Home | History | Annotate | Download | only in runtime
      1 /*
      2  * Copyright (C) 2008 The Android Open Source Project
      3  *
      4  * Licensed under the Apache License, Version 2.0 (the "License");
      5  * you may not use this file except in compliance with the License.
      6  * You may obtain a copy of the License at
      7  *
      8  *      http://www.apache.org/licenses/LICENSE-2.0
      9  *
     10  * Unless required by applicable law or agreed to in writing, software
     11  * distributed under the License is distributed on an "AS IS" BASIS,
     12  * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
     13  * See the License for the specific language governing permissions and
     14  * limitations under the License.
     15  */
     16 
     17 #include "jni_internal.h"
     18 
     19 #include <sys/mman.h>
     20 #include <zlib.h>
     21 
     22 #include "base/logging.h"
     23 #include "class_linker.h"
     24 #include "class_linker-inl.h"
     25 #include "dex_file-inl.h"
     26 #include "field_helper.h"
     27 #include "gc/space/space.h"
     28 #include "mirror/art_field-inl.h"
     29 #include "mirror/art_method-inl.h"
     30 #include "mirror/class-inl.h"
     31 #include "mirror/object-inl.h"
     32 #include "mirror/object_array-inl.h"
     33 #include "mirror/string-inl.h"
     34 #include "mirror/throwable.h"
     35 #include "runtime.h"
     36 #include "scoped_thread_state_change.h"
     37 #include "thread.h"
     38 
     39 namespace art {
     40 
     41 static void JniAbort(const char* jni_function_name, const char* msg) {
     42   Thread* self = Thread::Current();
     43   ScopedObjectAccess soa(self);
     44   mirror::ArtMethod* current_method = self->GetCurrentMethod(nullptr);
     45 
     46   std::ostringstream os;
     47   os << "JNI DETECTED ERROR IN APPLICATION: " << msg;
     48 
     49   if (jni_function_name != nullptr) {
     50     os << "\n    in call to " << jni_function_name;
     51   }
     52   // TODO: is this useful given that we're about to dump the calling thread's stack?
     53   if (current_method != nullptr) {
     54     os << "\n    from " << PrettyMethod(current_method);
     55   }
     56   os << "\n";
     57   self->Dump(os);
     58 
     59   JavaVMExt* vm = Runtime::Current()->GetJavaVM();
     60   if (vm->check_jni_abort_hook != nullptr) {
     61     vm->check_jni_abort_hook(vm->check_jni_abort_hook_data, os.str());
     62   } else {
     63     // Ensure that we get a native stack trace for this thread.
     64     self->TransitionFromRunnableToSuspended(kNative);
     65     LOG(FATAL) << os.str();
     66     self->TransitionFromSuspendedToRunnable();  // Unreachable, keep annotalysis happy.
     67   }
     68 }
     69 
     70 static void JniAbortV(const char* jni_function_name, const char* fmt, va_list ap) {
     71   std::string msg;
     72   StringAppendV(&msg, fmt, ap);
     73   JniAbort(jni_function_name, msg.c_str());
     74 }
     75 
     76 void JniAbortF(const char* jni_function_name, const char* fmt, ...) {
     77   va_list args;
     78   va_start(args, fmt);
     79   JniAbortV(jni_function_name, fmt, args);
     80   va_end(args);
     81 }
     82 
     83 /*
     84  * ===========================================================================
     85  *      JNI function helpers
     86  * ===========================================================================
     87  */
     88 
     89 static bool IsHandleScopeLocalRef(JNIEnv* env, jobject localRef) {
     90   return GetIndirectRefKind(localRef) == kHandleScopeOrInvalid &&
     91       reinterpret_cast<JNIEnvExt*>(env)->self->HandleScopeContains(localRef);
     92 }
     93 
     94 // Flags passed into ScopedCheck.
     95 #define kFlag_Default       0x0000
     96 
     97 #define kFlag_CritBad       0x0000      // Calling while in critical is not allowed.
     98 #define kFlag_CritOkay      0x0001      // Calling while in critical is allowed.
     99 #define kFlag_CritGet       0x0002      // This is a critical "get".
    100 #define kFlag_CritRelease   0x0003      // This is a critical "release".
    101 #define kFlag_CritMask      0x0003      // Bit mask to get "crit" value.
    102 
    103 #define kFlag_ExcepBad      0x0000      // Raised exceptions are not allowed.
    104 #define kFlag_ExcepOkay     0x0004      // Raised exceptions are allowed.
    105 
    106 #define kFlag_Release       0x0010      // Are we in a non-critical release function?
    107 #define kFlag_NullableUtf   0x0020      // Are our UTF parameters nullable?
    108 
    109 #define kFlag_Invocation    0x8000      // Part of the invocation interface (JavaVM*).
    110 
    111 #define kFlag_ForceTrace    0x80000000  // Add this to a JNI function's flags if you want to trace every call.
    112 
    113 static const char* gBuiltInPrefixes[] = {
    114   "Landroid/",
    115   "Lcom/android/",
    116   "Lcom/google/android/",
    117   "Ldalvik/",
    118   "Ljava/",
    119   "Ljavax/",
    120   "Llibcore/",
    121   "Lorg/apache/harmony/",
    122   nullptr
    123 };
    124 
    125 static bool ShouldTrace(JavaVMExt* vm, mirror::ArtMethod* method)
    126     SHARED_LOCKS_REQUIRED(Locks::mutator_lock_) {
    127   // If both "-Xcheck:jni" and "-Xjnitrace:" are enabled, we print trace messages
    128   // when a native method that matches the -Xjnitrace argument calls a JNI function
    129   // such as NewByteArray.
    130   // If -verbose:third-party-jni is on, we want to log any JNI function calls
    131   // made by a third-party native method.
    132   std::string class_name(method->GetDeclaringClassDescriptor());
    133   if (!vm->trace.empty() && class_name.find(vm->trace) != std::string::npos) {
    134     return true;
    135   }
    136   if (VLOG_IS_ON(third_party_jni)) {
    137     // Return true if we're trying to log all third-party JNI activity and 'method' doesn't look
    138     // like part of Android.
    139     for (size_t i = 0; gBuiltInPrefixes[i] != nullptr; ++i) {
    140       if (StartsWith(class_name, gBuiltInPrefixes[i])) {
    141         return false;
    142       }
    143     }
    144     return true;
    145   }
    146   return false;
    147 }
    148 
    149 class ScopedCheck {
    150  public:
    151   // For JNIEnv* functions.
    152   explicit ScopedCheck(JNIEnv* env, int flags, const char* functionName)
    153       SHARED_LOCK_FUNCTION(Locks::mutator_lock_)
    154       : soa_(env) {
    155     Init(flags, functionName, true);
    156     CheckThread(flags);
    157   }
    158 
    159   // For JavaVM* functions.
    160   // TODO: it's not correct that this is a lock function, but making it so aids annotalysis.
    161   explicit ScopedCheck(JavaVM* vm, bool has_method, const char* functionName)
    162       SHARED_LOCK_FUNCTION(Locks::mutator_lock_)
    163       : soa_(vm) {
    164     Init(kFlag_Invocation, functionName, has_method);
    165   }
    166 
    167   ~ScopedCheck() UNLOCK_FUNCTION(Locks::mutator_lock_) {}
    168 
    169   const ScopedObjectAccess& soa() {
    170     return soa_;
    171   }
    172 
    173   bool ForceCopy() {
    174     return Runtime::Current()->GetJavaVM()->force_copy;
    175   }
    176 
    177   // Checks that 'class_name' is a valid "fully-qualified" JNI class name, like "java/lang/Thread"
    178   // or "[Ljava/lang/Object;". A ClassLoader can actually normalize class names a couple of
    179   // times, so using "java.lang.Thread" instead of "java/lang/Thread" might work in some
    180   // circumstances, but this is incorrect.
