4138 lines
		
	
	
		
			145 KiB
		
	
	
	
		
			C++
		
	
	
	
			
		
		
	
	
			4138 lines
		
	
	
		
			145 KiB
		
	
	
	
		
			C++
		
	
	
	
| /*
 | |
|  * Copyright (C) 2008 The Android Open Source Project
 | |
|  *
 | |
|  * Licensed under the Apache License, Version 2.0 (the "License");
 | |
|  * you may not use this file except in compliance with the License.
 | |
|  * You may obtain a copy of the License at
 | |
|  *
 | |
|  *      http://www.apache.org/licenses/LICENSE-2.0
 | |
|  *
 | |
|  * Unless required by applicable law or agreed to in writing, software
 | |
|  * distributed under the License is distributed on an "AS IS" BASIS,
 | |
|  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | |
|  * See the License for the specific language governing permissions and
 | |
|  * limitations under the License.
 | |
|  */
 | |
| 
 | |
| #include "check_jni.h"
 | |
| 
 | |
| #include <sys/mman.h>
 | |
| #include <zlib.h>
 | |
| 
 | |
| #include <iomanip>
 | |
| 
 | |
| #include <android-base/logging.h>
 | |
| #include <android-base/stringprintf.h>
 | |
| 
 | |
| #include "art_field-inl.h"
 | |
| #include "art_method-inl.h"
 | |
| #include "base/macros.h"
 | |
| #include "base/to_str.h"
 | |
| #include "base/time_utils.h"
 | |
| #include "class_linker-inl.h"
 | |
| #include "class_linker.h"
 | |
| #include "class_root-inl.h"
 | |
| #include "dex/descriptors_names.h"
 | |
| #include "dex/dex_file-inl.h"
 | |
| #include "gc/space/space.h"
 | |
| #include "indirect_reference_table-inl.h"
 | |
| #include "java_vm_ext.h"
 | |
| #include "jni_internal.h"
 | |
| #include "mirror/class-inl.h"
 | |
| #include "mirror/field.h"
 | |
| #include "mirror/method.h"
 | |
| #include "mirror/object-inl.h"
 | |
| #include "mirror/object_array-inl.h"
 | |
| #include "mirror/string-inl.h"
 | |
| #include "mirror/throwable.h"
 | |
| #include "runtime.h"
 | |
| #include "scoped_thread_state_change-inl.h"
 | |
| #include "thread.h"
 | |
| #include "well_known_classes.h"
 | |
| 
 | |
| namespace art {
 | |
| 
 | |
| // This helper cannot be in the anonymous namespace because it needs to be
 | |
| // declared as a friend by JniVmExt and JniEnvExt.
 | |
| inline IndirectReferenceTable* GetIndirectReferenceTable(ScopedObjectAccess& soa,
 | |
|                                                          IndirectRefKind kind) {
 | |
|   DCHECK_NE(kind, kJniTransitionOrInvalid);
 | |
|   JNIEnvExt* env = soa.Env();
 | |
|   IndirectReferenceTable* irt =
 | |
|       (kind == kLocal) ? &env->locals_
 | |
|                        : ((kind == kGlobal) ? &env->vm_->globals_ : &env->vm_->weak_globals_);
 | |
|   DCHECK_EQ(irt->GetKind(), kind);
 | |
|   return irt;
 | |
| }
 | |
| 
 | |
| namespace {
 | |
| 
 | |
| using android::base::StringAppendF;
 | |
| using android::base::StringPrintf;
 | |
| 
 | |
| /*
 | |
|  * ===========================================================================
 | |
|  *      JNI function helpers
 | |
|  * ===========================================================================
 | |
|  */
 | |
| 
 | |
| // Warn if a JNI critical is held for longer than 16ms.
 | |
| static constexpr uint64_t kCriticalWarnTimeUs = MsToUs(16);
 | |
| static_assert(kCriticalWarnTimeUs > 0, "No JNI critical warn time set");
 | |
| 
 | |
| // True if primitives within specific ranges cause a fatal error,
 | |
| // otherwise just warn.
 | |
| static constexpr bool kBrokenPrimitivesAreFatal = kIsDebugBuild;
 | |
| 
 | |
| // Flags passed into ScopedCheck.
 | |
| static constexpr uint16_t kFlag_Default = 0x0000;
 | |
| 
 | |
| // Calling while in critical is not allowed.
 | |
| static constexpr uint16_t kFlag_CritBad = 0x0000;
 | |
| // Calling while in critical is allowed.
 | |
| static constexpr uint16_t kFlag_CritOkay = 0x0001;
 | |
| // This is a critical "get".
 | |
| static constexpr uint16_t kFlag_CritGet = 0x0002;
 | |
| // This is a critical "release".
 | |
| static constexpr uint16_t kFlag_CritRelease = 0x0003;
 | |
| // Bit mask to get "crit" value.
 | |
| static constexpr uint16_t kFlag_CritMask = 0x0003;
 | |
| 
 | |
| // Raised exceptions are allowed.
 | |
| static constexpr uint16_t kFlag_ExcepOkay = 0x0004;
 | |
| 
 | |
| // Are we in a non-critical release function?
 | |
| static constexpr uint16_t kFlag_Release = 0x0010;
 | |
| // Are our UTF parameters nullable?
 | |
| static constexpr uint16_t kFlag_NullableUtf = 0x0020;
 | |
| 
 | |
| // Part of the invocation interface (JavaVM*).
 | |
| static constexpr uint16_t kFlag_Invocation = 0x0100;
 | |
| 
 | |
| // Add this to a JNI function's flags if you want to trace every call.
 | |
| static constexpr uint16_t kFlag_ForceTrace = 0x8000;
 | |
| 
 | |
| class VarArgs;
 | |
| /*
 | |
|  * Java primitive types:
 | |
|  * B - jbyte
 | |
|  * C - jchar
 | |
|  * D - jdouble
 | |
|  * F - jfloat
 | |
|  * I - jint
 | |
|  * J - jlong
 | |
|  * S - jshort
 | |
|  * Z - jboolean (shown as true and false)
 | |
|  * V - void
 | |
|  *
 | |
|  * Java reference types:
 | |
|  * L - jobject
 | |
|  * a - jarray
 | |
|  * c - jclass
 | |
|  * s - jstring
 | |
|  * t - jthrowable
 | |
|  *
 | |
|  * JNI types:
 | |
|  * b - jboolean (shown as JNI_TRUE and JNI_FALSE)
 | |
|  * f - jfieldID
 | |
|  * i - JNI error value (JNI_OK, JNI_ERR, JNI_EDETACHED, JNI_EVERSION)
 | |
|  * m - jmethodID
 | |
|  * p - void*
 | |
|  * r - jint (for release mode arguments)
 | |
|  * u - const char* (Modified UTF-8)
 | |
|  * z - jsize (for lengths; use i if negative values are okay)
 | |
|  * v - JavaVM*
 | |
|  * w - jobjectRefType
 | |
|  * E - JNIEnv*
 | |
|  * . - no argument; just print "..." (used for varargs JNI calls)
 | |
|  *
 | |
|  */
 | |
| union JniValueType {
 | |
|   jarray a;
 | |
|   jboolean b;
 | |
|   jclass c;
 | |
|   jfieldID f;
 | |
|   jint i;
 | |
|   jmethodID m;
 | |
|   const void* p;  // Pointer.
 | |
|   jint r;  // Release mode.
 | |
|   jstring s;
 | |
|   jthrowable t;
 | |
|   const char* u;  // Modified UTF-8.
 | |
|   JavaVM* v;
 | |
|   jobjectRefType w;
 | |
|   jsize z;
 | |
|   jbyte B;
 | |
|   jchar C;
 | |
|   jdouble D;
 | |
|   JNIEnv* E;
 | |
|   jfloat F;
 | |
|   jint I;
 | |
|   jlong J;
 | |
|   jobject L;
 | |
|   jshort S;
 | |
|   const void* V;  // void
 | |
|   jboolean Z;
 | |
|   const VarArgs* va;
 | |
| };
 | |
| 
 | |
| /*
 | |
|  * A structure containing all the information needed to validate varargs arguments.
 | |
|  *
 | |
|  * Note that actually getting the arguments from this structure mutates it so should only be done on
 | |
|  * owned copies.
 | |
|  */
 | |
| class VarArgs {
 | |
|  public:
 | |
|   VarArgs(jmethodID m, va_list var) : m_(m), type_(kTypeVaList), cnt_(0) {
 | |
|     va_copy(vargs_, var);
 | |
|   }
 | |
| 
 | |
|   VarArgs(jmethodID m, const jvalue* vals) : m_(m), type_(kTypePtr), cnt_(0), ptr_(vals) {}
 | |
| 
 | |
|   ~VarArgs() {
 | |
|     if (type_ == kTypeVaList) {
 | |
|       va_end(vargs_);
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   VarArgs(VarArgs&& other) noexcept {
 | |
|     m_ = other.m_;
 | |
|     cnt_ = other.cnt_;
 | |
|     type_ = other.type_;
 | |
|     if (other.type_ == kTypeVaList) {
 | |
|       va_copy(vargs_, other.vargs_);
 | |
|     } else {
 | |
|       ptr_ = other.ptr_;
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   // This method is const because we need to ensure that one only uses the GetValue method on an
 | |
|   // owned copy of the VarArgs. This is because getting the next argument from a va_list is a
 | |
|   // mutating operation. Therefore we pass around these VarArgs with the 'const' qualifier and when
 | |
|   // we want to use one we need to Clone() it.
 | |
|   VarArgs Clone() const {
 | |
|     if (type_ == kTypeVaList) {
 | |
|       // const_cast needed to make sure the compiler is okay with va_copy, which (being a macro) is
 | |
|       // messed up if the source argument is not the exact type 'va_list'.
 | |
|       return VarArgs(m_, cnt_, const_cast<VarArgs*>(this)->vargs_);
 | |
|     } else {
 | |
|       return VarArgs(m_, cnt_, ptr_);
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   jmethodID GetMethodID() const {
 | |
|     return m_;
 | |
|   }
 | |
| 
 | |
|   JniValueType GetValue(char fmt) {
 | |
|     JniValueType o;
 | |
|     if (type_ == kTypeVaList) {
 | |
|       switch (fmt) {
 | |
|         // Assign a full int for va_list values as this is what is done in reflection.cc.
 | |
|         // TODO(b/73656264): avoid undefined behavior.
 | |
|         case 'Z': FALLTHROUGH_INTENDED;
 | |
|         case 'B': FALLTHROUGH_INTENDED;
 | |
|         case 'C': FALLTHROUGH_INTENDED;
 | |
|         case 'S': FALLTHROUGH_INTENDED;
 | |
|         case 'I': o.I = va_arg(vargs_, jint); break;
 | |
|         case 'J': o.J = va_arg(vargs_, jlong); break;
 | |
|         case 'F': o.F = static_cast<jfloat>(va_arg(vargs_, jdouble)); break;
 | |
|         case 'D': o.D = va_arg(vargs_, jdouble); break;
 | |
|         case 'L': o.L = va_arg(vargs_, jobject); break;
 | |
|         default:
 | |
|           LOG(FATAL) << "Illegal type format char " << fmt;
 | |
|           UNREACHABLE();
 | |
|       }
 | |
|     } else {
 | |
|       CHECK(type_ == kTypePtr);
 | |
|       jvalue v = ptr_[cnt_];
 | |
|       cnt_++;
 | |
|       switch (fmt) {
 | |
|         // Copy just the amount of the jvalue necessary, as done in
 | |
|         // reflection.cc, but extend to an int to be consistent with
 | |
|         // var args in CheckNonHeapValue.
 | |
|         // TODO(b/73656264): avoid undefined behavior.
 | |
|         case 'Z': o.I = v.z; break;
 | |
|         case 'B': o.I = v.b; break;
 | |
|         case 'C': o.I = v.c; break;
 | |
|         case 'S': o.I = v.s; break;
 | |
|         case 'I': o.I = v.i; break;
 | |
|         case 'J': o.J = v.j; break;
 | |
|         case 'F': o.F = v.f; break;
 | |
|         case 'D': o.D = v.d; break;
 | |
|         case 'L': o.L = v.l; break;
 | |
|         default:
 | |
|           LOG(FATAL) << "Illegal type format char " << fmt;
 | |
|           UNREACHABLE();
 | |
|       }
 | |
|     }
 | |
|     return o;
 | |
|   }
 | |
| 
 | |
|  private:
 | |
|   VarArgs(jmethodID m, uint32_t cnt, va_list var) : m_(m), type_(kTypeVaList), cnt_(cnt) {
 | |
|     va_copy(vargs_, var);
 | |
|   }
 | |
| 
 | |
|   VarArgs(jmethodID m, uint32_t cnt, const jvalue* vals) : m_(m), type_(kTypePtr), cnt_(cnt), ptr_(vals) {}
 | |
| 
 | |
|   enum VarArgsType {
 | |
|     kTypeVaList,
 | |
|     kTypePtr,
 | |
|   };
 | |
| 
 | |
|   jmethodID m_;
 | |
|   VarArgsType type_;
 | |
|   uint32_t cnt_;
 | |
|   union {
 | |
|     va_list vargs_;
 | |
|     const jvalue* ptr_;
 | |
|   };
 | |
| };
 | |
| 
 | |
| // Check whether the current thread is attached. This is usually required
 | |
| // to be the first check, as ScopedCheck needs a ScopedObjectAccess for
 | |
| // checking heap values (and that will fail with unattached threads).
 | |
| bool CheckAttachedThread(const char* function_name) {
 | |
|   Thread* self = Thread::Current();
 | |
|   if (UNLIKELY(self == nullptr)) {
 | |
|     // Need to attach this thread for a proper abort to work. We prefer this
 | |
|     // to get reasonable stacks and environment, rather than relying on
 | |
|     // tombstoned.
 | |
|     JNIEnv* env;
 | |
|     Runtime::Current()->GetJavaVM()->AttachCurrentThread(&env, /* thr_args= */ nullptr);
 | |
| 
 | |
|     std::string tmp = android::base::StringPrintf(
 | |
|         "a thread (tid %" PRId64 " is making JNI calls without being attached",
 | |
|         static_cast<int64_t>(GetTid()));
 | |
|     Runtime::Current()->GetJavaVM()->JniAbort(function_name, tmp.c_str());
 | |
| 
 | |
|     CHECK_NE(Runtime::Current()->GetJavaVM()->DetachCurrentThread(), JNI_ERR);
 | |
|     return false;
 | |
|   }
 | |
|   return true;
 | |
| }
 | |
| 
 | |
| // Macro helpers for the above.
 | |
| #define CHECK_ATTACHED_THREAD(function_name, fail_val)  \
 | |
|   do {                                                  \
 | |
|     if (!CheckAttachedThread((function_name))) {        \
 | |
|       return fail_val;                                  \
 | |
|     }                                                   \
 | |
|   } while (false)
 | |
| #define CHECK_ATTACHED_THREAD_VOID(function_name)       \
 | |
|   do {                                                  \
 | |
|     if (!CheckAttachedThread((function_name))) {        \
 | |
|       return;                                           \
 | |
|     }                                                   \
 | |
|   } while (false)
 | |
| 
 | |
| class ScopedCheck {
 | |
|  public:
 | |
|   ScopedCheck(uint16_t flags, const char* functionName, bool has_method = true)
 | |
|       : function_name_(functionName), indent_(0), flags_(flags), has_method_(has_method) {
 | |
|   }
 | |
| 
 | |
|   ~ScopedCheck() {}
 | |
| 
 | |
|   // Checks that 'class_name' is a valid "fully-qualified" JNI class name, like "java/lang/Thread"
 | |
|   // or "[Ljava/lang/Object;". A ClassLoader can actually normalize class names a couple of
 | |
|   // times, so using "java.lang.Thread" instead of "java/lang/Thread" might work in some
 | |
|   // circumstances, but this is incorrect.
 | |
|   bool CheckClassName(const char* class_name) {
 | |
|     if ((class_name == nullptr) || !IsValidJniClassName(class_name)) {
 | |
|       AbortF("illegal class name '%s'\n"
 | |
|              "    (should be of the form 'package/Class', [Lpackage/Class;' or '[[B')",
 | |
|              class_name);
 | |
|       return false;
 | |
|     }
 | |
|     return true;
 | |
|   }
 | |
| 
 | |
|   /*
 | |
|    * Verify that this instance field ID is valid for this object.
 | |
|    *
 | |
|    * Assumes "jobj" has already been validated.
 | |
|    */
 | |
|   bool CheckInstanceFieldID(ScopedObjectAccess& soa, jobject java_object, jfieldID fid)
 | |
|       REQUIRES_SHARED(Locks::mutator_lock_) {
 | |
|     ObjPtr<mirror::Object> o = soa.Decode<mirror::Object>(java_object);
 | |
|     if (o == nullptr) {
 | |
|       AbortF("field operation on NULL object: %p", java_object);
 | |
|       return false;
 | |
|     }
 | |
|     if (!Runtime::Current()->GetHeap()->IsValidObjectAddress(o.Ptr())) {
 | |
|       Runtime::Current()->GetHeap()->DumpSpaces(LOG_STREAM(ERROR));
 | |
|       AbortF("field operation on invalid %s: %p",
 | |
|              GetIndirectRefKindString(IndirectReferenceTable::GetIndirectRefKind(java_object)),
 | |
|              java_object);
 | |
|       return false;
 | |
|     }
 | |
| 
 | |
|     ArtField* f = CheckFieldID(fid);
 | |
|     if (f == nullptr) {
 | |
|       return false;
 | |
|     }
 | |
|     ObjPtr<mirror::Class> c = o->GetClass();
 | |
|     if (c->FindInstanceField(f->GetName(), f->GetTypeDescriptor()) == nullptr) {
 | |
|       AbortF("jfieldID %s not valid for an object of class %s",
 | |
|              f->PrettyField().c_str(), o->PrettyTypeOf().c_str());
 | |
|       return false;
 | |
|     }
 | |
|     return true;
 | |
|   }
 | |
| 
 | |
|   /*
 | |
|    * Verify that the pointer value is non-null.
 | |
|    */
 | |
|   bool CheckNonNull(const void* ptr) {
 | |
|     if (UNLIKELY(ptr == nullptr)) {
 | |
|       AbortF("non-nullable argument was NULL");
 | |
|       return false;
 | |
|     }
 | |
|     return true;
 | |
|   }
 | |
| 
 | |
|   /*
 | |
|    * Verify that the method's return type matches the type of call.
 | |
|    * 'expectedType' will be "L" for all objects, including arrays.
 | |
|    */
 | |
|   bool CheckMethodAndSig(ScopedObjectAccess& soa, jobject jobj, jclass jc,
 | |
|                          jmethodID mid, Primitive::Type type, InvokeType invoke)
 | |
|       REQUIRES_SHARED(Locks::mutator_lock_) {
 | |
|     ArtMethod* m = CheckMethodID(mid);
 | |
|     if (m == nullptr) {
 | |
|       return false;
 | |
|     }
 | |
|     if (type != Primitive::GetType(m->GetShorty()[0])) {
 | |
|       AbortF("the return type of %s does not match %s", function_name_, m->PrettyMethod().c_str());
 | |
|       return false;
 | |
|     }
 | |
|     bool is_static = (invoke == kStatic);
 | |
|     if (is_static != m->IsStatic()) {
 | |
|       if (is_static) {
 | |
|         AbortF("calling non-static method %s with %s",
 | |
|                m->PrettyMethod().c_str(), function_name_);
 | |
|       } else {
 | |
|         AbortF("calling static method %s with %s",
 | |
|                m->PrettyMethod().c_str(), function_name_);
 | |
|       }
 | |
|       return false;
 | |
|     }
 | |
|     if (invoke != kVirtual) {
 | |
|       ObjPtr<mirror::Class> c = soa.Decode<mirror::Class>(jc);
 | |
|       if (!m->GetDeclaringClass()->IsAssignableFrom(c)) {
 | |
|         AbortF("can't call %s %s with class %s", invoke == kStatic ? "static" : "nonvirtual",
 | |
|             m->PrettyMethod().c_str(), mirror::Class::PrettyClass(c).c_str());
 | |
|         return false;
 | |
|       }
 | |
|     }
 | |
|     if (invoke != kStatic) {
 | |
|       ObjPtr<mirror::Object> o = soa.Decode<mirror::Object>(jobj);
 | |
|       if (o == nullptr) {
 | |
|         AbortF("can't call %s on null object", m->PrettyMethod().c_str());
 | |
|         return false;
 | |
|       } else if (!o->InstanceOf(m->GetDeclaringClass())) {
 | |
|         AbortF("can't call %s on instance of %s", m->PrettyMethod().c_str(),
 | |
|                o->PrettyTypeOf().c_str());
 | |
|         return false;
 | |
|       }
 | |
|     }
 | |
|     return true;
 | |
|   }
 | |
| 
 | |
|   /*
 | |
|    * Verify that this static field ID is valid for this class.
 | |
|    *
 | |
|    * Assumes "java_class" has already been validated.
 | |
|    */
 | |
|   bool CheckStaticFieldID(ScopedObjectAccess& soa, jclass java_class, jfieldID fid)
 | |
|       REQUIRES_SHARED(Locks::mutator_lock_) {
 | |
|     ObjPtr<mirror::Class> c = soa.Decode<mirror::Class>(java_class);
 | |
|     ArtField* f = CheckFieldID(fid);
 | |
|     if (f == nullptr) {
 | |
|       return false;
 | |
|     }
 | |
|     if (!f->GetDeclaringClass()->IsAssignableFrom(c)) {
 | |
|       AbortF("static jfieldID %p not valid for class %s", fid,
 | |
|              mirror::Class::PrettyClass(c).c_str());
 | |
|       return false;
 | |
|     }
 | |
|     return true;
 | |
|   }
 | |
| 
 | |
|   /*
 | |
|    * Verify that "mid" is appropriate for "java_class".
 | |
|    *
 | |
|    * A mismatch isn't dangerous, because the jmethodID defines the class.  In
 | |
|    * fact, java_class is unused in the implementation.  It's best if we don't
 | |
|    * allow bad code in the system though.
 | |
|    *
 | |
|    * Instances of "java_class" must be instances of the method's declaring class.
 | |
|    */
 | |
|   bool CheckStaticMethod(ScopedObjectAccess& soa, jclass java_class, jmethodID mid)
 | |
|       REQUIRES_SHARED(Locks::mutator_lock_) {
 | |
|     ArtMethod* m = CheckMethodID(mid);
 | |
|     if (m == nullptr) {
 | |
|       return false;
 | |
|     }
 | |
|     ObjPtr<mirror::Class> c = soa.Decode<mirror::Class>(java_class);
 | |
|     if (!m->GetDeclaringClass()->IsAssignableFrom(c)) {
 | |
|       AbortF("can't call static %s on class %s", m->PrettyMethod().c_str(),
 | |
|              mirror::Class::PrettyClass(c).c_str());
 | |
|       return false;
 | |
|     }
 | |
|     return true;
 | |
|   }
 | |
| 
 | |
|   /*
 | |
|    * Verify that "mid" is appropriate for "jobj".
 | |
|    *
 | |
|    * Make sure the object is an instance of the method's declaring class.
 | |
|    * (Note the mid might point to a declaration in an interface; this
 | |
|    * will be handled automatically by the instanceof check.)
 | |
|    */
 | |
|   bool CheckVirtualMethod(ScopedObjectAccess& soa, jobject java_object, jmethodID mid)
 | |
|       REQUIRES_SHARED(Locks::mutator_lock_) {
 | |
|     ArtMethod* m = CheckMethodID(mid);
 | |
|     if (m == nullptr) {
 | |
|       return false;
 | |
|     }
 | |
|     ObjPtr<mirror::Object> o = soa.Decode<mirror::Object>(java_object);
 | |
|     if (o == nullptr) {
 | |
|       AbortF("can't call %s on null object", m->PrettyMethod().c_str());
 | |
|       return false;
 | |
|     } else if (!o->InstanceOf(m->GetDeclaringClass())) {
 | |
|       AbortF("can't call %s on instance of %s", m->PrettyMethod().c_str(),
 | |
|              o->PrettyTypeOf().c_str());
 | |
|       return false;
 | |
|     }
 | |
|     return true;
 | |
|   }
 | |
| 
 | |
|   /**
 | |
|    * The format string is a sequence of the following characters,
 | |
|    * and must be followed by arguments of the corresponding types
 | |
|    * in the same order.
 | |
|    *
 | |
|    * Java primitive types:
 | |
|    * B - jbyte
 | |
|    * C - jchar
 | |
|    * D - jdouble
 | |
|    * F - jfloat
 | |
|    * I - jint
 | |
|    * J - jlong
 | |
|    * S - jshort
 | |
|    * Z - jboolean (shown as true and false)
 | |
|    * V - void
 | |
|    *
 | |
|    * Java reference types:
 | |
|    * L - jobject
 | |
|    * a - jarray
 | |
|    * c - jclass
 | |
|    * s - jstring
 | |
|    *
 | |
|    * JNI types:
 | |
|    * b - jboolean (shown as JNI_TRUE and JNI_FALSE)
 | |
|    * f - jfieldID
 | |
|    * m - jmethodID
 | |
|    * p - void*
 | |
|    * r - jint (for release mode arguments)
 | |
|    * u - const char* (Modified UTF-8)
 | |
|    * z - jsize (for lengths; use i if negative values are okay)
 | |
|    * v - JavaVM*
 | |
|    * E - JNIEnv*
 | |
|    * . - VarArgs* for Jni calls with variable length arguments
 | |
|    *
 | |
|    * Use the kFlag_NullableUtf flag where 'u' field(s) are nullable.
 | |
|    */
 | |
|   bool Check(ScopedObjectAccess& soa, bool entry, const char* fmt, JniValueType* args)
 | |
|       REQUIRES_SHARED(Locks::mutator_lock_) {
 | |
|     ArtMethod* traceMethod = nullptr;
 | |
|     if (has_method_ && soa.Vm()->IsTracingEnabled()) {
 | |
|       // We need to guard some of the invocation interface's calls: a bad caller might
 | |
|       // use DetachCurrentThread or GetEnv on a thread that's not yet attached.
 | |
|       Thread* self = Thread::Current();
 | |
|       if ((flags_ & kFlag_Invocation) == 0 || self != nullptr) {
 | |
|         traceMethod = self->GetCurrentMethod(nullptr);
 | |
|       }
 | |
|     }
 | |
| 
 | |
|     if (((flags_ & kFlag_ForceTrace) != 0) ||
 | |
