, jmethodID mid, jvalue* vargs) {
2130 CallMethodA(__FUNCTION__, env, nullptr, c, mid, vargs, Primitive::kPrimVoid, kStatic);
2133 static void CallVoidMethodV(JNIEnv* env, jobject obj, jmethodID mid, va_list vargs) {
2134 CallMethodV(__FUNCTION__, env, obj, nullptr, mid, vargs, Primitive::kPrimVoid, kVirtual);
2137 static void CallNonvirtualVoidMethodV(JNIEnv* env, jobject obj, jclass c, jmethodID mid,
2139 CallMethodV(__FUNCTION__, env, obj, c, mid, vargs, Primitive::kPrimVoid, kDirect);
2142 static void CallStaticVoidMethodV(JNIEnv* env, jclass c, jmethodID mid, va_list vargs) {
2143 CallMethodV(__FUNCTION__, env, nullptr, c, mid, vargs, Primitive::kPrimVoid, kStatic);
2146 static void CallVoidMethod(JNIEnv* env, jobject obj, jmethodID mid, ...) {
2148 va_start(vargs, mid);
2149 CallMethodV(__FUNCTION__, env, obj, nullptr, mid, vargs, Primitive::kPrimVoid, kVirtual);
2153 static void CallNonvirtualVoidMethod(JNIEnv* env, jobject obj, jclass c, jmethodID mid, ...) {
2155 va_start(vargs, mid);
2156 CallMethodV(__FUNCTION__, env, obj, c, mid, vargs, Primitive::kPrimVoid, kDirect);
2160 static void CallStaticVoidMethod(JNIEnv* env, jclass c, jmethodID mid, ...) {
2162 va_start(vargs, mid);
2163 CallMethodV(__FUNCTION__, env, nullptr, c, mid, vargs, Primitive::kPrimVoid, kStatic);
2167 #define CALL(rtype, name, ptype, shorty) \
2168 static rtype Call##name##MethodA(JNIEnv* env, jobject obj, jmethodID mid, jvalue* vargs) { \
2169 return CallMethodA(__FUNCTION__, env, obj, nullptr, mid, vargs, ptype, kVirtual).shorty; \
2172 static rtype CallNonvirtual##name##MethodA(JNIEnv* env, jobject obj, jclass c, jmethodID mid, \
2174 return CallMethodA(__FUNCTION__, env, obj, c, mid, vargs, ptype, kDirect).shorty; \
2177 static rtype CallStatic##name##MethodA(JNIEnv* env, jclass c, jmethodID mid, jvalue* vargs) { \
2178 return CallMethodA(__FUNCTION__, env, nullptr, c, mid, vargs, ptype, kStatic).shorty; \
2181 static rtype Call##name##MethodV(JNIEnv* env, jobject obj, jmethodID mid, va_list vargs) { \
2182 return CallMethodV(__FUNCTION__, env, obj, nullptr, mid, vargs, ptype, kVirtual).shorty; \
2185 static rtype CallNonvirtual##name##MethodV(JNIEnv* env, jobject obj, jclass c, jmethodID mid, \
2187 return CallMethodV(__FUNCTION__, env, obj, c, mid, vargs, ptype, kDirect).shorty; \
2190 static rtype CallStatic##name##MethodV(JNIEnv* env, jclass c, jmethodID mid, va_list vargs) { \
2191 return CallMethodV(__FUNCTION__, env, nullptr, c, mid, vargs, ptype, kStatic).shorty; \
2194 static rtype Call##name##Method(JNIEnv* env, jobject obj, jmethodID mid, ...) { \
2196 va_start(vargs, mid); \
2198 CallMethodV(__FUNCTION__, env, obj, nullptr, mid, vargs, ptype, kVirtual).shorty; \
2203 static rtype CallNonvirtual##name##Method(JNIEnv* env, jobject obj, jclass c, jmethodID mid, \
2206 va_start(vargs, mid); \
2208 CallMethodV(__FUNCTION__, env, obj, c, mid, vargs, ptype, kDirect).shorty; \
2213 static rtype CallStatic##name##Method(JNIEnv* env, jclass c, jmethodID mid, ...) { \
2215 va_start(vargs, mid); \
2217 CallMethodV(__FUNCTION__, env, nullptr, c, mid, vargs, ptype, kStatic).shorty; \
2222 CALL(jobject, Object, Primitive::kPrimNot, L)
2223 CALL(jboolean, Boolean, Primitive::kPrimBoolean, Z)
2224 CALL(jbyte, Byte, Primitive::kPrimByte, B)
2225 CALL(jchar, Char, Primitive::kPrimChar, C)
2226 CALL(jshort, Short, Primitive::kPrimShort, S)
2227 CALL(jint, Int, Primitive::kPrimInt, I)
2228 CALL(jlong, Long, Primitive::kPrimLong, J)
2229 CALL(jfloat, Float, Primitive::kPrimFloat, F)
2230 CALL(jdouble, Double, Primitive::kPrimDouble, D)
2233 static jstring NewString(JNIEnv* env, const jchar* unicode_chars, jsize len) {
2234 ScopedObjectAccess soa(env);
2235 ScopedCheck sc(kFlag_Default, __FUNCTION__);
2236 JniValueType args[3] = {{.E = env}, {.p = unicode_chars}, {.z = len}};
2237 if (sc.Check(soa, true, "Epz", args)) {
2238 JniValueType result;
2239 result.s = baseEnv(env)->NewString(env, unicode_chars, len);
2240 if (sc.Check(soa, false, "s", &result)) {
2247 static jstring NewStringUTF(JNIEnv* env, const char* chars) {
2248 ScopedObjectAccess soa(env);
2249 ScopedCheck sc(kFlag_NullableUtf, __FUNCTION__);
2250 JniValueType args[2] = {{.E = env}, {.u = chars}};
2251 if (sc.Check(soa, true, "Eu", args)) {
2252 JniValueType result;
2253 // TODO: stale? show pointer and truncate string.
2254 result.s = baseEnv(env)->NewStringUTF(env, chars);
2255 if (sc.Check(soa, false, "s", &result)) {
2262 static jsize GetStringLength(JNIEnv* env, jstring string) {
2263 ScopedObjectAccess soa(env);
2264 ScopedCheck sc(kFlag_CritOkay, __FUNCTION__);
2265 JniValueType args[2] = {{.E = env}, {.s = string}};
2266 if (sc.Check(soa, true, "Es", args)) {
2267 JniValueType result;
2268 result.z = baseEnv(env)->GetStringLength(env, string);
2269 if (sc.Check(soa, false, "z", &result)) {
2276 static jsize GetStringUTFLength(JNIEnv* env, jstring string) {
2277 ScopedObjectAccess soa(env);
2278 ScopedCheck sc(kFlag_CritOkay, __FUNCTION__);
2279 JniValueType args[2] = {{.E = env}, {.s = string}};
2280 if (sc.Check(soa, true, "Es", args)) {
2281 JniValueType result;
2282 result.z = baseEnv(env)->GetStringUTFLength(env, string);
2283 if (sc.Check(soa, false, "z", &result)) {
2290 static const jchar* GetStringChars(JNIEnv* env, jstring string, jboolean* is_copy) {
2291 return reinterpret_cast<const jchar*>(GetStringCharsInternal(__FUNCTION__, env, string,
2292 is_copy, false, false));
2295 static const char* GetStringUTFChars(JNIEnv* env, jstring string, jboolean* is_copy) {
2296 return reinterpret_cast<const char*>(GetStringCharsInternal(__FUNCTION__, env, string,
2297 is_copy, true, false));
2300 static const jchar* GetStringCritical(JNIEnv* env, jstring string, jboolean* is_copy) {
2301 return reinterpret_cast<const jchar*>(GetStringCharsInternal(__FUNCTION__, env, string,
2302 is_copy, false, true));
2305 static void ReleaseStringChars(JNIEnv* env, jstring string, const jchar* chars) {
2306 ReleaseStringCharsInternal(__FUNCTION__, env, string, chars, false, false);
2309 static void ReleaseStringUTFChars(JNIEnv* env, jstring string, const char* utf) {
2310 ReleaseStringCharsInternal(__FUNCTION__, env, string, utf, true, false);
2313 static void ReleaseStringCritical(JNIEnv* env, jstring string, const jchar* chars) {
2314 ReleaseStringCharsInternal(__FUNCTION__, env, string, chars, false, true);
2317 static void GetStringRegion(JNIEnv* env, jstring string, jsize start, jsize len, jchar* buf) {
2318 ScopedObjectAccess soa(env);
2319 ScopedCheck sc(kFlag_CritOkay, __FUNCTION__);
2320 JniValueType args[5] = {{.E = env}, {.s = string}, {.z = start}, {.z = len}, {.p = buf}};
2321 // Note: the start and len arguments are checked as 'I' rather than 'z' as invalid indices
2322 // result in ArrayIndexOutOfBoundsExceptions in the base implementation.