    181   void CheckClassName(const char* class_name) {
    182     if ((class_name == nullptr) || !IsValidJniClassName(class_name)) {
    183       JniAbortF(function_name_,
    184                 "illegal class name '%s'\n"
    185                 "    (should be of the form 'package/Class', [Lpackage/Class;' or '[[B')",
    186                 class_name);
    187     }
    188   }
    189 
    190   /*
    191    * Verify that the field is of the appropriate type.  If the field has an
    192    * object type, "java_object" is the object we're trying to assign into it.
    193    *
    194    * Works for both static and instance fields.
    195    */
    196   void CheckFieldType(jvalue value, jfieldID fid, char prim, bool isStatic)
    197       SHARED_LOCKS_REQUIRED(Locks::mutator_lock_) {
    198     StackHandleScope<1> hs(Thread::Current());
    199     Handle<mirror::ArtField> f(hs.NewHandle(CheckFieldID(fid)));
    200     if (f.Get() == nullptr) {
    201       return;
    202     }
    203     mirror::Class* field_type = FieldHelper(f).GetType();
    204     if (!field_type->IsPrimitive()) {
    205       jobject java_object = value.l;
    206       if (java_object != nullptr) {
    207         mirror::Object* obj = soa_.Decode<mirror::Object*>(java_object);
    208         // If java_object is a weak global ref whose referent has been cleared,
    209         // obj will be NULL.  Otherwise, obj should always be non-NULL
    210         // and valid.
    211         if (!Runtime::Current()->GetHeap()->IsValidObjectAddress(obj)) {
    212           Runtime::Current()->GetHeap()->DumpSpaces(LOG(ERROR));
    213           JniAbortF(function_name_, "field operation on invalid %s: %p",
    214                     ToStr<IndirectRefKind>(GetIndirectRefKind(java_object)).c_str(), java_object);
    215           return;
    216         } else {
    217           if (!obj->InstanceOf(field_type)) {
    218             JniAbortF(function_name_, "attempt to set field %s with value of wrong type: %s",
    219                       PrettyField(f.Get()).c_str(), PrettyTypeOf(obj).c_str());
    220             return;
    221           }
    222         }
    223       }
    224     } else if (field_type != Runtime::Current()->GetClassLinker()->FindPrimitiveClass(prim)) {
    225       JniAbortF(function_name_, "attempt to set field %s with value of wrong type: %c",
    226                 PrettyField(f.Get()).c_str(), prim);
    227       return;
    228     }
    229 
    230     if (isStatic != f.Get()->IsStatic()) {
    231       if (isStatic) {
    232         JniAbortF(function_name_, "accessing non-static field %s as static",
    233                   PrettyField(f.Get()).c_str());
    234       } else {
    235         JniAbortF(function_name_, "accessing static field %s as non-static",
    236                   PrettyField(f.Get()).c_str());
    237       }
    238       return;
    239     }
    240   }
    241 
    242   /*
    243    * Verify that this instance field ID is valid for this object.
    244    *
    245    * Assumes "jobj" has already been validated.
    246    */
    247   void CheckInstanceFieldID(jobject java_object, jfieldID fid)
    248       SHARED_LOCKS_REQUIRED(Locks::mutator_lock_) {
    249     mirror::Object* o = soa_.Decode<mirror::Object*>(java_object);
    250     if (o == nullptr || !Runtime::Current()->GetHeap()->IsValidObjectAddress(o)) {
    251       Runtime::Current()->GetHeap()->DumpSpaces(LOG(ERROR));
    252       JniAbortF(function_name_, "field operation on invalid %s: %p",
    253                 ToStr<IndirectRefKind>(GetIndirectRefKind(java_object)).c_str(), java_object);
    254       return;
    255     }
    256 
    257     mirror::ArtField* f = CheckFieldID(fid);
    258     if (f == nullptr) {
    259       return;
    260     }
    261     mirror::Class* c = o->GetClass();
    262     if (c->FindInstanceField(f->GetName(), f->GetTypeDescriptor()) == nullptr) {
    263       JniAbortF(function_name_, "jfieldID %s not valid for an object of class %s",
    264                 PrettyField(f).c_str(), PrettyTypeOf(o).c_str());
    265     }
    266   }
    267 
    268   /*
    269    * Verify that the pointer value is non-NULL.
    270    */
    271   void CheckNonNull(const void* ptr) {
    272     if (ptr == nullptr) {
    273       JniAbortF(function_name_, "non-nullable argument was NULL");
    274     }
    275   }
    276 
    277   /*
    278    * Verify that the method's return type matches the type of call.
    279    * 'expectedType' will be "L" for all objects, including arrays.
    280    */
    281   void CheckSig(jmethodID mid, const char* expectedType, bool isStatic)
    282       SHARED_LOCKS_REQUIRED(Locks::mutator_lock_) {
    283     mirror::ArtMethod* m = CheckMethodID(mid);
    284     if (m == nullptr) {
    285       return;
    286     }
    287     if (*expectedType != m->GetShorty()[0]) {
    288       JniAbortF(function_name_, "the return type of %s does not match %s",
    289                 function_name_, PrettyMethod(m).c_str());
    290     }
    291     if (isStatic != m->IsStatic()) {
    292       if (isStatic) {
    293         JniAbortF(function_name_, "calling non-static method %s with %s",
    294                   PrettyMethod(m).c_str(), function_name_);
    295       } else {
    296         JniAbortF(function_name_, "calling static method %s with %s",
    297                   PrettyMethod(m).c_str(), function_name_);
    298       }
    299     }
    300   }
    301 
    302   /*
    303    * Verify that this static field ID is valid for this class.
    304    *
    305    * Assumes "java_class" has already been validated.
    306    */
    307   void CheckStaticFieldID(jclass java_class, jfieldID fid)
    308       SHARED_LOCKS_REQUIRED(Locks::mutator_lock_) {
    309     mirror::Class* c = soa_.Decode<mirror::Class*>(java_class);
    310     mirror::ArtField* f = CheckFieldID(fid);
    311     if (f == nullptr) {
    312       return;
    313     }
    314     if (f->GetDeclaringClass() != c) {
    315       JniAbortF(function_name_, "static jfieldID %p not valid for class %s",
    316                 fid, PrettyClass(c).c_str());
    317     }
    318   }
    319 
    320   /*
    321    * Verify that "mid" is appropriate for "java_class".
    322    *
    323    * A mismatch isn't dangerous, because the jmethodID defines the class.  In
    324    * fact, java_class is unused in the implementation.  It's best if we don't
    325    * allow bad code in the system though.
    326    *
    327    * Instances of "java_class" must be instances of the method's declaring class.
    328    */
    329   void CheckStaticMethod(jclass java_class, jmethodID mid)
    330       SHARED_LOCKS_REQUIRED(Locks::mutator_lock_) {
    331     mirror::ArtMethod* m = CheckMethodID(mid);
    332     if (m == nullptr) {
    333       return;
    334     }
    335     mirror::Class* c = soa_.Decode<mirror::Class*>(java_class);
    336     if (!m->GetDeclaringClass()->IsAssignableFrom(c)) {
    337       JniAbortF(function_name_, "can't call static %s on class %s",
    338                 PrettyMethod(m).c_str(), PrettyClass(c).c_str());
    339     }
    340   }
    341 
    342   /*
    343    * Verify that "mid" is appropriate for "jobj".
    344    *
    345    * Make sure the object is an instance of the method's declaring class.
    346    * (Note the mid might point to a declaration in an interface; this
    347    * will be handled automatically by the instanceof check.)
    348    */
    349   void CheckVirtualMethod(jobject java_object, jmethodID mid)
    350       SHARED_LOCKS_REQUIRED(Locks::mutator_lock_) {
    351     mirror::ArtMethod* m = CheckMethodID(mid);
    352     if (m == nullptr) {
    353       return;
    354     }
    355     mirror::Object* o = soa_.Decode<mirror::Object*>(java_object);
    356     if (o == nullptr) {
    357       JniAbortF(function_name_, "can't call %s on null object", PrettyMethod(m).c_str());
    358     } else if (!o->InstanceOf(m->GetDeclaringClass())) {
    359       JniAbortF(function_name_, "can't call %s on instance of %s",
    360                 PrettyMethod(m).c_str(), PrettyTypeOf(o).c_str());
    361     }
    362   }
    363 
    364   /**
    365    * The format string is a sequence of the following characters,
    366    * and must be followed by arguments of the corresponding types
    367    * in the same order.