|         (traceMethod != nullptr && soa.Vm()->ShouldTrace(traceMethod))) {
 | |
|       std::string msg;
 | |
|       for (size_t i = 0; fmt[i] != '\0'; ++i) {
 | |
|         TracePossibleHeapValue(soa, entry, fmt[i], args[i], &msg);
 | |
|         if (fmt[i + 1] != '\0') {
 | |
|           StringAppendF(&msg, ", ");
 | |
|         }
 | |
|       }
 | |
| 
 | |
|       if ((flags_ & kFlag_ForceTrace) != 0) {
 | |
|         LOG(INFO) << "JNI: call to " << function_name_ << "(" << msg << ")";
 | |
|       } else if (entry) {
 | |
|         if (has_method_) {
 | |
|           std::string methodName(ArtMethod::PrettyMethod(traceMethod, false));
 | |
|           LOG(INFO) << "JNI: " << methodName << " -> " << function_name_ << "(" << msg << ")";
 | |
|           indent_ = methodName.size() + 1;
 | |
|         } else {
 | |
|           LOG(INFO) << "JNI: -> " << function_name_ << "(" << msg << ")";
 | |
|           indent_ = 0;
 | |
|         }
 | |
|       } else {
 | |
|         LOG(INFO) << StringPrintf("JNI: %*s<- %s returned %s", indent_, "", function_name_, msg.c_str());
 | |
|       }
 | |
|     }
 | |
| 
 | |
|     // We always do the thorough checks on entry, and never on exit...
 | |
|     if (entry) {
 | |
|       for (size_t i = 0; fmt[i] != '\0'; ++i) {
 | |
|         if (!CheckPossibleHeapValue(soa, fmt[i], args[i])) {
 | |
|           return false;
 | |
|         }
 | |
|       }
 | |
|     }
 | |
|     return true;
 | |
|   }
 | |
| 
 | |
|   bool CheckNonHeap(JavaVMExt* vm, bool entry, const char* fmt, JniValueType* args) {
 | |
|     bool should_trace = (flags_ & kFlag_ForceTrace) != 0;
 | |
|     if (!should_trace && vm != nullptr && vm->IsTracingEnabled()) {
 | |
|       // We need to guard some of the invocation interface's calls: a bad caller might
 | |
|       // use DetachCurrentThread or GetEnv on a thread that's not yet attached.
 | |
|       Thread* self = Thread::Current();
 | |
|       if ((flags_ & kFlag_Invocation) == 0 || self != nullptr) {
 | |
|         ScopedObjectAccess soa(self);
 | |
|         ArtMethod* traceMethod = self->GetCurrentMethod(nullptr);
 | |
|         should_trace = (traceMethod != nullptr && vm->ShouldTrace(traceMethod));
 | |
|       }
 | |
|     }
 | |
|     if (should_trace) {
 | |
|       std::string msg;
 | |
|       for (size_t i = 0; fmt[i] != '\0'; ++i) {
 | |
|         TraceNonHeapValue(fmt[i], args[i], &msg);
 | |
|         if (fmt[i + 1] != '\0') {
 | |
|           StringAppendF(&msg, ", ");
 | |
|         }
 | |
|       }
 | |
| 
 | |
|       if ((flags_ & kFlag_ForceTrace) != 0) {
 | |
|         LOG(INFO) << "JNI: call to " << function_name_ << "(" << msg << ")";
 | |
|       } else if (entry) {
 | |
|         if (has_method_) {
 | |
|           Thread* self = Thread::Current();
 | |
|           ScopedObjectAccess soa(self);
 | |
|           ArtMethod* traceMethod = self->GetCurrentMethod(nullptr);
 | |
|           std::string methodName(ArtMethod::PrettyMethod(traceMethod, false));
 | |
|           LOG(INFO) << "JNI: " << methodName << " -> " << function_name_ << "(" << msg << ")";
 | |
|           indent_ = methodName.size() + 1;
 | |
|         } else {
 | |
|           LOG(INFO) << "JNI: -> " << function_name_ << "(" << msg << ")";
 | |
|           indent_ = 0;
 | |
|         }
 | |
|       } else {
 | |
|         LOG(INFO) << StringPrintf("JNI: %*s<- %s returned %s", indent_, "", function_name_, msg.c_str());
 | |
|       }
 | |
|     }
 | |
| 
 | |
|     // We always do the thorough checks on entry, and never on exit...
 | |
|     if (entry) {
 | |
|       for (size_t i = 0; fmt[i] != '\0'; ++i) {
 | |
|         if (!CheckNonHeapValue(fmt[i], args[i])) {
 | |
|           return false;
 | |
|         }
 | |
|       }
 | |
|     }
 | |
|     return true;
 | |
|   }
 | |
| 
 | |
|   bool CheckReflectedMethod(ScopedObjectAccess& soa, jobject jmethod)
 | |
|       REQUIRES_SHARED(Locks::mutator_lock_) {
 | |
|     ObjPtr<mirror::Object> method = soa.Decode<mirror::Object>(jmethod);
 | |
|     if (method == nullptr) {
 | |
|       AbortF("expected non-null method");
 | |
|       return false;
 | |
|     }
 | |
|     ObjPtr<mirror::ObjectArray<mirror::Class>> class_roots =
 | |
|         Runtime::Current()->GetClassLinker()->GetClassRoots();
 | |
|     ObjPtr<mirror::Class> c = method->GetClass();
 | |
|     if (c != GetClassRoot<mirror::Method>(class_roots) &&
 | |
|         c != GetClassRoot<mirror::Constructor>(class_roots)) {
 | |
|       AbortF("expected java.lang.reflect.Method or "
 | |
|           "java.lang.reflect.Constructor but got object of type %s: %p",
 | |
|           method->PrettyTypeOf().c_str(), jmethod);
 | |
|       return false;
 | |
|     }
 | |
|     return true;
 | |
|   }
 | |
| 
 | |
|   bool CheckConstructor(jmethodID mid) REQUIRES_SHARED(Locks::mutator_lock_) {
 | |
|     ArtMethod* method = jni::DecodeArtMethod(mid);
 | |
|     if (method == nullptr) {
 | |
|       AbortF("expected non-null constructor");
 | |
|       return false;
 | |
|     }
 | |
|     if (!method->IsConstructor() || method->IsStatic()) {
 | |
|       AbortF("expected a constructor but %s: %p", method->PrettyMethod().c_str(), mid);
 | |
|       return false;
 | |
|     }
 | |
|     return true;
 | |
|   }
 | |
| 
 | |
|   bool CheckReflectedField(ScopedObjectAccess& soa, jobject jfield)
 | |
|       REQUIRES_SHARED(Locks::mutator_lock_) {
 | |
|     ObjPtr<mirror::Object> field = soa.Decode<mirror::Object>(jfield);
 | |
|     if (field == nullptr) {
 | |
|       AbortF("expected non-null java.lang.reflect.Field");
 | |
|       return false;
 | |
|     }
 | |
|     ObjPtr<mirror::Class> c = field->GetClass();
 | |
|     if (GetClassRoot<mirror::Field>() != c) {
 | |
|       AbortF("expected java.lang.reflect.Field but got object of type %s: %p",
 | |
|              field->PrettyTypeOf().c_str(), jfield);
 | |
|       return false;
 | |
|     }
 | |
|     return true;
 | |
|   }
 | |
| 
 | |
|   bool CheckThrowable(ScopedObjectAccess& soa, jthrowable jobj)
 | |
|       REQUIRES_SHARED(Locks::mutator_lock_) {
 | |
|     ObjPtr<mirror::Object> obj = soa.Decode<mirror::Object>(jobj);
 | |
|     if (!obj->GetClass()->IsThrowableClass()) {
 | |
|       AbortF("expected java.lang.Throwable but got object of type "
 | |
|              "%s: %p", obj->PrettyTypeOf().c_str(), obj.Ptr());
 | |
|       return false;
 | |
|     }
 | |
|     return true;
 | |
|   }
 | |
| 
 | |
|   bool CheckThrowableClass(ScopedObjectAccess& soa, jclass jc)
 | |
|       REQUIRES_SHARED(Locks::mutator_lock_) {
 | |
|     ObjPtr<mirror::Class> c = soa.Decode<mirror::Class>(jc);
 | |
|     if (!c->IsThrowableClass()) {
 | |
|       AbortF("expected java.lang.Throwable class but got object of "
 | |
|              "type %s: %p", c->PrettyDescriptor().c_str(), c.Ptr());
 | |
|       return false;
 | |
|     }
 | |
|     return true;
 | |
|   }
 | |
| 
 | |
|   bool CheckReferenceKind(IndirectRefKind expected_kind, Thread* self, jobject obj)
 | |
|       REQUIRES_SHARED(Locks::mutator_lock_) {
 | |
|     IndirectRefKind found_kind;
 | |
|     if (expected_kind == kLocal) {
 | |
|       found_kind = IndirectReferenceTable::GetIndirectRefKind(obj);
 | |
|       if (found_kind == kJniTransitionOrInvalid &&
 | |
|           obj != nullptr &&
 | |
|           self->IsJniTransitionReference(obj)) {
 | |
|         found_kind = kLocal;
 | |
|       }
 | |
|     } else {
 | |
|       found_kind = IndirectReferenceTable::GetIndirectRefKind(obj);
 | |
|     }
 | |
|     if (obj != nullptr && found_kind != expected_kind) {
 | |
|       AbortF("expected reference of kind %s but found %s: %p",
 | |
|              GetIndirectRefKindString(expected_kind),
 | |
|              GetIndirectRefKindString(IndirectReferenceTable::GetIndirectRefKind(obj)),
 | |
|              obj);
 | |
|       return false;
 | |
|     }
 | |
|     return true;
 | |
|   }
 | |
| 
 | |
|   bool CheckInstantiableNonArray(ScopedObjectAccess& soa, jclass jc)
 | |
|       REQUIRES_SHARED(Locks::mutator_lock_) {
 | |
|     ObjPtr<mirror::Class> c = soa.Decode<mirror::Class>(jc);
 | |
|     if (!c->IsInstantiableNonArray()) {
 | |
|       AbortF("can't make objects of type %s: %p", c->PrettyDescriptor().c_str(), c.Ptr());
 | |
|       return false;
 | |
|     }
 | |
|     return true;
 | |
|   }
 | |
| 
 | |
|   bool CheckPrimitiveArrayType(ScopedObjectAccess& soa, jarray array, Primitive::Type type)
 | |
|       REQUIRES_SHARED(Locks::mutator_lock_) {
 | |
|     if (!CheckArray(soa, array)) {
 | |
|       return false;
 | |
|     }
 | |
|     ObjPtr<mirror::Array> a = soa.Decode<mirror::Array>(array);
 | |
|     if (a->GetClass()->GetComponentType()->GetPrimitiveType() != type) {
 | |
|       AbortF("incompatible array type %s expected %s[]: %p",
 | |
|              a->GetClass()->PrettyDescriptor().c_str(), PrettyDescriptor(type).c_str(), array);
 | |
|       return false;
 | |
|     }
 | |
|     return true;
 | |
|   }
 | |
| 
 | |
|   bool CheckFieldAccess(ScopedObjectAccess& soa, jobject obj, jfieldID fid, bool is_static,
 | |
|                         Primitive::Type type)
 | |
|       REQUIRES_SHARED(Locks::mutator_lock_) {
 | |
|     if (is_static && !CheckStaticFieldID(soa, down_cast<jclass>(obj), fid)) {
 | |
|       return false;
 | |
|     }
 | |
|     if (!is_static && !CheckInstanceFieldID(soa, obj, fid)) {
 | |
|       return false;
 | |
|     }
 | |
|     ArtField* field = jni::DecodeArtField(fid);
 | |
|     DCHECK(field != nullptr);  // Already checked by Check.
 | |
|     if (is_static != field->IsStatic()) {
 | |
|       AbortF("attempt to access %s field %s: %p",
 | |
|              field->IsStatic() ? "static" : "non-static", field->PrettyField().c_str(), fid);
 | |
|       return false;
 | |
|     }
 | |
|     if (type != field->GetTypeAsPrimitiveType()) {
 | |
|       AbortF("attempt to access field %s of type %s with the wrong type %s: %p",
 | |
|              field->PrettyField().c_str(),
 | |
|              PrettyDescriptor(field->GetTypeDescriptor()).c_str(),
 | |
|              PrettyDescriptor(type).c_str(), fid);
 | |
|       return false;
 | |
|     }
 | |
|     if (is_static) {
 | |
|       ObjPtr<mirror::Object> o = soa.Decode<mirror::Object>(obj);
 | |
|       if (o == nullptr || !o->IsClass()) {
 | |
|         AbortF("attempt to access static field %s with a class argument of type %s: %p",
 | |
|                field->PrettyField().c_str(), o->PrettyTypeOf().c_str(), fid);
 | |
|         return false;
 | |
|       }
 | |
|       ObjPtr<mirror::Class> c = o->AsClass();
 | |
|       if (!field->GetDeclaringClass()->IsAssignableFrom(c)) {
 | |
|         AbortF("attempt to access static field %s with an incompatible class argument of %s: %p",
 | |
|                field->PrettyField().c_str(), mirror::Class::PrettyDescriptor(c).c_str(), fid);
 | |
|         return false;
 | |
|       }
 | |
|     } else {
 | |
|       ObjPtr<mirror::Object> o = soa.Decode<mirror::Object>(obj);
 | |
|       if (o == nullptr || !field->GetDeclaringClass()->IsAssignableFrom(o->GetClass())) {
 | |
|         AbortF("attempt to access field %s from an object argument of type %s: %p",
 | |
|                field->PrettyField().c_str(), o->PrettyTypeOf().c_str(), fid);
 | |
|         return false;
 | |
|       }
 | |
|     }
 | |
|     return true;
 | |
|   }
 | |
| 
 | |
|  private:
 | |
|   enum InstanceKind {
 | |
|     kClass,
 | |
|     kDirectByteBuffer,
 | |
|     kObject,
 | |
|     kString,
 | |
|     kThrowable,
 | |
|   };
 | |
| 
 | |
|   /*
 | |
|    * Verify that "jobj" is a valid non-null object reference, and points to
 | |
|    * an instance of expectedClass.
 | |
|    *
 | |
|    * Because we're looking at an object on the GC heap, we have to switch
 | |
|    * to "running" mode before doing the checks.
 | |
|    */
 | |
|   bool CheckInstance(ScopedObjectAccess& soa, InstanceKind kind, jobject java_object, bool null_ok)
 | |
|       REQUIRES_SHARED(Locks::mutator_lock_) {
 | |
|     const char* what = nullptr;
 | |
|     switch (kind) {
 | |
|     case kClass:
 | |
|       what = "jclass";
 | |
|       break;
 | |
|     case kDirectByteBuffer:
 | |
|       what = "direct ByteBuffer";
 | |
|       break;
 | |
|     case kObject:
 | |
|       what = "jobject";
 | |
|       break;
 | |
|     case kString:
 | |
|       what = "jstring";
 | |
|       break;
 | |
|     case kThrowable:
 | |
|       what = "jthrowable";
 | |
|       break;
 | |
|     default:
 | |
|       LOG(FATAL) << "Unknown kind " << static_cast<int>(kind);
 | |
|     }
 | |
| 
 | |
|     if (java_object == nullptr) {
 | |
|       if (null_ok) {
 | |
|         return true;
 | |
|       } else {
 | |
|         AbortF("%s received NULL %s", function_name_, what);
 | |
|         return false;
 | |
|       }
 | |
|     }
 | |
| 
 | |
|     ObjPtr<mirror::Object> obj = nullptr;
 | |
|     IndirectRef ref = reinterpret_cast<IndirectRef>(java_object);
 | |
|     IndirectRefKind ref_kind = IndirectReferenceTable::GetIndirectRefKind(ref);
 | |
|     bool expect_null = false;
 | |
|     bool okay = true;
 | |
|     std::string error_msg;
 | |
|     if (ref_kind == kJniTransitionOrInvalid) {
 | |
|       if (!soa.Self()->IsJniTransitionReference(java_object)) {
 | |
|         okay = false;
 | |
|         error_msg = "use of invalid jobject";
 | |
|       } else {
 | |
|         obj = soa.Decode<mirror::Object>(java_object);
 | |
|       }
 | |
|     } else {
 | |
|       IndirectReferenceTable* irt = GetIndirectReferenceTable(soa, ref_kind);
 | |
|       okay = irt->IsValidReference(java_object, &error_msg);
 | |
|       DCHECK_EQ(okay, error_msg.empty());
 | |
|       if (okay) {
 | |
|         // Note: The `IsValidReference()` checks for null but we do not prevent races,
 | |
|         // so the null check below can still fail. Even if it succeeds, another thread
 | |
|         // could delete the global or weak global before it's used by JNI.
 | |
|         if (ref_kind == kLocal) {
 | |
|           // Local references do not need a read barrier.
 | |
|           obj = irt->Get<kWithoutReadBarrier>(ref);
 | |
|         } else if (ref_kind == kGlobal) {
 | |
|           obj = soa.Env()->GetVm()->DecodeGlobal(ref);
 | |
|         } else {
 | |
|           obj = soa.Env()->GetVm()->DecodeWeakGlobal(soa.Self(), ref);
 | |
|           if (Runtime::Current()->IsClearedJniWeakGlobal(obj)) {
 | |
|             obj = nullptr;
 | |
|             expect_null = true;
 | |
|           }
 | |
|         }
 | |
|       }
 | |
|     }
 | |
|     if (okay) {
 | |
|       if (!expect_null && obj == nullptr) {
 | |
|         okay = false;
 | |
|         error_msg = "deleted reference";
 | |
|       }
 | |
|       if (expect_null && !null_ok) {
 | |
|         okay = false;
 | |
|         error_msg = "cleared weak reference";
 | |
|       }
 | |
|     }
 | |
|     if (!okay) {
 | |
|       AbortF("JNI ERROR (app bug): %s is an invalid %s: %p (%s)",
 | |
|              what,
 | |
|              ToStr<IndirectRefKind>(ref_kind).c_str(),
 | |
|              java_object,
 | |
|              error_msg.c_str());
 | |
|       return false;
 | |
|     }
 | |
| 
 | |
|     if (!Runtime::Current()->GetHeap()->IsValidObjectAddress(obj.Ptr())) {
 | |
|       Runtime::Current()->GetHeap()->DumpSpaces(LOG_STREAM(ERROR));
 | |
|       AbortF("%s is an invalid %s: %p (%p)",
 | |
|              what,
 | |
|              GetIndirectRefKindString(IndirectReferenceTable::GetIndirectRefKind(java_object)),
 | |
|              java_object,
 | |
|              obj.Ptr());
 | |
|       return false;
 | |
|     }
 | |
| 
 | |
|     switch (kind) {
 | |
|     case kClass:
 | |
|       okay = obj->IsClass();
 | |
|       break;
 | |
|     case kDirectByteBuffer:
 | |
|       UNIMPLEMENTED(FATAL);
 | |
|       UNREACHABLE();
 | |
|     case kString:
 | |
|       okay = obj->GetClass()->IsStringClass();
 | |
|       break;
 | |
|     case kThrowable:
 | |
|       okay = obj->GetClass()->IsThrowableClass();
 | |
|       break;
 | |
|     case kObject:
 | |
|       break;
 | |
|     }
 | |
|     if (!okay) {
 | |
|       AbortF("%s has wrong type: %s", what, mirror::Object::PrettyTypeOf(obj).c_str());
 | |
|       return false;
 | |
|     }
 | |
| 
 | |
|     return true;
 | |
|   }
 | |
| 
 | |
|   /*
 | |
|    * Verify that the "mode" argument passed to a primitive array Release
 | |
|    * function is one of the valid values.
 | |
|    */
 | |
|   bool CheckReleaseMode(jint mode) {
 | |
|     if (mode != 0 && mode != JNI_COMMIT && mode != JNI_ABORT) {
 | |
|       AbortF("unknown value for release mode: %d", mode);
 | |
|       return false;
 | |
|     }
 | |
|     return true;
 | |
|   }
 | |
| 
 | |
|   bool CheckPossibleHeapValue(ScopedObjectAccess& soa, char fmt, JniValueType arg)
 | |
|       REQUIRES_SHARED(Locks::mutator_lock_) {
 | |
|     switch (fmt) {
 | |
|       case 'a':  // jarray
 | |
|         return CheckArray(soa, arg.a);
 | |
|       case 'c':  // jclass
 | |
|         return CheckInstance(soa, kClass, arg.c, false);
 | |
|       case 'f':  // jfieldID
 | |
|         return CheckFieldID(arg.f) != nullptr;
 | |
|       case 'm':  // jmethodID
 | |
|         return CheckMethodID(arg.m) != nullptr;
 | |
|       case 'r':  // release int
 | |
|         return CheckReleaseMode(arg.r);
 | |
|       case 's':  // jstring
 | |
|         return CheckInstance(soa, kString, arg.s, false);
 | |
|       case 't':  // jthrowable
 | |
|         return CheckInstance(soa, kThrowable, arg.t, false);
 | |
|       case 'E':  // JNIEnv*
 | |
|         return CheckThread(arg.E);
 | |
|       case 'L':  // jobject
 | |
|         return CheckInstance(soa, kObject, arg.L, true);
 | |
|       case '.':  // A VarArgs list
 | |
|         return CheckVarArgs(soa, arg.va);
 | |
|       default:
 | |
|         return CheckNonHeapValue(fmt, arg);
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   bool CheckVarArgs(ScopedObjectAccess& soa, const VarArgs* args_p)
 | |
|       REQUIRES_SHARED(Locks::mutator_lock_) {
 | |
|     CHECK(args_p != nullptr);
 | |
|     VarArgs args(args_p->Clone());
 | |
|     ArtMethod* m = CheckMethodID(args.GetMethodID());
 | |
|     if (m == nullptr) {
 | |
|       return false;
 | |
|     }
 | |
|     uint32_t len = 0;
 | |
|     const char* shorty = m->GetShorty(&len);
 | |
|     // Skip the return type
 | |
|     CHECK_GE(len, 1u);
 | |
|     len--;
 | |
|     shorty++;
 | |
|     for (uint32_t i = 0; i < len; i++) {
 | |
|       if (!CheckPossibleHeapValue(soa, shorty[i], args.GetValue(shorty[i]))) {
 | |
|         return false;
 | |
|       }
 | |
|     }
 | |
|     return true;
 | |
|   }
 | |
| 
 | |
|   bool CheckNonHeapValue(char fmt, JniValueType arg) {
 | |
|     switch (fmt) {
 | |
|       case 'p':  // TODO: pointer - null or readable?
 | |
|       case 'v':  // JavaVM*
 | |
|       case 'D':  // jdouble
 | |
|       case 'F':  // jfloat
 | |
|       case 'J':  // jlong
 | |
|       case 'I':  // jint
 | |
|         break;  // Ignored.
 | |
|       case 'b':  // jboolean, why two? Fall-through.
 | |
|       case 'Z':
 | |
|         return CheckBoolean(arg.I);
 | |
|       case 'B':  // jbyte
 | |
|         return CheckByte(arg.I);
 | |
|       case 'C':  // jchar
 | |
|         return CheckChar(arg.I);
 | |
|       case 'S':  // jshort
 | |
|         return CheckShort(arg.I);
 | |
|       case 'u':  // utf8
 | |
|         if ((flags_ & kFlag_Release) != 0) {
 | |
|           return CheckNonNull(arg.u);
 | |
|         } else {
 | |
|           bool nullable = ((flags_ & kFlag_NullableUtf) != 0);
 | |
|           return CheckUtfString(arg.u, nullable);
 | |
|         }
 | |
|       case 'w':  // jobjectRefType
 | |
|         switch (arg.w) {
 | |
|           case JNIInvalidRefType:
 | |
|           case JNILocalRefType:
 | |
|           case JNIGlobalRefType:
 | |
|           case JNIWeakGlobalRefType:
 | |
|             break;
 | |
|           default:
 | |
|             AbortF("Unknown reference type");
 | |
|             return false;
 | |
|         }
 | |
|         break;
 | |
|       case 'z':  // jsize
 | |
|         return CheckLengthPositive(arg.z);
 | |
|       default:
 | |
|         AbortF("unknown format specifier: '%c'", fmt);
 | |
|         return false;
 | |
|     }
 | |
|     return true;
 | |
|   }
 | |
| 
 | |
|   void TracePossibleHeapValue(ScopedObjectAccess& soa, bool entry, char fmt, JniValueType arg,
 | |
|                               std::string* msg)
 | |
|       REQUIRES_SHARED(Locks::mutator_lock_) {
 | |
|     switch (fmt) {
 | |
|       case 'L':  // jobject fall-through.
 | |
|       case 'a':  // jarray fall-through.
 | |
|       case 's':  // jstring fall-through.
 | |
|       case 't':  // jthrowable fall-through.
 | |
|         if (arg.L == nullptr) {
 | |
|           *msg += "NULL";
 | |
|         } else {
 | |
|           StringAppendF(msg, "%p", arg.L);
 | |
|         }
 | |
|         break;
 | |
|       case 'c': {  // jclass
 | |
|         jclass jc = arg.c;
 | |
|         ObjPtr<mirror::Class> c = soa.Decode<mirror::Class>(jc);
 | |
|         if (c == nullptr) {
 | |
|           *msg += "NULL";
 | |
|         } else if (!Runtime::Current()->GetHeap()->IsValidObjectAddress(c.Ptr())) {
 | |
|           StringAppendF(msg, "INVALID POINTER:%p", jc);
 | |
|         } else if (!c->IsClass()) {
 | |
|           *msg += "INVALID NON-CLASS OBJECT OF TYPE:" + c->PrettyTypeOf();
 | |
|         } else {
 | |
|           *msg += c->PrettyClass();
 | |
|           if (!entry) {
 | |
|             StringAppendF(msg, " (%p)", jc);
 | |
|           }
 | |
|         }
 | |
|         break;
 | |
|       }
 | |
|       case 'f': {  // jfieldID
 | |
|         jfieldID fid = arg.f;
 | |
|         ArtField* f = jni::DecodeArtField(fid);
 | |
|         *msg += ArtField::PrettyField(f);
 | |
|         if (!entry) {
 | |
|           StringAppendF(msg, " (%p)", fid);
 | |
|         }
 | |
|         break;
 | |
|       }
 | |
|       case 'm': {  // jmethodID
 | |
|         jmethodID mid = arg.m;
 | |
|         ArtMethod* m = jni::DecodeArtMethod(mid);
 | |
|         *msg += ArtMethod::PrettyMethod(m);
 | |
|         if (!entry) {
 | |
|           StringAppendF(msg, " (%p)", mid);