2323 if (sc.Check(soa, true, "EsIIp", args)) {
2324 baseEnv(env)->GetStringRegion(env, string, start, len, buf);
2325 JniValueType result;
2327 sc.Check(soa, false, "V", &result);
2331 static void GetStringUTFRegion(JNIEnv* env, jstring string, jsize start, jsize len, char* buf) {
2332 ScopedObjectAccess soa(env);
2333 ScopedCheck sc(kFlag_CritOkay, __FUNCTION__);
2334 JniValueType args[5] = {{.E = env}, {.s = string}, {.z = start}, {.z = len}, {.p = buf}};
2335 // Note: the start and len arguments are checked as 'I' rather than 'z' as invalid indices
2336 // result in ArrayIndexOutOfBoundsExceptions in the base implementation.
2337 if (sc.Check(soa, true, "EsIIp", args)) {
2338 baseEnv(env)->GetStringUTFRegion(env, string, start, len, buf);
2339 JniValueType result;
2341 sc.Check(soa, false, "V", &result);
2345 static jsize GetArrayLength(JNIEnv* env, jarray array) {
2346 ScopedObjectAccess soa(env);
2347 ScopedCheck sc(kFlag_CritOkay, __FUNCTION__);
2348 JniValueType args[2] = {{.E = env}, {.a = array}};
2349 if (sc.Check(soa, true, "Ea", args)) {
2350 JniValueType result;
2351 result.z = baseEnv(env)->GetArrayLength(env, array);
2352 if (sc.Check(soa, false, "z", &result)) {
2359 static jobjectArray NewObjectArray(JNIEnv* env, jsize length, jclass element_class,
2360 jobject initial_element) {
2361 ScopedObjectAccess soa(env);
2362 ScopedCheck sc(kFlag_Default, __FUNCTION__);
2363 JniValueType args[4] =
2364 {{.E = env}, {.z = length}, {.c = element_class}, {.L = initial_element}};
2365 if (sc.Check(soa, true, "EzcL", args)) {
2366 JniValueType result;
2367 // Note: assignability tests of initial_element are done in the base implementation.
2368 result.a = baseEnv(env)->NewObjectArray(env, length, element_class, initial_element);
2369 if (sc.Check(soa, false, "a", &result)) {
2370 return down_cast<jobjectArray>(result.a);
2376 static jobject GetObjectArrayElement(JNIEnv* env, jobjectArray array, jsize index) {
2377 ScopedObjectAccess soa(env);
2378 ScopedCheck sc(kFlag_Default, __FUNCTION__);
2379 JniValueType args[3] = {{.E = env}, {.a = array}, {.z = index}};
2380 if (sc.Check(soa, true, "Eaz", args)) {
2381 JniValueType result;
2382 result.L = baseEnv(env)->GetObjectArrayElement(env, array, index);
2383 if (sc.Check(soa, false, "L", &result)) {
2390 static void SetObjectArrayElement(JNIEnv* env, jobjectArray array, jsize index, jobject value) {
2391 ScopedObjectAccess soa(env);
2392 ScopedCheck sc(kFlag_Default, __FUNCTION__);
2393 JniValueType args[4] = {{.E = env}, {.a = array}, {.z = index}, {.L = value}};
2394 // Note: the index arguments is checked as 'I' rather than 'z' as invalid indices result in
2395 // ArrayIndexOutOfBoundsExceptions in the base implementation. Similarly invalid stores result
2396 // in ArrayStoreExceptions.
2397 if (sc.Check(soa, true, "EaIL", args)) {
2398 baseEnv(env)->SetObjectArrayElement(env, array, index, value);
2399 JniValueType result;
2401 sc.Check(soa, false, "V", &result);
2405 static jbooleanArray NewBooleanArray(JNIEnv* env, jsize length) {
2406 return down_cast<jbooleanArray>(NewPrimitiveArray(__FUNCTION__, env, length,
2407 Primitive::kPrimBoolean));
2410 static jbyteArray NewByteArray(JNIEnv* env, jsize length) {
2411 return down_cast<jbyteArray>(NewPrimitiveArray(__FUNCTION__, env, length,
2412 Primitive::kPrimByte));
2415 static jcharArray NewCharArray(JNIEnv* env, jsize length) {
2416 return down_cast<jcharArray>(NewPrimitiveArray(__FUNCTION__, env, length,
2417 Primitive::kPrimChar));
2420 static jshortArray NewShortArray(JNIEnv* env, jsize length) {
2421 return down_cast<jshortArray>(NewPrimitiveArray(__FUNCTION__, env, length,
2422 Primitive::kPrimShort));
2425 static jintArray NewIntArray(JNIEnv* env, jsize length) {
2426 return down_cast<jintArray>(NewPrimitiveArray(__FUNCTION__, env, length, Primitive::kPrimInt));
2429 static jlongArray NewLongArray(JNIEnv* env, jsize length) {
2430 return down_cast<jlongArray>(NewPrimitiveArray(__FUNCTION__, env, length,
2431 Primitive::kPrimLong));
2434 static jfloatArray NewFloatArray(JNIEnv* env, jsize length) {
2435 return down_cast<jfloatArray>(NewPrimitiveArray(__FUNCTION__, env, length,
2436 Primitive::kPrimFloat));
2439 static jdoubleArray NewDoubleArray(JNIEnv* env, jsize length) {
2440 return down_cast<jdoubleArray>(NewPrimitiveArray(__FUNCTION__, env, length,
2441 Primitive::kPrimDouble));
2444 // NOLINT added to avoid wrong warning/fix from clang-tidy.
2445 #define PRIMITIVE_ARRAY_FUNCTIONS(ctype, name, ptype) \
2446 static ctype* Get##name##ArrayElements(JNIEnv* env, ctype##Array array, jboolean* is_copy) { /* NOLINT */ \
2447 return reinterpret_cast<ctype*>( /* NOLINT */ \
2448 GetPrimitiveArrayElements(__FUNCTION__, ptype, env, array, is_copy)); \
2451 static void Release##name##ArrayElements(JNIEnv* env, ctype##Array array, ctype* elems, /* NOLINT */ \
2453 ReleasePrimitiveArrayElements(__FUNCTION__, ptype, env, array, elems, mode); \
2456 static void Get##name##ArrayRegion(JNIEnv* env, ctype##Array array, jsize start, jsize len, \
2457 ctype* buf) { /* NOLINT */ \
2458 GetPrimitiveArrayRegion(__FUNCTION__, ptype, env, array, start, len, buf); \
2461 static void Set##name##ArrayRegion(JNIEnv* env, ctype##Array array, jsize start, jsize len, \
2462 const ctype* buf) { \
2463 SetPrimitiveArrayRegion(__FUNCTION__, ptype, env, array, start, len, buf); \
2466 PRIMITIVE_ARRAY_FUNCTIONS(jboolean, Boolean, Primitive::kPrimBoolean)
2467 PRIMITIVE_ARRAY_FUNCTIONS(jbyte, Byte, Primitive::kPrimByte)
2468 PRIMITIVE_ARRAY_FUNCTIONS(jchar, Char, Primitive::kPrimChar)
2469 PRIMITIVE_ARRAY_FUNCTIONS(jshort, Short, Primitive::kPrimShort)
2470 PRIMITIVE_ARRAY_FUNCTIONS(jint, Int, Primitive::kPrimInt)
2471 PRIMITIVE_ARRAY_FUNCTIONS(jlong, Long, Primitive::kPrimLong)
2472 PRIMITIVE_ARRAY_FUNCTIONS(jfloat, Float, Primitive::kPrimFloat)
2473 PRIMITIVE_ARRAY_FUNCTIONS(jdouble, Double, Primitive::kPrimDouble)
2474 #undef PRIMITIVE_ARRAY_FUNCTIONS
2476 static jint MonitorEnter(JNIEnv* env, jobject obj) {
2477 ScopedObjectAccess soa(env);
2478 ScopedCheck sc(kFlag_Default, __FUNCTION__);
2479 JniValueType args[2] = {{.E = env}, {.L = obj}};
2480 if (sc.Check(soa, true, "EL", args)) {
2481 if (obj != nullptr) {
2482 down_cast<JNIEnvExt*>(env)->RecordMonitorEnter(obj);
2484 JniValueType result;
2485 result.i = baseEnv(env)->MonitorEnter(env, obj);
2486 if (sc.Check(soa, false, "i", &result)) {
2493 static jint MonitorExit(JNIEnv* env, jobject obj) {
2494 ScopedObjectAccess soa(env);
2495 ScopedCheck sc(kFlag_ExcepOkay, __FUNCTION__);
2496 JniValueType args[2] = {{.E = env}, {.L = obj}};
2497 if (sc.Check(soa, true, "EL", args)) {
2498 if (obj != nullptr) {
2499 down_cast<JNIEnvExt*>(env)->CheckMonitorRelease(obj);
2501 JniValueType result;
2502 result.i = baseEnv(env)->MonitorExit(env, obj);
2503 if (sc.Check(soa, false, "i", &result)) {
2510 static void* GetPrimitiveArrayCritical(JNIEnv* env, jarray array, jboolean* is_copy) {
2511 ScopedObjectAccess soa(env);
2512 ScopedCheck sc(kFlag_CritGet, __FUNCTION__);
2513 JniValueType args[3] = {{.E = env}, {.a = array}, {.p = is_copy}};
2514 if (sc.Check(soa, true, "Eap", args)) {
2515 JniValueType result;
2516 void* ptr = baseEnv(env)->GetPrimitiveArrayCritical(env, array, is_copy);
2517 if (ptr != nullptr && soa.ForceCopy()) {
2518 ptr = GuardedCopy::CreateGuardedPACopy(env, array, is_copy, ptr);
2521 if (sc.Check(soa, false, "p", &result)) {
2522 return const_cast<void*>(result.p);
2528 static void ReleasePrimitiveArrayCritical(JNIEnv* env, jarray array, void* carray, jint mode) {
2529 ScopedObjectAccess soa(env);
2530 ScopedCheck sc(kFlag_CritRelease | kFlag_ExcepOkay, __FUNCTION__);
2531 sc.CheckNonNull(carray);
2532 JniValueType args[4] = {{.E = env}, {.a = array}, {.p = carray}, {.r = mode}};
2533 if (sc.Check(soa, true, "Eapr", args)) {
2534 if (soa.ForceCopy()) {
2535 carray = GuardedCopy::ReleaseGuardedPACopy(__FUNCTION__, env, array, carray, mode);
2537 baseEnv(env)->ReleasePrimitiveArrayCritical(env, array, carray, mode);
2538 JniValueType result;
2540 sc.Check(soa, false, "V", &result);
2544 static jobject NewDirectByteBuffer(JNIEnv* env, void* address, jlong capacity) {
2545 ScopedObjectAccess soa(env);
2546 ScopedCheck sc(kFlag_Default, __FUNCTION__);
2547 JniValueType args[3] = {{.E = env}, {.p = address}, {.J = capacity}};
2548 if (sc.Check(soa, true, "EpJ", args)) {
2549 JniValueType result;
2550 // Note: the validity of address and capacity are checked in the base implementation.