    368    *
    369    * Java primitive types:
    370    * B - jbyte
    371    * C - jchar
    372    * D - jdouble
    373    * F - jfloat
    374    * I - jint
    375    * J - jlong
    376    * S - jshort
    377    * Z - jboolean (shown as true and false)
    378    * V - void
    379    *
    380    * Java reference types:
    381    * L - jobject
    382    * a - jarray
    383    * c - jclass
    384    * s - jstring
    385    *
    386    * JNI types:
    387    * b - jboolean (shown as JNI_TRUE and JNI_FALSE)
    388    * f - jfieldID
    389    * m - jmethodID
    390    * p - void*
    391    * r - jint (for release mode arguments)
    392    * u - const char* (Modified UTF-8)
    393    * z - jsize (for lengths; use i if negative values are okay)
    394    * v - JavaVM*
    395    * E - JNIEnv*
    396    * . - no argument; just print "..." (used for varargs JNI calls)
    397    *
    398    * Use the kFlag_NullableUtf flag where 'u' field(s) are nullable.
    399    */
    400   void Check(bool entry, const char* fmt0, ...) SHARED_LOCKS_REQUIRED(Locks::mutator_lock_) {
    401     va_list ap;
    402 
    403     mirror::ArtMethod* traceMethod = nullptr;
    404     if (has_method_ && (!soa_.Vm()->trace.empty() || VLOG_IS_ON(third_party_jni))) {
    405       // We need to guard some of the invocation interface's calls: a bad caller might
    406       // use DetachCurrentThread or GetEnv on a thread that's not yet attached.
    407       Thread* self = Thread::Current();
    408       if ((flags_ & kFlag_Invocation) == 0 || self != nullptr) {
    409         traceMethod = self->GetCurrentMethod(nullptr);
    410       }
    411     }
    412 
    413     if (((flags_ & kFlag_ForceTrace) != 0) ||
    414         (traceMethod != nullptr && ShouldTrace(soa_.Vm(), traceMethod))) {
    415       va_start(ap, fmt0);
    416       std::string msg;
    417       for (const char* fmt = fmt0; *fmt;) {
    418         char ch = *fmt++;
    419         if (ch == 'B') {  // jbyte
    420           jbyte b = va_arg(ap, int);
    421           if (b >= 0 && b < 10) {
    422             StringAppendF(&msg, "%d", b);
    423           } else {
    424             StringAppendF(&msg, "%#x (%d)", b, b);
    425           }
    426         } else if (ch == 'C') {  // jchar
    427           jchar c = va_arg(ap, int);
    428           if (c < 0x7f && c >= ' ') {
    429             StringAppendF(&msg, "U+%x ('%c')", c, c);
    430           } else {
    431             StringAppendF(&msg, "U+%x", c);
    432           }
    433         } else if (ch == 'F' || ch == 'D') {  // jfloat, jdouble
    434           StringAppendF(&msg, "%g", va_arg(ap, double));
    435         } else if (ch == 'I' || ch == 'S') {  // jint, jshort
    436           StringAppendF(&msg, "%d", va_arg(ap, int));
    437         } else if (ch == 'J') {  // jlong
    438           StringAppendF(&msg, "%" PRId64, va_arg(ap, jlong));
    439         } else if (ch == 'Z') {  // jboolean
    440           StringAppendF(&msg, "%s", va_arg(ap, int) ? "true" : "false");
    441         } else if (ch == 'V') {  // void
    442           msg += "void";
    443         } else if (ch == 'v') {  // JavaVM*
    444           JavaVM* vm = va_arg(ap, JavaVM*);
    445           StringAppendF(&msg, "(JavaVM*)%p", vm);
    446         } else if (ch == 'E') {  // JNIEnv*
    447           JNIEnv* env = va_arg(ap, JNIEnv*);
    448           StringAppendF(&msg, "(JNIEnv*)%p", env);
    449         } else if (ch == 'L' || ch == 'a' || ch == 's') {  // jobject, jarray, jstring
    450           // For logging purposes, these are identical.
    451           jobject o = va_arg(ap, jobject);
    452           if (o == nullptr) {
    453             msg += "NULL";
    454           } else {
    455             StringAppendF(&msg, "%p", o);
    456           }
    457         } else if (ch == 'b') {  // jboolean (JNI-style)
    458           jboolean b = va_arg(ap, int);
    459           msg += (b ? "JNI_TRUE" : "JNI_FALSE");
    460         } else if (ch == 'c') {  // jclass
    461           jclass jc = va_arg(ap, jclass);
    462           mirror::Class* c = reinterpret_cast<mirror::Class*>(Thread::Current()->DecodeJObject(jc));
    463           if (c == nullptr) {
    464             msg += "NULL";
    465           } else if (c == kInvalidIndirectRefObject ||
    466               !Runtime::Current()->GetHeap()->IsValidObjectAddress(c)) {
    467             StringAppendF(&msg, "INVALID POINTER:%p", jc);
    468           } else if (!c->IsClass()) {
    469             msg += "INVALID NON-CLASS OBJECT OF TYPE:" + PrettyTypeOf(c);
    470           } else {
    471             msg += PrettyClass(c);
    472             if (!entry) {
    473               StringAppendF(&msg, " (%p)", jc);
    474             }
    475           }
    476         } else if (ch == 'f') {  // jfieldID
    477           jfieldID fid = va_arg(ap, jfieldID);
    478           mirror::ArtField* f = reinterpret_cast<mirror::ArtField*>(fid);
    479           msg += PrettyField(f);
    480           if (!entry) {
    481             StringAppendF(&msg, " (%p)", fid);
    482           }
    483         } else if (ch == 'z') {  // non-negative jsize
    484           // You might expect jsize to be size_t, but it's not; it's the same as jint.
    485           // We only treat this specially so we can do the non-negative check.
    486           // TODO: maybe this wasn't worth it?
    487           jint i = va_arg(ap, jint);
    488           StringAppendF(&msg, "%d", i);
    489         } else if (ch == 'm') {  // jmethodID
    490           jmethodID mid = va_arg(ap, jmethodID);
    491           mirror::ArtMethod* m = reinterpret_cast<mirror::ArtMethod*>(mid);
    492           msg += PrettyMethod(m);
    493           if (!entry) {
    494             StringAppendF(&msg, " (%p)", mid);
    495           }
    496         } else if (ch == 'p') {  // void* ("pointer")
    497           void* p = va_arg(ap, void*);
    498           if (p == nullptr) {
    499             msg += "NULL";
    500           } else {
    501             StringAppendF(&msg, "(void*) %p", p);
    502           }
    503         } else if (ch == 'r') {  // jint (release mode)
    504           jint releaseMode = va_arg(ap, jint);
    505           if (releaseMode == 0) {
    506             msg += "0";
    507           } else if (releaseMode == JNI_ABORT) {
    508             msg += "JNI_ABORT";
    509           } else if (releaseMode == JNI_COMMIT) {
    510             msg += "JNI_COMMIT";
    511           } else {
    512             StringAppendF(&msg, "invalid release mode %d", releaseMode);
    513           }
    514         } else if (ch == 'u') {  // const char* (Modified UTF-8)
    515           const char* utf = va_arg(ap, const char*);
    516           if (utf == nullptr) {
    517             msg += "NULL";
    518           } else {
    519             StringAppendF(&msg, "\"%s\"", utf);
    520           }
    521         } else if (ch == '.') {
    522           msg += "...";
    523         } else {
    524           JniAbortF(function_name_, "unknown trace format specifier: %c", ch);
    525           return;
    526         }
    527         if (*fmt) {
    528           StringAppendF(&msg, ", ");
    529         }
    530       }
    531       va_end(ap);
    532 
    533       if ((flags_ & kFlag_ForceTrace) != 0) {
    534         LOG(INFO) << "JNI: call to " << function_name_ << "(" << msg << ")";
    535       } else if (entry) {
    536         if (has_method_) {
    537           std::string methodName(PrettyMethod(traceMethod, false));
    538           LOG(INFO) << "JNI: " << methodName << " -> " << function_name_ << "(" << msg << ")";
    539           indent_ = methodName.size() + 1;
    540         } else {
    541           LOG(INFO) << "JNI: -> " << function_name_ << "(" << msg << ")";
    542           indent_ = 0;
    543         }
    544       } else {
    545         LOG(INFO) << StringPrintf("JNI: %*s<- %s returned %s", indent_, "", function_name_, msg.c_str());
    546       }
    547     }
    548 
    549     // We always do the thorough checks on entry, and never on exit...