 | |
|         }
 | |
|         break;
 | |
|       }
 | |
|       case '.': {
 | |
|         const VarArgs* va = arg.va;
 | |
|         VarArgs args(va->Clone());
 | |
|         ArtMethod* m = jni::DecodeArtMethod(args.GetMethodID());
 | |
|         uint32_t len;
 | |
|         const char* shorty = m->GetShorty(&len);
 | |
|         CHECK_GE(len, 1u);
 | |
|         // Skip past return value.
 | |
|         len--;
 | |
|         shorty++;
 | |
|         // Remove the previous ', ' from the message.
 | |
|         msg->erase(msg->length() - 2);
 | |
|         for (uint32_t i = 0; i < len; i++) {
 | |
|           *msg += ", ";
 | |
|           TracePossibleHeapValue(soa, entry, shorty[i], args.GetValue(shorty[i]), msg);
 | |
|         }
 | |
|         break;
 | |
|       }
 | |
|       default:
 | |
|         TraceNonHeapValue(fmt, arg, msg);
 | |
|         break;
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   void TraceNonHeapValue(char fmt, JniValueType arg, std::string* msg) {
 | |
|     switch (fmt) {
 | |
|       case 'B':  // jbyte
 | |
|         if (arg.B >= 0 && arg.B < 10) {
 | |
|           StringAppendF(msg, "%d", arg.B);
 | |
|         } else {
 | |
|           StringAppendF(msg, "%#x (%d)", arg.B, arg.B);
 | |
|         }
 | |
|         break;
 | |
|       case 'C':  // jchar
 | |
|         if (arg.C < 0x7f && arg.C >= ' ') {
 | |
|           StringAppendF(msg, "U+%x ('%c')", arg.C, arg.C);
 | |
|         } else {
 | |
|           StringAppendF(msg, "U+%x", arg.C);
 | |
|         }
 | |
|         break;
 | |
|       case 'F':  // jfloat
 | |
|         StringAppendF(msg, "%g", arg.F);
 | |
|         break;
 | |
|       case 'D':  // jdouble
 | |
|         StringAppendF(msg, "%g", arg.D);
 | |
|         break;
 | |
|       case 'S':  // jshort
 | |
|         StringAppendF(msg, "%d", arg.S);
 | |
|         break;
 | |
|       case 'i':  // jint - fall-through.
 | |
|       case 'I':  // jint
 | |
|         StringAppendF(msg, "%d", arg.I);
 | |
|         break;
 | |
|       case 'J':  // jlong
 | |
|         StringAppendF(msg, "%" PRId64, arg.J);
 | |
|         break;
 | |
|       case 'Z':  // jboolean
 | |
|       case 'b':  // jboolean (JNI-style)
 | |
|         *msg += arg.b == JNI_TRUE ? "true" : "false";
 | |
|         break;
 | |
|       case 'V':  // void
 | |
|         DCHECK(arg.V == nullptr);
 | |
|         *msg += "void";
 | |
|         break;
 | |
|       case 'v':  // JavaVM*
 | |
|         StringAppendF(msg, "(JavaVM*)%p", arg.v);
 | |
|         break;
 | |
|       case 'E':
 | |
|         StringAppendF(msg, "(JNIEnv*)%p", arg.E);
 | |
|         break;
 | |
|       case 'z':  // non-negative jsize
 | |
|         // You might expect jsize to be size_t, but it's not; it's the same as jint.
 | |
|         // We only treat this specially so we can do the non-negative check.
 | |
|         // TODO: maybe this wasn't worth it?
 | |
|         StringAppendF(msg, "%d", arg.z);
 | |
|         break;
 | |
|       case 'p':  // void* ("pointer")
 | |
|         if (arg.p == nullptr) {
 | |
|           *msg += "NULL";
 | |
|         } else {
 | |
|           StringAppendF(msg, "(void*) %p", arg.p);
 | |
|         }
 | |
|         break;
 | |
|       case 'r': {  // jint (release mode)
 | |
|         jint releaseMode = arg.r;
 | |
|         if (releaseMode == 0) {
 | |
|           *msg += "0";
 | |
|         } else if (releaseMode == JNI_ABORT) {
 | |
|           *msg += "JNI_ABORT";
 | |
|         } else if (releaseMode == JNI_COMMIT) {
 | |
|           *msg += "JNI_COMMIT";
 | |
|         } else {
 | |
|           StringAppendF(msg, "invalid release mode %d", releaseMode);
 | |
|         }
 | |
|         break;
 | |
|       }
 | |
|       case 'u':  // const char* (Modified UTF-8)
 | |
|         if (arg.u == nullptr) {
 | |
|           *msg += "NULL";
 | |
|         } else {
 | |
|           StringAppendF(msg, "\"%s\"", arg.u);
 | |
|         }
 | |
|         break;
 | |
|       case 'w':  // jobjectRefType
 | |
|         switch (arg.w) {
 | |
|           case JNIInvalidRefType:
 | |
|             *msg += "invalid reference type";
 | |
|             break;
 | |
|           case JNILocalRefType:
 | |
|             *msg += "local ref type";
 | |
|             break;
 | |
|           case JNIGlobalRefType:
 | |
|             *msg += "global ref type";
 | |
|             break;
 | |
|           case JNIWeakGlobalRefType:
 | |
|             *msg += "weak global ref type";
 | |
|             break;
 | |
|           default:
 | |
|             *msg += "unknown ref type";
 | |
|             break;
 | |
|         }
 | |
|         break;
 | |
|       default:
 | |
|         LOG(FATAL) << function_name_ << ": unknown trace format specifier: '" << fmt << "'";
 | |
|     }
 | |
|   }
 | |
|   /*
 | |
|    * Verify that "array" is non-null and points to an Array object.
 | |
|    *
 | |
|    * Since we're dealing with objects, switch to "running" mode.
 | |
|    */
 | |
|   bool CheckArray(ScopedObjectAccess& soa, jarray java_array)
 | |
|       REQUIRES_SHARED(Locks::mutator_lock_) {
 | |
|     if (UNLIKELY(java_array == nullptr)) {
 | |
|       AbortF("jarray was NULL");
 | |
|       return false;
 | |
|     }
 | |
| 
 | |
|     ObjPtr<mirror::Array> a = soa.Decode<mirror::Array>(java_array);
 | |
|     if (UNLIKELY(!Runtime::Current()->GetHeap()->IsValidObjectAddress(a.Ptr()))) {
 | |
|       Runtime::Current()->GetHeap()->DumpSpaces(LOG_STREAM(ERROR));
 | |
|       AbortF("jarray is an invalid %s: %p (%p)",
 | |
|              GetIndirectRefKindString(IndirectReferenceTable::GetIndirectRefKind(java_array)),
 | |
|              java_array,
 | |
|              a.Ptr());
 | |
|       return false;
 | |
|     } else if (!a->IsArrayInstance()) {
 | |
|       AbortF("jarray argument has non-array type: %s", a->PrettyTypeOf().c_str());
 | |
|       return false;
 | |
|     }
 | |
|     return true;
 | |
|   }
 | |
| 
 | |
|   bool CheckBoolean(jint z) {
 | |
|     if (z != JNI_TRUE && z != JNI_FALSE) {
 | |
|       // Note, broken booleans are always fatal.
 | |
|       AbortF("unexpected jboolean value: %d", z);
 | |
|       return false;
 | |
|     }
 | |
|     return true;
 | |
|   }
 | |
| 
 | |
|   bool CheckByte(jint b) {
 | |
|     if (b < std::numeric_limits<jbyte>::min() ||
 | |
|         b > std::numeric_limits<jbyte>::max()) {
 | |
|       if (kBrokenPrimitivesAreFatal) {
 | |
|         AbortF("unexpected jbyte value: %d", b);
 | |
|         return false;
 | |
|       } else {
 | |
|         LOG(WARNING) << "Unexpected jbyte value: " << b;
 | |
|       }
 | |
|     }
 | |
|     return true;
 | |
|   }
 | |
| 
 | |
|   bool CheckShort(jint s) {
 | |
|     if (s < std::numeric_limits<jshort>::min() ||
 | |
|         s > std::numeric_limits<jshort>::max()) {
 | |
|       if (kBrokenPrimitivesAreFatal) {
 | |
|         AbortF("unexpected jshort value: %d", s);
 | |
|         return false;
 | |
|       } else {
 | |
|         LOG(WARNING) << "Unexpected jshort value: " << s;
 | |
|       }
 | |
|     }
 | |
|     return true;
 | |
|   }
 | |
| 
 | |
|   bool CheckChar(jint c) {
 | |
|     if (c < std::numeric_limits<jchar>::min() ||
 | |
|         c > std::numeric_limits<jchar>::max()) {
 | |
|       if (kBrokenPrimitivesAreFatal) {
 | |
|         AbortF("unexpected jchar value: %d", c);
 | |
|         return false;
 | |
|       } else {
 | |
|         LOG(WARNING) << "Unexpected jchar value: " << c;
 | |
|       }
 | |
|     }
 | |
|     return true;
 | |
|   }
 | |
| 
 | |
|   bool CheckLengthPositive(jsize length) {
 | |
|     if (length < 0) {
 | |
|       AbortF("negative jsize: %d", length);
 | |
|       return false;
 | |
|     }
 | |
|     return true;
 | |
|   }
 | |
| 
 | |
|   ArtField* CheckFieldID(jfieldID fid) REQUIRES_SHARED(Locks::mutator_lock_) {
 | |
|     if (fid == nullptr) {
 | |
|       AbortF("jfieldID was NULL");
 | |
|       return nullptr;
 | |
|     }
 | |
|     ArtField* f = jni::DecodeArtField(fid);
 | |
|     // TODO: Better check here.
 | |
|     if (!Runtime::Current()->GetHeap()->IsValidObjectAddress(f->GetDeclaringClass().Ptr())) {
 | |
|       Runtime::Current()->GetHeap()->DumpSpaces(LOG_STREAM(ERROR));
 | |
|       AbortF("invalid jfieldID: %p", fid);
 | |
|       return nullptr;
 | |
|     }
 | |
|     return f;
 | |
|   }
 | |
| 
 | |
|   ArtMethod* CheckMethodID(jmethodID mid) REQUIRES_SHARED(Locks::mutator_lock_) {
 | |
|     if (mid == nullptr) {
 | |
|       AbortF("jmethodID was NULL");
 | |
|       return nullptr;
 | |
|     }
 | |
|     ArtMethod* m = jni::DecodeArtMethod(mid);
 | |
|     // TODO: Better check here.
 | |
|     if (!Runtime::Current()->GetHeap()->IsValidObjectAddress(m->GetDeclaringClass().Ptr())) {
 | |
|       Runtime::Current()->GetHeap()->DumpSpaces(LOG_STREAM(ERROR));
 | |
|       AbortF("invalid jmethodID: %p", mid);
 | |
|       return nullptr;
 | |
|     }
 | |
|     return m;
 | |
|   }
 | |
| 
 | |
|   bool CheckThread(JNIEnv* env) REQUIRES_SHARED(Locks::mutator_lock_) {
 | |
|     Thread* self = Thread::Current();
 | |
|     CHECK(self != nullptr);
 | |
| 
 | |
|     // Get the current thread's JNIEnv by going through our TLS pointer.
 | |
|     JNIEnvExt* threadEnv = self->GetJniEnv();
 | |
| 
 | |
|     // Verify that the current thread is (a) attached and (b) associated with
 | |
|     // this particular instance of JNIEnv.
 | |
|     if (env != threadEnv) {
 | |
|       // Get the thread owning the JNIEnv that's being used.
 | |
|       Thread* envThread = reinterpret_cast<JNIEnvExt*>(env)->GetSelf();
 | |
|       AbortF("thread %s using JNIEnv* from thread %s",
 | |
|              ToStr<Thread>(*self).c_str(), ToStr<Thread>(*envThread).c_str());
 | |
|       return false;
 | |
|     }
 | |
| 
 | |
|     // Verify that, if this thread previously made a critical "get" call, we
 | |
|     // do the corresponding "release" call before we try anything else.
 | |
|     switch (flags_ & kFlag_CritMask) {
 | |
|     case kFlag_CritOkay:    // okay to call this method
 | |
|       break;
 | |
|     case kFlag_CritBad:     // not okay to call
 | |
|       if (threadEnv->GetCritical() > 0) {
 | |
|         AbortF("thread %s using JNI after critical get",
 | |
|                ToStr<Thread>(*self).c_str());
 | |
|         return false;
 | |
|       }
 | |
|       break;
 | |
|     case kFlag_CritGet:     // this is a "get" call
 | |
|       // Don't check here; we allow nested gets.
 | |
|       if (threadEnv->GetCritical() == 0) {
 | |
|         threadEnv->SetCriticalStartUs(self->GetCpuMicroTime());
 | |
|       }
 | |
|       threadEnv->SetCritical(threadEnv->GetCritical() + 1);
 | |
|       break;
 | |
|     case kFlag_CritRelease:  // this is a "release" call
 | |
|       if (threadEnv->GetCritical() == 0) {
 | |
|         AbortF("thread %s called too many critical releases",
 | |
|                ToStr<Thread>(*self).c_str());
 | |
|         return false;
 | |
|       } else if (threadEnv->GetCritical() == 1) {
 | |
|         // Leaving the critical region, possibly warn about long critical regions.
 | |
|         uint64_t critical_duration_us = self->GetCpuMicroTime() - threadEnv->GetCriticalStartUs();
 | |
|         if (critical_duration_us > kCriticalWarnTimeUs) {
 | |
|           LOG(WARNING) << "JNI critical lock held for "
 | |
|                        << PrettyDuration(UsToNs(critical_duration_us)) << " on " << *self;
 | |
|         }
 | |
|       }
 | |
|       threadEnv->SetCritical(threadEnv->GetCritical() - 1);
 | |
|       break;
 | |
|     default:
 | |
|       LOG(FATAL) << "Bad flags (internal error): " << flags_;
 | |
|     }
 | |
| 
 | |
|     // Verify that, if an exception has been raised, the native code doesn't
 | |
|     // make any JNI calls other than the Exception* methods.
 | |
|     if ((flags_ & kFlag_ExcepOkay) == 0 && self->IsExceptionPending()) {
 | |
|       mirror::Throwable* exception = self->GetException();
 | |
|       AbortF("JNI %s called with pending exception %s",
 | |
|              function_name_,
 | |
|              exception->Dump().c_str());
 | |
|       return false;
 | |
|     }
 | |
|     return true;
 | |
|   }
 | |
| 
 | |
|   // Verifies that "bytes" points to valid Modified UTF-8 data.
 | |
|   bool CheckUtfString(const char* bytes, bool nullable) {
 | |
|     if (bytes == nullptr) {
 | |
|       if (!nullable) {
 | |
|         AbortF("non-nullable const char* was NULL");
 | |
|         return false;
 | |
|       }
 | |
|       return true;
 | |
|     }
 | |
| 
 | |
|     const char* errorKind = nullptr;
 | |
|     const uint8_t* utf8 = CheckUtfBytes(bytes, &errorKind);
 | |
|     if (errorKind != nullptr) {
 | |
|       // This is an expensive loop that will resize often, but this isn't supposed to hit in
 | |
|       // practice anyways.
 | |
|       std::ostringstream oss;
 | |
|       oss << std::hex;
 | |
|       const uint8_t* tmp = reinterpret_cast<const uint8_t*>(bytes);
 | |
|       while (*tmp != 0) {
 | |
|         if (tmp == utf8) {
 | |
|           oss << "<";
 | |
|         }
 | |
|         oss << "0x" << std::setfill('0') << std::setw(2) << static_cast<uint32_t>(*tmp);
 | |
|         if (tmp == utf8) {
 | |
|           oss << '>';
 | |
|         }
 | |
|         tmp++;
 | |
|         if (*tmp != 0) {
 | |
|           oss << ' ';
 | |
|         }
 | |
|       }
 | |
| 
 | |
|       AbortF("input is not valid Modified UTF-8: illegal %s byte %#x\n"
 | |
|           "    string: '%s'\n    input: '%s'", errorKind, *utf8, bytes, oss.str().c_str());
 | |
|       return false;
 | |
|     }
 | |
|     return true;
 | |
|   }
 | |
| 
 | |
|   // Checks whether |bytes| is valid modified UTF-8. We also accept 4 byte UTF
 | |
|   // sequences in place of encoded surrogate pairs.
 | |
|   static const uint8_t* CheckUtfBytes(const char* bytes, const char** errorKind) {
 | |
|     while (*bytes != '\0') {
 | |
|       const uint8_t* utf8 = reinterpret_cast<const uint8_t*>(bytes++);
 | |
|       // Switch on the high four bits.
 | |
|       switch (*utf8 >> 4) {
 | |
|       case 0x00:
 | |
|       case 0x01:
 | |
|       case 0x02:
 | |
|       case 0x03:
 | |
|       case 0x04:
 | |
|       case 0x05:
 | |
|       case 0x06:
 | |
|       case 0x07:
 | |
|         // Bit pattern 0xxx. No need for any extra bytes.
 | |
|         break;
 | |
|       case 0x08:
 | |
|       case 0x09:
 | |
|       case 0x0a:
 | |
|       case 0x0b:
 | |
|          // Bit patterns 10xx, which are illegal start bytes.
 | |
|         *errorKind = "start";
 | |
|         return utf8;
 | |
|       case 0x0f:
 | |
|         // Bit pattern 1111, which might be the start of a 4 byte sequence.
 | |
|         if ((*utf8 & 0x08) == 0) {
 | |
|           // Bit pattern 1111 0xxx, which is the start of a 4 byte sequence.
 | |
|           // We consume one continuation byte here, and fall through to consume two more.
 | |
|           utf8 = reinterpret_cast<const uint8_t*>(bytes++);
 | |
|           if ((*utf8 & 0xc0) != 0x80) {
 | |
|             *errorKind = "continuation";
 | |
|             return utf8;
 | |
|           }
 | |
|         } else {
 | |
|           *errorKind = "start";
 | |
|           return utf8;
 | |
|         }
 | |
| 
 | |
|         // Fall through to the cases below to consume two more continuation bytes.
 | |
|         FALLTHROUGH_INTENDED;
 | |
|       case 0x0e:
 | |
|         // Bit pattern 1110, so there are two additional bytes.
 | |
|         utf8 = reinterpret_cast<const uint8_t*>(bytes++);
 | |
|         if ((*utf8 & 0xc0) != 0x80) {
 | |
|           *errorKind = "continuation";
 | |
|           return utf8;
 | |
|         }
 | |
| 
 | |
|         // Fall through to consume one more continuation byte.
 | |
|         FALLTHROUGH_INTENDED;
 | |
|       case 0x0c:
 | |
|       case 0x0d:
 | |
|         // Bit pattern 110x, so there is one additional byte.
 | |
|         utf8 = reinterpret_cast<const uint8_t*>(bytes++);
 | |
|         if ((*utf8 & 0xc0) != 0x80) {
 | |
|           *errorKind = "continuation";
 | |
|           return utf8;
 | |
|         }
 | |
|         break;
 | |
|       }
 | |
|     }
 | |
|     return nullptr;
 | |
|   }
 | |
| 
 | |
|   void AbortF(const char* fmt, ...) __attribute__((__format__(__printf__, 2, 3))) {
 | |
|     va_list args;
 | |
|     va_start(args, fmt);
 | |
|     Runtime::Current()->GetJavaVM()->JniAbortV(function_name_, fmt, args);
 | |
|     va_end(args);
 | |
|   }
 | |
| 
 | |
|   // The name of the JNI function being checked.
 | |
|   const char* const function_name_;
 | |
| 
 | |
|   int indent_;
 | |
| 
 | |
|   const uint16_t flags_;
 | |
| 
 | |
|   const bool has_method_;
 | |
| 
 | |
|   DISALLOW_COPY_AND_ASSIGN(ScopedCheck);
 | |
| };
 | |
| 
 | |
| /*
 | |
|  * ===========================================================================
 | |
|  *      Guarded arrays
 | |
|  * ===========================================================================
 | |
|  */
 | |
| 
 | |
| /* this gets tucked in at the start of the buffer; struct size must be even */
 | |
| class GuardedCopy {
 | |
|  public:
 | |
|   /*
 | |
|    * Create an over-sized buffer to hold the contents of "buf".  Copy it in,
 | |
|    * filling in the area around it with guard data.
 | |
|    */
 | |
|   static void* Create(void* original_buf, size_t len, bool mod_okay) {
 | |
|     const size_t new_len = LengthIncludingRedZones(len);
 | |
|     uint8_t* const new_buf = DebugAlloc(new_len);
 | |
| 
 | |
|     // If modification is not expected, grab a checksum.
 | |
|     uLong adler = 0;
 | |
|     if (!mod_okay) {
 | |
|       adler = adler32(adler32(0L, Z_NULL, 0), reinterpret_cast<const Bytef*>(original_buf), len);
 | |
|     }
 | |
| 
 | |
|     GuardedCopy* copy = new (new_buf) GuardedCopy(original_buf, len, adler);
 | |
| 
 | |
|     // Fill begin region with canary pattern.
 | |
|     const size_t kStartCanaryLength = (GuardedCopy::kRedZoneSize / 2) - sizeof(GuardedCopy);
 | |
|     for (size_t i = 0, j = 0; i < kStartCanaryLength; ++i) {
 | |
|       const_cast<char*>(copy->StartRedZone())[i] = kCanary[j];
 | |
|       if (kCanary[j] == '\0') {
 | |
|         j = 0;
 | |
|       } else {
 | |
|         j++;
 | |
|       }
 | |
|     }
 | |
| 
 | |
|     // Copy the data in; note "len" could be zero.
 | |
|     memcpy(const_cast<uint8_t*>(copy->BufferWithinRedZones()), original_buf, len);
 | |
| 
 | |
|     // Fill end region with canary pattern.
 | |
|     for (size_t i = 0, j = 0; i < kEndCanaryLength; ++i) {
 | |
|       const_cast<char*>(copy->EndRedZone())[i] = kCanary[j];
 | |
|       if (kCanary[j] == '\0') {
 | |
|         j = 0;
 | |
|       } else {
 | |
|         j++;
 | |
|       }
 | |
|     }
 | |
| 
 | |
|     return const_cast<uint8_t*>(copy->BufferWithinRedZones());
 | |
|   }
 | |
| 
 | |
|   /*
 | |
|    * Create a guarded copy of a primitive array.  Modifications to the copied
 | |
|    * data are allowed.  Returns a pointer to the copied data.
 | |
|    */
 | |
|   static void* CreateGuardedPACopy(JNIEnv* env, const jarray java_array, jboolean* is_copy,
 | |
|                                    void* original_ptr) {
 | |
|     ScopedObjectAccess soa(env);
 | |
| 
 | |
|     ObjPtr<mirror::Array> a = soa.Decode<mirror::Array>(java_array);
 | |
|     size_t component_size = a->GetClass()->GetComponentSize();
 | |
|     size_t byte_count = a->GetLength() * component_size;
 | |
|     void* result = Create(original_ptr, byte_count, true);
 | |
|     if (is_copy != nullptr) {
 | |
|       *is_copy = JNI_TRUE;
 | |
|     }
 | |
|     return result;
 | |
|   }
 | |
| 
 | |
|   /*
 | |
|    * Perform the array "release" operation, which may or may not copy data
 | |
|    * back into the managed heap, and may or may not release the underlying storage.
 | |
|    */
 | |
|   static void* ReleaseGuardedPACopy(const char* function_name, JNIEnv* env,
 | |
|                                     jarray java_array ATTRIBUTE_UNUSED, void* embedded_buf,
 | |
|                                     int mode) {
 | |
|     ScopedObjectAccess soa(env);
 | |
|     if (!GuardedCopy::Check(function_name, embedded_buf, true)) {
 | |
|       return nullptr;
 | |
|     }
 | |
|     GuardedCopy* const copy = FromEmbedded(embedded_buf);
 | |
|     void* original_ptr = copy->original_ptr_;
 | |
|     if (mode != JNI_ABORT) {
 | |
|       memcpy(original_ptr, embedded_buf, copy->original_length_);
 | |
|     }
 | |
|     if (mode != JNI_COMMIT) {
 | |
|       Destroy(embedded_buf);
 | |
|     }
 | |
|     return original_ptr;
 | |
|   }
 | |
| 
 | |
| 
 | |
|   /*
 | |
|    * Free up the guard buffer, scrub it, and return the original pointer.
 | |
|    */
 | |
|   static void* Destroy(void* embedded_buf) {
 | |
|     GuardedCopy* copy = FromEmbedded(embedded_buf);
 | |
|     void* original_ptr = const_cast<void*>(copy->original_ptr_);
 | |
|     size_t len = LengthIncludingRedZones(copy->original_length_);
 | |
|     DebugFree(copy, len);
 | |
|     return original_ptr;
 | |
|   }
 | |
| 
 | |
|   /*
 | |
|    * Verify the guard area and, if "modOkay" is false, that the data itself
 | |
|    * has not been altered.
 | |
|    *
 | |
|    * The caller has already checked that "dataBuf" is non-null.
 | |
|    */
 | |
|   static bool Check(const char* function_name, const void* embedded_buf, bool mod_okay) {
 | |
|     const GuardedCopy* copy = FromEmbedded(embedded_buf);
 | |
|     return copy->CheckHeader(function_name, mod_okay) && copy->CheckRedZones(function_name);
 | |
|   }
 | |
| 
 | |
|  private:
 | |
|   GuardedCopy(void* original_buf, size_t len, uLong adler) :
 | |
|     magic_(kGuardMagic), adler_(adler), original_ptr_(original_buf), original_length_(len) {
 | |
|   }
 | |
| 
 | |
|   static uint8_t* DebugAlloc(size_t len) {
 | |
|     void* result = mmap(nullptr, len, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANON, -1, 0);
 | |
|     if (result == MAP_FAILED) {
 | |
|       PLOG(FATAL) << "GuardedCopy::create mmap(" << len << ") failed";
 | |
|     }
 | |
|     return reinterpret_cast<uint8_t*>(result);
 | |
|   }
 | |
| 
 | |
|   static void DebugFree(void* buf, size_t len) {
 | |
|     if (munmap(buf, len) != 0) {
 | |