2551 result.L = baseEnv(env)->NewDirectByteBuffer(env, address, capacity);
2552 if (sc.Check(soa, false, "L", &result)) {
2559 static void* GetDirectBufferAddress(JNIEnv* env, jobject buf) {
2560 ScopedObjectAccess soa(env);
2561 ScopedCheck sc(kFlag_Default, __FUNCTION__);
2562 JniValueType args[2] = {{.E = env}, {.L = buf}};
2563 if (sc.Check(soa, true, "EL", args)) {
2564 JniValueType result;
2565 // Note: this is implemented in the base environment by a GetLongField which will sanity
2566 // check the type of buf in GetLongField above.
2567 result.p = baseEnv(env)->GetDirectBufferAddress(env, buf);
2568 if (sc.Check(soa, false, "p", &result)) {
2569 return const_cast<void*>(result.p);
2575 static jlong GetDirectBufferCapacity(JNIEnv* env, jobject buf) {
2576 ScopedObjectAccess soa(env);
2577 ScopedCheck sc(kFlag_Default, __FUNCTION__);
2578 JniValueType args[2] = {{.E = env}, {.L = buf}};
2579 if (sc.Check(soa, true, "EL", args)) {
2580 JniValueType result;
2581 // Note: this is implemented in the base environment by a GetIntField which will sanity
2582 // check the type of buf in GetIntField above.
2583 result.J = baseEnv(env)->GetDirectBufferCapacity(env, buf);
2584 if (sc.Check(soa, false, "J", &result)) {
2592 static JavaVMExt* GetJavaVMExt(JNIEnv* env) {
2593 return reinterpret_cast<JNIEnvExt*>(env)->vm;
2596 static const JNINativeInterface* baseEnv(JNIEnv* env) {
2597 return reinterpret_cast<JNIEnvExt*>(env)->unchecked_functions;
2600 static jobject NewRef(const char* function_name, JNIEnv* env, jobject obj, IndirectRefKind kind) {
2601 ScopedObjectAccess soa(env);
2602 ScopedCheck sc(kFlag_Default, function_name);
2603 JniValueType args[2] = {{.E = env}, {.L = obj}};
2604 if (sc.Check(soa, true, "EL", args)) {
2605 JniValueType result;
2608 result.L = baseEnv(env)->NewGlobalRef(env, obj);
2611 result.L = baseEnv(env)->NewLocalRef(env, obj);
2614 result.L = baseEnv(env)->NewWeakGlobalRef(env, obj);
2617 LOG(FATAL) << "Unexpected reference kind: " << kind;
2619 if (sc.Check(soa, false, "L", &result)) {
2620 DCHECK_EQ(IsSameObject(env, obj, result.L), JNI_TRUE);
2621 DCHECK(sc.CheckReferenceKind(kind, soa.Self(), result.L));
2628 static void DeleteRef(const char* function_name, JNIEnv* env, jobject obj, IndirectRefKind kind) {
2629 ScopedObjectAccess soa(env);
2630 ScopedCheck sc(kFlag_ExcepOkay, function_name);
2631 JniValueType args[2] = {{.E = env}, {.L = obj}};
2632 sc.Check(soa, true, "EL", args);
2633 if (sc.CheckReferenceKind(kind, soa.Self(), obj)) {
2634 JniValueType result;
2637 baseEnv(env)->DeleteGlobalRef(env, obj);
2640 baseEnv(env)->DeleteLocalRef(env, obj);
2643 baseEnv(env)->DeleteWeakGlobalRef(env, obj);
2646 LOG(FATAL) << "Unexpected reference kind: " << kind;
2649 sc.Check(soa, false, "V", &result);
2653 static jmethodID GetMethodIDInternal(const char* function_name, JNIEnv* env, jclass c,
2654 const char* name, const char* sig, bool is_static) {
2655 ScopedObjectAccess soa(env);
2656 ScopedCheck sc(kFlag_Default, function_name);
2657 JniValueType args[4] = {{.E = env}, {.c = c}, {.u = name}, {.u = sig}};
2658 if (sc.Check(soa, true, "Ecuu", args)) {
2659 JniValueType result;
2661 result.m = baseEnv(env)->GetStaticMethodID(env, c, name, sig);
2663 result.m = baseEnv(env)->GetMethodID(env, c, name, sig);
2665 if (sc.Check(soa, false, "m", &result)) {
2672 static jfieldID GetFieldIDInternal(const char* function_name, JNIEnv* env, jclass c,
2673 const char* name, const char* sig, bool is_static) {
2674 ScopedObjectAccess soa(env);
2675 ScopedCheck sc(kFlag_Default, function_name);
2676 JniValueType args[4] = {{.E = env}, {.c = c}, {.u = name}, {.u = sig}};
2677 if (sc.Check(soa, true, "Ecuu", args)) {
2678 JniValueType result;
2680 result.f = baseEnv(env)->GetStaticFieldID(env, c, name, sig);
2682 result.f = baseEnv(env)->GetFieldID(env, c, name, sig);
2684 if (sc.Check(soa, false, "f", &result)) {
2691 static JniValueType GetField(const char* function_name, JNIEnv* env, jobject obj, jfieldID fid,
2692 bool is_static, Primitive::Type type) {
2693 ScopedObjectAccess soa(env);
2694 ScopedCheck sc(kFlag_Default, function_name);
2695 JniValueType args[3] = {{.E = env}, {.L = obj}, {.f = fid}};
2696 JniValueType result;
2697 if (sc.Check(soa, true, is_static ? "Ecf" : "ELf", args) &&
2698 sc.CheckFieldAccess(soa, obj, fid, is_static, type)) {
2699 const char* result_check = nullptr;
2701 case Primitive::kPrimNot:
2703 result.L = baseEnv(env)->GetStaticObjectField(env, down_cast<jclass>(obj), fid);
2705 result.L = baseEnv(env)->GetObjectField(env, obj, fid);
2709 case Primitive::kPrimBoolean:
2711 result.Z = baseEnv(env)->GetStaticBooleanField(env, down_cast<jclass>(obj), fid);
2713 result.Z = baseEnv(env)->GetBooleanField(env, obj, fid);
2717 case Primitive::kPrimByte:
2719 result.B = baseEnv(env)->GetStaticByteField(env, down_cast<jclass>(obj), fid);
2721 result.B = baseEnv(env)->GetByteField(env, obj, fid);
2725 case Primitive::kPrimChar:
2727 result.C = baseEnv(env)->GetStaticCharField(env, down_cast<jclass>(obj), fid);
2729 result.C = baseEnv(env)->GetCharField(env, obj, fid);
2733 case Primitive::kPrimShort:
2735 result.S = baseEnv(env)->GetStaticShortField(env, down_cast<jclass>(obj), fid);
2737 result.S = baseEnv(env)->GetShortField(env, obj, fid);
2741 case Primitive::kPrimInt:
2743 result.I = baseEnv(env)->GetStaticIntField(env, down_cast<jclass>(obj), fid);
2745 result.I = baseEnv(env)->GetIntField(env, obj, fid);
2749 case Primitive::kPrimLong:
2751 result.J = baseEnv(env)->GetStaticLongField(env, down_cast<jclass>(obj), fid);
2753 result.J = baseEnv(env)->GetLongField(env, obj, fid);
2757 case Primitive::kPrimFloat:
2759 result.F = baseEnv(env)->GetStaticFloatField(env, down_cast<jclass>(obj), fid);
2761 result.F = baseEnv(env)->GetFloatField(env, obj, fid);
2765 case Primitive::kPrimDouble:
2767 result.D = baseEnv(env)->GetStaticDoubleField(env, down_cast<jclass>(obj), fid);
2769 result.D = baseEnv(env)->GetDoubleField(env, obj, fid);
2773 case Primitive::kPrimVoid:
2774 LOG(FATAL) << "Unexpected type: " << type;
2777 if (sc.Check(soa, false, result_check, &result)) {
2785 static void SetField(const char* function_name, JNIEnv* env, jobject obj, jfieldID fid,
2786 bool is_static, Primitive::Type type, JniValueType value) {
2787 ScopedObjectAccess soa(env);
2788 ScopedCheck sc(kFlag_Default, function_name);
2789 JniValueType args[4] = {{.E = env}, {.L = obj}, {.f = fid}, value};
2790 char sig[5] = { 'E', is_static ? 'c' : 'L', 'f',