    550     if (entry) {
    551       va_start(ap, fmt0);
    552       for (const char* fmt = fmt0; *fmt; ++fmt) {
    553         char ch = *fmt;
    554         if (ch == 'a') {
    555           CheckArray(va_arg(ap, jarray));
    556         } else if (ch == 'c') {
    557           CheckInstance(kClass, va_arg(ap, jclass));
    558         } else if (ch == 'L') {
    559           CheckObject(va_arg(ap, jobject));
    560         } else if (ch == 'r') {
    561           CheckReleaseMode(va_arg(ap, jint));
    562         } else if (ch == 's') {
    563           CheckInstance(kString, va_arg(ap, jstring));
    564         } else if (ch == 'u') {
    565           if ((flags_ & kFlag_Release) != 0) {
    566             CheckNonNull(va_arg(ap, const char*));
    567           } else {
    568             bool nullable = ((flags_ & kFlag_NullableUtf) != 0);
    569             CheckUtfString(va_arg(ap, const char*), nullable);
    570           }
    571         } else if (ch == 'z') {
    572           CheckLengthPositive(va_arg(ap, jsize));
    573         } else if (strchr("BCISZbfmpEv", ch) != nullptr) {
    574           va_arg(ap, uint32_t);  // Skip this argument.
    575         } else if (ch == 'D' || ch == 'F') {
    576           va_arg(ap, double);  // Skip this argument.
    577         } else if (ch == 'J') {
    578           va_arg(ap, uint64_t);  // Skip this argument.
    579         } else if (ch == '.') {
    580         } else {
    581           LOG(FATAL) << "Unknown check format specifier: " << ch;
    582         }
    583       }
    584       va_end(ap);
    585     }
    586   }
    587 
    588   enum InstanceKind {
    589     kClass,
    590     kDirectByteBuffer,
    591     kObject,
    592     kString,
    593     kThrowable,
    594   };
    595 
    596   /*
    597    * Verify that "jobj" is a valid non-NULL object reference, and points to
    598    * an instance of expectedClass.
    599    *
    600    * Because we're looking at an object on the GC heap, we have to switch
    601    * to "running" mode before doing the checks.
    602    */
    603   bool CheckInstance(InstanceKind kind, jobject java_object)
    604       SHARED_LOCKS_REQUIRED(Locks::mutator_lock_) {
    605     const char* what = nullptr;
    606     switch (kind) {
    607     case kClass:
    608       what = "jclass";
    609       break;
    610     case kDirectByteBuffer:
    611       what = "direct ByteBuffer";
    612       break;
    613     case kObject:
    614       what = "jobject";
    615       break;
    616     case kString:
    617       what = "jstring";
    618       break;
    619     case kThrowable:
    620       what = "jthrowable";
    621       break;
    622     default:
    623       LOG(FATAL) << "Unknown kind " << static_cast<int>(kind);
    624     }
    625 
    626     if (java_object == nullptr) {
    627       JniAbortF(function_name_, "%s received null %s", function_name_, what);
    628       return false;
    629     }
    630 
    631     mirror::Object* obj = soa_.Decode<mirror::Object*>(java_object);
    632     if (!Runtime::Current()->GetHeap()->IsValidObjectAddress(obj)) {
    633       Runtime::Current()->GetHeap()->DumpSpaces(LOG(ERROR));
    634       JniAbortF(function_name_, "%s is an invalid %s: %p (%p)",
    635                 what, ToStr<IndirectRefKind>(GetIndirectRefKind(java_object)).c_str(), java_object, obj);
    636       return false;
    637     }
    638 
    639     bool okay = true;
    640     switch (kind) {
    641     case kClass:
    642       okay = obj->IsClass();
    643       break;
    644     case kDirectByteBuffer:
    645       UNIMPLEMENTED(FATAL);
    646       break;
    647     case kString:
    648       okay = obj->GetClass()->IsStringClass();
    649       break;
    650     case kThrowable:
    651       okay = obj->GetClass()->IsThrowableClass();
    652       break;
    653     case kObject:
    654       break;
    655     }
    656     if (!okay) {
    657       JniAbortF(function_name_, "%s has wrong type: %s", what, PrettyTypeOf(obj).c_str());
    658       return false;
    659     }
    660 
    661     return true;
    662   }
    663 
    664  private:
    665   // Set "has_method" to true if we have a valid thread with a method pointer.
    666   // We won't have one before attaching a thread, after detaching a thread, or
    667   // when shutting down the runtime.
    668   void Init(int flags, const char* functionName, bool has_method) {
    669     flags_ = flags;
    670     function_name_ = functionName;
    671     has_method_ = has_method;
    672   }
    673 
    674   /*
    675    * Verify that "array" is non-NULL and points to an Array object.
    676    *
    677    * Since we're dealing with objects, switch to "running" mode.
    678    */
    679   void CheckArray(jarray java_array) SHARED_LOCKS_REQUIRED(Locks::mutator_lock_) {
    680     if (java_array == nullptr) {
    681       JniAbortF(function_name_, "jarray was NULL");
    682       return;
    683     }
    684 
    685     mirror::Array* a = soa_.Decode<mirror::Array*>(java_array);
    686     if (!Runtime::Current()->GetHeap()->IsValidObjectAddress(a)) {
    687       Runtime::Current()->GetHeap()->DumpSpaces(LOG(ERROR));
    688       JniAbortF(function_name_, "jarray is an invalid %s: %p (%p)",
    689                 ToStr<IndirectRefKind>(GetIndirectRefKind(java_array)).c_str(), java_array, a);
    690     } else if (!a->IsArrayInstance()) {
    691       JniAbortF(function_name_, "jarray argument has non-array type: %s", PrettyTypeOf(a).c_str());
    692     }
    693   }
    694 
    695   void CheckLengthPositive(jsize length) {
    696     if (length < 0) {
    697       JniAbortF(function_name_, "negative jsize: %d", length);
    698     }
    699   }
    700 
    701   mirror::ArtField* CheckFieldID(jfieldID fid) SHARED_LOCKS_REQUIRED(Locks::mutator_lock_) {
    702     if (fid == nullptr) {
    703       JniAbortF(function_name_, "jfieldID was NULL");
    704       return nullptr;
    705     }
    706     mirror::ArtField* f = soa_.DecodeField(fid);
    707     if (!Runtime::Current()->GetHeap()->IsValidObjectAddress(f) || !f->IsArtField()) {
    708       Runtime::Current()->GetHeap()->DumpSpaces(LOG(ERROR));
    709       JniAbortF(function_name_, "invalid jfieldID: %p", fid);
    710       return nullptr;
    711     }
    712     return f;
    713   }
    714 
    715   mirror::ArtMethod* CheckMethodID(jmethodID mid) SHARED_LOCKS_REQUIRED(Locks::mutator_lock_) {
    716     if (mid == nullptr) {
    717       JniAbortF(function_name_, "jmethodID was NULL");
    718       return nullptr;
    719     }
    720     mirror::ArtMethod* m = soa_.DecodeMethod(mid);
    721     if (!Runtime::Current()->GetHeap()->IsValidObjectAddress(m) || !m->IsArtMethod()) {
    722       Runtime::Current()->GetHeap()->DumpSpaces(LOG(ERROR));
    723       JniAbortF(function_name_, "invalid jmethodID: %p", mid);
    724       return nullptr;
    725     }
    726     return m;
    727   }
    728 
    729   /*
    730    * Verify that "jobj" is a valid object, and that it's an object that JNI
    731    * is allowed to know about.  We allow NULL references.