|       PLOG(FATAL) << "munmap(" << buf << ", " << len << ") failed";
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   static size_t LengthIncludingRedZones(size_t len) {
 | |
|     return len + kRedZoneSize;
 | |
|   }
 | |
| 
 | |
|   // Get the GuardedCopy from the interior pointer.
 | |
|   static GuardedCopy* FromEmbedded(void* embedded_buf) {
 | |
|     return reinterpret_cast<GuardedCopy*>(
 | |
|         reinterpret_cast<uint8_t*>(embedded_buf) - (kRedZoneSize / 2));
 | |
|   }
 | |
| 
 | |
|   static const GuardedCopy* FromEmbedded(const void* embedded_buf) {
 | |
|     return reinterpret_cast<const GuardedCopy*>(
 | |
|         reinterpret_cast<const uint8_t*>(embedded_buf) - (kRedZoneSize / 2));
 | |
|   }
 | |
| 
 | |
|   static void AbortF(const char* jni_function_name, const char* fmt, ...) {
 | |
|     va_list args;
 | |
|     va_start(args, fmt);
 | |
|     Runtime::Current()->GetJavaVM()->JniAbortV(jni_function_name, fmt, args);
 | |
|     va_end(args);
 | |
|   }
 | |
| 
 | |
|   bool CheckHeader(const char* function_name, bool mod_okay) const {
 | |
|     static const uint32_t kMagicCmp = kGuardMagic;
 | |
| 
 | |
|     // Before we do anything with "pExtra", check the magic number.  We
 | |
|     // do the check with memcmp rather than "==" in case the pointer is
 | |
|     // unaligned.  If it points to completely bogus memory we're going
 | |
|     // to crash, but there's no easy way around that.
 | |
|     if (UNLIKELY(memcmp(&magic_, &kMagicCmp, 4) != 0)) {
 | |
|       uint8_t buf[4];
 | |
|       memcpy(buf, &magic_, 4);
 | |
|       AbortF(function_name,
 | |
|              "guard magic does not match (found 0x%02x%02x%02x%02x) -- incorrect data pointer %p?",
 | |
|              buf[3], buf[2], buf[1], buf[0], this);  // Assumes little-endian.
 | |
|       return false;
 | |
|     }
 | |
| 
 | |
|     // If modification is not expected, verify checksum. Strictly speaking this is wrong: if we
 | |
|     // told the client that we made a copy, there's no reason they can't alter the buffer.
 | |
|     if (!mod_okay) {
 | |
|       uLong computed_adler =
 | |
|           adler32(adler32(0L, Z_NULL, 0), BufferWithinRedZones(), original_length_);
 | |
|       if (computed_adler != adler_) {
 | |
|         AbortF(function_name, "buffer modified (0x%08lx vs 0x%08lx) at address %p",
 | |
|                computed_adler, adler_, this);
 | |
|         return false;
 | |
|       }
 | |
|     }
 | |
|     return true;
 | |
|   }
 | |
| 
 | |
|   bool CheckRedZones(const char* function_name) const {
 | |
|     // Check the begin red zone.
 | |
|     const size_t kStartCanaryLength = (GuardedCopy::kRedZoneSize / 2) - sizeof(GuardedCopy);
 | |
|     for (size_t i = 0, j = 0; i < kStartCanaryLength; ++i) {
 | |
|       if (UNLIKELY(StartRedZone()[i] != kCanary[j])) {
 | |
|         AbortF(function_name, "guard pattern before buffer disturbed at %p +%zd", this, i);
 | |
|         return false;
 | |
|       }
 | |
|       if (kCanary[j] == '\0') {
 | |
|         j = 0;
 | |
|       } else {
 | |
|         j++;
 | |
|       }
 | |
|     }
 | |
| 
 | |
|     // Check end region.
 | |
|     for (size_t i = 0, j = 0; i < kEndCanaryLength; ++i) {
 | |
|       if (UNLIKELY(EndRedZone()[i] != kCanary[j])) {
 | |
|         size_t offset_from_buffer_start =
 | |
|             &(EndRedZone()[i]) - &(StartRedZone()[kStartCanaryLength]);
 | |
|         AbortF(function_name, "guard pattern after buffer disturbed at %p +%zd", this,
 | |
|                offset_from_buffer_start);
 | |
|         return false;
 | |
|       }
 | |
|       if (kCanary[j] == '\0') {
 | |
|         j = 0;
 | |
|       } else {
 | |
|         j++;
 | |
|       }
 | |
|     }
 | |
|     return true;
 | |
|   }
 | |
| 
 | |
|   // Location that canary value will be written before the guarded region.
 | |
|   const char* StartRedZone() const {
 | |
|     const uint8_t* buf = reinterpret_cast<const uint8_t*>(this);
 | |
|     return reinterpret_cast<const char*>(buf + sizeof(GuardedCopy));
 | |
|   }
 | |
| 
 | |
|   // Return the interior embedded buffer.
 | |
|   const uint8_t* BufferWithinRedZones() const {
 | |
|     const uint8_t* embedded_buf = reinterpret_cast<const uint8_t*>(this) + (kRedZoneSize / 2);
 | |
|     return embedded_buf;
 | |
|   }
 | |
| 
 | |
|   // Location that canary value will be written after the guarded region.
 | |
|   const char* EndRedZone() const {
 | |
|     const uint8_t* buf = reinterpret_cast<const uint8_t*>(this);
 | |
|     size_t buf_len = LengthIncludingRedZones(original_length_);
 | |
|     return reinterpret_cast<const char*>(buf + (buf_len - (kRedZoneSize / 2)));
 | |
|   }
 | |
| 
 | |
|   static constexpr size_t kRedZoneSize = 512;
 | |
|   static constexpr size_t kEndCanaryLength = kRedZoneSize / 2;
 | |
| 
 | |
|   // Value written before and after the guarded array.
 | |
|   static const char* const kCanary;
 | |
| 
 | |
|   static constexpr uint32_t kGuardMagic = 0xffd5aa96;
 | |
| 
 | |
|   const uint32_t magic_;
 | |
|   const uLong adler_;
 | |
|   void* const original_ptr_;
 | |
|   const size_t original_length_;
 | |
| };
 | |
| const char* const GuardedCopy::kCanary = "JNI BUFFER RED ZONE";
 | |
| 
 | |
| /*
 | |
|  * ===========================================================================
 | |
|  *      JNI functions
 | |
|  * ===========================================================================
 | |
|  */
 | |
| 
 | |
| class CheckJNI {
 | |
|  public:
 | |
|   static jint GetVersion(JNIEnv* env) {
 | |
|     CHECK_ATTACHED_THREAD(__FUNCTION__, JNI_ERR);
 | |
|     ScopedObjectAccess soa(env);
 | |
|     ScopedCheck sc(kFlag_Default, __FUNCTION__);
 | |
|     JniValueType args[1] = {{.E = env }};
 | |
|     if (sc.Check(soa, true, "E", args)) {
 | |
|       JniValueType result;
 | |
|       result.I = baseEnv(env)->GetVersion(env);
 | |
|       if (sc.Check(soa, false, "I", &result)) {
 | |
|         return result.I;
 | |
|       }
 | |
|     }
 | |
|     return JNI_ERR;
 | |
|   }
 | |
| 
 | |
|   static jint GetJavaVM(JNIEnv *env, JavaVM **vm) {
 | |
|     CHECK_ATTACHED_THREAD(__FUNCTION__, JNI_ERR);
 | |
|     ScopedObjectAccess soa(env);
 | |
|     ScopedCheck sc(kFlag_Default, __FUNCTION__);
 | |
|     JniValueType args[2] = {{.E = env }, {.p = vm}};
 | |
|     if (sc.Check(soa, true, "Ep", args)) {
 | |
|       JniValueType result;
 | |
|       result.i = baseEnv(env)->GetJavaVM(env, vm);
 | |
|       if (sc.Check(soa, false, "i", &result)) {
 | |
|         return result.i;
 | |
|       }
 | |
|     }
 | |
|     return JNI_ERR;
 | |
|   }
 | |
| 
 | |
|   static jint RegisterNatives(JNIEnv* env, jclass c, const JNINativeMethod* methods, jint nMethods) {
 | |
|     CHECK_ATTACHED_THREAD(__FUNCTION__, JNI_ERR);
 | |
|     ScopedObjectAccess soa(env);
 | |
|     ScopedCheck sc(kFlag_Default, __FUNCTION__);
 | |
|     JniValueType args[4] = {{.E = env }, {.c = c}, {.p = methods}, {.I = nMethods}};
 | |
|     if (sc.Check(soa, true, "EcpI", args)) {
 | |
|       JniValueType result;
 | |
|       result.i = baseEnv(env)->RegisterNatives(env, c, methods, nMethods);
 | |
|       if (sc.Check(soa, false, "i", &result)) {
 | |
|         return result.i;
 | |
|       }
 | |
|     }
 | |
|     return JNI_ERR;
 | |
|   }
 | |
| 
 | |
|   static jint UnregisterNatives(JNIEnv* env, jclass c) {
 | |
|     CHECK_ATTACHED_THREAD(__FUNCTION__, JNI_ERR);
 | |
|     ScopedObjectAccess soa(env);
 | |
|     ScopedCheck sc(kFlag_Default, __FUNCTION__);
 | |
|     JniValueType args[2] = {{.E = env }, {.c = c}};
 | |
|     if (sc.Check(soa, true, "Ec", args)) {
 | |
|       JniValueType result;
 | |
|       result.i = baseEnv(env)->UnregisterNatives(env, c);
 | |
|       if (sc.Check(soa, false, "i", &result)) {
 | |
|         return result.i;
 | |
|       }
 | |
|     }
 | |
|     return JNI_ERR;
 | |
|   }
 | |
| 
 | |
|   static jobjectRefType GetObjectRefType(JNIEnv* env, jobject obj) {
 | |
|     CHECK_ATTACHED_THREAD(__FUNCTION__, JNIInvalidRefType);
 | |
|     // Note: we use "EL" here but "Ep" has been used in the past on the basis that we'd like to
 | |
|     // know the object is invalid. The spec says that passing invalid objects or even ones that
 | |
|     // are deleted isn't supported.
 | |
|     ScopedObjectAccess soa(env);
 | |
|     ScopedCheck sc(kFlag_Default, __FUNCTION__);
 | |
|     JniValueType args[2] = {{.E = env }, {.L = obj}};
 | |
|     if (sc.Check(soa, true, "EL", args)) {
 | |
|       JniValueType result;
 | |
|       result.w = baseEnv(env)->GetObjectRefType(env, obj);
 | |
|       if (sc.Check(soa, false, "w", &result)) {
 | |
|         return result.w;
 | |
|       }
 | |
|     }
 | |
|     return JNIInvalidRefType;
 | |
|   }
 | |
| 
 | |
|   static jclass DefineClass(JNIEnv* env, const char* name, jobject loader, const jbyte* buf,
 | |
|                             jsize bufLen) {
 | |
|     CHECK_ATTACHED_THREAD(__FUNCTION__, nullptr);
 | |
|     ScopedObjectAccess soa(env);
 | |
|     ScopedCheck sc(kFlag_Default, __FUNCTION__);
 | |
|     JniValueType args[5] = {{.E = env}, {.u = name}, {.L = loader}, {.p = buf}, {.z = bufLen}};
 | |
|     if (sc.Check(soa, true, "EuLpz", args) && sc.CheckClassName(name)) {
 | |
|       JniValueType result;
 | |
|       result.c = baseEnv(env)->DefineClass(env, name, loader, buf, bufLen);
 | |
|       if (sc.Check(soa, false, "c", &result)) {
 | |
|         return result.c;
 | |
|       }
 | |
|     }
 | |
|     return nullptr;
 | |
|   }
 | |
| 
 | |
|   static jclass FindClass(JNIEnv* env, const char* name) {
 | |
|     CHECK_ATTACHED_THREAD(__FUNCTION__, nullptr);
 | |
|     ScopedObjectAccess soa(env);
 | |
|     ScopedCheck sc(kFlag_Default, __FUNCTION__);
 | |
|     JniValueType args[2] = {{.E = env}, {.u = name}};
 | |
|     if (sc.Check(soa, true, "Eu", args) && sc.CheckClassName(name)) {
 | |
|       JniValueType result;
 | |
|       result.c = baseEnv(env)->FindClass(env, name);
 | |
|       if (sc.Check(soa, false, "c", &result)) {
 | |
|         return result.c;
 | |
|       }
 | |
|     }
 | |
|     return nullptr;
 | |
|   }
 | |
| 
 | |
|   static jclass GetSuperclass(JNIEnv* env, jclass c) {
 | |
|     CHECK_ATTACHED_THREAD(__FUNCTION__, nullptr);
 | |
|     ScopedObjectAccess soa(env);
 | |
|     ScopedCheck sc(kFlag_Default, __FUNCTION__);
 | |
|     JniValueType args[2] = {{.E = env}, {.c = c}};
 | |
|     if (sc.Check(soa, true, "Ec", args)) {
 | |
|       JniValueType result;
 | |
|       result.c = baseEnv(env)->GetSuperclass(env, c);
 | |
|       if (sc.Check(soa, false, "c", &result)) {
 | |
|         return result.c;
 | |
|       }
 | |
|     }
 | |
|     return nullptr;
 | |
|   }
 | |
| 
 | |
|   static jboolean IsAssignableFrom(JNIEnv* env, jclass c1, jclass c2) {
 | |
|     CHECK_ATTACHED_THREAD(__FUNCTION__, JNI_FALSE);
 | |
|     ScopedObjectAccess soa(env);
 | |
|     ScopedCheck sc(kFlag_Default, __FUNCTION__);
 | |
|     JniValueType args[3] = {{.E = env}, {.c = c1}, {.c = c2}};
 | |
|     if (sc.Check(soa, true, "Ecc", args)) {
 | |
|       JniValueType result;
 | |
|       result.b = baseEnv(env)->IsAssignableFrom(env, c1, c2);
 | |
|       if (sc.Check(soa, false, "b", &result)) {
 | |
|         return result.b;
 | |
|       }
 | |
|     }
 | |
|     return JNI_FALSE;
 | |
|   }
 | |
| 
 | |
|   static jmethodID FromReflectedMethod(JNIEnv* env, jobject method) {
 | |
|     CHECK_ATTACHED_THREAD(__FUNCTION__, nullptr);
 | |
|     ScopedObjectAccess soa(env);
 | |
|     ScopedCheck sc(kFlag_Default, __FUNCTION__);
 | |
|     JniValueType args[2] = {{.E = env}, {.L = method}};
 | |
|     if (sc.Check(soa, true, "EL", args) && sc.CheckReflectedMethod(soa, method)) {
 | |
|       JniValueType result;
 | |
|       result.m = baseEnv(env)->FromReflectedMethod(env, method);
 | |
|       if (sc.Check(soa, false, "m", &result)) {
 | |
|         return result.m;
 | |
|       }
 | |
|     }
 | |
|     return nullptr;
 | |
|   }
 | |
| 
 | |
|   static jfieldID FromReflectedField(JNIEnv* env, jobject field) {
 | |
|     CHECK_ATTACHED_THREAD(__FUNCTION__, nullptr);
 | |
|     ScopedObjectAccess soa(env);
 | |
|     ScopedCheck sc(kFlag_Default, __FUNCTION__);
 | |
|     JniValueType args[2] = {{.E = env}, {.L = field}};
 | |
|     if (sc.Check(soa, true, "EL", args) && sc.CheckReflectedField(soa, field)) {
 | |
|       JniValueType result;
 | |
|       result.f = baseEnv(env)->FromReflectedField(env, field);
 | |
|       if (sc.Check(soa, false, "f", &result)) {
 | |
|         return result.f;
 | |
|       }
 | |
|     }
 | |
|     return nullptr;
 | |
|   }
 | |
| 
 | |
|   static jobject ToReflectedMethod(JNIEnv* env, jclass cls, jmethodID mid, jboolean isStatic) {
 | |
|     CHECK_ATTACHED_THREAD(__FUNCTION__, nullptr);
 | |
|     ScopedObjectAccess soa(env);
 | |
|     ScopedCheck sc(kFlag_Default, __FUNCTION__);
 | |
|     JniValueType args[4] = {{.E = env}, {.c = cls}, {.m = mid}, {.I = isStatic}};
 | |
|     if (sc.Check(soa, true, "Ecmb", args)) {
 | |
|       JniValueType result;
 | |
|       result.L = baseEnv(env)->ToReflectedMethod(env, cls, mid, isStatic);
 | |
|       if (sc.Check(soa, false, "L", &result) && (result.L != nullptr)) {
 | |
|         DCHECK(sc.CheckReflectedMethod(soa, result.L));
 | |
|         return result.L;
 | |
|       }
 | |
|     }
 | |
|     return nullptr;
 | |
|   }
 | |
| 
 | |
|   static jobject ToReflectedField(JNIEnv* env, jclass cls, jfieldID fid, jboolean isStatic) {
 | |
|     CHECK_ATTACHED_THREAD(__FUNCTION__, nullptr);
 | |
|     ScopedObjectAccess soa(env);
 | |
|     ScopedCheck sc(kFlag_Default, __FUNCTION__);
 | |
|     JniValueType args[4] = {{.E = env}, {.c = cls}, {.f = fid}, {.I = isStatic}};
 | |
|     if (sc.Check(soa, true, "Ecfb", args)) {
 | |
|       JniValueType result;
 | |
|       result.L = baseEnv(env)->ToReflectedField(env, cls, fid, isStatic);
 | |
|       if (sc.Check(soa, false, "L", &result) && (result.L != nullptr)) {
 | |
|         DCHECK(sc.CheckReflectedField(soa, result.L));
 | |
|         return result.L;
 | |
|       }
 | |
|     }
 | |
|     return nullptr;
 | |
|   }
 | |
| 
 | |
|   static jint Throw(JNIEnv* env, jthrowable obj) {
 | |
|     CHECK_ATTACHED_THREAD(__FUNCTION__, JNI_ERR);
 | |
|     ScopedObjectAccess soa(env);
 | |
|     ScopedCheck sc(kFlag_Default, __FUNCTION__);
 | |
|     JniValueType args[2] = {{.E = env}, {.t = obj}};
 | |
|     if (sc.Check(soa, true, "Et", args) && sc.CheckThrowable(soa, obj)) {
 | |
|       JniValueType result;
 | |
|       result.i = baseEnv(env)->Throw(env, obj);
 | |
|       if (sc.Check(soa, false, "i", &result)) {
 | |
|         return result.i;
 | |
|       }
 | |
|     }
 | |
|     return JNI_ERR;
 | |
|   }
 | |
| 
 | |
|   static jint ThrowNew(JNIEnv* env, jclass c, const char* message) {
 | |
|     CHECK_ATTACHED_THREAD(__FUNCTION__, JNI_ERR);
 | |
|     ScopedObjectAccess soa(env);
 | |
|     ScopedCheck sc(kFlag_NullableUtf, __FUNCTION__);
 | |
|     JniValueType args[3] = {{.E = env}, {.c = c}, {.u = message}};
 | |
|     if (sc.Check(soa, true, "Ecu", args) && sc.CheckThrowableClass(soa, c)) {
 | |
|       JniValueType result;
 | |
|       result.i = baseEnv(env)->ThrowNew(env, c, message);
 | |
|       if (sc.Check(soa, false, "i", &result)) {
 | |
|         return result.i;
 | |
|       }
 | |
|     }
 | |
|     return JNI_ERR;
 | |
|   }
 | |
| 
 | |
|   static jthrowable ExceptionOccurred(JNIEnv* env) {
 | |
|     CHECK_ATTACHED_THREAD(__FUNCTION__, nullptr);
 | |
|     ScopedObjectAccess soa(env);
 | |
|     ScopedCheck sc(kFlag_ExcepOkay, __FUNCTION__);
 | |
|     JniValueType args[1] = {{.E = env}};
 | |
|     if (sc.Check(soa, true, "E", args)) {
 | |
|       JniValueType result;
 | |
|       result.t = baseEnv(env)->ExceptionOccurred(env);
 | |
|       if (sc.Check(soa, false, "t", &result)) {
 | |
|         return result.t;
 | |
|       }
 | |
|     }
 | |
|     return nullptr;
 | |
|   }
 | |
| 
 | |
|   static void ExceptionDescribe(JNIEnv* env) {
 | |
|     CHECK_ATTACHED_THREAD_VOID(__FUNCTION__);
 | |
|     ScopedObjectAccess soa(env);
 | |
|     ScopedCheck sc(kFlag_ExcepOkay, __FUNCTION__);
 | |
|     JniValueType args[1] = {{.E = env}};
 | |
|     if (sc.Check(soa, true, "E", args)) {
 | |
|       JniValueType result;
 | |
|       baseEnv(env)->ExceptionDescribe(env);
 | |
|       result.V = nullptr;
 | |
|       sc.Check(soa, false, "V", &result);
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   static void ExceptionClear(JNIEnv* env) {
 | |
|     CHECK_ATTACHED_THREAD_VOID(__FUNCTION__);
 | |
|     ScopedObjectAccess soa(env);
 | |
|     ScopedCheck sc(kFlag_ExcepOkay, __FUNCTION__);
 | |
|     JniValueType args[1] = {{.E = env}};
 | |
|     if (sc.Check(soa, true, "E", args)) {
 | |
|       JniValueType result;
 | |
|       baseEnv(env)->ExceptionClear(env);
 | |
|       result.V = nullptr;
 | |
|       sc.Check(soa, false, "V", &result);
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   static jboolean ExceptionCheck(JNIEnv* env) {
 | |
|     CHECK_ATTACHED_THREAD(__FUNCTION__, JNI_FALSE);
 | |
|     ScopedObjectAccess soa(env);
 | |
|     ScopedCheck sc(kFlag_CritOkay | kFlag_ExcepOkay, __FUNCTION__);
 | |
|     JniValueType args[1] = {{.E = env}};
 | |
|     if (sc.Check(soa, true, "E", args)) {
 | |
|       JniValueType result;
 | |
|       result.b = baseEnv(env)->ExceptionCheck(env);
 | |
|       if (sc.Check(soa, false, "b", &result)) {
 | |
|         return result.b;
 | |
|       }
 | |
|     }
 | |
|     return JNI_FALSE;
 | |
|   }
 | |
| 
 | |
|   static void FatalError(JNIEnv* env, const char* msg) {
 | |
|     CHECK_ATTACHED_THREAD_VOID(__FUNCTION__);
 | |
|     // The JNI specification doesn't say it's okay to call FatalError with a pending exception,
 | |
|     // but you're about to abort anyway, and it's quite likely that you have a pending exception,
 | |
|     // and it's not unimaginable that you don't know that you do. So we allow it.
 | |
|     ScopedObjectAccess soa(env);
 | |
|     ScopedCheck sc(kFlag_ExcepOkay | kFlag_NullableUtf, __FUNCTION__);
 | |
|     JniValueType args[2] = {{.E = env}, {.u = msg}};
 | |
|     if (sc.Check(soa, true, "Eu", args)) {
 | |
|       JniValueType result;
 | |
|       baseEnv(env)->FatalError(env, msg);
 | |
|       // Unreachable.
 | |
|       result.V = nullptr;
 | |
|       sc.Check(soa, false, "V", &result);
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   static jint PushLocalFrame(JNIEnv* env, jint capacity) {
 | |
|     CHECK_ATTACHED_THREAD(__FUNCTION__, JNI_ERR);
 | |
|     ScopedObjectAccess soa(env);
 | |
|     ScopedCheck sc(kFlag_ExcepOkay, __FUNCTION__);
 | |
|     JniValueType args[2] = {{.E = env}, {.I = capacity}};
 | |
|     if (sc.Check(soa, true, "EI", args)) {
 | |
|       JniValueType result;
 | |
|       result.i = baseEnv(env)->PushLocalFrame(env, capacity);
 | |
|       if (sc.Check(soa, false, "i", &result)) {
 | |
|         return result.i;
 | |
|       }
 | |
|     }
 | |
|     return JNI_ERR;
 | |
|   }
 | |
| 
 | |
|   static jobject PopLocalFrame(JNIEnv* env, jobject res) {
 | |
|     CHECK_ATTACHED_THREAD(__FUNCTION__, nullptr);
 | |
|     ScopedObjectAccess soa(env);
 | |
|     ScopedCheck sc(kFlag_ExcepOkay, __FUNCTION__);
 | |
|     JniValueType args[2] = {{.E = env}, {.L = res}};
 | |
|     if (sc.Check(soa, true, "EL", args)) {
 | |
|       JniValueType result;
 | |
|       result.L = baseEnv(env)->PopLocalFrame(env, res);
 | |
|       sc.Check(soa, false, "L", &result);
 | |
|       return result.L;
 | |
|     }
 | |
|     return nullptr;
 | |
|   }
 | |
| 
 | |
|   static jobject NewGlobalRef(JNIEnv* env, jobject obj) {
 | |
|     return NewRef(__FUNCTION__, env, obj, kGlobal);
 | |
|   }
 | |
| 
 | |
|   static jobject NewLocalRef(JNIEnv* env, jobject obj) {
 | |
|     return NewRef(__FUNCTION__, env, obj, kLocal);
 | |
|   }
 | |
| 
 | |
|   static jweak NewWeakGlobalRef(JNIEnv* env, jobject obj) {
 | |
|     return NewRef(__FUNCTION__, env, obj, kWeakGlobal);
 | |
|   }
 | |
| 
 | |
|   static void DeleteGlobalRef(JNIEnv* env, jobject obj) {
 | |
|     DeleteRef(__FUNCTION__, env, obj, kGlobal);
 | |
|   }
 | |
| 
 | |
|   static void DeleteWeakGlobalRef(JNIEnv* env, jweak obj) {
 | |
|     DeleteRef(__FUNCTION__, env, obj, kWeakGlobal);
 | |
|   }
 | |
| 
 | |
|   static void DeleteLocalRef(JNIEnv* env, jobject obj) {
 | |
|     DeleteRef(__FUNCTION__, env, obj, kLocal);
 | |
|   }
 | |
| 
 | |
|   static jint EnsureLocalCapacity(JNIEnv *env, jint capacity) {
 | |
|     CHECK_ATTACHED_THREAD(__FUNCTION__, JNI_ERR);
 | |
|     ScopedObjectAccess soa(env);
 | |
|     ScopedCheck sc(kFlag_Default, __FUNCTION__);
 | |
|     JniValueType args[2] = {{.E = env}, {.I = capacity}};
 | |
|     if (sc.Check(soa, true, "EI", args)) {
 | |
|       JniValueType result;
 | |
|       result.i = baseEnv(env)->EnsureLocalCapacity(env, capacity);
 | |
|       if (sc.Check(soa, false, "i", &result)) {
 | |
|         return result.i;
 | |
|       }
 | |
|     }
 | |
|     return JNI_ERR;
 | |
|   }
 | |
| 
 | |
|   static jboolean IsSameObject(JNIEnv* env, jobject ref1, jobject ref2) {
 | |
|     CHECK_ATTACHED_THREAD(__FUNCTION__, JNI_FALSE);
 | |
|     ScopedObjectAccess soa(env);
 | |
|     ScopedCheck sc(kFlag_Default, __FUNCTION__);
 | |
|     JniValueType args[3] = {{.E = env}, {.L = ref1}, {.L = ref2}};
 | |
|     if (sc.Check(soa, true, "ELL", args)) {
 | |
|       JniValueType result;
 | |
|       result.b = baseEnv(env)->IsSameObject(env, ref1, ref2);
 | |
|       if (sc.Check(soa, false, "b", &result)) {
 | |
|         return result.b;
 | |
|       }
 | |
|     }
 | |
|     return JNI_FALSE;
 | |
|   }
 | |
| 
 | |
|   static jobject AllocObject(JNIEnv* env, jclass c) {
 | |
|     CHECK_ATTACHED_THREAD(__FUNCTION__, nullptr);
 | |
|     ScopedObjectAccess soa(env);
 | |
|     ScopedCheck sc(kFlag_Default, __FUNCTION__);
 | |
|     JniValueType args[2] = {{.E = env}, {.c = c}};
 | |
|     if (sc.Check(soa, true, "Ec", args) && sc.CheckInstantiableNonArray(soa, c)) {
 | |
|       JniValueType result;
 | |
|       result.L = baseEnv(env)->AllocObject(env, c);
 | |
|       if (sc.Check(soa, false, "L", &result)) {
 | |
|         return result.L;
 | |
|       }
 | |
|     }