2791 type == Primitive::kPrimNot ? 'L' : Primitive::Descriptor(type)[0], '\0'};
2792 if (sc.Check(soa, true, sig, args) &&
2793 sc.CheckFieldAccess(soa, obj, fid, is_static, type)) {
2795 case Primitive::kPrimNot:
2797 baseEnv(env)->SetStaticObjectField(env, down_cast<jclass>(obj), fid, value.L);
2799 baseEnv(env)->SetObjectField(env, obj, fid, value.L);
2802 case Primitive::kPrimBoolean:
2804 baseEnv(env)->SetStaticBooleanField(env, down_cast<jclass>(obj), fid, value.Z);
2806 baseEnv(env)->SetBooleanField(env, obj, fid, value.Z);
2809 case Primitive::kPrimByte:
2811 baseEnv(env)->SetStaticByteField(env, down_cast<jclass>(obj), fid, value.B);
2813 baseEnv(env)->SetByteField(env, obj, fid, value.B);
2816 case Primitive::kPrimChar:
2818 baseEnv(env)->SetStaticCharField(env, down_cast<jclass>(obj), fid, value.C);
2820 baseEnv(env)->SetCharField(env, obj, fid, value.C);
2823 case Primitive::kPrimShort:
2825 baseEnv(env)->SetStaticShortField(env, down_cast<jclass>(obj), fid, value.S);
2827 baseEnv(env)->SetShortField(env, obj, fid, value.S);
2830 case Primitive::kPrimInt:
2832 baseEnv(env)->SetStaticIntField(env, down_cast<jclass>(obj), fid, value.I);
2834 baseEnv(env)->SetIntField(env, obj, fid, value.I);
2837 case Primitive::kPrimLong:
2839 baseEnv(env)->SetStaticLongField(env, down_cast<jclass>(obj), fid, value.J);
2841 baseEnv(env)->SetLongField(env, obj, fid, value.J);
2844 case Primitive::kPrimFloat:
2846 baseEnv(env)->SetStaticFloatField(env, down_cast<jclass>(obj), fid, value.F);
2848 baseEnv(env)->SetFloatField(env, obj, fid, value.F);
2851 case Primitive::kPrimDouble:
2853 baseEnv(env)->SetStaticDoubleField(env, down_cast<jclass>(obj), fid, value.D);
2855 baseEnv(env)->SetDoubleField(env, obj, fid, value.D);
2858 case Primitive::kPrimVoid:
2859 LOG(FATAL) << "Unexpected type: " << type;
2862 JniValueType result;
2864 sc.Check(soa, false, "V", &result);
2868 static bool CheckCallArgs(ScopedObjectAccess& soa, ScopedCheck& sc, JNIEnv* env, jobject obj,
2869 jclass c, jmethodID mid, InvokeType invoke, const VarArgs* vargs)
2870 REQUIRES_SHARED(Locks::mutator_lock_) {
2874 DCHECK(c == nullptr);
2875 JniValueType args[4] = {{.E = env}, {.L = obj}, {.m = mid}, {.va = vargs}};
2876 checked = sc.Check(soa, true, "ELm.", args);
2880 JniValueType args[5] = {{.E = env}, {.L = obj}, {.c = c}, {.m = mid}, {.va = vargs}};
2881 checked = sc.Check(soa, true, "ELcm.", args);
2885 DCHECK(obj == nullptr);
2886 JniValueType args[4] = {{.E = env}, {.c = c}, {.m = mid}, {.va = vargs}};
2887 checked = sc.Check(soa, true, "Ecm.", args);
2891 LOG(FATAL) << "Unexpected invoke: " << invoke;
2898 static JniValueType CallMethodA(const char* function_name, JNIEnv* env, jobject obj, jclass c,
2899 jmethodID mid, jvalue* vargs, Primitive::Type type,
2900 InvokeType invoke) {
2901 ScopedObjectAccess soa(env);
2902 ScopedCheck sc(kFlag_Default, function_name);
2903 JniValueType result;
2904 VarArgs rest(mid, vargs);
2905 if (CheckCallArgs(soa, sc, env, obj, c, mid, invoke, &rest) &&
2906 sc.CheckMethodAndSig(soa, obj, c, mid, type, invoke)) {
2907 const char* result_check;
2909 case Primitive::kPrimNot:
2913 result.L = baseEnv(env)->CallObjectMethodA(env, obj, mid, vargs);
2916 result.L = baseEnv(env)->CallNonvirtualObjectMethodA(env, obj, c, mid, vargs);
2919 result.L = baseEnv(env)->CallStaticObjectMethodA(env, c, mid, vargs);
2925 case Primitive::kPrimBoolean:
2929 result.Z = baseEnv(env)->CallBooleanMethodA(env, obj, mid, vargs);
2932 result.Z = baseEnv(env)->CallNonvirtualBooleanMethodA(env, obj, c, mid, vargs);
2935 result.Z = baseEnv(env)->CallStaticBooleanMethodA(env, c, mid, vargs);
2941 case Primitive::kPrimByte:
2945 result.B = baseEnv(env)->CallByteMethodA(env, obj, mid, vargs);
2948 result.B = baseEnv(env)->CallNonvirtualByteMethodA(env, obj, c, mid, vargs);
2951 result.B = baseEnv(env)->CallStaticByteMethodA(env, c, mid, vargs);
2957 case Primitive::kPrimChar:
2961 result.C = baseEnv(env)->CallCharMethodA(env, obj, mid, vargs);
2964 result.C = baseEnv(env)->CallNonvirtualCharMethodA(env, obj, c, mid, vargs);
2967 result.C = baseEnv(env)->CallStaticCharMethodA(env, c, mid, vargs);
2973 case Primitive::kPrimShort:
2977 result.S = baseEnv(env)->CallShortMethodA(env, obj, mid, vargs);
2980 result.S = baseEnv(env)->CallNonvirtualShortMethodA(env, obj, c, mid, vargs);
2983 result.S = baseEnv(env)->CallStaticShortMethodA(env, c, mid, vargs);
2989 case Primitive::kPrimInt:
2993 result.I = baseEnv(env)->CallIntMethodA(env, obj, mid, vargs);
2996 result.I = baseEnv(env)->CallNonvirtualIntMethodA(env, obj, c, mid, vargs);
2999 result.I = baseEnv(env)->CallStaticIntMethodA(env, c, mid, vargs);
3005 case Primitive::kPrimLong:
3009 result.J = baseEnv(env)->CallLongMethodA(env, obj, mid, vargs);
3012 result.J = baseEnv(env)->CallNonvirtualLongMethodA(env, obj, c, mid, vargs);
3015 result.J = baseEnv(env)->CallStaticLongMethodA(env, c, mid, vargs);
3021 case Primitive::kPrimFloat:
3025 result.F = baseEnv(env)->CallFloatMethodA(env, obj, mid, vargs);
3028 result.F = baseEnv(env)->CallNonvirtualFloatMethodA(env, obj, c, mid, vargs);
3031 result.F = baseEnv(env)->CallStaticFloatMethodA(env, c, mid, vargs);
3037 case Primitive::kPrimDouble:
3041 result.D = baseEnv(env)->CallDoubleMethodA(env, obj, mid, vargs);
3044 result.D = baseEnv(env)->CallNonvirtualDoubleMethodA(env, obj, c, mid, vargs);
3047 result.D = baseEnv(env)->CallStaticDoubleMethodA(env, c, mid, vargs);
3053 case Primitive::kPrimVoid:
3058 baseEnv(env)->CallVoidMethodA(env, obj, mid, vargs);
3061 baseEnv(env)->CallNonvirtualVoidMethodA(env, obj, c, mid, vargs);
3064 baseEnv(env)->CallStaticVoidMethodA(env, c, mid, vargs);
3067 LOG(FATAL) << "Unexpected invoke: " << invoke;
3071 LOG(FATAL) << "Unexpected return type: " << type;
3072 result_check = nullptr;
3074 if (sc.Check(soa, false, result_check, &result)) {
3082 static JniValueType CallMethodV(const char* function_name, JNIEnv* env, jobject obj, jclass c,
3083 jmethodID mid, va_list vargs, Primitive::Type type,
3084 InvokeType invoke) {
3085 ScopedObjectAccess soa(env);
3086 ScopedCheck sc(kFlag_Default, function_name);
3087 JniValueType result;
3088 VarArgs rest(mid, vargs);
3089 if (CheckCallArgs(soa, sc, env, obj, c, mid, invoke, &rest) &&
3090 sc.CheckMethodAndSig(soa, obj, c, mid, type, invoke)) {
3091 const char* result_check;
3093 case Primitive::kPrimNot:
3097 result.L = baseEnv(env)->CallObjectMethodV(env, obj, mid, vargs);