    732    *
    733    * Switches to "running" mode before performing checks.
    734    */
    735   void CheckObject(jobject java_object)
    736       SHARED_LOCKS_REQUIRED(Locks::mutator_lock_) {
    737     if (java_object == nullptr) {
    738       return;
    739     }
    740 
    741     mirror::Object* o = soa_.Decode<mirror::Object*>(java_object);
    742     if (!Runtime::Current()->GetHeap()->IsValidObjectAddress(o)) {
    743       Runtime::Current()->GetHeap()->DumpSpaces(LOG(ERROR));
    744       // TODO: when we remove work_around_app_jni_bugs, this should be impossible.
    745       JniAbortF(function_name_, "native code passing in reference to invalid %s: %p",
    746                 ToStr<IndirectRefKind>(GetIndirectRefKind(java_object)).c_str(), java_object);
    747     }
    748   }
    749 
    750   /*
    751    * Verify that the "mode" argument passed to a primitive array Release
    752    * function is one of the valid values.
    753    */
    754   void CheckReleaseMode(jint mode) {
    755     if (mode != 0 && mode != JNI_COMMIT && mode != JNI_ABORT) {
    756       JniAbortF(function_name_, "unknown value for release mode: %d", mode);
    757     }
    758   }
    759 
    760   void CheckThread(int flags) SHARED_LOCKS_REQUIRED(Locks::mutator_lock_) {
    761     Thread* self = Thread::Current();
    762     if (self == nullptr) {
    763       JniAbortF(function_name_, "a thread (tid %d) is making JNI calls without being attached", GetTid());
    764       return;
    765     }
    766 
    767     // Get the *correct* JNIEnv by going through our TLS pointer.
    768     JNIEnvExt* threadEnv = self->GetJniEnv();
    769 
    770     // Verify that the current thread is (a) attached and (b) associated with
    771     // this particular instance of JNIEnv.
    772     if (soa_.Env() != threadEnv) {
    773       JniAbortF(function_name_, "thread %s using JNIEnv* from thread %s",
    774                 ToStr<Thread>(*self).c_str(), ToStr<Thread>(*soa_.Self()).c_str());
    775       return;
    776     }
    777 
    778     // Verify that, if this thread previously made a critical "get" call, we
    779     // do the corresponding "release" call before we try anything else.
    780     switch (flags & kFlag_CritMask) {
    781     case kFlag_CritOkay:    // okay to call this method
    782       break;
    783     case kFlag_CritBad:     // not okay to call
    784       if (threadEnv->critical) {
    785         JniAbortF(function_name_, "thread %s using JNI after critical get", ToStr<Thread>(*self).c_str());
    786         return;
    787       }
    788       break;
    789     case kFlag_CritGet:     // this is a "get" call
    790       // Don't check here; we allow nested gets.
    791       threadEnv->critical++;
    792       break;
    793     case kFlag_CritRelease:  // this is a "release" call
    794       threadEnv->critical--;
    795       if (threadEnv->critical < 0) {
    796         JniAbortF(function_name_, "thread %s called too many critical releases", ToStr<Thread>(*self).c_str());
    797         return;
    798       }
    799       break;
    800     default:
    801       LOG(FATAL) << "Bad flags (internal error): " << flags;
    802     }
    803 
    804     // Verify that, if an exception has been raised, the native code doesn't
    805     // make any JNI calls other than the Exception* methods.
    806     if ((flags & kFlag_ExcepOkay) == 0 && self->IsExceptionPending()) {
    807       ThrowLocation throw_location;
    808       mirror::Throwable* exception = self->GetException(&throw_location);
    809       std::string type(PrettyTypeOf(exception));
    810       JniAbortF(function_name_, "JNI %s called with pending exception '%s' thrown in %s",
    811                 function_name_, type.c_str(), throw_location.Dump().c_str());
    812       return;
    813     }
    814   }
    815 
    816   // Verifies that "bytes" points to valid Modified UTF-8 data.
    817   void CheckUtfString(const char* bytes, bool nullable) {
    818     if (bytes == nullptr) {
    819       if (!nullable) {
    820         JniAbortF(function_name_, "non-nullable const char* was NULL");
    821         return;
    822       }
    823       return;
    824     }
    825 
    826     const char* errorKind = nullptr;
    827     uint8_t utf8 = CheckUtfBytes(bytes, &errorKind);
    828     if (errorKind != nullptr) {
    829       JniAbortF(function_name_,
    830                 "input is not valid Modified UTF-8: illegal %s byte %#x\n"
    831                 "    string: '%s'", errorKind, utf8, bytes);
    832       return;
    833     }
    834   }
    835 
    836   static uint8_t CheckUtfBytes(const char* bytes, const char** errorKind) {
    837     while (*bytes != '\0') {
    838       uint8_t utf8 = *(bytes++);
    839       // Switch on the high four bits.
    840       switch (utf8 >> 4) {
    841       case 0x00:
    842       case 0x01:
    843       case 0x02:
    844       case 0x03:
    845       case 0x04:
    846       case 0x05:
    847       case 0x06:
    848       case 0x07:
    849         // Bit pattern 0xxx. No need for any extra bytes.
    850         break;
    851       case 0x08:
    852       case 0x09:
    853       case 0x0a:
    854       case 0x0b:
    855       case 0x0f:
    856         /*
    857          * Bit pattern 10xx or 1111, which are illegal start bytes.
    858          * Note: 1111 is valid for normal UTF-8, but not the
    859          * Modified UTF-8 used here.
    860          */
    861         *errorKind = "start";
    862         return utf8;
    863       case 0x0e:
    864         // Bit pattern 1110, so there are two additional bytes.
    865         utf8 = *(bytes++);
    866         if ((utf8 & 0xc0) != 0x80) {
    867           *errorKind = "continuation";
    868           return utf8;
    869         }
    870         // Fall through to take care of the final byte.
    871       case 0x0c:
    872       case 0x0d:
    873         // Bit pattern 110x, so there is one additional byte.
    874         utf8 = *(bytes++);
    875         if ((utf8 & 0xc0) != 0x80) {
    876           *errorKind = "continuation";
    877           return utf8;
    878         }
    879         break;
    880       }
    881     }
    882     return 0;
    883   }
    884 
    885   const ScopedObjectAccess soa_;
    886   const char* function_name_;
    887   int flags_;
    888   bool has_method_;
    889   int indent_;
    890 
    891   DISALLOW_COPY_AND_ASSIGN(ScopedCheck);
    892 };
    893 
    894 #define CHECK_JNI_ENTRY(flags, types, args...) \
    895   ScopedCheck sc(env, flags, __FUNCTION__); \
    896   sc.Check(true, types, ##args)
    897 
    898 #define CHECK_JNI_EXIT(type, exp) ({ \
    899     auto _rc = (exp); \
    900   sc.Check(false, type, _rc); \
    901   _rc; })
    902 #define CHECK_JNI_EXIT_VOID() \
    903   sc.Check(false, "V")
    904 
    905 /*
    906  * ===========================================================================
    907  *      Guarded arrays
    908  * ===========================================================================
    909  */
    910 
    911 #define kGuardLen       512         /* must be multiple of 2 */
    912 #define kGuardPattern   0xd5e3      /* uncommon values; d5e3d5e3 invalid addr */
    913 #define kGuardMagic     0xffd5aa96
    914 
    915 /* this gets tucked in at the start of the buffer; struct size must be even */
    916 struct GuardedCopy {
    917   uint32_t magic;
    918   uLong adler;
    919   size_t original_length;
    920   const void* original_ptr;
    921 
    922   /* find the GuardedCopy given the pointer into the "live" data */
    923   static inline const GuardedCopy* FromData(const void* dataBuf) {
    924     return reinterpret_cast<const GuardedCopy*>(ActualBuffer(dataBuf));
    925   }
    926 
    927   /*
    928    * Create an over-sized buffer to hold the contents of "buf".  Copy it in,
    929    * filling in the area around it with guard data.