 | |
|     return nullptr;
 | |
|   }
 | |
| 
 | |
|   static jobject NewObjectV(JNIEnv* env, jclass c, jmethodID mid, va_list vargs) {
 | |
|     CHECK_ATTACHED_THREAD(__FUNCTION__, nullptr);
 | |
|     ScopedObjectAccess soa(env);
 | |
|     ScopedCheck sc(kFlag_Default, __FUNCTION__);
 | |
|     VarArgs rest(mid, vargs);
 | |
|     JniValueType args[4] = {{.E = env}, {.c = c}, {.m = mid}, {.va = &rest}};
 | |
|     if (sc.Check(soa, true, "Ecm.", args) && sc.CheckInstantiableNonArray(soa, c) &&
 | |
|         sc.CheckConstructor(mid)) {
 | |
|       JniValueType result;
 | |
|       result.L = baseEnv(env)->NewObjectV(env, c, mid, vargs);
 | |
|       if (sc.Check(soa, false, "L", &result)) {
 | |
|         return result.L;
 | |
|       }
 | |
|     }
 | |
|     return nullptr;
 | |
|   }
 | |
| 
 | |
|   static jobject NewObject(JNIEnv* env, jclass c, jmethodID mid, ...) {
 | |
|     CHECK_ATTACHED_THREAD(__FUNCTION__, nullptr);
 | |
|     va_list args;
 | |
|     va_start(args, mid);
 | |
|     jobject result = NewObjectV(env, c, mid, args);
 | |
|     va_end(args);
 | |
|     return result;
 | |
|   }
 | |
| 
 | |
|   static jobject NewObjectA(JNIEnv* env, jclass c, jmethodID mid, const jvalue* vargs) {
 | |
|     CHECK_ATTACHED_THREAD(__FUNCTION__, nullptr);
 | |
|     ScopedObjectAccess soa(env);
 | |
|     ScopedCheck sc(kFlag_Default, __FUNCTION__);
 | |
|     VarArgs rest(mid, vargs);
 | |
|     JniValueType args[4] = {{.E = env}, {.c = c}, {.m = mid}, {.va = &rest}};
 | |
|     if (sc.Check(soa, true, "Ecm.", args) && sc.CheckInstantiableNonArray(soa, c) &&
 | |
|         sc.CheckConstructor(mid)) {
 | |
|       JniValueType result;
 | |
|       result.L = baseEnv(env)->NewObjectA(env, c, mid, vargs);
 | |
|       if (sc.Check(soa, false, "L", &result)) {
 | |
|         return result.L;
 | |
|       }
 | |
|     }
 | |
|     return nullptr;
 | |
|   }
 | |
| 
 | |
|   static jclass GetObjectClass(JNIEnv* env, jobject obj) {
 | |
|     CHECK_ATTACHED_THREAD(__FUNCTION__, nullptr);
 | |
|     ScopedObjectAccess soa(env);
 | |
|     ScopedCheck sc(kFlag_Default, __FUNCTION__);
 | |
|     JniValueType args[2] = {{.E = env}, {.L = obj}};
 | |
|     if (sc.Check(soa, true, "EL", args)) {
 | |
|       JniValueType result;
 | |
|       result.c = baseEnv(env)->GetObjectClass(env, obj);
 | |
|       if (sc.Check(soa, false, "c", &result)) {
 | |
|         return result.c;
 | |
|       }
 | |
|     }
 | |
|     return nullptr;
 | |
|   }
 | |
| 
 | |
|   static jboolean IsInstanceOf(JNIEnv* env, jobject obj, jclass c) {
 | |
|     CHECK_ATTACHED_THREAD(__FUNCTION__, JNI_FALSE);
 | |
|     ScopedObjectAccess soa(env);
 | |
|     ScopedCheck sc(kFlag_Default, __FUNCTION__);
 | |
|     JniValueType args[3] = {{.E = env}, {.L = obj}, {.c = c}};
 | |
|     if (sc.Check(soa, true, "ELc", args)) {
 | |
|       JniValueType result;
 | |
|       result.b = baseEnv(env)->IsInstanceOf(env, obj, c);
 | |
|       if (sc.Check(soa, false, "b", &result)) {
 | |
|         return result.b;
 | |
|       }
 | |
|     }
 | |
|     return JNI_FALSE;
 | |
|   }
 | |
| 
 | |
|   static jmethodID GetMethodID(JNIEnv* env, jclass c, const char* name, const char* sig) {
 | |
|     return GetMethodIDInternal(__FUNCTION__, env, c, name, sig, false);
 | |
|   }
 | |
| 
 | |
|   static jmethodID GetStaticMethodID(JNIEnv* env, jclass c, const char* name, const char* sig) {
 | |
|     return GetMethodIDInternal(__FUNCTION__, env, c, name, sig, true);
 | |
|   }
 | |
| 
 | |
|   static jfieldID GetFieldID(JNIEnv* env, jclass c, const char* name, const char* sig) {
 | |
|     return GetFieldIDInternal(__FUNCTION__, env, c, name, sig, false);
 | |
|   }
 | |
| 
 | |
|   static jfieldID GetStaticFieldID(JNIEnv* env, jclass c, const char* name, const char* sig) {
 | |
|     return GetFieldIDInternal(__FUNCTION__, env, c, name, sig, true);
 | |
|   }
 | |
| 
 | |
| #define FIELD_ACCESSORS(jtype, name, ptype, shorty, slot_sized_shorty)  \
 | |
|   static jtype GetStatic##name##Field(JNIEnv* env, jclass c, jfieldID fid) { \
 | |
|     return GetField(__FUNCTION__, env, c, fid, true, ptype).shorty; \
 | |
|   } \
 | |
|   \
 | |
|   static jtype Get##name##Field(JNIEnv* env, jobject obj, jfieldID fid) { \
 | |
|     return GetField(__FUNCTION__, env, obj, fid, false, ptype).shorty; \
 | |
|   } \
 | |
|   \
 | |
|   static void SetStatic##name##Field(JNIEnv* env, jclass c, jfieldID fid, jtype v) { \
 | |
|     JniValueType value; \
 | |
|     value.slot_sized_shorty = v; \
 | |
|     SetField(__FUNCTION__, env, c, fid, true, ptype, value); \
 | |
|   } \
 | |
|   \
 | |
|   static void Set##name##Field(JNIEnv* env, jobject obj, jfieldID fid, jtype v) { \
 | |
|     JniValueType value; \
 | |
|     value.slot_sized_shorty = v; \
 | |
|     SetField(__FUNCTION__, env, obj, fid, false, ptype, value); \
 | |
|   }
 | |
| 
 | |
|   FIELD_ACCESSORS(jobject, Object, Primitive::kPrimNot, L, L)
 | |
|   FIELD_ACCESSORS(jboolean, Boolean, Primitive::kPrimBoolean, Z, I)
 | |
|   FIELD_ACCESSORS(jbyte, Byte, Primitive::kPrimByte, B, I)
 | |
|   FIELD_ACCESSORS(jchar, Char, Primitive::kPrimChar, C, I)
 | |
|   FIELD_ACCESSORS(jshort, Short, Primitive::kPrimShort, S, I)
 | |
|   FIELD_ACCESSORS(jint, Int, Primitive::kPrimInt, I, I)
 | |
|   FIELD_ACCESSORS(jlong, Long, Primitive::kPrimLong, J, J)
 | |
|   FIELD_ACCESSORS(jfloat, Float, Primitive::kPrimFloat, F, F)
 | |
|   FIELD_ACCESSORS(jdouble, Double, Primitive::kPrimDouble, D, D)
 | |
| #undef FIELD_ACCESSORS
 | |
| 
 | |
|   static void CallVoidMethodA(JNIEnv* env, jobject obj, jmethodID mid, const jvalue* vargs) {
 | |
|     CallMethodA(__FUNCTION__, env, obj, nullptr, mid, vargs, Primitive::kPrimVoid, kVirtual);
 | |
|   }
 | |
| 
 | |
|   static void CallNonvirtualVoidMethodA(JNIEnv* env, jobject obj, jclass c, jmethodID mid,
 | |
|                                         const jvalue* vargs) {
 | |
|     CallMethodA(__FUNCTION__, env, obj, c, mid, vargs, Primitive::kPrimVoid, kDirect);
 | |
|   }
 | |
| 
 | |
|   static void CallStaticVoidMethodA(JNIEnv* env, jclass c, jmethodID mid, const jvalue* vargs) {
 | |
|     CallMethodA(__FUNCTION__, env, nullptr, c, mid, vargs, Primitive::kPrimVoid, kStatic);
 | |
|   }
 | |
| 
 | |
|   static void CallVoidMethodV(JNIEnv* env, jobject obj, jmethodID mid, va_list vargs) {
 | |
|     CallMethodV(__FUNCTION__, env, obj, nullptr, mid, vargs, Primitive::kPrimVoid, kVirtual);
 | |
|   }
 | |
| 
 | |
|   static void CallNonvirtualVoidMethodV(JNIEnv* env, jobject obj, jclass c, jmethodID mid,
 | |
|                                         va_list vargs) {
 | |
|     CallMethodV(__FUNCTION__, env, obj, c, mid, vargs, Primitive::kPrimVoid, kDirect);
 | |
|   }
 | |
| 
 | |
|   static void CallStaticVoidMethodV(JNIEnv* env, jclass c, jmethodID mid, va_list vargs) {
 | |
|     CallMethodV(__FUNCTION__, env, nullptr, c, mid, vargs, Primitive::kPrimVoid, kStatic);
 | |
|   }
 | |
| 
 | |
|   static void CallVoidMethod(JNIEnv* env, jobject obj, jmethodID mid, ...) {
 | |
|     va_list vargs;
 | |
|     va_start(vargs, mid);
 | |
|     CallMethodV(__FUNCTION__, env, obj, nullptr, mid, vargs, Primitive::kPrimVoid, kVirtual);
 | |
|     va_end(vargs);
 | |
|   }
 | |
| 
 | |
|   static void CallNonvirtualVoidMethod(JNIEnv* env, jobject obj, jclass c, jmethodID mid, ...) {
 | |
|     va_list vargs;
 | |
|     va_start(vargs, mid);
 | |
|     CallMethodV(__FUNCTION__, env, obj, c, mid, vargs, Primitive::kPrimVoid, kDirect);
 | |
|     va_end(vargs);
 | |
|   }
 | |
| 
 | |
|   static void CallStaticVoidMethod(JNIEnv* env, jclass c, jmethodID mid, ...) {
 | |
|     va_list vargs;
 | |
|     va_start(vargs, mid);
 | |
|     CallMethodV(__FUNCTION__, env, nullptr, c, mid, vargs, Primitive::kPrimVoid, kStatic);
 | |
|     va_end(vargs);
 | |
|   }
 | |
| 
 | |
| #define CALL(rtype, name, ptype, shorty) \
 | |
|   static rtype Call##name##MethodA(JNIEnv* env, jobject obj, jmethodID mid, const jvalue* vargs) { \
 | |
|     return CallMethodA(__FUNCTION__, env, obj, nullptr, mid, vargs, ptype, kVirtual).shorty; \
 | |
|   } \
 | |
|   \
 | |
|   static rtype CallNonvirtual##name##MethodA(JNIEnv* env, jobject obj, jclass c, jmethodID mid, \
 | |
|                                              const jvalue* vargs) { \
 | |
|     return CallMethodA(__FUNCTION__, env, obj, c, mid, vargs, ptype, kDirect).shorty; \
 | |
|   } \
 | |
|   \
 | |
|   static rtype CallStatic##name##MethodA(JNIEnv* env, jclass c, jmethodID mid, const jvalue* vargs) { \
 | |
|     return CallMethodA(__FUNCTION__, env, nullptr, c, mid, vargs, ptype, kStatic).shorty; \
 | |
|   } \
 | |
|   \
 | |
|   static rtype Call##name##MethodV(JNIEnv* env, jobject obj, jmethodID mid, va_list vargs) { \
 | |
|     return CallMethodV(__FUNCTION__, env, obj, nullptr, mid, vargs, ptype, kVirtual).shorty; \
 | |
|   } \
 | |
|   \
 | |
|   static rtype CallNonvirtual##name##MethodV(JNIEnv* env, jobject obj, jclass c, jmethodID mid, \
 | |
|                                              va_list vargs) { \
 | |
|     return CallMethodV(__FUNCTION__, env, obj, c, mid, vargs, ptype, kDirect).shorty; \
 | |
|   } \
 | |
|   \
 | |
|   static rtype CallStatic##name##MethodV(JNIEnv* env, jclass c, jmethodID mid, va_list vargs) { \
 | |
|     return CallMethodV(__FUNCTION__, env, nullptr, c, mid, vargs, ptype, kStatic).shorty; \
 | |
|   } \
 | |
|   \
 | |
|   static rtype Call##name##Method(JNIEnv* env, jobject obj, jmethodID mid, ...) { \
 | |
|     va_list vargs; \
 | |
|     va_start(vargs, mid); \
 | |
|     rtype result = \
 | |
|         CallMethodV(__FUNCTION__, env, obj, nullptr, mid, vargs, ptype, kVirtual).shorty; \
 | |
|     va_end(vargs); \
 | |
|     return result; \
 | |
|   } \
 | |
|   \
 | |
|   static rtype CallNonvirtual##name##Method(JNIEnv* env, jobject obj, jclass c, jmethodID mid, \
 | |
|                                             ...) { \
 | |
|     va_list vargs; \
 | |
|     va_start(vargs, mid); \
 | |
|     rtype result = \
 | |
|         CallMethodV(__FUNCTION__, env, obj, c, mid, vargs, ptype, kDirect).shorty; \
 | |
|     va_end(vargs); \
 | |
|     return result; \
 | |
|   } \
 | |
|   \
 | |
|   static rtype CallStatic##name##Method(JNIEnv* env, jclass c, jmethodID mid, ...) { \
 | |
|     va_list vargs; \
 | |
|     va_start(vargs, mid); \
 | |
|     rtype result = \
 | |
|         CallMethodV(__FUNCTION__, env, nullptr, c, mid, vargs, ptype, kStatic).shorty; \
 | |
|     va_end(vargs); \
 | |
|     return result; \
 | |
|   }
 | |
| 
 | |
|   CALL(jobject, Object, Primitive::kPrimNot, L)
 | |
|   CALL(jboolean, Boolean, Primitive::kPrimBoolean, Z)
 | |
|   CALL(jbyte, Byte, Primitive::kPrimByte, B)
 | |
|   CALL(jchar, Char, Primitive::kPrimChar, C)
 | |
|   CALL(jshort, Short, Primitive::kPrimShort, S)
 | |
|   CALL(jint, Int, Primitive::kPrimInt, I)
 | |
|   CALL(jlong, Long, Primitive::kPrimLong, J)
 | |
|   CALL(jfloat, Float, Primitive::kPrimFloat, F)
 | |
|   CALL(jdouble, Double, Primitive::kPrimDouble, D)
 | |
| #undef CALL
 | |
| 
 | |
|   static jstring NewString(JNIEnv* env, const jchar* unicode_chars, jsize len) {
 | |
|     CHECK_ATTACHED_THREAD(__FUNCTION__, nullptr);
 | |
|     ScopedObjectAccess soa(env);
 | |
|     ScopedCheck sc(kFlag_Default, __FUNCTION__);
 | |
|     JniValueType args[3] = {{.E = env}, {.p = unicode_chars}, {.z = len}};
 | |
|     if (sc.Check(soa, true, "Epz", args)) {
 | |
|       JniValueType result;
 | |
|       result.s = baseEnv(env)->NewString(env, unicode_chars, len);
 | |
|       if (sc.Check(soa, false, "s", &result)) {
 | |
|         return result.s;
 | |
|       }
 | |
|     }
 | |
|     return nullptr;
 | |
|   }
 | |
| 
 | |
|   static jstring NewStringUTF(JNIEnv* env, const char* chars) {
 | |
|     CHECK_ATTACHED_THREAD(__FUNCTION__, nullptr);
 | |
|     ScopedObjectAccess soa(env);
 | |
|     ScopedCheck sc(kFlag_NullableUtf, __FUNCTION__);
 | |
|     JniValueType args[2] = {{.E = env}, {.u = chars}};
 | |
|     if (sc.Check(soa, true, "Eu", args)) {
 | |
|       JniValueType result;
 | |
|       // TODO: stale? show pointer and truncate string.
 | |
|       result.s = baseEnv(env)->NewStringUTF(env, chars);
 | |
|       if (sc.Check(soa, false, "s", &result)) {
 | |
|         return result.s;
 | |
|       }
 | |
|     }
 | |
|     return nullptr;
 | |
|   }
 | |
| 
 | |
|   static jsize GetStringLength(JNIEnv* env, jstring string) {
 | |
|     CHECK_ATTACHED_THREAD(__FUNCTION__, JNI_ERR);
 | |
|     ScopedObjectAccess soa(env);
 | |
|     ScopedCheck sc(kFlag_CritOkay, __FUNCTION__);
 | |
|     JniValueType args[2] = {{.E = env}, {.s = string}};
 | |
|     if (sc.Check(soa, true, "Es", args)) {
 | |
|       JniValueType result;
 | |
|       result.z = baseEnv(env)->GetStringLength(env, string);
 | |
|       if (sc.Check(soa, false, "z", &result)) {
 | |
|         return result.z;
 | |
|       }
 | |
|     }
 | |
|     return JNI_ERR;
 | |
|   }
 | |
| 
 | |
|   static jsize GetStringUTFLength(JNIEnv* env, jstring string) {
 | |
|     CHECK_ATTACHED_THREAD(__FUNCTION__, JNI_ERR);
 | |
|     ScopedObjectAccess soa(env);
 | |
|     ScopedCheck sc(kFlag_CritOkay, __FUNCTION__);
 | |
|     JniValueType args[2] = {{.E = env}, {.s = string}};
 | |
|     if (sc.Check(soa, true, "Es", args)) {
 | |
|       JniValueType result;
 | |
|       result.z = baseEnv(env)->GetStringUTFLength(env, string);
 | |
|       if (sc.Check(soa, false, "z", &result)) {
 | |
|         return result.z;
 | |
|       }
 | |
|     }
 | |
|     return JNI_ERR;
 | |
|   }
 | |
| 
 | |
|   static const jchar* GetStringChars(JNIEnv* env, jstring string, jboolean* is_copy) {
 | |
|     return reinterpret_cast<const jchar*>(GetStringCharsInternal(__FUNCTION__, env, string,
 | |
|                                                                  is_copy, false, false));
 | |
|   }
 | |
| 
 | |
|   static const char* GetStringUTFChars(JNIEnv* env, jstring string, jboolean* is_copy) {
 | |
|     return reinterpret_cast<const char*>(GetStringCharsInternal(__FUNCTION__, env, string,
 | |
|                                                                 is_copy, true, false));
 | |
|   }
 | |
| 
 | |
|   static const jchar* GetStringCritical(JNIEnv* env, jstring string, jboolean* is_copy) {
 | |
|     return reinterpret_cast<const jchar*>(GetStringCharsInternal(__FUNCTION__, env, string,
 | |
|                                                                  is_copy, false, true));
 | |
|   }
 | |
| 
 | |
|   static void ReleaseStringChars(JNIEnv* env, jstring string, const jchar* chars) {
 | |
|     ReleaseStringCharsInternal(__FUNCTION__, env, string, chars, false, false);
 | |
|   }
 | |
| 
 | |
|   static void ReleaseStringUTFChars(JNIEnv* env, jstring string, const char* utf) {
 | |
|     ReleaseStringCharsInternal(__FUNCTION__, env, string, utf, true, false);
 | |
|   }
 | |
| 
 | |
|   static void ReleaseStringCritical(JNIEnv* env, jstring string, const jchar* chars) {
 | |
|     ReleaseStringCharsInternal(__FUNCTION__, env, string, chars, false, true);
 | |
|   }
 | |
| 
 | |
|   static void GetStringRegion(JNIEnv* env, jstring string, jsize start, jsize len, jchar* buf) {
 | |
|     CHECK_ATTACHED_THREAD_VOID(__FUNCTION__);
 | |
|     ScopedObjectAccess soa(env);
 | |
|     ScopedCheck sc(kFlag_CritOkay, __FUNCTION__);
 | |
|     JniValueType args[5] = {{.E = env}, {.s = string}, {.z = start}, {.z = len}, {.p = buf}};
 | |
|     // Note: the start and len arguments are checked as 'I' rather than 'z' as invalid indices
 | |
|     // result in ArrayIndexOutOfBoundsExceptions in the base implementation.
 | |
|     if (sc.Check(soa, true, "EsIIp", args)) {
 | |
|       baseEnv(env)->GetStringRegion(env, string, start, len, buf);
 | |
|       JniValueType result;
 | |
|       result.V = nullptr;
 | |
|       sc.Check(soa, false, "V", &result);
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   static void GetStringUTFRegion(JNIEnv* env, jstring string, jsize start, jsize len, char* buf) {
 | |
|     CHECK_ATTACHED_THREAD_VOID(__FUNCTION__);
 | |
|     ScopedObjectAccess soa(env);
 | |
|     ScopedCheck sc(kFlag_CritOkay, __FUNCTION__);
 | |
|     JniValueType args[5] = {{.E = env}, {.s = string}, {.z = start}, {.z = len}, {.p = buf}};
 | |
|     // Note: the start and len arguments are checked as 'I' rather than 'z' as invalid indices
 | |
|     // result in ArrayIndexOutOfBoundsExceptions in the base implementation.
 | |
|     if (sc.Check(soa, true, "EsIIp", args)) {
 | |
|       baseEnv(env)->GetStringUTFRegion(env, string, start, len, buf);
 | |
|       JniValueType result;
 | |
|       result.V = nullptr;
 | |
|       sc.Check(soa, false, "V", &result);
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   static jsize GetArrayLength(JNIEnv* env, jarray array) {
 | |
|     CHECK_ATTACHED_THREAD(__FUNCTION__, JNI_ERR);
 | |
|     ScopedObjectAccess soa(env);
 | |
|     ScopedCheck sc(kFlag_CritOkay, __FUNCTION__);
 | |
|     JniValueType args[2] = {{.E = env}, {.a = array}};
 | |
|     if (sc.Check(soa, true, "Ea", args)) {
 | |
|       JniValueType result;
 | |
|       result.z = baseEnv(env)->GetArrayLength(env, array);
 | |
|       if (sc.Check(soa, false, "z", &result)) {
 | |
|         return result.z;
 | |
|       }
 | |
|     }
 | |
|     return JNI_ERR;
 | |
|   }
 | |
| 
 | |
|   static jobjectArray NewObjectArray(JNIEnv* env, jsize length, jclass element_class,
 | |
|                                      jobject initial_element) {
 | |
|     CHECK_ATTACHED_THREAD(__FUNCTION__, nullptr);
 | |
|     ScopedObjectAccess soa(env);
 | |
|     ScopedCheck sc(kFlag_Default, __FUNCTION__);
 | |
|     JniValueType args[4] =
 | |
|         {{.E = env}, {.z = length}, {.c = element_class}, {.L = initial_element}};
 | |
|     if (sc.Check(soa, true, "EzcL", args)) {
 | |
|       JniValueType result;
 | |
|       // Note: assignability tests of initial_element are done in the base implementation.
 | |
|       result.a = baseEnv(env)->NewObjectArray(env, length, element_class, initial_element);
 | |
|       if (sc.Check(soa, false, "a", &result)) {
 | |
|         return down_cast<jobjectArray>(result.a);
 | |
|       }
 | |
|     }
 | |
|     return nullptr;
 | |
|   }
 | |
| 
 | |
|   static jobject GetObjectArrayElement(JNIEnv* env, jobjectArray array, jsize index) {
 | |
|     CHECK_ATTACHED_THREAD(__FUNCTION__, nullptr);
 | |
|     ScopedObjectAccess soa(env);
 | |
|     ScopedCheck sc(kFlag_Default, __FUNCTION__);
 | |
|     JniValueType args[3] = {{.E = env}, {.a = array}, {.z = index}};
 | |
|     if (sc.Check(soa, true, "Eaz", args)) {
 | |
|       JniValueType result;
 | |
|       result.L = baseEnv(env)->GetObjectArrayElement(env, array, index);
 | |
|       if (sc.Check(soa, false, "L", &result)) {
 | |
|         return result.L;
 | |
|       }
 | |
|     }
 | |
|     return nullptr;
 | |
|   }
 | |
| 
 | |
|   static void SetObjectArrayElement(JNIEnv* env, jobjectArray array, jsize index, jobject value) {
 | |
|     CHECK_ATTACHED_THREAD_VOID(__FUNCTION__);
 | |
|     ScopedObjectAccess soa(env);
 | |
|     ScopedCheck sc(kFlag_Default, __FUNCTION__);
 | |
|     JniValueType args[4] = {{.E = env}, {.a = array}, {.z = index}, {.L = value}};
 | |
|     // Note: the index arguments is checked as 'I' rather than 'z' as invalid indices result in
 | |
|     // ArrayIndexOutOfBoundsExceptions in the base implementation. Similarly invalid stores result
 | |
|     // in ArrayStoreExceptions.
 | |
|     if (sc.Check(soa, true, "EaIL", args)) {
 | |
|       baseEnv(env)->SetObjectArrayElement(env, array, index, value);
 | |
|       JniValueType result;
 | |
|       result.V = nullptr;
 | |
|       sc.Check(soa, false, "V", &result);
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   static jbooleanArray NewBooleanArray(JNIEnv* env, jsize length) {
 | |
|     return down_cast<jbooleanArray>(NewPrimitiveArray(__FUNCTION__, env, length,
 | |
|                                                       Primitive::kPrimBoolean));
 | |
|   }
 | |
| 
 | |
|   static jbyteArray NewByteArray(JNIEnv* env, jsize length) {
 | |
|     return down_cast<jbyteArray>(NewPrimitiveArray(__FUNCTION__, env, length,
 | |
|                                                    Primitive::kPrimByte));
 | |
|   }
 | |
| 
 | |
|   static jcharArray NewCharArray(JNIEnv* env, jsize length) {
 | |
|     return down_cast<jcharArray>(NewPrimitiveArray(__FUNCTION__, env, length,
 | |
|                                                    Primitive::kPrimChar));
 | |
|   }
 | |
| 
 | |
|   static jshortArray NewShortArray(JNIEnv* env, jsize length) {
 | |
|     return down_cast<jshortArray>(NewPrimitiveArray(__FUNCTION__, env, length,
 | |
|                                                     Primitive::kPrimShort));
 | |
|   }
 | |
| 
 | |
|   static jintArray NewIntArray(JNIEnv* env, jsize length) {
 | |
|     return down_cast<jintArray>(NewPrimitiveArray(__FUNCTION__, env, length, Primitive::kPrimInt));
 | |
|   }
 | |
| 
 | |
|   static jlongArray NewLongArray(JNIEnv* env, jsize length) {
 | |
|     return down_cast<jlongArray>(NewPrimitiveArray(__FUNCTION__, env, length,
 | |
|                                                    Primitive::kPrimLong));
 | |
|   }
 | |
| 
 | |
|   static jfloatArray NewFloatArray(JNIEnv* env, jsize length) {
 | |
|     return down_cast<jfloatArray>(NewPrimitiveArray(__FUNCTION__, env, length,
 | |
|                                                     Primitive::kPrimFloat));
 | |
|   }
 | |
| 
 | |
|   static jdoubleArray NewDoubleArray(JNIEnv* env, jsize length) {
 | |
|     return down_cast<jdoubleArray>(NewPrimitiveArray(__FUNCTION__, env, length,
 | |
|                                                      Primitive::kPrimDouble));
 | |
|   }
 | |
| 
 | |
| // NOLINT added to avoid wrong warning/fix from clang-tidy.
 | |
| #define PRIMITIVE_ARRAY_FUNCTIONS(ctype, name, ptype) \
 | |
|   static ctype* Get##name##ArrayElements(JNIEnv* env, ctype##Array array, jboolean* is_copy) { /* NOLINT */ \
 | |
|     return reinterpret_cast<ctype*>( /* NOLINT */ \
 | |
|         GetPrimitiveArrayElements(__FUNCTION__, ptype, env, array, is_copy)); \
 | |
|   } \
 | |
|   \
 | |