3100 result.L = baseEnv(env)->CallNonvirtualObjectMethodV(env, obj, c, mid, vargs);
3103 result.L = baseEnv(env)->CallStaticObjectMethodV(env, c, mid, vargs);
3106 LOG(FATAL) << "Unexpected invoke: " << invoke;
3109 case Primitive::kPrimBoolean:
3113 result.Z = baseEnv(env)->CallBooleanMethodV(env, obj, mid, vargs);
3116 result.Z = baseEnv(env)->CallNonvirtualBooleanMethodV(env, obj, c, mid, vargs);
3119 result.Z = baseEnv(env)->CallStaticBooleanMethodV(env, c, mid, vargs);
3122 LOG(FATAL) << "Unexpected invoke: " << invoke;
3125 case Primitive::kPrimByte:
3129 result.B = baseEnv(env)->CallByteMethodV(env, obj, mid, vargs);
3132 result.B = baseEnv(env)->CallNonvirtualByteMethodV(env, obj, c, mid, vargs);
3135 result.B = baseEnv(env)->CallStaticByteMethodV(env, c, mid, vargs);
3138 LOG(FATAL) << "Unexpected invoke: " << invoke;
3141 case Primitive::kPrimChar:
3145 result.C = baseEnv(env)->CallCharMethodV(env, obj, mid, vargs);
3148 result.C = baseEnv(env)->CallNonvirtualCharMethodV(env, obj, c, mid, vargs);
3151 result.C = baseEnv(env)->CallStaticCharMethodV(env, c, mid, vargs);
3154 LOG(FATAL) << "Unexpected invoke: " << invoke;
3157 case Primitive::kPrimShort:
3161 result.S = baseEnv(env)->CallShortMethodV(env, obj, mid, vargs);
3164 result.S = baseEnv(env)->CallNonvirtualShortMethodV(env, obj, c, mid, vargs);
3167 result.S = baseEnv(env)->CallStaticShortMethodV(env, c, mid, vargs);
3170 LOG(FATAL) << "Unexpected invoke: " << invoke;
3173 case Primitive::kPrimInt:
3177 result.I = baseEnv(env)->CallIntMethodV(env, obj, mid, vargs);
3180 result.I = baseEnv(env)->CallNonvirtualIntMethodV(env, obj, c, mid, vargs);
3183 result.I = baseEnv(env)->CallStaticIntMethodV(env, c, mid, vargs);
3186 LOG(FATAL) << "Unexpected invoke: " << invoke;
3189 case Primitive::kPrimLong:
3193 result.J = baseEnv(env)->CallLongMethodV(env, obj, mid, vargs);
3196 result.J = baseEnv(env)->CallNonvirtualLongMethodV(env, obj, c, mid, vargs);
3199 result.J = baseEnv(env)->CallStaticLongMethodV(env, c, mid, vargs);
3202 LOG(FATAL) << "Unexpected invoke: " << invoke;
3205 case Primitive::kPrimFloat:
3209 result.F = baseEnv(env)->CallFloatMethodV(env, obj, mid, vargs);
3212 result.F = baseEnv(env)->CallNonvirtualFloatMethodV(env, obj, c, mid, vargs);
3215 result.F = baseEnv(env)->CallStaticFloatMethodV(env, c, mid, vargs);
3218 LOG(FATAL) << "Unexpected invoke: " << invoke;
3221 case Primitive::kPrimDouble:
3225 result.D = baseEnv(env)->CallDoubleMethodV(env, obj, mid, vargs);
3228 result.D = baseEnv(env)->CallNonvirtualDoubleMethodV(env, obj, c, mid, vargs);
3231 result.D = baseEnv(env)->CallStaticDoubleMethodV(env, c, mid, vargs);
3234 LOG(FATAL) << "Unexpected invoke: " << invoke;
3237 case Primitive::kPrimVoid:
3242 baseEnv(env)->CallVoidMethodV(env, obj, mid, vargs);
3245 baseEnv(env)->CallNonvirtualVoidMethodV(env, obj, c, mid, vargs);
3248 baseEnv(env)->CallStaticVoidMethodV(env, c, mid, vargs);
3251 LOG(FATAL) << "Unexpected invoke: " << invoke;
3255 LOG(FATAL) << "Unexpected return type: " << type;
3256 result_check = nullptr;
3258 if (sc.Check(soa, false, result_check, &result)) {
3266 static const void* GetStringCharsInternal(const char* function_name, JNIEnv* env, jstring string,
3267 jboolean* is_copy, bool utf, bool critical) {
3268 ScopedObjectAccess soa(env);
3269 int flags = critical ? kFlag_CritGet : kFlag_CritOkay;
3270 ScopedCheck sc(flags, function_name);
3271 JniValueType args[3] = {{.E = env}, {.s = string}, {.p = is_copy}};
3272 if (sc.Check(soa, true, "Esp", args)) {
3273 JniValueType result;
3277 ptr = const_cast<char*>(baseEnv(env)->GetStringUTFChars(env, string, is_copy));
3278 result.u = reinterpret_cast<char*>(ptr);
3280 ptr = const_cast<jchar*>(critical ? baseEnv(env)->GetStringCritical(env, string, is_copy) :
3281 baseEnv(env)->GetStringChars(env, string, is_copy));
3284 // TODO: could we be smarter about not copying when local_is_copy?
3285 if (ptr != nullptr && soa.ForceCopy()) {
3287 size_t length_in_bytes = strlen(result.u) + 1;
3289 reinterpret_cast<const char*>(GuardedCopy::Create(ptr, length_in_bytes, false));
3291 size_t length_in_bytes = baseEnv(env)->GetStringLength(env, string) * 2;
3293 reinterpret_cast<const jchar*>(GuardedCopy::Create(ptr, length_in_bytes, false));
3295 if (is_copy != nullptr) {
3296 *is_copy = JNI_TRUE;
3299 if (sc.Check(soa, false, utf ? "u" : "p", &result)) {
3300 return utf ? result.u : result.p;
3306 static void ReleaseStringCharsInternal(const char* function_name, JNIEnv* env, jstring string,
3307 const void* chars, bool utf, bool critical) {
3308 ScopedObjectAccess soa(env);
3309 int flags = kFlag_ExcepOkay | kFlag_Release;
3311 flags |= kFlag_CritRelease;
3313 ScopedCheck sc(flags, function_name);
3314 sc.CheckNonNull(chars);
3315 bool force_copy_ok = !soa.ForceCopy() || GuardedCopy::Check(function_name, chars, false);
3316 if (force_copy_ok && soa.ForceCopy()) {
3317 chars = reinterpret_cast<const jchar*>(GuardedCopy::Destroy(const_cast<void*>(chars)));
3319 if (force_copy_ok) {
3320 JniValueType args[3] = {{.E = env}, {.s = string}, {.p = chars}};
3321 if (sc.Check(soa, true, utf ? "Esu" : "Esp", args)) {
3324 baseEnv(env)->ReleaseStringUTFChars(env, string, reinterpret_cast<const char*>(chars));
3327 baseEnv(env)->ReleaseStringCritical(env, string, reinterpret_cast<const jchar*>(chars));
3329 baseEnv(env)->ReleaseStringChars(env, string, reinterpret_cast<const jchar*>(chars));
3332 JniValueType result;
3333 sc.Check(soa, false, "V", &result);
3338 static jarray NewPrimitiveArray(const char* function_name, JNIEnv* env, jsize length,
3339 Primitive::Type type) {
3340 ScopedObjectAccess soa(env);
3341 ScopedCheck sc(kFlag_Default, function_name);
3342 JniValueType args[2] = {{.E = env}, {.z = length}};
3343 if (sc.Check(soa, true, "Ez", args)) {
3344 JniValueType result;
3346 case Primitive::kPrimBoolean:
3347 result.a = baseEnv(env)->NewBooleanArray(env, length);
3349 case Primitive::kPrimByte:
3350 result.a = baseEnv(env)->NewByteArray(env, length);
3352 case Primitive::kPrimChar:
3353 result.a = baseEnv(env)->NewCharArray(env, length);
3355 case Primitive::kPrimShort:
3356 result.a = baseEnv(env)->NewShortArray(env, length);
3358 case Primitive::kPrimInt:
3359 result.a = baseEnv(env)->NewIntArray(env, length);
3361 case Primitive::kPrimLong:
3362 result.a = baseEnv(env)->NewLongArray(env, length);
3364 case Primitive::kPrimFloat:
3365 result.a = baseEnv(env)->NewFloatArray(env, length);