    930    *
    931    * We use a 16-bit pattern to make a rogue memset less likely to elude us.
    932    */
    933   static void* Create(const void* buf, size_t len, bool modOkay) {
    934     size_t newLen = ActualLength(len);
    935     uint8_t* newBuf = DebugAlloc(newLen);
    936 
    937     // Fill it in with a pattern.
    938     uint16_t* pat = reinterpret_cast<uint16_t*>(newBuf);
    939     for (size_t i = 0; i < newLen / 2; i++) {
    940       *pat++ = kGuardPattern;
    941     }
    942 
    943     // Copy the data in; note "len" could be zero.
    944     memcpy(newBuf + kGuardLen / 2, buf, len);
    945 
    946     // If modification is not expected, grab a checksum.
    947     uLong adler = 0;
    948     if (!modOkay) {
    949       adler = adler32(0L, Z_NULL, 0);
    950       adler = adler32(adler, reinterpret_cast<const Bytef*>(buf), len);
    951       *reinterpret_cast<uLong*>(newBuf) = adler;
    952     }
    953 
    954     GuardedCopy* pExtra = reinterpret_cast<GuardedCopy*>(newBuf);
    955     pExtra->magic = kGuardMagic;
    956     pExtra->adler = adler;
    957     pExtra->original_ptr = buf;
    958     pExtra->original_length = len;
    959 
    960     return newBuf + kGuardLen / 2;
    961   }
    962 
    963   /*
    964    * Free up the guard buffer, scrub it, and return the original pointer.
    965    */
    966   static void* Destroy(void* dataBuf) {
    967     const GuardedCopy* pExtra = GuardedCopy::FromData(dataBuf);
    968     void* original_ptr = const_cast<void*>(pExtra->original_ptr);
    969     size_t len = pExtra->original_length;
    970     DebugFree(dataBuf, len);
    971     return original_ptr;
    972   }
    973 
    974   /*
    975    * Verify the guard area and, if "modOkay" is false, that the data itself
    976    * has not been altered.
    977    *
    978    * The caller has already checked that "dataBuf" is non-NULL.
    979    */
    980   static void Check(const char* functionName, const void* dataBuf, bool modOkay) {
    981     static const uint32_t kMagicCmp = kGuardMagic;
    982     const uint8_t* fullBuf = ActualBuffer(dataBuf);
    983     const GuardedCopy* pExtra = GuardedCopy::FromData(dataBuf);
    984 
    985     // Before we do anything with "pExtra", check the magic number.  We
    986     // do the check with memcmp rather than "==" in case the pointer is
    987     // unaligned.  If it points to completely bogus memory we're going
    988     // to crash, but there's no easy way around that.
    989     if (memcmp(&pExtra->magic, &kMagicCmp, 4) != 0) {
    990       uint8_t buf[4];
    991       memcpy(buf, &pExtra->magic, 4);
    992       JniAbortF(functionName,
    993           "guard magic does not match (found 0x%02x%02x%02x%02x) -- incorrect data pointer %p?",
    994           buf[3], buf[2], buf[1], buf[0], dataBuf);  // Assumes little-endian.
    995     }
    996 
    997     size_t len = pExtra->original_length;
    998 
    999     // Check bottom half of guard; skip over optional checksum storage.
   1000     const uint16_t* pat = reinterpret_cast<const uint16_t*>(fullBuf);
   1001     for (size_t i = sizeof(GuardedCopy) / 2; i < (kGuardLen / 2 - sizeof(GuardedCopy)) / 2; i++) {
   1002       if (pat[i] != kGuardPattern) {
   1003         JniAbortF(functionName, "guard pattern(1) disturbed at %p +%zd", fullBuf, i*2);
   1004       }
   1005     }
   1006 
   1007     int offset = kGuardLen / 2 + len;
   1008     if (offset & 0x01) {
   1009       // Odd byte; expected value depends on endian.
   1010       const uint16_t patSample = kGuardPattern;
   1011       uint8_t expected_byte = reinterpret_cast<const uint8_t*>(&patSample)[1];
   1012       if (fullBuf[offset] != expected_byte) {
   1013         JniAbortF(functionName, "guard pattern disturbed in odd byte after %p +%d 0x%02x 0x%02x",
   1014                   fullBuf, offset, fullBuf[offset], expected_byte);
   1015       }
   1016       offset++;
   1017     }
   1018 
   1019     // Check top half of guard.
   1020     pat = reinterpret_cast<const uint16_t*>(fullBuf + offset);
   1021     for (size_t i = 0; i < kGuardLen / 4; i++) {
   1022       if (pat[i] != kGuardPattern) {
   1023         JniAbortF(functionName, "guard pattern(2) disturbed at %p +%zd", fullBuf, offset + i*2);
   1024       }
   1025     }
   1026 
   1027     // If modification is not expected, verify checksum.  Strictly speaking
   1028     // this is wrong: if we told the client that we made a copy, there's no
   1029     // reason they can't alter the buffer.
   1030     if (!modOkay) {
   1031       uLong adler = adler32(0L, Z_NULL, 0);
   1032       adler = adler32(adler, (const Bytef*)dataBuf, len);
   1033       if (pExtra->adler != adler) {
   1034         JniAbortF(functionName, "buffer modified (0x%08lx vs 0x%08lx) at address %p",
   1035                   pExtra->adler, adler, dataBuf);
   1036       }
   1037     }
   1038   }
   1039 
   1040  private:
   1041   static uint8_t* DebugAlloc(size_t len) {
   1042     void* result = mmap(nullptr, len, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANON, -1, 0);
   1043     if (result == MAP_FAILED) {
   1044       PLOG(FATAL) << "GuardedCopy::create mmap(" << len << ") failed";
   1045     }
   1046     return reinterpret_cast<uint8_t*>(result);
   1047   }
   1048 
   1049   static void DebugFree(void* dataBuf, size_t len) {
   1050     uint8_t* fullBuf = ActualBuffer(dataBuf);
   1051     size_t totalByteCount = ActualLength(len);
   1052     // TODO: we could mprotect instead, and keep the allocation around for a while.
   1053     // This would be even more expensive, but it might catch more errors.
   1054     // if (mprotect(fullBuf, totalByteCount, PROT_NONE) != 0) {
   1055     //     PLOG(WARNING) << "mprotect(PROT_NONE) failed";
   1056     // }
   1057     if (munmap(fullBuf, totalByteCount) != 0) {
   1058       PLOG(FATAL) << "munmap(" << reinterpret_cast<void*>(fullBuf) << ", " << totalByteCount << ") failed";
   1059     }
   1060   }
   1061 
   1062   static const uint8_t* ActualBuffer(const void* dataBuf) {
   1063     return reinterpret_cast<const uint8_t*>(dataBuf) - kGuardLen / 2;
   1064   }
   1065 
   1066   static uint8_t* ActualBuffer(void* dataBuf) {
   1067     return reinterpret_cast<uint8_t*>(dataBuf) - kGuardLen / 2;
   1068   }
   1069 
   1070   // Underlying length of a user allocation of 'length' bytes.
   1071   static size_t ActualLength(size_t length) {
   1072     return (length + kGuardLen + 1) & ~0x01;
   1073   }
   1074 };
   1075 
   1076 /*
   1077  * Create a guarded copy of a primitive array.  Modifications to the copied
   1078  * data are allowed.  Returns a pointer to the copied data.