|   static void Release##name##ArrayElements(JNIEnv* env, ctype##Array array, ctype* elems, /* NOLINT */ \
 | |
|                                            jint mode) { \
 | |
|     ReleasePrimitiveArrayElements(__FUNCTION__, ptype, env, array, elems, mode); \
 | |
|   } \
 | |
|   \
 | |
|   static void Get##name##ArrayRegion(JNIEnv* env, ctype##Array array, jsize start, jsize len, \
 | |
|                                      ctype* buf) { /* NOLINT */ \
 | |
|     GetPrimitiveArrayRegion(__FUNCTION__, ptype, env, array, start, len, buf); \
 | |
|   } \
 | |
|   \
 | |
|   static void Set##name##ArrayRegion(JNIEnv* env, ctype##Array array, jsize start, jsize len, \
 | |
|                                      const ctype* buf) { \
 | |
|     SetPrimitiveArrayRegion(__FUNCTION__, ptype, env, array, start, len, buf); \
 | |
|   }
 | |
| 
 | |
|   PRIMITIVE_ARRAY_FUNCTIONS(jboolean, Boolean, Primitive::kPrimBoolean)
 | |
|   PRIMITIVE_ARRAY_FUNCTIONS(jbyte, Byte, Primitive::kPrimByte)
 | |
|   PRIMITIVE_ARRAY_FUNCTIONS(jchar, Char, Primitive::kPrimChar)
 | |
|   PRIMITIVE_ARRAY_FUNCTIONS(jshort, Short, Primitive::kPrimShort)
 | |
|   PRIMITIVE_ARRAY_FUNCTIONS(jint, Int, Primitive::kPrimInt)
 | |
|   PRIMITIVE_ARRAY_FUNCTIONS(jlong, Long, Primitive::kPrimLong)
 | |
|   PRIMITIVE_ARRAY_FUNCTIONS(jfloat, Float, Primitive::kPrimFloat)
 | |
|   PRIMITIVE_ARRAY_FUNCTIONS(jdouble, Double, Primitive::kPrimDouble)
 | |
| #undef PRIMITIVE_ARRAY_FUNCTIONS
 | |
| 
 | |
|   static jint MonitorEnter(JNIEnv* env, jobject obj) {
 | |
|     CHECK_ATTACHED_THREAD(__FUNCTION__, JNI_ERR);
 | |
|     ScopedObjectAccess soa(env);
 | |
|     ScopedCheck sc(kFlag_Default, __FUNCTION__);
 | |
|     JniValueType args[2] = {{.E = env}, {.L = obj}};
 | |
|     if (sc.Check(soa, true, "EL", args)) {
 | |
|       if (obj != nullptr) {
 | |
|         down_cast<JNIEnvExt*>(env)->RecordMonitorEnter(obj);
 | |
|       }
 | |
|       JniValueType result;
 | |
|       result.i = baseEnv(env)->MonitorEnter(env, obj);
 | |
|       if (sc.Check(soa, false, "i", &result)) {
 | |
|         return result.i;
 | |
|       }
 | |
|     }
 | |
|     return JNI_ERR;
 | |
|   }
 | |
| 
 | |
|   static jint MonitorExit(JNIEnv* env, jobject obj) {
 | |
|     CHECK_ATTACHED_THREAD(__FUNCTION__, JNI_ERR);
 | |
|     ScopedObjectAccess soa(env);
 | |
|     ScopedCheck sc(kFlag_ExcepOkay, __FUNCTION__);
 | |
|     JniValueType args[2] = {{.E = env}, {.L = obj}};
 | |
|     if (sc.Check(soa, true, "EL", args)) {
 | |
|       if (obj != nullptr) {
 | |
|         down_cast<JNIEnvExt*>(env)->CheckMonitorRelease(obj);
 | |
|       }
 | |
|       JniValueType result;
 | |
|       result.i = baseEnv(env)->MonitorExit(env, obj);
 | |
|       if (sc.Check(soa, false, "i", &result)) {
 | |
|         return result.i;
 | |
|       }
 | |
|     }
 | |
|     return JNI_ERR;
 | |
|   }
 | |
| 
 | |
|   static void* GetPrimitiveArrayCritical(JNIEnv* env, jarray array, jboolean* is_copy) {
 | |
|     CHECK_ATTACHED_THREAD(__FUNCTION__, nullptr);
 | |
|     ScopedObjectAccess soa(env);
 | |
|     ScopedCheck sc(kFlag_CritGet, __FUNCTION__);
 | |
|     JniValueType args[3] = {{.E = env}, {.a = array}, {.p = is_copy}};
 | |
|     if (sc.Check(soa, true, "Eap", args)) {
 | |
|       JniValueType result;
 | |
|       void* ptr = baseEnv(env)->GetPrimitiveArrayCritical(env, array, is_copy);
 | |
|       if (ptr != nullptr && soa.ForceCopy()) {
 | |
|         ptr = GuardedCopy::CreateGuardedPACopy(env, array, is_copy, ptr);
 | |
|       }
 | |
|       result.p = ptr;
 | |
|       if (sc.Check(soa, false, "p", &result)) {
 | |
|         return const_cast<void*>(result.p);
 | |
|       }
 | |
|     }
 | |
|     return nullptr;
 | |
|   }
 | |
| 
 | |
|   static void ReleasePrimitiveArrayCritical(JNIEnv* env, jarray array, void* carray, jint mode) {
 | |
|     CHECK_ATTACHED_THREAD_VOID(__FUNCTION__);
 | |
|     ScopedObjectAccess soa(env);
 | |
|     ScopedCheck sc(kFlag_CritRelease | kFlag_ExcepOkay, __FUNCTION__);
 | |
|     sc.CheckNonNull(carray);
 | |
|     JniValueType args[4] = {{.E = env}, {.a = array}, {.p = carray}, {.r = mode}};
 | |
|     if (sc.Check(soa, true, "Eapr", args)) {
 | |
|       if (soa.ForceCopy()) {
 | |
|         carray = GuardedCopy::ReleaseGuardedPACopy(__FUNCTION__, env, array, carray, mode);
 | |
|       }
 | |
|       baseEnv(env)->ReleasePrimitiveArrayCritical(env, array, carray, mode);
 | |
|       JniValueType result;
 | |
|       result.V = nullptr;
 | |
|       sc.Check(soa, false, "V", &result);
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   static jobject NewDirectByteBuffer(JNIEnv* env, void* address, jlong capacity) {
 | |
|     CHECK_ATTACHED_THREAD(__FUNCTION__, nullptr);
 | |
|     ScopedObjectAccess soa(env);
 | |
|     ScopedCheck sc(kFlag_Default, __FUNCTION__);
 | |
|     JniValueType args[3] = {{.E = env}, {.p = address}, {.J = capacity}};
 | |
|     if (sc.Check(soa, true, "EpJ", args)) {
 | |
|       JniValueType result;
 | |
|       // Note: the validity of address and capacity are checked in the base implementation.
 | |
|       result.L = baseEnv(env)->NewDirectByteBuffer(env, address, capacity);
 | |
|       if (sc.Check(soa, false, "L", &result)) {
 | |
|         return result.L;
 | |
|       }
 | |
|     }
 | |
|     return nullptr;
 | |
|   }
 | |
| 
 | |
|   static void* GetDirectBufferAddress(JNIEnv* env, jobject buf) {
 | |
|     CHECK_ATTACHED_THREAD(__FUNCTION__, nullptr);
 | |
|     ScopedObjectAccess soa(env);
 | |
|     ScopedCheck sc(kFlag_Default, __FUNCTION__);
 | |
|     JniValueType args[2] = {{.E = env}, {.L = buf}};
 | |
|     if (sc.Check(soa, true, "EL", args)) {
 | |
|       JniValueType result;
 | |
|       // Note: this is implemented in the base environment by a GetLongField which will check the
 | |
|       // type of buf in GetLongField above.
 | |
|       result.p = baseEnv(env)->GetDirectBufferAddress(env, buf);
 | |
|       if (sc.Check(soa, false, "p", &result)) {
 | |
|         return const_cast<void*>(result.p);
 | |
|       }
 | |
|     }
 | |
|     return nullptr;
 | |
|   }
 | |
| 
 | |
|   static jlong GetDirectBufferCapacity(JNIEnv* env, jobject buf) {
 | |
|     CHECK_ATTACHED_THREAD(__FUNCTION__, JNI_ERR);
 | |
|     ScopedObjectAccess soa(env);
 | |
|     ScopedCheck sc(kFlag_Default, __FUNCTION__);
 | |
|     JniValueType args[2] = {{.E = env}, {.L = buf}};
 | |
|     if (sc.Check(soa, true, "EL", args)) {
 | |
|       JniValueType result;
 | |
|       // Note: this is implemented in the base environment by a GetIntField which will check the
 | |
|       // type of buf in GetIntField above.
 | |
|       result.J = baseEnv(env)->GetDirectBufferCapacity(env, buf);
 | |
|       if (sc.Check(soa, false, "J", &result)) {
 | |
|         return result.J;
 | |
|       }
 | |
|     }
 | |
|     return JNI_ERR;
 | |
|   }
 | |
| 
 | |
|  private:
 | |
|   static JavaVMExt* GetJavaVMExt(JNIEnv* env) {
 | |
|     return reinterpret_cast<JNIEnvExt*>(env)->GetVm();
 | |
|   }
 | |
| 
 | |
|   static const JNINativeInterface* baseEnv(JNIEnv* env) {
 | |
|     return reinterpret_cast<JNIEnvExt*>(env)->GetUncheckedFunctions();
 | |
|   }
 | |
| 
 | |
|   static jobject NewRef(const char* function_name, JNIEnv* env, jobject obj, IndirectRefKind kind) {
 | |
|     CHECK_ATTACHED_THREAD(function_name, nullptr);
 | |
|     ScopedObjectAccess soa(env);
 | |
|     ScopedCheck sc(kFlag_Default, function_name);
 | |
|     JniValueType args[2] = {{.E = env}, {.L = obj}};
 | |
|     if (sc.Check(soa, true, "EL", args)) {
 | |
|       JniValueType result;
 | |
|       switch (kind) {
 | |
|         case kGlobal:
 | |
|           result.L = baseEnv(env)->NewGlobalRef(env, obj);
 | |
|           break;
 | |
|         case kLocal:
 | |
|           result.L = baseEnv(env)->NewLocalRef(env, obj);
 | |
|           break;
 | |
|         case kWeakGlobal:
 | |
|           result.L = baseEnv(env)->NewWeakGlobalRef(env, obj);
 | |
|           break;
 | |
|         default:
 | |
|           LOG(FATAL) << "Unexpected reference kind: " << kind;
 | |
|       }
 | |
|       if (sc.Check(soa, false, "L", &result)) {
 | |
|         DCHECK_EQ(IsSameObject(env, obj, result.L), JNI_TRUE);
 | |
|         DCHECK(sc.CheckReferenceKind(kind, soa.Self(), result.L));
 | |
|         return result.L;
 | |
|       }
 | |
|     }
 | |
|     return nullptr;
 | |
|   }
 | |
| 
 | |
|   static void DeleteRef(const char* function_name, JNIEnv* env, jobject obj, IndirectRefKind kind) {
 | |
|     CHECK_ATTACHED_THREAD_VOID(function_name);
 | |
|     ScopedObjectAccess soa(env);
 | |
|     ScopedCheck sc(kFlag_ExcepOkay, function_name);
 | |
|     JniValueType args[2] = {{.E = env}, {.L = obj}};
 | |
|     sc.Check(soa, true, "EL", args);
 | |
|     if (sc.CheckReferenceKind(kind, soa.Self(), obj)) {
 | |
|       JniValueType result;
 | |
|       switch (kind) {
 | |
|         case kGlobal:
 | |
|           baseEnv(env)->DeleteGlobalRef(env, obj);
 | |
|           break;
 | |
|         case kLocal:
 | |
|           baseEnv(env)->DeleteLocalRef(env, obj);
 | |
|           break;
 | |
|         case kWeakGlobal:
 | |
|           baseEnv(env)->DeleteWeakGlobalRef(env, obj);
 | |
|           break;
 | |
|         default:
 | |
|           LOG(FATAL) << "Unexpected reference kind: " << kind;
 | |
|       }
 | |
|       result.V = nullptr;
 | |
|       sc.Check(soa, false, "V", &result);
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   static jmethodID GetMethodIDInternal(const char* function_name, JNIEnv* env, jclass c,
 | |
|                                        const char* name, const char* sig, bool is_static) {
 | |
|     CHECK_ATTACHED_THREAD(function_name, nullptr);
 | |
|     ScopedObjectAccess soa(env);
 | |
|     ScopedCheck sc(kFlag_Default, function_name);
 | |
|     JniValueType args[4] = {{.E = env}, {.c = c}, {.u = name}, {.u = sig}};
 | |
|     if (sc.Check(soa, true, "Ecuu", args)) {
 | |
|       JniValueType result;
 | |
|       if (is_static) {
 | |
|         result.m = baseEnv(env)->GetStaticMethodID(env, c, name, sig);
 | |
|       } else {
 | |
|         result.m = baseEnv(env)->GetMethodID(env, c, name, sig);
 | |
|       }
 | |
|       if (sc.Check(soa, false, "m", &result)) {
 | |
|         return result.m;
 | |
|       }
 | |
|     }
 | |
|     return nullptr;
 | |
|   }
 | |
| 
 | |
|   static jfieldID GetFieldIDInternal(const char* function_name, JNIEnv* env, jclass c,
 | |
|                                      const char* name, const char* sig, bool is_static) {
 | |
|     CHECK_ATTACHED_THREAD(function_name, nullptr);
 | |
|     ScopedObjectAccess soa(env);
 | |
|     ScopedCheck sc(kFlag_Default, function_name);
 | |
|     JniValueType args[4] = {{.E = env}, {.c = c}, {.u = name}, {.u = sig}};
 | |
|     if (sc.Check(soa, true, "Ecuu", args)) {
 | |
|       JniValueType result;
 | |
|       if (is_static) {
 | |
|         result.f = baseEnv(env)->GetStaticFieldID(env, c, name, sig);
 | |
|       } else {
 | |
|         result.f = baseEnv(env)->GetFieldID(env, c, name, sig);
 | |
|       }
 | |
|       if (sc.Check(soa, false, "f", &result)) {
 | |
|         return result.f;
 | |
|       }
 | |
|     }
 | |
|     return nullptr;
 | |
|   }
 | |
| 
 | |
|   static JniValueType GetField(const char* function_name, JNIEnv* env, jobject obj, jfieldID fid,
 | |
|                                bool is_static, Primitive::Type type) {
 | |
|     CHECK_ATTACHED_THREAD(function_name, JniValueType());
 | |
|     ScopedObjectAccess soa(env);
 | |
|     ScopedCheck sc(kFlag_Default, function_name);
 | |
|     JniValueType args[3] = {{.E = env}, {.L = obj}, {.f = fid}};
 | |
|     JniValueType result;
 | |
|     if (sc.Check(soa, true, is_static ? "Ecf" : "ELf", args) &&
 | |
|         sc.CheckFieldAccess(soa, obj, fid, is_static, type)) {
 | |
|       const char* result_check = nullptr;
 | |
|       switch (type) {
 | |
|         case Primitive::kPrimNot:
 | |
|           if (is_static) {
 | |
|             result.L = baseEnv(env)->GetStaticObjectField(env, down_cast<jclass>(obj), fid);
 | |
|           } else {
 | |
|             result.L = baseEnv(env)->GetObjectField(env, obj, fid);
 | |
|           }
 | |
|           result_check = "L";
 | |
|           break;
 | |
|         case Primitive::kPrimBoolean:
 | |
|           if (is_static) {
 | |
|             result.Z = baseEnv(env)->GetStaticBooleanField(env, down_cast<jclass>(obj), fid);
 | |
|           } else {
 | |
|             result.Z = baseEnv(env)->GetBooleanField(env, obj, fid);
 | |
|           }
 | |
|           result_check = "Z";
 | |
|           break;
 | |
|         case Primitive::kPrimByte:
 | |
|           if (is_static) {
 | |
|             result.B = baseEnv(env)->GetStaticByteField(env, down_cast<jclass>(obj), fid);
 | |
|           } else {
 | |
|             result.B = baseEnv(env)->GetByteField(env, obj, fid);
 | |
|           }
 | |
|           result_check = "B";
 | |
|           break;
 | |
|         case Primitive::kPrimChar:
 | |
|           if (is_static) {
 | |
|             result.C = baseEnv(env)->GetStaticCharField(env, down_cast<jclass>(obj), fid);
 | |
|           } else {
 | |
|             result.C = baseEnv(env)->GetCharField(env, obj, fid);
 | |
|           }
 | |
|           result_check = "C";
 | |
|           break;
 | |
|         case Primitive::kPrimShort:
 | |
|           if (is_static) {
 | |
|             result.S = baseEnv(env)->GetStaticShortField(env, down_cast<jclass>(obj), fid);
 | |
|           } else {
 | |
|             result.S = baseEnv(env)->GetShortField(env, obj, fid);
 | |
|           }
 | |
|           result_check = "S";
 | |
|           break;
 | |
|         case Primitive::kPrimInt:
 | |
|           if (is_static) {
 | |
|             result.I = baseEnv(env)->GetStaticIntField(env, down_cast<jclass>(obj), fid);
 | |
|           } else {
 | |
|             result.I = baseEnv(env)->GetIntField(env, obj, fid);
 | |
|           }
 | |
|           result_check = "I";
 | |
|           break;
 | |
|         case Primitive::kPrimLong:
 | |
|           if (is_static) {
 | |
|             result.J = baseEnv(env)->GetStaticLongField(env, down_cast<jclass>(obj), fid);
 | |
|           } else {
 | |
|             result.J = baseEnv(env)->GetLongField(env, obj, fid);
 | |
|           }
 | |
|           result_check = "J";
 | |
|           break;
 | |
|         case Primitive::kPrimFloat:
 | |
|           if (is_static) {
 | |
|             result.F = baseEnv(env)->GetStaticFloatField(env, down_cast<jclass>(obj), fid);
 | |
|           } else {
 | |
|             result.F = baseEnv(env)->GetFloatField(env, obj, fid);
 | |
|           }
 | |
|           result_check = "F";
 | |
|           break;
 | |
|         case Primitive::kPrimDouble:
 | |
|           if (is_static) {
 | |
|             result.D = baseEnv(env)->GetStaticDoubleField(env, down_cast<jclass>(obj), fid);
 | |
|           } else {
 | |
|             result.D = baseEnv(env)->GetDoubleField(env, obj, fid);
 | |
|           }
 | |
|           result_check = "D";
 | |
|           break;
 | |
|         case Primitive::kPrimVoid:
 | |
|           LOG(FATAL) << "Unexpected type: " << type;
 | |
|           UNREACHABLE();
 | |
|       }
 | |
|       if (sc.Check(soa, false, result_check, &result)) {
 | |
|         return result;
 | |
|       }
 | |
|     }
 | |
|     result.J = 0;
 | |
|     return result;
 | |
|   }
 | |
| 
 | |
|   static void SetField(const char* function_name, JNIEnv* env, jobject obj, jfieldID fid,
 | |
|                        bool is_static, Primitive::Type type, JniValueType value) {
 | |
|     CHECK_ATTACHED_THREAD_VOID(function_name);
 | |
|     ScopedObjectAccess soa(env);
 | |
|     ScopedCheck sc(kFlag_Default, function_name);
 | |
|     JniValueType args[4] = {{.E = env}, {.L = obj}, {.f = fid}, value};
 | |
|     char sig[5] = { 'E', is_static ? 'c' : 'L', 'f',
 | |
|         type == Primitive::kPrimNot ? 'L' : Primitive::Descriptor(type)[0], '\0'};
 | |
|     if (sc.Check(soa, true, sig, args) &&
 | |
|         sc.CheckFieldAccess(soa, obj, fid, is_static, type)) {
 | |
|       switch (type) {
 | |
|         case Primitive::kPrimNot:
 | |
|           if (is_static) {
 | |
|             baseEnv(env)->SetStaticObjectField(env, down_cast<jclass>(obj), fid, value.L);
 | |
|           } else {
 | |
|             baseEnv(env)->SetObjectField(env, obj, fid, value.L);
 | |
|           }
 | |
|           break;
 | |
|         case Primitive::kPrimBoolean:
 | |
|           if (is_static) {
 | |
|             baseEnv(env)->SetStaticBooleanField(env, down_cast<jclass>(obj), fid, value.Z);
 | |
|           } else {
 | |
|             baseEnv(env)->SetBooleanField(env, obj, fid, value.Z);
 | |
|           }
 | |
|           break;
 | |
|         case Primitive::kPrimByte:
 | |
|           if (is_static) {
 | |
|             baseEnv(env)->SetStaticByteField(env, down_cast<jclass>(obj), fid, value.B);
 | |
|           } else {
 | |
|             baseEnv(env)->SetByteField(env, obj, fid, value.B);
 | |
|           }
 | |
|           break;
 | |
|         case Primitive::kPrimChar:
 | |
|           if (is_static) {
 | |
|             baseEnv(env)->SetStaticCharField(env, down_cast<jclass>(obj), fid, value.C);
 | |
|           } else {
 | |
|             baseEnv(env)->SetCharField(env, obj, fid, value.C);
 | |
|           }
 | |
|           break;
 | |
|         case Primitive::kPrimShort:
 | |
|           if (is_static) {
 | |
|             baseEnv(env)->SetStaticShortField(env, down_cast<jclass>(obj), fid, value.S);
 | |
|           } else {
 | |
|             baseEnv(env)->SetShortField(env, obj, fid, value.S);
 | |
|           }
 | |
|           break;
 | |
|         case Primitive::kPrimInt:
 | |
|           if (is_static) {
 | |
|             baseEnv(env)->SetStaticIntField(env, down_cast<jclass>(obj), fid, value.I);
 | |
|           } else {
 | |
|             baseEnv(env)->SetIntField(env, obj, fid, value.I);
 | |
|           }
 | |
|           break;
 | |
|         case Primitive::kPrimLong:
 | |
|           if (is_static) {
 | |
|             baseEnv(env)->SetStaticLongField(env, down_cast<jclass>(obj), fid, value.J);
 | |
|           } else {
 | |
|             baseEnv(env)->SetLongField(env, obj, fid, value.J);
 | |
|           }
 | |
|           break;
 | |
|         case Primitive::kPrimFloat:
 | |
|           if (is_static) {
 | |
|             baseEnv(env)->SetStaticFloatField(env, down_cast<jclass>(obj), fid, value.F);
 | |
|           } else {
 | |
|             baseEnv(env)->SetFloatField(env, obj, fid, value.F);
 | |
|           }
 | |
|           break;
 | |
|         case Primitive::kPrimDouble:
 | |
|           if (is_static) {
 | |
|             baseEnv(env)->SetStaticDoubleField(env, down_cast<jclass>(obj), fid, value.D);
 | |
|           } else {
 | |
|             baseEnv(env)->SetDoubleField(env, obj, fid, value.D);
 | |
|           }
 | |
|           break;
 | |
|         case Primitive::kPrimVoid:
 | |
|           LOG(FATAL) << "Unexpected type: " << type;
 | |
|           UNREACHABLE();
 | |
|       }
 | |
|       JniValueType result;
 | |
|       result.V = nullptr;
 | |
|       sc.Check(soa, false, "V", &result);
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   static bool CheckCallArgs(ScopedObjectAccess& soa, ScopedCheck& sc, JNIEnv* env, jobject obj,
 | |
|                             jclass c, jmethodID mid, InvokeType invoke, const VarArgs* vargs)
 | |
|       REQUIRES_SHARED(Locks::mutator_lock_) {
 | |
|     bool checked;
 | |
|     switch (invoke) {
 | |
|       case kVirtual: {
 | |
|         DCHECK(c == nullptr);
 | |
|         JniValueType args[4] = {{.E = env}, {.L = obj}, {.m = mid}, {.va = vargs}};
 | |
|         checked = sc.Check(soa, true, "ELm.", args);
 | |
|         break;
 | |
|       }
 | |
|       case kDirect: {
 | |
|         JniValueType args[5] = {{.E = env}, {.L = obj}, {.c = c}, {.m = mid}, {.va = vargs}};
 | |
|         checked = sc.Check(soa, true, "ELcm.", args);
 | |
|         break;
 | |
|       }
 | |
|       case kStatic: {
 | |
|         DCHECK(obj == nullptr);
 | |
|         JniValueType args[4] = {{.E = env}, {.c = c}, {.m = mid}, {.va = vargs}};
 | |
|         checked = sc.Check(soa, true, "Ecm.", args);
 | |
|         break;
 | |
|       }
 | |
|       default:
 | |
|         LOG(FATAL) << "Unexpected invoke: " << invoke;
 | |
|         checked = false;
 | |
|         break;
 | |
|     }
 | |
|     return checked;
 | |
|   }
 | |
| 
 | |
|   static JniValueType CallMethodA(const char* function_name, JNIEnv* env, jobject obj, jclass c,
 | |
|                                   jmethodID mid, const jvalue* vargs, Primitive::Type type,
 | |
|                                   InvokeType invoke) {
 | |
|     CHECK_ATTACHED_THREAD(function_name, JniValueType());
 | |
|     ScopedObjectAccess soa(env);
 | |
|     ScopedCheck sc(kFlag_Default, function_name);
 | |
|     JniValueType result;
 | |
|     VarArgs rest(mid, vargs);
 | |
|     if (CheckCallArgs(soa, sc, env, obj, c, mid, invoke, &rest) &&
 | |
|         sc.CheckMethodAndSig(soa, obj, c, mid, type, invoke)) {
 | |
|       const char* result_check;
 | |
|       switch (type) {
 | |
|         case Primitive::kPrimNot:
 | |
|           result_check = "L";
 | |
|           switch (invoke) {
 | |
|             case kVirtual:
 | |
|               result.L = baseEnv(env)->CallObjectMethodA(env, obj, mid, vargs);
 | |
|               break;
 | |
|             case kDirect:
 | |
|               result.L = baseEnv(env)->CallNonvirtualObjectMethodA(env, obj, c, mid, vargs);
 | |
|               break;
 | |
|             case kStatic:
 | |
|               result.L = baseEnv(env)->CallStaticObjectMethodA(env, c, mid, vargs);
 | |
|               break;
 | |
|             default:
 | |
|               break;
 | |
|           }
 | |
|           break;
 | |
|         case Primitive::kPrimBoolean:
 | |
|           result_check = "Z";
 | |
|           switch (invoke) {
 | |
|             case kVirtual:
 | |
|               result.Z = baseEnv(env)->CallBooleanMethodA(env, obj, mid, vargs);
 | |
|               break;
 | |
|             case kDirect:
 | |