3367 case Primitive::kPrimDouble:
3368 result.a = baseEnv(env)->NewDoubleArray(env, length);
3371 LOG(FATAL) << "Unexpected primitive type: " << type;
3373 if (sc.Check(soa, false, "a", &result)) {
3380 static void* GetPrimitiveArrayElements(const char* function_name, Primitive::Type type,
3381 JNIEnv* env, jarray array, jboolean* is_copy) {
3382 ScopedObjectAccess soa(env);
3383 ScopedCheck sc(kFlag_Default, function_name);
3384 JniValueType args[3] = {{.E = env}, {.a = array}, {.p = is_copy}};
3385 if (sc.Check(soa, true, "Eap", args) && sc.CheckPrimitiveArrayType(soa, array, type)) {
3386 JniValueType result;
3387 void* ptr = nullptr;
3389 case Primitive::kPrimBoolean:
3390 ptr = baseEnv(env)->GetBooleanArrayElements(env, down_cast<jbooleanArray>(array),
3393 case Primitive::kPrimByte:
3394 ptr = baseEnv(env)->GetByteArrayElements(env, down_cast<jbyteArray>(array), is_copy);
3396 case Primitive::kPrimChar:
3397 ptr = baseEnv(env)->GetCharArrayElements(env, down_cast<jcharArray>(array), is_copy);
3399 case Primitive::kPrimShort:
3400 ptr = baseEnv(env)->GetShortArrayElements(env, down_cast<jshortArray>(array), is_copy);
3402 case Primitive::kPrimInt:
3403 ptr = baseEnv(env)->GetIntArrayElements(env, down_cast<jintArray>(array), is_copy);
3405 case Primitive::kPrimLong:
3406 ptr = baseEnv(env)->GetLongArrayElements(env, down_cast<jlongArray>(array), is_copy);
3408 case Primitive::kPrimFloat:
3409 ptr = baseEnv(env)->GetFloatArrayElements(env, down_cast<jfloatArray>(array), is_copy);
3411 case Primitive::kPrimDouble:
3412 ptr = baseEnv(env)->GetDoubleArrayElements(env, down_cast<jdoubleArray>(array), is_copy);
3415 LOG(FATAL) << "Unexpected primitive type: " << type;
3417 if (ptr != nullptr && soa.ForceCopy()) {
3418 ptr = GuardedCopy::CreateGuardedPACopy(env, array, is_copy, ptr);
3419 if (is_copy != nullptr) {
3420 *is_copy = JNI_TRUE;
3424 if (sc.Check(soa, false, "p", &result)) {
3425 return const_cast<void*>(result.p);
3431 static void ReleasePrimitiveArrayElements(const char* function_name, Primitive::Type type,
3432 JNIEnv* env, jarray array, void* elems, jint mode) {
3433 ScopedObjectAccess soa(env);
3434 ScopedCheck sc(kFlag_ExcepOkay, function_name);
3435 if (sc.CheckNonNull(elems) && sc.CheckPrimitiveArrayType(soa, array, type)) {
3436 if (soa.ForceCopy()) {
3437 elems = GuardedCopy::ReleaseGuardedPACopy(function_name, env, array, elems, mode);
3439 if (!soa.ForceCopy() || elems != nullptr) {
3440 JniValueType args[4] = {{.E = env}, {.a = array}, {.p = elems}, {.r = mode}};
3441 if (sc.Check(soa, true, "Eapr", args)) {
3443 case Primitive::kPrimBoolean:
3444 baseEnv(env)->ReleaseBooleanArrayElements(env, down_cast<jbooleanArray>(array),
3445 reinterpret_cast<jboolean*>(elems), mode);
3447 case Primitive::kPrimByte:
3448 baseEnv(env)->ReleaseByteArrayElements(env, down_cast<jbyteArray>(array),
3449 reinterpret_cast<jbyte*>(elems), mode);
3451 case Primitive::kPrimChar:
3452 baseEnv(env)->ReleaseCharArrayElements(env, down_cast<jcharArray>(array),
3453 reinterpret_cast<jchar*>(elems), mode);
3455 case Primitive::kPrimShort:
3456 baseEnv(env)->ReleaseShortArrayElements(env, down_cast<jshortArray>(array),
3457 reinterpret_cast<jshort*>(elems), mode);
3459 case Primitive::kPrimInt:
3460 baseEnv(env)->ReleaseIntArrayElements(env, down_cast<jintArray>(array),
3461 reinterpret_cast<jint*>(elems), mode);
3463 case Primitive::kPrimLong:
3464 baseEnv(env)->ReleaseLongArrayElements(env, down_cast<jlongArray>(array),
3465 reinterpret_cast<jlong*>(elems), mode);
3467 case Primitive::kPrimFloat:
3468 baseEnv(env)->ReleaseFloatArrayElements(env, down_cast<jfloatArray>(array),
3469 reinterpret_cast<jfloat*>(elems), mode);
3471 case Primitive::kPrimDouble:
3472 baseEnv(env)->ReleaseDoubleArrayElements(env, down_cast<jdoubleArray>(array),
3473 reinterpret_cast<jdouble*>(elems), mode);
3476 LOG(FATAL) << "Unexpected primitive type: " << type;
3478 JniValueType result;
3480 sc.Check(soa, false, "V", &result);
3486 static void GetPrimitiveArrayRegion(const char* function_name, Primitive::Type type, JNIEnv* env,
3487 jarray array, jsize start, jsize len, void* buf) {
3488 ScopedObjectAccess soa(env);
3489 ScopedCheck sc(kFlag_Default, function_name);
3490 JniValueType args[5] = {{.E = env}, {.a = array}, {.z = start}, {.z = len}, {.p = buf}};
3491 // Note: the start and len arguments are checked as 'I' rather than 'z' as invalid indices
3492 // result in ArrayIndexOutOfBoundsExceptions in the base implementation.
3493 if (sc.Check(soa, true, "EaIIp", args) && sc.CheckPrimitiveArrayType(soa, array, type)) {
3495 case Primitive::kPrimBoolean:
3496 baseEnv(env)->GetBooleanArrayRegion(env, down_cast<jbooleanArray>(array), start, len,
3497 reinterpret_cast<jboolean*>(buf));
3499 case Primitive::kPrimByte:
3500 baseEnv(env)->GetByteArrayRegion(env, down_cast<jbyteArray>(array), start, len,
3501 reinterpret_cast<jbyte*>(buf));
3503 case Primitive::kPrimChar:
3504 baseEnv(env)->GetCharArrayRegion(env, down_cast<jcharArray>(array), start, len,
3505 reinterpret_cast<jchar*>(buf));
3507 case Primitive::kPrimShort:
3508 baseEnv(env)->GetShortArrayRegion(env, down_cast<jshortArray>(array), start, len,
3509 reinterpret_cast<jshort*>(buf));
3511 case Primitive::kPrimInt:
3512 baseEnv(env)->GetIntArrayRegion(env, down_cast<jintArray>(array), start, len,
3513 reinterpret_cast<jint*>(buf));
3515 case Primitive::kPrimLong:
3516 baseEnv(env)->GetLongArrayRegion(env, down_cast<jlongArray>(array), start, len,
3517 reinterpret_cast<jlong*>(buf));
3519 case Primitive::kPrimFloat:
3520 baseEnv(env)->GetFloatArrayRegion(env, down_cast<jfloatArray>(array), start, len,
3521 reinterpret_cast<jfloat*>(buf));
3523 case Primitive::kPrimDouble:
3524 baseEnv(env)->GetDoubleArrayRegion(env, down_cast<jdoubleArray>(array), start, len,
3525 reinterpret_cast<jdouble*>(buf));
3528 LOG(FATAL) << "Unexpected primitive type: " << type;
3530 JniValueType result;
3532 sc.Check(soa, false, "V", &result);
3536 static void SetPrimitiveArrayRegion(const char* function_name, Primitive::Type type, JNIEnv* env,
3537 jarray array, jsize start, jsize len, const void* buf) {
3538 ScopedObjectAccess soa(env);
3539 ScopedCheck sc(kFlag_Default, function_name);
3540 JniValueType args[5] = {{.E = env}, {.a = array}, {.z = start}, {.z = len}, {.p = buf}};
3541 // Note: the start and len arguments are checked as 'I' rather than 'z' as invalid indices
3542 // result in ArrayIndexOutOfBoundsExceptions in the base implementation.