   1079  */
   1080 static void* CreateGuardedPACopy(JNIEnv* env, const jarray java_array, jboolean* isCopy) {
   1081   ScopedObjectAccess soa(env);
   1082 
   1083   mirror::Array* a = soa.Decode<mirror::Array*>(java_array);
   1084   size_t component_size = a->GetClass()->GetComponentSize();
   1085   size_t byte_count = a->GetLength() * component_size;
   1086   void* result = GuardedCopy::Create(a->GetRawData(component_size, 0), byte_count, true);
   1087   if (isCopy != nullptr) {
   1088     *isCopy = JNI_TRUE;
   1089   }
   1090   return result;
   1091 }
   1092 
   1093 /*
   1094  * Perform the array "release" operation, which may or may not copy data
   1095  * back into the managed heap, and may or may not release the underlying storage.
   1096  */
   1097 static void ReleaseGuardedPACopy(JNIEnv* env, jarray java_array, void* dataBuf, int mode) {
   1098   ScopedObjectAccess soa(env);
   1099   mirror::Array* a = soa.Decode<mirror::Array*>(java_array);
   1100 
   1101   GuardedCopy::Check(__FUNCTION__, dataBuf, true);
   1102 
   1103   if (mode != JNI_ABORT) {
   1104     size_t len = GuardedCopy::FromData(dataBuf)->original_length;
   1105     memcpy(a->GetRawData(a->GetClass()->GetComponentSize(), 0), dataBuf, len);
   1106   }
   1107   if (mode != JNI_COMMIT) {
   1108     GuardedCopy::Destroy(dataBuf);
   1109   }
   1110 }
   1111 
   1112 /*
   1113  * ===========================================================================
   1114  *      JNI functions
   1115  * ===========================================================================
   1116  */
   1117 
   1118 class CheckJNI {
   1119  public:
   1120   static jint GetVersion(JNIEnv* env) {
   1121     CHECK_JNI_ENTRY(kFlag_Default, "E", env);
   1122     return CHECK_JNI_EXIT("I", baseEnv(env)->GetVersion(env));
   1123   }
   1124 
   1125   static jclass DefineClass(JNIEnv* env, const char* name, jobject loader, const jbyte* buf, jsize bufLen) {
   1126     CHECK_JNI_ENTRY(kFlag_Default, "EuLpz", env, name, loader, buf, bufLen);
   1127     sc.CheckClassName(name);
   1128     return CHECK_JNI_EXIT("c", baseEnv(env)->DefineClass(env, name, loader, buf, bufLen));
   1129   }
   1130 
   1131   static jclass FindClass(JNIEnv* env, const char* name) {
   1132     CHECK_JNI_ENTRY(kFlag_Default, "Eu", env, name);
   1133     sc.CheckClassName(name);
   1134     return CHECK_JNI_EXIT("c", baseEnv(env)->FindClass(env, name));
   1135   }
   1136 
   1137   static jclass GetSuperclass(JNIEnv* env, jclass c) {
   1138     CHECK_JNI_ENTRY(kFlag_Default, "Ec", env, c);
   1139     return CHECK_JNI_EXIT("c", baseEnv(env)->GetSuperclass(env, c));
   1140   }
   1141 
   1142   static jboolean IsAssignableFrom(JNIEnv* env, jclass c1, jclass c2) {
   1143     CHECK_JNI_ENTRY(kFlag_Default, "Ecc", env, c1, c2);
   1144     return CHECK_JNI_EXIT("b", baseEnv(env)->IsAssignableFrom(env, c1, c2));
   1145   }
   1146 
   1147   static jmethodID FromReflectedMethod(JNIEnv* env, jobject method) {
   1148     CHECK_JNI_ENTRY(kFlag_Default, "EL", env, method);
   1149     // TODO: check that 'field' is a java.lang.reflect.Method.
   1150     return CHECK_JNI_EXIT("m", baseEnv(env)->FromReflectedMethod(env, method));
   1151   }
   1152 
   1153   static jfieldID FromReflectedField(JNIEnv* env, jobject field) {
   1154     CHECK_JNI_ENTRY(kFlag_Default, "EL", env, field);
   1155     // TODO: check that 'field' is a java.lang.reflect.Field.
   1156     return CHECK_JNI_EXIT("f", baseEnv(env)->FromReflectedField(env, field));
   1157   }
   1158 
   1159   static jobject ToReflectedMethod(JNIEnv* env, jclass cls, jmethodID mid, jboolean isStatic) {
   1160     CHECK_JNI_ENTRY(kFlag_Default, "Ecmb", env, cls, mid, isStatic);
   1161     return CHECK_JNI_EXIT("L", baseEnv(env)->ToReflectedMethod(env, cls, mid, isStatic));
   1162   }
   1163 
   1164   static jobject ToReflectedField(JNIEnv* env, jclass cls, jfieldID fid, jboolean isStatic) {
   1165     CHECK_JNI_ENTRY(kFlag_Default, "Ecfb", env, cls, fid, isStatic);
   1166     return CHECK_JNI_EXIT("L", baseEnv(env)->ToReflectedField(env, cls, fid, isStatic));
   1167   }
   1168 
   1169   static jint Throw(JNIEnv* env, jthrowable obj) {
   1170     CHECK_JNI_ENTRY(kFlag_Default, "EL", env, obj);
   1171     // TODO: check that 'obj' is a java.lang.Throwable.
   1172     return CHECK_JNI_EXIT("I", baseEnv(env)->Throw(env, obj));
   1173   }
   1174 
   1175   static jint ThrowNew(JNIEnv* env, jclass c, const char* message) {
   1176     CHECK_JNI_ENTRY(kFlag_NullableUtf, "Ecu", env, c, message);
   1177     return CHECK_JNI_EXIT("I", baseEnv(env)->ThrowNew(env, c, message));
   1178   }
   1179 
   1180   static jthrowable ExceptionOccurred(JNIEnv* env) {
   1181     CHECK_JNI_ENTRY(kFlag_ExcepOkay, "E", env);
   1182     return CHECK_JNI_EXIT("L", baseEnv(env)->ExceptionOccurred(env));
   1183   }
   1184 
   1185   static void ExceptionDescribe(JNIEnv* env) {
   1186     CHECK_JNI_ENTRY(kFlag_ExcepOkay, "E", env);
   1187     baseEnv(env)->ExceptionDescribe(env);
   1188     CHECK_JNI_EXIT_VOID();
   1189   }
   1190 
   1191   static void ExceptionClear(JNIEnv* env) {
   1192     CHECK_JNI_ENTRY(kFlag_ExcepOkay, "E", env);
   1193     baseEnv(env)->ExceptionClear(env);
   1194     CHECK_JNI_EXIT_VOID();
   1195   }
   1196 
   1197   static void FatalError(JNIEnv* env, const char* msg) {
   1198     // The JNI specification doesn't say it's okay to call FatalError with a pending exception,
   1199     // but you're about to abort anyway, and it's quite likely that you have a pending exception,
   1200     // and it's not unimaginable that you don't know that you do. So we allow it.