|               result.Z = baseEnv(env)->CallNonvirtualBooleanMethodA(env, obj, c, mid, vargs);
 | |
|               break;
 | |
|             case kStatic:
 | |
|               result.Z = baseEnv(env)->CallStaticBooleanMethodA(env, c, mid, vargs);
 | |
|               break;
 | |
|             default:
 | |
|               break;
 | |
|           }
 | |
|           break;
 | |
|         case Primitive::kPrimByte:
 | |
|           result_check = "B";
 | |
|           switch (invoke) {
 | |
|             case kVirtual:
 | |
|               result.B = baseEnv(env)->CallByteMethodA(env, obj, mid, vargs);
 | |
|               break;
 | |
|             case kDirect:
 | |
|               result.B = baseEnv(env)->CallNonvirtualByteMethodA(env, obj, c, mid, vargs);
 | |
|               break;
 | |
|             case kStatic:
 | |
|               result.B = baseEnv(env)->CallStaticByteMethodA(env, c, mid, vargs);
 | |
|               break;
 | |
|             default:
 | |
|               break;
 | |
|           }
 | |
|           break;
 | |
|         case Primitive::kPrimChar:
 | |
|           result_check = "C";
 | |
|           switch (invoke) {
 | |
|             case kVirtual:
 | |
|               result.C = baseEnv(env)->CallCharMethodA(env, obj, mid, vargs);
 | |
|               break;
 | |
|             case kDirect:
 | |
|               result.C = baseEnv(env)->CallNonvirtualCharMethodA(env, obj, c, mid, vargs);
 | |
|               break;
 | |
|             case kStatic:
 | |
|               result.C = baseEnv(env)->CallStaticCharMethodA(env, c, mid, vargs);
 | |
|               break;
 | |
|             default:
 | |
|               break;
 | |
|           }
 | |
|           break;
 | |
|         case Primitive::kPrimShort:
 | |
|           result_check = "S";
 | |
|           switch (invoke) {
 | |
|             case kVirtual:
 | |
|               result.S = baseEnv(env)->CallShortMethodA(env, obj, mid, vargs);
 | |
|               break;
 | |
|             case kDirect:
 | |
|               result.S = baseEnv(env)->CallNonvirtualShortMethodA(env, obj, c, mid, vargs);
 | |
|               break;
 | |
|             case kStatic:
 | |
|               result.S = baseEnv(env)->CallStaticShortMethodA(env, c, mid, vargs);
 | |
|               break;
 | |
|             default:
 | |
|               break;
 | |
|           }
 | |
|           break;
 | |
|         case Primitive::kPrimInt:
 | |
|           result_check = "I";
 | |
|           switch (invoke) {
 | |
|             case kVirtual:
 | |
|               result.I = baseEnv(env)->CallIntMethodA(env, obj, mid, vargs);
 | |
|               break;
 | |
|             case kDirect:
 | |
|               result.I = baseEnv(env)->CallNonvirtualIntMethodA(env, obj, c, mid, vargs);
 | |
|               break;
 | |
|             case kStatic:
 | |
|               result.I = baseEnv(env)->CallStaticIntMethodA(env, c, mid, vargs);
 | |
|               break;
 | |
|             default:
 | |
|               break;
 | |
|           }
 | |
|           break;
 | |
|         case Primitive::kPrimLong:
 | |
|           result_check = "J";
 | |
|           switch (invoke) {
 | |
|             case kVirtual:
 | |
|               result.J = baseEnv(env)->CallLongMethodA(env, obj, mid, vargs);
 | |
|               break;
 | |
|             case kDirect:
 | |
|               result.J = baseEnv(env)->CallNonvirtualLongMethodA(env, obj, c, mid, vargs);
 | |
|               break;
 | |
|             case kStatic:
 | |
|               result.J = baseEnv(env)->CallStaticLongMethodA(env, c, mid, vargs);
 | |
|               break;
 | |
|             default:
 | |
|               break;
 | |
|           }
 | |
|           break;
 | |
|         case Primitive::kPrimFloat:
 | |
|           result_check = "F";
 | |
|           switch (invoke) {
 | |
|             case kVirtual:
 | |
|               result.F = baseEnv(env)->CallFloatMethodA(env, obj, mid, vargs);
 | |
|               break;
 | |
|             case kDirect:
 | |
|               result.F = baseEnv(env)->CallNonvirtualFloatMethodA(env, obj, c, mid, vargs);
 | |
|               break;
 | |
|             case kStatic:
 | |
|               result.F = baseEnv(env)->CallStaticFloatMethodA(env, c, mid, vargs);
 | |
|               break;
 | |
|             default:
 | |
|               break;
 | |
|           }
 | |
|           break;
 | |
|         case Primitive::kPrimDouble:
 | |
|           result_check = "D";
 | |
|           switch (invoke) {
 | |
|             case kVirtual:
 | |
|               result.D = baseEnv(env)->CallDoubleMethodA(env, obj, mid, vargs);
 | |
|               break;
 | |
|             case kDirect:
 | |
|               result.D = baseEnv(env)->CallNonvirtualDoubleMethodA(env, obj, c, mid, vargs);
 | |
|               break;
 | |
|             case kStatic:
 | |
|               result.D = baseEnv(env)->CallStaticDoubleMethodA(env, c, mid, vargs);
 | |
|               break;
 | |
|             default:
 | |
|               break;
 | |
|           }
 | |
|           break;
 | |
|         case Primitive::kPrimVoid:
 | |
|           result_check = "V";
 | |
|           result.V = nullptr;
 | |
|           switch (invoke) {
 | |
|             case kVirtual:
 | |
|               baseEnv(env)->CallVoidMethodA(env, obj, mid, vargs);
 | |
|               break;
 | |
|             case kDirect:
 | |
|               baseEnv(env)->CallNonvirtualVoidMethodA(env, obj, c, mid, vargs);
 | |
|               break;
 | |
|             case kStatic:
 | |
|               baseEnv(env)->CallStaticVoidMethodA(env, c, mid, vargs);
 | |
|               break;
 | |
|             default:
 | |
|               LOG(FATAL) << "Unexpected invoke: " << invoke;
 | |
|           }
 | |
|           break;
 | |
|         default:
 | |
|           LOG(FATAL) << "Unexpected return type: " << type;
 | |
|           result_check = nullptr;
 | |
|       }
 | |
|       if (sc.Check(soa, false, result_check, &result)) {
 | |
|         return result;
 | |
|       }
 | |
|     }
 | |
|     result.J = 0;
 | |
|     return result;
 | |
|   }
 | |
| 
 | |
|   static JniValueType CallMethodV(const char* function_name, JNIEnv* env, jobject obj, jclass c,
 | |
|                                   jmethodID mid, va_list vargs, Primitive::Type type,
 | |
|                                   InvokeType invoke) {
 | |
|     CHECK_ATTACHED_THREAD(function_name, JniValueType());
 | |
|     ScopedObjectAccess soa(env);
 | |
|     ScopedCheck sc(kFlag_Default, function_name);
 | |
|     JniValueType result;
 | |
|     VarArgs rest(mid, vargs);
 | |
|     if (CheckCallArgs(soa, sc, env, obj, c, mid, invoke, &rest) &&
 | |
|         sc.CheckMethodAndSig(soa, obj, c, mid, type, invoke)) {
 | |
|       const char* result_check;
 | |
|       switch (type) {
 | |
|         case Primitive::kPrimNot:
 | |
|           result_check = "L";
 | |
|           switch (invoke) {
 | |
|             case kVirtual:
 | |
|               result.L = baseEnv(env)->CallObjectMethodV(env, obj, mid, vargs);
 | |
|               break;
 | |
|             case kDirect:
 | |
|               result.L = baseEnv(env)->CallNonvirtualObjectMethodV(env, obj, c, mid, vargs);
 | |
|               break;
 | |
|             case kStatic:
 | |
|               result.L = baseEnv(env)->CallStaticObjectMethodV(env, c, mid, vargs);
 | |
|               break;
 | |
|             default:
 | |
|               LOG(FATAL) << "Unexpected invoke: " << invoke;
 | |
|           }
 | |
|           break;
 | |
|         case Primitive::kPrimBoolean:
 | |
|           result_check = "Z";
 | |
|           switch (invoke) {
 | |
|             case kVirtual:
 | |
|               result.Z = baseEnv(env)->CallBooleanMethodV(env, obj, mid, vargs);
 | |
|               break;
 | |
|             case kDirect:
 | |
|               result.Z = baseEnv(env)->CallNonvirtualBooleanMethodV(env, obj, c, mid, vargs);
 | |
|               break;
 | |
|             case kStatic:
 | |
|               result.Z = baseEnv(env)->CallStaticBooleanMethodV(env, c, mid, vargs);
 | |
|               break;
 | |
|             default:
 | |
|               LOG(FATAL) << "Unexpected invoke: " << invoke;
 | |
|           }
 | |
|           break;
 | |
|         case Primitive::kPrimByte:
 | |
|           result_check = "B";
 | |
|           switch (invoke) {
 | |
|             case kVirtual:
 | |
|               result.B = baseEnv(env)->CallByteMethodV(env, obj, mid, vargs);
 | |
|               break;
 | |
|             case kDirect:
 | |
|               result.B = baseEnv(env)->CallNonvirtualByteMethodV(env, obj, c, mid, vargs);
 | |
|               break;
 | |
|             case kStatic:
 | |
|               result.B = baseEnv(env)->CallStaticByteMethodV(env, c, mid, vargs);
 | |
|               break;
 | |
|             default:
 | |
|               LOG(FATAL) << "Unexpected invoke: " << invoke;
 | |
|           }
 | |
|           break;
 | |
|         case Primitive::kPrimChar:
 | |
|           result_check = "C";
 | |
|           switch (invoke) {
 | |
|             case kVirtual:
 | |
|               result.C = baseEnv(env)->CallCharMethodV(env, obj, mid, vargs);
 | |
|               break;
 | |
|             case kDirect:
 | |
|               result.C = baseEnv(env)->CallNonvirtualCharMethodV(env, obj, c, mid, vargs);
 | |
|               break;
 | |
|             case kStatic:
 | |
|               result.C = baseEnv(env)->CallStaticCharMethodV(env, c, mid, vargs);
 | |
|               break;
 | |
|             default:
 | |
|               LOG(FATAL) << "Unexpected invoke: " << invoke;
 | |
|           }
 | |
|           break;
 | |
|         case Primitive::kPrimShort:
 | |
|           result_check = "S";
 | |
|           switch (invoke) {
 | |
|             case kVirtual:
 | |
|               result.S = baseEnv(env)->CallShortMethodV(env, obj, mid, vargs);
 | |
|               break;
 | |
|             case kDirect:
 | |
|               result.S = baseEnv(env)->CallNonvirtualShortMethodV(env, obj, c, mid, vargs);
 | |
|               break;
 | |
|             case kStatic:
 | |
|               result.S = baseEnv(env)->CallStaticShortMethodV(env, c, mid, vargs);
 | |
|               break;
 | |
|             default:
 | |
|               LOG(FATAL) << "Unexpected invoke: " << invoke;
 | |
|           }
 | |
|           break;
 | |
|         case Primitive::kPrimInt:
 | |
|           result_check = "I";
 | |
|           switch (invoke) {
 | |
|             case kVirtual:
 | |
|               result.I = baseEnv(env)->CallIntMethodV(env, obj, mid, vargs);
 | |
|               break;
 | |
|             case kDirect:
 | |
|               result.I = baseEnv(env)->CallNonvirtualIntMethodV(env, obj, c, mid, vargs);
 | |
|               break;
 | |
|             case kStatic:
 | |
|               result.I = baseEnv(env)->CallStaticIntMethodV(env, c, mid, vargs);
 | |
|               break;
 | |
|             default:
 | |
|               LOG(FATAL) << "Unexpected invoke: " << invoke;
 | |
|           }
 | |
|           break;
 | |
|         case Primitive::kPrimLong:
 | |
|           result_check = "J";
 | |
|           switch (invoke) {
 | |
|             case kVirtual:
 | |
|               result.J = baseEnv(env)->CallLongMethodV(env, obj, mid, vargs);
 | |
|               break;
 | |
|             case kDirect:
 | |
|               result.J = baseEnv(env)->CallNonvirtualLongMethodV(env, obj, c, mid, vargs);
 | |
|               break;
 | |
|             case kStatic:
 | |
|               result.J = baseEnv(env)->CallStaticLongMethodV(env, c, mid, vargs);
 | |
|               break;
 | |
|             default:
 | |
|               LOG(FATAL) << "Unexpected invoke: " << invoke;
 | |
|           }
 | |
|           break;
 | |
|         case Primitive::kPrimFloat:
 | |
|           result_check = "F";
 | |
|           switch (invoke) {
 | |
|             case kVirtual:
 | |
|               result.F = baseEnv(env)->CallFloatMethodV(env, obj, mid, vargs);
 | |
|               break;
 | |
|             case kDirect:
 | |
|               result.F = baseEnv(env)->CallNonvirtualFloatMethodV(env, obj, c, mid, vargs);
 | |
|               break;
 | |
|             case kStatic:
 | |
|               result.F = baseEnv(env)->CallStaticFloatMethodV(env, c, mid, vargs);
 | |
|               break;
 | |
|             default:
 | |
|               LOG(FATAL) << "Unexpected invoke: " << invoke;
 | |
|           }
 | |
|           break;
 | |
|         case Primitive::kPrimDouble:
 | |
|           result_check = "D";
 | |
|           switch (invoke) {
 | |
|             case kVirtual:
 | |
|               result.D = baseEnv(env)->CallDoubleMethodV(env, obj, mid, vargs);
 | |
|               break;
 | |
|             case kDirect:
 | |
|               result.D = baseEnv(env)->CallNonvirtualDoubleMethodV(env, obj, c, mid, vargs);
 | |
|               break;
 | |
|             case kStatic:
 | |
|               result.D = baseEnv(env)->CallStaticDoubleMethodV(env, c, mid, vargs);
 | |
|               break;
 | |
|             default:
 | |
|               LOG(FATAL) << "Unexpected invoke: " << invoke;
 | |
|           }
 | |
|           break;
 | |
|         case Primitive::kPrimVoid:
 | |
|           result_check = "V";
 | |
|           result.V = nullptr;
 | |
|           switch (invoke) {
 | |
|             case kVirtual:
 | |
|               baseEnv(env)->CallVoidMethodV(env, obj, mid, vargs);
 | |
|               break;
 | |
|             case kDirect:
 | |
|               baseEnv(env)->CallNonvirtualVoidMethodV(env, obj, c, mid, vargs);
 | |
|               break;
 | |
|             case kStatic:
 | |
|               baseEnv(env)->CallStaticVoidMethodV(env, c, mid, vargs);
 | |
|               break;
 | |
|             default:
 | |
|               LOG(FATAL) << "Unexpected invoke: " << invoke;
 | |
|           }
 | |
|           break;
 | |
|         default:
 | |
|           LOG(FATAL) << "Unexpected return type: " << type;
 | |
|           result_check = nullptr;
 | |
|       }
 | |
|       if (sc.Check(soa, false, result_check, &result)) {
 | |
|         return result;
 | |
|       }
 | |
|     }
 | |
|     result.J = 0;
 | |
|     return result;
 | |
|   }
 | |
| 
 | |
|   static const void* GetStringCharsInternal(const char* function_name, JNIEnv* env, jstring string,
 | |
|                                             jboolean* is_copy, bool utf, bool critical) {
 | |
|     CHECK_ATTACHED_THREAD(function_name, nullptr);
 | |
|     ScopedObjectAccess soa(env);
 | |
|     int flags = critical ? kFlag_CritGet : kFlag_CritOkay;
 | |
|     ScopedCheck sc(flags, function_name);
 | |
|     JniValueType args[3] = {{.E = env}, {.s = string}, {.p = is_copy}};
 | |
|     if (sc.Check(soa, true, "Esp", args)) {
 | |
|       JniValueType result;
 | |
|       void* ptr;
 | |
|       if (utf) {
 | |
|         CHECK(!critical);
 | |
|         ptr = const_cast<char*>(baseEnv(env)->GetStringUTFChars(env, string, is_copy));
 | |
|         result.u = reinterpret_cast<char*>(ptr);
 | |
|       } else {
 | |
|         ptr = const_cast<jchar*>(critical ? baseEnv(env)->GetStringCritical(env, string, is_copy) :
 | |
|             baseEnv(env)->GetStringChars(env, string, is_copy));
 | |
|         result.p = ptr;
 | |
|       }
 | |
|       // TODO: could we be smarter about not copying when local_is_copy?
 | |
|       if (ptr != nullptr && soa.ForceCopy()) {
 | |
|         if (utf) {
 | |
|           size_t length_in_bytes = strlen(result.u) + 1;
 | |
|           result.u =
 | |
|               reinterpret_cast<const char*>(GuardedCopy::Create(ptr, length_in_bytes, false));
 | |
|         } else {
 | |
|           size_t length_in_bytes = baseEnv(env)->GetStringLength(env, string) * 2;
 | |
|           result.p =
 | |
|               reinterpret_cast<const jchar*>(GuardedCopy::Create(ptr, length_in_bytes, false));
 | |
|         }
 | |
|         if (is_copy != nullptr) {
 | |
|           *is_copy = JNI_TRUE;
 | |
|         }
 | |
|       }
 | |
|       if (sc.Check(soa, false, utf ? "u" : "p", &result)) {
 | |
|         return utf ? result.u : result.p;
 | |
|       }
 | |
|     }
 | |
|     return nullptr;
 | |
|   }
 | |
| 
 | |
|   static void ReleaseStringCharsInternal(const char* function_name, JNIEnv* env, jstring string,
 | |
|                                          const void* chars, bool utf, bool critical) {
 | |
|     CHECK_ATTACHED_THREAD_VOID(function_name);
 | |
|     ScopedObjectAccess soa(env);
 | |
|     int flags = kFlag_ExcepOkay | kFlag_Release;
 | |
|     if (critical) {
 | |
|       flags |= kFlag_CritRelease;
 | |
|     }
 | |
|     ScopedCheck sc(flags, function_name);
 | |
|     sc.CheckNonNull(chars);
 | |
|     bool force_copy_ok = !soa.ForceCopy() || GuardedCopy::Check(function_name, chars, false);
 | |
|     if (force_copy_ok && soa.ForceCopy()) {
 | |
|       chars = reinterpret_cast<const jchar*>(GuardedCopy::Destroy(const_cast<void*>(chars)));
 | |
|     }
 | |
|     if (force_copy_ok) {
 | |
|       JniValueType args[3] = {{.E = env}, {.s = string}, {.p = chars}};
 | |
|       if (sc.Check(soa, true, utf ? "Esu" : "Esp", args)) {
 | |
|         if (utf) {
 | |
|           CHECK(!critical);
 | |
|           baseEnv(env)->ReleaseStringUTFChars(env, string, reinterpret_cast<const char*>(chars));
 | |
|         } else {
 | |
|           if (critical) {
 | |
|             baseEnv(env)->ReleaseStringCritical(env, string, reinterpret_cast<const jchar*>(chars));
 | |
|           } else {
 | |
|             baseEnv(env)->ReleaseStringChars(env, string, reinterpret_cast<const jchar*>(chars));
 | |
|           }
 | |
|         }
 | |
|         JniValueType result;
 | |
|         sc.Check(soa, false, "V", &result);
 | |
|       }
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   static jarray NewPrimitiveArray(const char* function_name, JNIEnv* env, jsize length,
 | |
|                                   Primitive::Type type) {
 | |
|     CHECK_ATTACHED_THREAD(function_name, nullptr);
 | |
|     ScopedObjectAccess soa(env);
 | |
|     ScopedCheck sc(kFlag_Default, function_name);
 | |
|     JniValueType args[2] = {{.E = env}, {.z = length}};
 | |
|     if (sc.Check(soa, true, "Ez", args)) {
 | |
|       JniValueType result;
 | |
|       switch (type) {
 | |
|         case Primitive::kPrimBoolean:
 | |
|           result.a = baseEnv(env)->NewBooleanArray(env, length);
 | |
|           break;
 | |
|         case Primitive::kPrimByte:
 | |
|           result.a = baseEnv(env)->NewByteArray(env, length);
 | |
|           break;
 | |
|         case Primitive::kPrimChar:
 | |
|           result.a = baseEnv(env)->NewCharArray(env, length);
 | |
|           break;
 | |
|         case Primitive::kPrimShort:
 | |
|           result.a = baseEnv(env)->NewShortArray(env, length);
 | |
|           break;
 | |
|         case Primitive::kPrimInt:
 | |
|           result.a = baseEnv(env)->NewIntArray(env, length);
 | |
|           break;
 | |
|         case Primitive::kPrimLong:
 | |
|           result.a = baseEnv(env)->NewLongArray(env, length);
 | |
|           break;
 | |
|         case Primitive::kPrimFloat:
 | |
|           result.a = baseEnv(env)->NewFloatArray(env, length);
 | |
|           break;
 | |
|         case Primitive::kPrimDouble:
 | |
|           result.a = baseEnv(env)->NewDoubleArray(env, length);
 | |
|           break;
 | |
|         default:
 | |
|           LOG(FATAL) << "Unexpected primitive type: " << type;
 | |
|       }
 | |
|       if (sc.Check(soa, false, "a", &result)) {
 | |
|         return result.a;
 | |
|       }
 | |
|     }
 | |
|     return nullptr;
 | |
|   }
 | |
| 
 | |
|   static void* GetPrimitiveArrayElements(const char* function_name, Primitive::Type type,
 | |
|                                          JNIEnv* env, jarray array, jboolean* is_copy) {
 | |
|     CHECK_ATTACHED_THREAD(function_name, nullptr);
 | |
|     ScopedObjectAccess soa(env);
 | |
|     ScopedCheck sc(kFlag_Default, function_name);
 | |
|     JniValueType args[3] = {{.E = env}, {.a = array}, {.p = is_copy}};
 | |
|     if (sc.Check(soa, true, "Eap", args) && sc.CheckPrimitiveArrayType(soa, array, type)) {
 | |
|       JniValueType result;
 | |
|       void* ptr = nullptr;
 | |
|       switch (type) {
 | |
|         case Primitive::kPrimBoolean:
 | |
|           ptr = baseEnv(env)->GetBooleanArrayElements(env, down_cast<jbooleanArray>(array),
 | |
|                                                       is_copy);
 | |
|           break;
 | |
|         case Primitive::kPrimByte:
 | |
|           ptr = baseEnv(env)->GetByteArrayElements(env, down_cast<jbyteArray>(array), is_copy);
 | |
|           break;
 | |
|         case Primitive::kPrimChar:
 | |
|           ptr = baseEnv(env)->GetCharArrayElements(env, down_cast<jcharArray>(array), is_copy);
 | |
|           break;
 | |
|         case Primitive::kPrimShort:
 | |
|           ptr = baseEnv(env)->GetShortArrayElements(env, down_cast<jshortArray>(array), is_copy);
 | |
|           break;
 | |
|         case Primitive::kPrimInt:
 | |
|           ptr = baseEnv(env)->GetIntArrayElements(env, down_cast<jintArray>(array), is_copy);
 | |
|           break;
 | |
|         case Primitive::kPrimLong:
 | |
|           ptr = baseEnv(env)->GetLongArrayElements(env, down_cast<jlongArray>(array), is_copy);
 | |
|           break;
 | |
|         case Primitive::kPrimFloat:
 | |
|           ptr = baseEnv(env)->GetFloatArrayElements(env, down_cast<jfloatArray>(array), is_copy);
 | |
|           break;
 | |
|         case Primitive::kPrimDouble:
 | |
|           ptr = baseEnv(env)->GetDoubleArrayElements(env, down_cast<jdoubleArray>(array), is_copy);
 | |
|           break;
 | |
|         default:
 | |
|           LOG(FATAL) << "Unexpected primitive type: " << type;
 | |
|       }
 | |
|       if (ptr != nullptr && soa.ForceCopy()) {
 | |
|         ptr = GuardedCopy::CreateGuardedPACopy(env, array, is_copy, ptr);
 | |
|         if (is_copy != nullptr) {
 | |
|           *is_copy = JNI_TRUE;
 | |
|         }
 | |
|       }
 | |
|       result.p = ptr;
 | |
|       if (sc.Check(soa, false, "p", &result)) {
 | |
|         return const_cast<void*>(result.p);