3543 if (sc.Check(soa, true, "EaIIp", args) && sc.CheckPrimitiveArrayType(soa, array, type)) {
3545 case Primitive::kPrimBoolean:
3546 baseEnv(env)->SetBooleanArrayRegion(env, down_cast<jbooleanArray>(array), start, len,
3547 reinterpret_cast<const jboolean*>(buf));
3549 case Primitive::kPrimByte:
3550 baseEnv(env)->SetByteArrayRegion(env, down_cast<jbyteArray>(array), start, len,
3551 reinterpret_cast<const jbyte*>(buf));
3553 case Primitive::kPrimChar:
3554 baseEnv(env)->SetCharArrayRegion(env, down_cast<jcharArray>(array), start, len,
3555 reinterpret_cast<const jchar*>(buf));
3557 case Primitive::kPrimShort:
3558 baseEnv(env)->SetShortArrayRegion(env, down_cast<jshortArray>(array), start, len,
3559 reinterpret_cast<const jshort*>(buf));
3561 case Primitive::kPrimInt:
3562 baseEnv(env)->SetIntArrayRegion(env, down_cast<jintArray>(array), start, len,
3563 reinterpret_cast<const jint*>(buf));
3565 case Primitive::kPrimLong:
3566 baseEnv(env)->SetLongArrayRegion(env, down_cast<jlongArray>(array), start, len,
3567 reinterpret_cast<const jlong*>(buf));
3569 case Primitive::kPrimFloat:
3570 baseEnv(env)->SetFloatArrayRegion(env, down_cast<jfloatArray>(array), start, len,
3571 reinterpret_cast<const jfloat*>(buf));
3573 case Primitive::kPrimDouble:
3574 baseEnv(env)->SetDoubleArrayRegion(env, down_cast<jdoubleArray>(array), start, len,
3575 reinterpret_cast<const jdouble*>(buf));
3578 LOG(FATAL) << "Unexpected primitive type: " << type;
3580 JniValueType result;
3582 sc.Check(soa, false, "V", &result);
3587 const JNINativeInterface gCheckNativeInterface = {
3588 nullptr, // reserved0.
3589 nullptr, // reserved1.
3590 nullptr, // reserved2.
3591 nullptr, // reserved3.
3592 CheckJNI::GetVersion,
3593 CheckJNI::DefineClass,
3594 CheckJNI::FindClass,
3595 CheckJNI::FromReflectedMethod,
3596 CheckJNI::FromReflectedField,
3597 CheckJNI::ToReflectedMethod,
3598 CheckJNI::GetSuperclass,
3599 CheckJNI::IsAssignableFrom,
3600 CheckJNI::ToReflectedField,
3603 CheckJNI::ExceptionOccurred,
3604 CheckJNI::ExceptionDescribe,
3605 CheckJNI::ExceptionClear,
3606 CheckJNI::FatalError,
3607 CheckJNI::PushLocalFrame,
3608 CheckJNI::PopLocalFrame,
3609 CheckJNI::NewGlobalRef,
3610 CheckJNI::DeleteGlobalRef,
3611 CheckJNI::DeleteLocalRef,
3612 CheckJNI::IsSameObject,
3613 CheckJNI::NewLocalRef,
3614 CheckJNI::EnsureLocalCapacity,
3615 CheckJNI::AllocObject,
3616 CheckJNI::NewObject,
3617 CheckJNI::NewObjectV,
3618 CheckJNI::NewObjectA,
3619 CheckJNI::GetObjectClass,
3620 CheckJNI::IsInstanceOf,
3621 CheckJNI::GetMethodID,
3622 CheckJNI::CallObjectMethod,
3623 CheckJNI::CallObjectMethodV,
3624 CheckJNI::CallObjectMethodA,
3625 CheckJNI::CallBooleanMethod,
3626 CheckJNI::CallBooleanMethodV,
3627 CheckJNI::CallBooleanMethodA,
3628 CheckJNI::CallByteMethod,
3629 CheckJNI::CallByteMethodV,
3630 CheckJNI::CallByteMethodA,
3631 CheckJNI::CallCharMethod,
3632 CheckJNI::CallCharMethodV,
3633 CheckJNI::CallCharMethodA,
3634 CheckJNI::CallShortMethod,
3635 CheckJNI::CallShortMethodV,
3636 CheckJNI::CallShortMethodA,
3637 CheckJNI::CallIntMethod,
3638 CheckJNI::CallIntMethodV,
3639 CheckJNI::CallIntMethodA,
3640 CheckJNI::CallLongMethod,
3641 CheckJNI::CallLongMethodV,
3642 CheckJNI::CallLongMethodA,
3643 CheckJNI::CallFloatMethod,
3644 CheckJNI::CallFloatMethodV,
3645 CheckJNI::CallFloatMethodA,
3646 CheckJNI::CallDoubleMethod,
3647 CheckJNI::CallDoubleMethodV,
3648 CheckJNI::CallDoubleMethodA,
3649 CheckJNI::CallVoidMethod,
3650 CheckJNI::CallVoidMethodV,
3651 CheckJNI::CallVoidMethodA,
3652 CheckJNI::CallNonvirtualObjectMethod,
3653 CheckJNI::CallNonvirtualObjectMethodV,
3654 CheckJNI::CallNonvirtualObjectMethodA,
3655 CheckJNI::CallNonvirtualBooleanMethod,
3656 CheckJNI::CallNonvirtualBooleanMethodV,
3657 CheckJNI::CallNonvirtualBooleanMethodA,
3658 CheckJNI::CallNonvirtualByteMethod,
3659 CheckJNI::CallNonvirtualByteMethodV,
3660 CheckJNI::CallNonvirtualByteMethodA,
3661 CheckJNI::CallNonvirtualCharMethod,
3662 CheckJNI::CallNonvirtualCharMethodV,
3663 CheckJNI::CallNonvirtualCharMethodA,
3664 CheckJNI::CallNonvirtualShortMethod,
3665 CheckJNI::CallNonvirtualShortMethodV,
3666 CheckJNI::CallNonvirtualShortMethodA,
3667 CheckJNI::CallNonvirtualIntMethod,
3668 CheckJNI::CallNonvirtualIntMethodV,
3669 CheckJNI::CallNonvirtualIntMethodA,
3670 CheckJNI::CallNonvirtualLongMethod,
3671 CheckJNI::CallNonvirtualLongMethodV,
3672 CheckJNI::CallNonvirtualLongMethodA,
3673 CheckJNI::CallNonvirtualFloatMethod,
3674 CheckJNI::CallNonvirtualFloatMethodV,
3675 CheckJNI::CallNonvirtualFloatMethodA,
3676 CheckJNI::CallNonvirtualDoubleMethod,
3677 CheckJNI::CallNonvirtualDoubleMethodV,
3678 CheckJNI::CallNonvirtualDoubleMethodA,
3679 CheckJNI::CallNonvirtualVoidMethod,
3680 CheckJNI::CallNonvirtualVoidMethodV,
3681 CheckJNI::CallNonvirtualVoidMethodA,
3682 CheckJNI::GetFieldID,
3683 CheckJNI::GetObjectField,
3684 CheckJNI::GetBooleanField,
3685 CheckJNI::GetByteField,
3686 CheckJNI::GetCharField,
3687 CheckJNI::GetShortField,
3688 CheckJNI::GetIntField,
3689 CheckJNI::GetLongField,
3690 CheckJNI::GetFloatField,
3691 CheckJNI::GetDoubleField,
3692 CheckJNI::SetObjectField,
3693 CheckJNI::SetBooleanField,
3694 CheckJNI::SetByteField,
3695 CheckJNI::SetCharField,
3696 CheckJNI::SetShortField,
3697 CheckJNI::SetIntField,
3698 CheckJNI::SetLongField,
3699 CheckJNI::SetFloatField,
3700 CheckJNI::SetDoubleField,
3701 CheckJNI::GetStaticMethodID,
3702 CheckJNI::CallStaticObjectMethod,
3703 CheckJNI::CallStaticObjectMethodV,
3704 CheckJNI::CallStaticObjectMethodA,
3705 CheckJNI::CallStaticBooleanMethod,
3706 CheckJNI::CallStaticBooleanMethodV,
3707 CheckJNI::CallStaticBooleanMethodA,
3708 CheckJNI::CallStaticByteMethod,
3709 CheckJNI::CallStaticByteMethodV,
3710 CheckJNI::CallStaticByteMethodA,
3711 CheckJNI::CallStaticCharMethod,
3712 CheckJNI::CallStaticCharMethodV,
3713 CheckJNI::CallStaticCharMethodA,
3714 CheckJNI::CallStaticShortMethod,
3715 CheckJNI::CallStaticShortMethodV,
3716 CheckJNI::CallStaticShortMethodA,
3717 CheckJNI::CallStaticIntMethod,
3718 CheckJNI::CallStaticIntMethodV,
3719 CheckJNI::CallStaticIntMethodA,
3720 CheckJNI::CallStaticLongMethod,
3721 CheckJNI::CallStaticLongMethodV,
3722 CheckJNI::CallStaticLongMethodA,
3723 CheckJNI::CallStaticFloatMethod,
3724 CheckJNI::CallStaticFloatMethodV,