 | |
|       }
 | |
|     }
 | |
|     return nullptr;
 | |
|   }
 | |
| 
 | |
|   static void ReleasePrimitiveArrayElements(const char* function_name, Primitive::Type type,
 | |
|                                             JNIEnv* env, jarray array, void* elems, jint mode) {
 | |
|     CHECK_ATTACHED_THREAD_VOID(function_name);
 | |
|     ScopedObjectAccess soa(env);
 | |
|     ScopedCheck sc(kFlag_ExcepOkay, function_name);
 | |
|     if (sc.CheckNonNull(elems) && sc.CheckPrimitiveArrayType(soa, array, type)) {
 | |
|       if (soa.ForceCopy()) {
 | |
|         elems = GuardedCopy::ReleaseGuardedPACopy(function_name, env, array, elems, mode);
 | |
|       }
 | |
|       if (!soa.ForceCopy() || elems != nullptr) {
 | |
|         JniValueType args[4] = {{.E = env}, {.a = array}, {.p = elems}, {.r = mode}};
 | |
|         if (sc.Check(soa, true, "Eapr", args)) {
 | |
|           switch (type) {
 | |
|             case Primitive::kPrimBoolean:
 | |
|               baseEnv(env)->ReleaseBooleanArrayElements(env, down_cast<jbooleanArray>(array),
 | |
|                                                         reinterpret_cast<jboolean*>(elems), mode);
 | |
|               break;
 | |
|             case Primitive::kPrimByte:
 | |
|               baseEnv(env)->ReleaseByteArrayElements(env, down_cast<jbyteArray>(array),
 | |
|                                                      reinterpret_cast<jbyte*>(elems), mode);
 | |
|               break;
 | |
|             case Primitive::kPrimChar:
 | |
|               baseEnv(env)->ReleaseCharArrayElements(env, down_cast<jcharArray>(array),
 | |
|                                                      reinterpret_cast<jchar*>(elems), mode);
 | |
|               break;
 | |
|             case Primitive::kPrimShort:
 | |
|               baseEnv(env)->ReleaseShortArrayElements(env, down_cast<jshortArray>(array),
 | |
|                                                       reinterpret_cast<jshort*>(elems), mode);
 | |
|               break;
 | |
|             case Primitive::kPrimInt:
 | |
|               baseEnv(env)->ReleaseIntArrayElements(env, down_cast<jintArray>(array),
 | |
|                                                     reinterpret_cast<jint*>(elems), mode);
 | |
|               break;
 | |
|             case Primitive::kPrimLong:
 | |
|               baseEnv(env)->ReleaseLongArrayElements(env, down_cast<jlongArray>(array),
 | |
|                                                      reinterpret_cast<jlong*>(elems), mode);
 | |
|               break;
 | |
|             case Primitive::kPrimFloat:
 | |
|               baseEnv(env)->ReleaseFloatArrayElements(env, down_cast<jfloatArray>(array),
 | |
|                                                       reinterpret_cast<jfloat*>(elems), mode);
 | |
|               break;
 | |
|             case Primitive::kPrimDouble:
 | |
|               baseEnv(env)->ReleaseDoubleArrayElements(env, down_cast<jdoubleArray>(array),
 | |
|                                                        reinterpret_cast<jdouble*>(elems), mode);
 | |
|               break;
 | |
|             default:
 | |
|               LOG(FATAL) << "Unexpected primitive type: " << type;
 | |
|           }
 | |
|           JniValueType result;
 | |
|           result.V = nullptr;
 | |
|           sc.Check(soa, false, "V", &result);
 | |
|         }
 | |
|       }
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   static void GetPrimitiveArrayRegion(const char* function_name, Primitive::Type type, JNIEnv* env,
 | |
|                                       jarray array, jsize start, jsize len, void* buf) {
 | |
|     CHECK_ATTACHED_THREAD_VOID(function_name);
 | |
|     ScopedObjectAccess soa(env);
 | |
|     ScopedCheck sc(kFlag_Default, function_name);
 | |
|     JniValueType args[5] = {{.E = env}, {.a = array}, {.z = start}, {.z = len}, {.p = buf}};
 | |
|     // Note: the start and len arguments are checked as 'I' rather than 'z' as invalid indices
 | |
|     // result in ArrayIndexOutOfBoundsExceptions in the base implementation.
 | |
|     if (sc.Check(soa, true, "EaIIp", args) && sc.CheckPrimitiveArrayType(soa, array, type)) {
 | |
|       switch (type) {
 | |
|         case Primitive::kPrimBoolean:
 | |
|           baseEnv(env)->GetBooleanArrayRegion(env, down_cast<jbooleanArray>(array), start, len,
 | |
|                                               reinterpret_cast<jboolean*>(buf));
 | |
|           break;
 | |
|         case Primitive::kPrimByte:
 | |
|           baseEnv(env)->GetByteArrayRegion(env, down_cast<jbyteArray>(array), start, len,
 | |
|                                            reinterpret_cast<jbyte*>(buf));
 | |
|           break;
 | |
|         case Primitive::kPrimChar:
 | |
|           baseEnv(env)->GetCharArrayRegion(env, down_cast<jcharArray>(array), start, len,
 | |
|                                            reinterpret_cast<jchar*>(buf));
 | |
|           break;
 | |
|         case Primitive::kPrimShort:
 | |
|           baseEnv(env)->GetShortArrayRegion(env, down_cast<jshortArray>(array), start, len,
 | |
|                                             reinterpret_cast<jshort*>(buf));
 | |
|           break;
 | |
|         case Primitive::kPrimInt:
 | |
|           baseEnv(env)->GetIntArrayRegion(env, down_cast<jintArray>(array), start, len,
 | |
|                                           reinterpret_cast<jint*>(buf));
 | |
|           break;
 | |
|         case Primitive::kPrimLong:
 | |
|           baseEnv(env)->GetLongArrayRegion(env, down_cast<jlongArray>(array), start, len,
 | |
|                                            reinterpret_cast<jlong*>(buf));
 | |
|           break;
 | |
|         case Primitive::kPrimFloat:
 | |
|           baseEnv(env)->GetFloatArrayRegion(env, down_cast<jfloatArray>(array), start, len,
 | |
|                                             reinterpret_cast<jfloat*>(buf));
 | |
|           break;
 | |
|         case Primitive::kPrimDouble:
 | |
|           baseEnv(env)->GetDoubleArrayRegion(env, down_cast<jdoubleArray>(array), start, len,
 | |
|                                              reinterpret_cast<jdouble*>(buf));
 | |
|           break;
 | |
|         default:
 | |
|           LOG(FATAL) << "Unexpected primitive type: " << type;
 | |
|       }
 | |
|       JniValueType result;
 | |
|       result.V = nullptr;
 | |
|       sc.Check(soa, false, "V", &result);
 | |
|     }
 | |
|   }
 | |
| 
 | |
|   static void SetPrimitiveArrayRegion(const char* function_name, Primitive::Type type, JNIEnv* env,
 | |
|                                       jarray array, jsize start, jsize len, const void* buf) {
 | |
|     CHECK_ATTACHED_THREAD_VOID(function_name);
 | |
|     ScopedObjectAccess soa(env);
 | |
|     ScopedCheck sc(kFlag_Default, function_name);
 | |
|     JniValueType args[5] = {{.E = env}, {.a = array}, {.z = start}, {.z = len}, {.p = buf}};
 | |
|     // Note: the start and len arguments are checked as 'I' rather than 'z' as invalid indices
 | |
|     // result in ArrayIndexOutOfBoundsExceptions in the base implementation.
 | |
|     if (sc.Check(soa, true, "EaIIp", args) && sc.CheckPrimitiveArrayType(soa, array, type)) {
 | |
|       switch (type) {
 | |
|         case Primitive::kPrimBoolean:
 | |
|           baseEnv(env)->SetBooleanArrayRegion(env, down_cast<jbooleanArray>(array), start, len,
 | |
|                                               reinterpret_cast<const jboolean*>(buf));
 | |
|           break;
 | |
|         case Primitive::kPrimByte:
 | |
|           baseEnv(env)->SetByteArrayRegion(env, down_cast<jbyteArray>(array), start, len,
 | |
|                                            reinterpret_cast<const jbyte*>(buf));
 | |
|           break;
 | |
|         case Primitive::kPrimChar:
 | |
|           baseEnv(env)->SetCharArrayRegion(env, down_cast<jcharArray>(array), start, len,
 | |
|                                            reinterpret_cast<const jchar*>(buf));
 | |
|           break;
 | |
|         case Primitive::kPrimShort:
 | |
|           baseEnv(env)->SetShortArrayRegion(env, down_cast<jshortArray>(array), start, len,
 | |
|                                               reinterpret_cast<const jshort*>(buf));
 | |
|           break;
 | |
|         case Primitive::kPrimInt:
 | |
|           baseEnv(env)->SetIntArrayRegion(env, down_cast<jintArray>(array), start, len,
 | |
|                                           reinterpret_cast<const jint*>(buf));
 | |
|           break;
 | |
|         case Primitive::kPrimLong:
 | |
|           baseEnv(env)->SetLongArrayRegion(env, down_cast<jlongArray>(array), start, len,
 | |
|                                               reinterpret_cast<const jlong*>(buf));
 | |
|           break;
 | |
|         case Primitive::kPrimFloat:
 | |
|           baseEnv(env)->SetFloatArrayRegion(env, down_cast<jfloatArray>(array), start, len,
 | |
|                                             reinterpret_cast<const jfloat*>(buf));
 | |
|           break;
 | |
|         case Primitive::kPrimDouble:
 | |
|           baseEnv(env)->SetDoubleArrayRegion(env, down_cast<jdoubleArray>(array), start, len,
 | |
|                                              reinterpret_cast<const jdouble*>(buf));
 | |
|           break;
 | |
|         default:
 | |
|           LOG(FATAL) << "Unexpected primitive type: " << type;
 | |
|       }
 | |
|       JniValueType result;
 | |
|       result.V = nullptr;
 | |
|       sc.Check(soa, false, "V", &result);
 | |
|     }
 | |
|   }
 | |
| };
 | |
| 
 | |
| const JNINativeInterface gCheckNativeInterface = {
 | |
|   nullptr,  // reserved0.
 | |
|   nullptr,  // reserved1.
 | |
|   nullptr,  // reserved2.
 | |
|   nullptr,  // reserved3.
 | |
|   CheckJNI::GetVersion,
 | |
|   CheckJNI::DefineClass,
 | |
|   CheckJNI::FindClass,
 | |
|   CheckJNI::FromReflectedMethod,
 | |
|   CheckJNI::FromReflectedField,
 | |
|   CheckJNI::ToReflectedMethod,
 | |
|   CheckJNI::GetSuperclass,
 | |
|   CheckJNI::IsAssignableFrom,
 | |
|   CheckJNI::ToReflectedField,
 | |
|   CheckJNI::Throw,
 | |
|   CheckJNI::ThrowNew,
 | |
|   CheckJNI::ExceptionOccurred,
 | |
|   CheckJNI::ExceptionDescribe,
 | |
|   CheckJNI::ExceptionClear,
 | |
|   CheckJNI::FatalError,
 | |
|   CheckJNI::PushLocalFrame,
 | |
|   CheckJNI::PopLocalFrame,
 | |
|   CheckJNI::NewGlobalRef,
 | |
|   CheckJNI::DeleteGlobalRef,
 | |
|   CheckJNI::DeleteLocalRef,
 | |
|   CheckJNI::IsSameObject,
 | |
|   CheckJNI::NewLocalRef,
 | |
|   CheckJNI::EnsureLocalCapacity,
 | |
|   CheckJNI::AllocObject,
 | |
|   CheckJNI::NewObject,
 | |
|   CheckJNI::NewObjectV,
 | |
|   CheckJNI::NewObjectA,
 | |
|   CheckJNI::GetObjectClass,
 | |
|   CheckJNI::IsInstanceOf,
 | |
|   CheckJNI::GetMethodID,
 | |
|   CheckJNI::CallObjectMethod,
 | |
|   CheckJNI::CallObjectMethodV,
 | |
|   CheckJNI::CallObjectMethodA,
 | |
|   CheckJNI::CallBooleanMethod,
 | |
|   CheckJNI::CallBooleanMethodV,
 | |
|   CheckJNI::CallBooleanMethodA,
 | |
|   CheckJNI::CallByteMethod,
 | |
|   CheckJNI::CallByteMethodV,
 | |
|   CheckJNI::CallByteMethodA,
 | |
|   CheckJNI::CallCharMethod,
 | |
|   CheckJNI::CallCharMethodV,
 | |
|   CheckJNI::CallCharMethodA,
 | |
|   CheckJNI::CallShortMethod,
 | |
|   CheckJNI::CallShortMethodV,
 | |
|   CheckJNI::CallShortMethodA,
 | |
|   CheckJNI::CallIntMethod,
 | |
|   CheckJNI::CallIntMethodV,
 | |
|   CheckJNI::CallIntMethodA,
 | |
|   CheckJNI::CallLongMethod,
 | |
|   CheckJNI::CallLongMethodV,
 | |
|   CheckJNI::CallLongMethodA,
 | |
|   CheckJNI::CallFloatMethod,
 | |
|   CheckJNI::CallFloatMethodV,
 | |
|   CheckJNI::CallFloatMethodA,
 | |
|   CheckJNI::CallDoubleMethod,
 | |
|   CheckJNI::CallDoubleMethodV,
 | |
|   CheckJNI::CallDoubleMethodA,
 | |
|   CheckJNI::CallVoidMethod,
 | |
|   CheckJNI::CallVoidMethodV,
 | |
|   CheckJNI::CallVoidMethodA,
 | |
|   CheckJNI::CallNonvirtualObjectMethod,
 | |
|   CheckJNI::CallNonvirtualObjectMethodV,
 | |
|   CheckJNI::CallNonvirtualObjectMethodA,
 | |
|   CheckJNI::CallNonvirtualBooleanMethod,
 | |
|   CheckJNI::CallNonvirtualBooleanMethodV,
 | |
|   CheckJNI::CallNonvirtualBooleanMethodA,
 | |
|   CheckJNI::CallNonvirtualByteMethod,
 | |
|   CheckJNI::CallNonvirtualByteMethodV,
 | |
|   CheckJNI::CallNonvirtualByteMethodA,
 | |
|   CheckJNI::CallNonvirtualCharMethod,
 | |
|   CheckJNI::CallNonvirtualCharMethodV,
 | |
|   CheckJNI::CallNonvirtualCharMethodA,
 | |
|   CheckJNI::CallNonvirtualShortMethod,
 | |
|   CheckJNI::CallNonvirtualShortMethodV,
 | |
|   CheckJNI::CallNonvirtualShortMethodA,
 | |
|   CheckJNI::CallNonvirtualIntMethod,
 | |
|   CheckJNI::CallNonvirtualIntMethodV,
 | |
|   CheckJNI::CallNonvirtualIntMethodA,
 | |
|   CheckJNI::CallNonvirtualLongMethod,
 | |
|   CheckJNI::CallNonvirtualLongMethodV,
 | |
|   CheckJNI::CallNonvirtualLongMethodA,
 | |
|   CheckJNI::CallNonvirtualFloatMethod,
 | |
|   CheckJNI::CallNonvirtualFloatMethodV,
 | |
|   CheckJNI::CallNonvirtualFloatMethodA,
 | |
|   CheckJNI::CallNonvirtualDoubleMethod,
 | |
|   CheckJNI::CallNonvirtualDoubleMethodV,
 | |
|   CheckJNI::CallNonvirtualDoubleMethodA,
 | |
|   CheckJNI::CallNonvirtualVoidMethod,
 | |
|   CheckJNI::CallNonvirtualVoidMethodV,
 | |
|   CheckJNI::CallNonvirtualVoidMethodA,
 | |
|   CheckJNI::GetFieldID,
 | |
|   CheckJNI::GetObjectField,
 | |
|   CheckJNI::GetBooleanField,
 | |
|   CheckJNI::GetByteField,
 | |
|   CheckJNI::GetCharField,
 | |
|   CheckJNI::GetShortField,
 | |
|   CheckJNI::GetIntField,
 | |
|   CheckJNI::GetLongField,
 | |
|   CheckJNI::GetFloatField,
 | |
|   CheckJNI::GetDoubleField,
 | |
|   CheckJNI::SetObjectField,
 | |
|   CheckJNI::SetBooleanField,
 | |
|   CheckJNI::SetByteField,
 | |
|   CheckJNI::SetCharField,
 | |
|   CheckJNI::SetShortField,
 | |
|   CheckJNI::SetIntField,
 | |
|   CheckJNI::SetLongField,
 | |
|   CheckJNI::SetFloatField,
 | |
|   CheckJNI::SetDoubleField,
 | |
|   CheckJNI::GetStaticMethodID,
 | |
|   CheckJNI::CallStaticObjectMethod,
 | |
|   CheckJNI::CallStaticObjectMethodV,
 | |
|   CheckJNI::CallStaticObjectMethodA,
 | |
|   CheckJNI::CallStaticBooleanMethod,
 | |
|   CheckJNI::CallStaticBooleanMethodV,
 | |
|   CheckJNI::CallStaticBooleanMethodA,
 | |
|   CheckJNI::CallStaticByteMethod,
 | |
|   CheckJNI::CallStaticByteMethodV,
 | |
|   CheckJNI::CallStaticByteMethodA,
 | |
|   CheckJNI::CallStaticCharMethod,
 | |
|   CheckJNI::CallStaticCharMethodV,
 | |
|   CheckJNI::CallStaticCharMethodA,
 | |
|   CheckJNI::CallStaticShortMethod,
 | |
|   CheckJNI::CallStaticShortMethodV,
 | |
|   CheckJNI::CallStaticShortMethodA,
 | |
|   CheckJNI::CallStaticIntMethod,
 | |
|   CheckJNI::CallStaticIntMethodV,
 | |
|   CheckJNI::CallStaticIntMethodA,
 | |
|   CheckJNI::CallStaticLongMethod,
 | |
|   CheckJNI::CallStaticLongMethodV,
 | |
|   CheckJNI::CallStaticLongMethodA,
 | |
|   CheckJNI::CallStaticFloatMethod,
 | |
|   CheckJNI::CallStaticFloatMethodV,
 | |
|   CheckJNI::CallStaticFloatMethodA,
 | |
|   CheckJNI::CallStaticDoubleMethod,
 | |
|   CheckJNI::CallStaticDoubleMethodV,
 | |
|   CheckJNI::CallStaticDoubleMethodA,
 | |
|   CheckJNI::CallStaticVoidMethod,
 | |
|   CheckJNI::CallStaticVoidMethodV,
 | |
|   CheckJNI::CallStaticVoidMethodA,
 | |
|   CheckJNI::GetStaticFieldID,
 | |
|   CheckJNI::GetStaticObjectField,
 | |
|   CheckJNI::GetStaticBooleanField,
 | |
|   CheckJNI::GetStaticByteField,
 | |
|   CheckJNI::GetStaticCharField,
 | |
|   CheckJNI::GetStaticShortField,
 | |
|   CheckJNI::GetStaticIntField,
 | |
|   CheckJNI::GetStaticLongField,
 | |
|   CheckJNI::GetStaticFloatField,
 | |
|   CheckJNI::GetStaticDoubleField,
 | |
|   CheckJNI::SetStaticObjectField,
 | |
|   CheckJNI::SetStaticBooleanField,
 | |
|   CheckJNI::SetStaticByteField,
 | |
|   CheckJNI::SetStaticCharField,
 | |
|   CheckJNI::SetStaticShortField,
 | |
|   CheckJNI::SetStaticIntField,
 | |
|   CheckJNI::SetStaticLongField,
 | |
|   CheckJNI::SetStaticFloatField,
 | |
|   CheckJNI::SetStaticDoubleField,
 | |
|   CheckJNI::NewString,
 | |
|   CheckJNI::GetStringLength,
 | |
|   CheckJNI::GetStringChars,
 | |
|   CheckJNI::ReleaseStringChars,
 | |
|   CheckJNI::NewStringUTF,
 | |
|   CheckJNI::GetStringUTFLength,
 | |
|   CheckJNI::GetStringUTFChars,
 | |
|   CheckJNI::ReleaseStringUTFChars,
 | |
|   CheckJNI::GetArrayLength,
 | |
|   CheckJNI::NewObjectArray,
 | |
|   CheckJNI::GetObjectArrayElement,
 | |
|   CheckJNI::SetObjectArrayElement,
 | |
|   CheckJNI::NewBooleanArray,
 | |
|   CheckJNI::NewByteArray,
 | |
|   CheckJNI::NewCharArray,
 | |
|   CheckJNI::NewShortArray,
 | |
|   CheckJNI::NewIntArray,
 | |
|   CheckJNI::NewLongArray,
 | |
|   CheckJNI::NewFloatArray,
 | |
|   CheckJNI::NewDoubleArray,
 | |
|   CheckJNI::GetBooleanArrayElements,
 | |
|   CheckJNI::GetByteArrayElements,
 | |
|   CheckJNI::GetCharArrayElements,
 | |
|   CheckJNI::GetShortArrayElements,
 | |
|   CheckJNI::GetIntArrayElements,
 | |
|   CheckJNI::GetLongArrayElements,
 | |
|   CheckJNI::GetFloatArrayElements,
 | |
|   CheckJNI::GetDoubleArrayElements,
 | |
|   CheckJNI::ReleaseBooleanArrayElements,
 | |
|   CheckJNI::ReleaseByteArrayElements,
 | |
|   CheckJNI::ReleaseCharArrayElements,
 | |
|   CheckJNI::ReleaseShortArrayElements,
 | |
|   CheckJNI::ReleaseIntArrayElements,
 | |
|   CheckJNI::ReleaseLongArrayElements,
 | |
|   CheckJNI::ReleaseFloatArrayElements,
 | |
|   CheckJNI::ReleaseDoubleArrayElements,
 | |
|   CheckJNI::GetBooleanArrayRegion,
 | |
|   CheckJNI::GetByteArrayRegion,
 | |
|   CheckJNI::GetCharArrayRegion,
 | |
|   CheckJNI::GetShortArrayRegion,
 | |
|   CheckJNI::GetIntArrayRegion,
 | |
|   CheckJNI::GetLongArrayRegion,
 | |
|   CheckJNI::GetFloatArrayRegion,
 | |
|   CheckJNI::GetDoubleArrayRegion,
 | |
|   CheckJNI::SetBooleanArrayRegion,
 | |
|   CheckJNI::SetByteArrayRegion,
 | |
|   CheckJNI::SetCharArrayRegion,
 | |
|   CheckJNI::SetShortArrayRegion,
 | |
|   CheckJNI::SetIntArrayRegion,
 | |
|   CheckJNI::SetLongArrayRegion,
 | |
|   CheckJNI::SetFloatArrayRegion,
 | |
|   CheckJNI::SetDoubleArrayRegion,
 | |
|   CheckJNI::RegisterNatives,
 | |
|   CheckJNI::UnregisterNatives,
 | |
|   CheckJNI::MonitorEnter,
 | |
|   CheckJNI::MonitorExit,
 | |
|   CheckJNI::GetJavaVM,
 | |
|   CheckJNI::GetStringRegion,
 | |
|   CheckJNI::GetStringUTFRegion,
 | |
|   CheckJNI::GetPrimitiveArrayCritical,
 | |
|   CheckJNI::ReleasePrimitiveArrayCritical,
 | |
|   CheckJNI::GetStringCritical,
 | |
|   CheckJNI::ReleaseStringCritical,
 | |
|   CheckJNI::NewWeakGlobalRef,
 | |
|   CheckJNI::DeleteWeakGlobalRef,
 | |
|   CheckJNI::ExceptionCheck,
 | |
|   CheckJNI::NewDirectByteBuffer,
 | |
|   CheckJNI::GetDirectBufferAddress,
 | |
|   CheckJNI::GetDirectBufferCapacity,
 | |
|   CheckJNI::GetObjectRefType,
 | |
| };
 | |
| 
 | |
| class CheckJII {
 | |
|  public:
 | |
|   static jint DestroyJavaVM(JavaVM* vm) {
 | |
|     ScopedCheck sc(kFlag_Invocation, __FUNCTION__, false);
 | |
|     JniValueType args[1] = {{.v = vm}};
 | |
|     sc.CheckNonHeap(reinterpret_cast<JavaVMExt*>(vm), true, "v", args);
 | |
|     JniValueType result;
 | |
|     result.i = BaseVm(vm)->DestroyJavaVM(vm);
 | |
|     // Use null to signal that the JavaVM isn't valid anymore. DestroyJavaVM deletes the runtime,
 | |
|     // which will delete the JavaVMExt.
 | |
|     sc.CheckNonHeap(nullptr, false, "i", &result);
 | |
|     return result.i;
 | |
|   }
 | |
| 
 | |
|   static jint AttachCurrentThread(JavaVM* vm, JNIEnv** p_env, void* thr_args) {
 | |
|     ScopedCheck sc(kFlag_Invocation, __FUNCTION__);
 | |
|     JniValueType args[3] = {{.v = vm}, {.p = p_env}, {.p = thr_args}};
 | |
|     sc.CheckNonHeap(reinterpret_cast<JavaVMExt*>(vm), true, "vpp", args);
 | |
|     JniValueType result;
 | |
|     result.i = BaseVm(vm)->AttachCurrentThread(vm, p_env, thr_args);
 | |
|     sc.CheckNonHeap(reinterpret_cast<JavaVMExt*>(vm), false, "i", &result);
 | |
|     return result.i;
 | |
|   }
 | |
| 
 | |
|   static jint AttachCurrentThreadAsDaemon(JavaVM* vm, JNIEnv** p_env, void* thr_args) {
 | |
|     ScopedCheck sc(kFlag_Invocation, __FUNCTION__);
 | |
|     JniValueType args[3] = {{.v = vm}, {.p = p_env}, {.p = thr_args}};
 | |
|     sc.CheckNonHeap(reinterpret_cast<JavaVMExt*>(vm), true, "vpp", args);
 | |
|     JniValueType result;
 | |
|     result.i = BaseVm(vm)->AttachCurrentThreadAsDaemon(vm, p_env, thr_args);
 | |
|     sc.CheckNonHeap(reinterpret_cast<JavaVMExt*>(vm), false, "i", &result);
 | |
|     return result.i;
 | |
|   }
 | |
| 
 | |
|   static jint DetachCurrentThread(JavaVM* vm) {
 | |
|     ScopedCheck sc(kFlag_Invocation, __FUNCTION__);
 | |
|     JniValueType args[1] = {{.v = vm}};
 | |
|     sc.CheckNonHeap(reinterpret_cast<JavaVMExt*>(vm), true, "v", args);
 | |
|     JniValueType result;
 | |
|     result.i = BaseVm(vm)->DetachCurrentThread(vm);
 | |
|     sc.CheckNonHeap(reinterpret_cast<JavaVMExt*>(vm), false, "i", &result);
 | |
|     return result.i;
 | |
|   }
 | |
| 
 | |
|   static jint GetEnv(JavaVM* vm, void** p_env, jint version) {
 | |
|     ScopedCheck sc(kFlag_Invocation, __FUNCTION__);
 | |
|     JniValueType args[3] = {{.v = vm}, {.p = p_env}, {.I = version}};
 | |
|     sc.CheckNonHeap(reinterpret_cast<JavaVMExt*>(vm), true, "vpI", args);
 | |
|     JniValueType result;
 | |
|     result.i = BaseVm(vm)->GetEnv(vm, p_env, version);
 | |
|     sc.CheckNonHeap(reinterpret_cast<JavaVMExt*>(vm), false, "i", &result);
 | |
|     return result.i;
 | |
|   }
 | |
| 
 | |
|  private:
 | |
|   static const JNIInvokeInterface* BaseVm(JavaVM* vm) {
 | |
|     return reinterpret_cast<JavaVMExt*>(vm)->GetUncheckedFunctions();
 | |
|   }
 | |
| };
 | |
| 
 | |
| const JNIInvokeInterface gCheckInvokeInterface = {
 | |
|   nullptr,  // reserved0
 | |
|   nullptr,  // reserved1
 | |
|   nullptr,  // reserved2
 | |
|   CheckJII::DestroyJavaVM,
 | |
|   CheckJII::AttachCurrentThread,
 | |
|   CheckJII::DetachCurrentThread,
 | |
|   CheckJII::GetEnv,
 | |
|   CheckJII::AttachCurrentThreadAsDaemon
 | |
| };
 | |
| 
 | |
| }  // anonymous namespace
 | |
| 
 | |
| const JNINativeInterface* GetCheckJniNativeInterface() {
 | |
|   return &gCheckNativeInterface;
 | |
| }
 | |
| 
 | |
| const JNIInvokeInterface* GetCheckJniInvokeInterface() {
 | |
|   return &gCheckInvokeInterface;
 | |
| }
 | |
| 
 | |
| }  // namespace art
 |