3725 CheckJNI::CallStaticFloatMethodA,
3726 CheckJNI::CallStaticDoubleMethod,
3727 CheckJNI::CallStaticDoubleMethodV,
3728 CheckJNI::CallStaticDoubleMethodA,
3729 CheckJNI::CallStaticVoidMethod,
3730 CheckJNI::CallStaticVoidMethodV,
3731 CheckJNI::CallStaticVoidMethodA,
3732 CheckJNI::GetStaticFieldID,
3733 CheckJNI::GetStaticObjectField,
3734 CheckJNI::GetStaticBooleanField,
3735 CheckJNI::GetStaticByteField,
3736 CheckJNI::GetStaticCharField,
3737 CheckJNI::GetStaticShortField,
3738 CheckJNI::GetStaticIntField,
3739 CheckJNI::GetStaticLongField,
3740 CheckJNI::GetStaticFloatField,
3741 CheckJNI::GetStaticDoubleField,
3742 CheckJNI::SetStaticObjectField,
3743 CheckJNI::SetStaticBooleanField,
3744 CheckJNI::SetStaticByteField,
3745 CheckJNI::SetStaticCharField,
3746 CheckJNI::SetStaticShortField,
3747 CheckJNI::SetStaticIntField,
3748 CheckJNI::SetStaticLongField,
3749 CheckJNI::SetStaticFloatField,
3750 CheckJNI::SetStaticDoubleField,
3751 CheckJNI::NewString,
3752 CheckJNI::GetStringLength,
3753 CheckJNI::GetStringChars,
3754 CheckJNI::ReleaseStringChars,
3755 CheckJNI::NewStringUTF,
3756 CheckJNI::GetStringUTFLength,
3757 CheckJNI::GetStringUTFChars,
3758 CheckJNI::ReleaseStringUTFChars,
3759 CheckJNI::GetArrayLength,
3760 CheckJNI::NewObjectArray,
3761 CheckJNI::GetObjectArrayElement,
3762 CheckJNI::SetObjectArrayElement,
3763 CheckJNI::NewBooleanArray,
3764 CheckJNI::NewByteArray,
3765 CheckJNI::NewCharArray,
3766 CheckJNI::NewShortArray,
3767 CheckJNI::NewIntArray,
3768 CheckJNI::NewLongArray,
3769 CheckJNI::NewFloatArray,
3770 CheckJNI::NewDoubleArray,
3771 CheckJNI::GetBooleanArrayElements,
3772 CheckJNI::GetByteArrayElements,
3773 CheckJNI::GetCharArrayElements,
3774 CheckJNI::GetShortArrayElements,
3775 CheckJNI::GetIntArrayElements,
3776 CheckJNI::GetLongArrayElements,
3777 CheckJNI::GetFloatArrayElements,
3778 CheckJNI::GetDoubleArrayElements,
3779 CheckJNI::ReleaseBooleanArrayElements,
3780 CheckJNI::ReleaseByteArrayElements,
3781 CheckJNI::ReleaseCharArrayElements,
3782 CheckJNI::ReleaseShortArrayElements,
3783 CheckJNI::ReleaseIntArrayElements,
3784 CheckJNI::ReleaseLongArrayElements,
3785 CheckJNI::ReleaseFloatArrayElements,
3786 CheckJNI::ReleaseDoubleArrayElements,
3787 CheckJNI::GetBooleanArrayRegion,
3788 CheckJNI::GetByteArrayRegion,
3789 CheckJNI::GetCharArrayRegion,
3790 CheckJNI::GetShortArrayRegion,
3791 CheckJNI::GetIntArrayRegion,
3792 CheckJNI::GetLongArrayRegion,
3793 CheckJNI::GetFloatArrayRegion,
3794 CheckJNI::GetDoubleArrayRegion,
3795 CheckJNI::SetBooleanArrayRegion,
3796 CheckJNI::SetByteArrayRegion,
3797 CheckJNI::SetCharArrayRegion,
3798 CheckJNI::SetShortArrayRegion,
3799 CheckJNI::SetIntArrayRegion,
3800 CheckJNI::SetLongArrayRegion,
3801 CheckJNI::SetFloatArrayRegion,
3802 CheckJNI::SetDoubleArrayRegion,
3803 CheckJNI::RegisterNatives,
3804 CheckJNI::UnregisterNatives,
3805 CheckJNI::MonitorEnter,
3806 CheckJNI::MonitorExit,
3807 CheckJNI::GetJavaVM,
3808 CheckJNI::GetStringRegion,
3809 CheckJNI::GetStringUTFRegion,
3810 CheckJNI::GetPrimitiveArrayCritical,
3811 CheckJNI::ReleasePrimitiveArrayCritical,
3812 CheckJNI::GetStringCritical,
3813 CheckJNI::ReleaseStringCritical,
3814 CheckJNI::NewWeakGlobalRef,
3815 CheckJNI::DeleteWeakGlobalRef,
3816 CheckJNI::ExceptionCheck,
3817 CheckJNI::NewDirectByteBuffer,
3818 CheckJNI::GetDirectBufferAddress,
3819 CheckJNI::GetDirectBufferCapacity,
3820 CheckJNI::GetObjectRefType,
3823 const JNINativeInterface* GetCheckJniNativeInterface() {
3824 return &gCheckNativeInterface;
3829 static jint DestroyJavaVM(JavaVM* vm) {
3830 ScopedCheck sc(kFlag_Invocation, __FUNCTION__, false);
3831 JniValueType args[1] = {{.v = vm}};
3832 sc.CheckNonHeap(reinterpret_cast<JavaVMExt*>(vm), true, "v", args);
3833 JniValueType result;
3834 result.i = BaseVm(vm)->DestroyJavaVM(vm);
3835 // Use null to signal that the JavaVM isn't valid anymore. DestroyJavaVM deletes the runtime,
3836 // which will delete the JavaVMExt.
3837 sc.CheckNonHeap(nullptr, false, "i", &result);
3841 static jint AttachCurrentThread(JavaVM* vm, JNIEnv** p_env, void* thr_args) {
3842 ScopedCheck sc(kFlag_Invocation, __FUNCTION__);
3843 JniValueType args[3] = {{.v = vm}, {.p = p_env}, {.p = thr_args}};
3844 sc.CheckNonHeap(reinterpret_cast<JavaVMExt*>(vm), true, "vpp", args);
3845 JniValueType result;
3846 result.i = BaseVm(vm)->AttachCurrentThread(vm, p_env, thr_args);
3847 sc.CheckNonHeap(reinterpret_cast<JavaVMExt*>(vm), false, "i", &result);
3851 static jint AttachCurrentThreadAsDaemon(JavaVM* vm, JNIEnv** p_env, void* thr_args) {
3852 ScopedCheck sc(kFlag_Invocation, __FUNCTION__);
3853 JniValueType args[3] = {{.v = vm}, {.p = p_env}, {.p = thr_args}};
3854 sc.CheckNonHeap(reinterpret_cast<JavaVMExt*>(vm), true, "vpp", args);
3855 JniValueType result;
3856 result.i = BaseVm(vm)->AttachCurrentThreadAsDaemon(vm, p_env, thr_args);
3857 sc.CheckNonHeap(reinterpret_cast<JavaVMExt*>(vm), false, "i", &result);
3861 static jint DetachCurrentThread(JavaVM* vm) {
3862 ScopedCheck sc(kFlag_Invocation, __FUNCTION__);
3863 JniValueType args[1] = {{.v = vm}};
3864 sc.CheckNonHeap(reinterpret_cast<JavaVMExt*>(vm), true, "v", args);
3865 JniValueType result;
3866 result.i = BaseVm(vm)->DetachCurrentThread(vm);
3867 sc.CheckNonHeap(reinterpret_cast<JavaVMExt*>(vm), false, "i", &result);
3871 static jint GetEnv(JavaVM* vm, void** p_env, jint version) {
3872 ScopedCheck sc(kFlag_Invocation, __FUNCTION__);
3873 JniValueType args[3] = {{.v = vm}, {.p = p_env}, {.I = version}};
3874 sc.CheckNonHeap(reinterpret_cast<JavaVMExt*>(vm), true, "vpI", args);
3875 JniValueType result;
3876 result.i = BaseVm(vm)->GetEnv(vm, p_env, version);
3877 sc.CheckNonHeap(reinterpret_cast<JavaVMExt*>(vm), false, "i", &result);
3882 static const JNIInvokeInterface* BaseVm(JavaVM* vm) {
3883 return reinterpret_cast<JavaVMExt*>(vm)->GetUncheckedFunctions();
3887 const JNIInvokeInterface gCheckInvokeInterface = {
3888 nullptr, // reserved0
3889 nullptr, // reserved1
3890 nullptr, // reserved2
3891 CheckJII::DestroyJavaVM,
3892 CheckJII::AttachCurrentThread,
3893 CheckJII::DetachCurrentThread,
3895 CheckJII::AttachCurrentThreadAsDaemon
3898 const JNIInvokeInterface* GetCheckJniInvokeInterface() {
3899 return &gCheckInvokeInterface;