   1201     CHECK_JNI_ENTRY(kFlag_ExcepOkay | kFlag_NullableUtf, "Eu", env, msg);
   1202     baseEnv(env)->FatalError(env, msg);
   1203     CHECK_JNI_EXIT_VOID();
   1204   }
   1205 
   1206   static jint PushLocalFrame(JNIEnv* env, jint capacity) {
   1207     CHECK_JNI_ENTRY(kFlag_Default | kFlag_ExcepOkay, "EI", env, capacity);
   1208     return CHECK_JNI_EXIT("I", baseEnv(env)->PushLocalFrame(env, capacity));
   1209   }
   1210 
   1211   static jobject PopLocalFrame(JNIEnv* env, jobject res) {
   1212     CHECK_JNI_ENTRY(kFlag_Default | kFlag_ExcepOkay, "EL", env, res);
   1213     return CHECK_JNI_EXIT("L", baseEnv(env)->PopLocalFrame(env, res));
   1214   }
   1215 
   1216   static jobject NewGlobalRef(JNIEnv* env, jobject obj) {
   1217     CHECK_JNI_ENTRY(kFlag_Default, "EL", env, obj);
   1218     return CHECK_JNI_EXIT("L", baseEnv(env)->NewGlobalRef(env, obj));
   1219   }
   1220 
   1221   static jobject NewLocalRef(JNIEnv* env, jobject ref) {
   1222     CHECK_JNI_ENTRY(kFlag_Default, "EL", env, ref);
   1223     return CHECK_JNI_EXIT("L", baseEnv(env)->NewLocalRef(env, ref));
   1224   }
   1225 
   1226   static void DeleteGlobalRef(JNIEnv* env, jobject globalRef) {
   1227     CHECK_JNI_ENTRY(kFlag_Default | kFlag_ExcepOkay, "EL", env, globalRef);
   1228     if (globalRef != nullptr && GetIndirectRefKind(globalRef) != kGlobal) {
   1229       JniAbortF(__FUNCTION__, "DeleteGlobalRef on %s: %p",
   1230                 ToStr<IndirectRefKind>(GetIndirectRefKind(globalRef)).c_str(), globalRef);
   1231     } else {
   1232       baseEnv(env)->DeleteGlobalRef(env, globalRef);
   1233       CHECK_JNI_EXIT_VOID();
   1234     }
   1235   }
   1236 
   1237   static void DeleteWeakGlobalRef(JNIEnv* env, jweak weakGlobalRef) {
   1238     CHECK_JNI_ENTRY(kFlag_Default | kFlag_ExcepOkay, "EL", env, weakGlobalRef);
   1239     if (weakGlobalRef != nullptr && GetIndirectRefKind(weakGlobalRef) != kWeakGlobal) {
   1240       JniAbortF(__FUNCTION__, "DeleteWeakGlobalRef on %s: %p",
   1241                 ToStr<IndirectRefKind>(GetIndirectRefKind(weakGlobalRef)).c_str(), weakGlobalRef);
   1242     } else {
   1243       baseEnv(env)->DeleteWeakGlobalRef(env, weakGlobalRef);
   1244       CHECK_JNI_EXIT_VOID();
   1245     }
   1246   }
   1247 
   1248   static void DeleteLocalRef(JNIEnv* env, jobject localRef) {
   1249     CHECK_JNI_ENTRY(kFlag_Default | kFlag_ExcepOkay, "EL", env, localRef);
   1250     if (localRef != nullptr && GetIndirectRefKind(localRef) != kLocal && !IsHandleScopeLocalRef(env, localRef)) {
   1251       JniAbortF(__FUNCTION__, "DeleteLocalRef on %s: %p",
   1252                 ToStr<IndirectRefKind>(GetIndirectRefKind(localRef)).c_str(), localRef);
   1253     } else {
   1254       baseEnv(env)->DeleteLocalRef(env, localRef);
   1255       CHECK_JNI_EXIT_VOID();
   1256     }
   1257   }
   1258 
   1259   static jint EnsureLocalCapacity(JNIEnv *env, jint capacity) {
   1260     CHECK_JNI_ENTRY(kFlag_Default, "EI", env, capacity);
   1261     return CHECK_JNI_EXIT("I", baseEnv(env)->EnsureLocalCapacity(env, capacity));
   1262   }
   1263 
   1264   static jboolean IsSameObject(JNIEnv* env, jobject ref1, jobject ref2) {
   1265     CHECK_JNI_ENTRY(kFlag_Default, "ELL", env, ref1, ref2);
   1266     return CHECK_JNI_EXIT("b", baseEnv(env)->IsSameObject(env, ref1, ref2));
   1267   }
   1268 
   1269   static jobject AllocObject(JNIEnv* env, jclass c) {
   1270     CHECK_JNI_ENTRY(kFlag_Default, "Ec", env, c);
   1271     return CHECK_JNI_EXIT("L", baseEnv(env)->AllocObject(env, c));
   1272   }
   1273 
   1274   static jobject NewObject(JNIEnv* env, jclass c, jmethodID mid, ...) {
   1275     CHECK_JNI_ENTRY(kFlag_Default, "Ecm.", env, c, mid);
   1276     va_list args;
   1277     va_start(args, mid);
   1278     jobject result = baseEnv(env)->NewObjectV(env, c, mid, args);
   1279     va_end(args);
   1280     return CHECK_JNI_EXIT("L", result);
   1281   }
   1282 
   1283   static jobject NewObjectV(JNIEnv* env, jclass c, jmethodID mid, va_list args) {
   1284     CHECK_JNI_ENTRY(kFlag_Default, "Ecm.", env, c, mid);
   1285     return CHECK_JNI_EXIT("L", baseEnv(env)->NewObjectV(env, c, mid, args));
   1286   }
   1287 
   1288   static jobject NewObjectA(JNIEnv* env, jclass c, jmethodID mid, jvalue* args) {
   1289     CHECK_JNI_ENTRY(kFlag_Default, "Ecm.", env, c, mid);
   1290     return CHECK_JNI_EXIT("L", baseEnv(env)->NewObjectA(env, c, mid, args));
   1291   }
   1292 
   1293   static jclass GetObjectClass(JNIEnv* env, jobject obj) {
   1294     CHECK_JNI_ENTRY(kFlag_Default, "EL", env, obj);
   1295     return CHECK_JNI_EXIT("c", baseEnv(env)->GetObjectClass(env, obj));
   1296   }
   1297 
   1298   static jboolean IsInstanceOf(JNIEnv* env, jobject obj, jclass c) {
   1299     CHECK_JNI_ENTRY(kFlag_Default, "ELc", env, obj, c);
   1300     return CHECK_JNI_EXIT("b", baseEnv(env)->IsInstanceOf(env, obj, c));
   1301   }
   1302 
   1303   static jmethodID GetMethodID(JNIEnv* env, jclass c, const char* name, const char* sig) {
   1304     CHECK_JNI_ENTRY(kFlag_Default, "Ecuu", env, c, name, sig);
   1305     return CHECK_JNI_EXIT("m", baseEnv(env)->GetMethodID(env, c, name, sig));
   1306   }
   1307 
   1308   static jfieldID GetFieldID(JNIEnv* env, jclass c, const char* name, const char* sig) {
   1309     CHECK_JNI_ENTRY(kFlag_Default, "Ecuu", env, c, name, sig);
   1310     return CHECK_JNI_EXIT("f", baseEnv(env)->GetFieldID(env, c, name, sig));
   1311   }
   1312 
   1313   static jmethodID GetStaticMethodID(JNIEnv* env, jclass c, const char* name, const char* sig) {
   1314     CHECK_JNI_ENTRY(kFlag_Default, "Ecuu", env, c, name, sig);
   1315     return CHECK_JNI_EXIT("m", baseEnv(env)->GetStaticMethodID(env, c, name, sig));
   1316   }
   1317 
   1318   static jfieldID GetStaticFieldID(JNIEnv* env, jclass c, const char* name, const char* sig) {
   1319     CHECK_JNI_ENTRY(kFlag_Default, "Ecuu", env, c, name, sig);
   1320     return CHECK_JNI_EXIT("f", baseEnv(env)->GetStaticFieldID(env, c, name, sig));
   1321   }
   1322 
   1323 #define FIELD_ACCESSORS(_ctype, _jname, _jvalue_type, _type) \
   1324     static _ctype GetStatic##_jname##Field(JNIEnv* env, jclass c, jfieldID fid) { \
   1325         CHECK_JNI_ENTRY(kFlag_Default, "Ecf", env, c, fid); \
   1326         sc.CheckStaticFieldID(c, fid); \
   1327         return CHECK_JNI_EXIT(_type, baseEnv(env)->GetStatic##_jname##Field(env, c, fid)); \
   1328     } \
   1329     static _ctype Get##_jname##Field(JNIEnv* env, jobject obj, jfieldID fid) { \
   1330         CHECK_JNI_ENTRY(kFlag_Default, "ELf", env, obj, fid); \
   1331         sc.CheckInstanceFieldID(obj, fid); \
   1332         return CHECK_JNI_EXIT(_type, baseEnv(env)->Get##_jname##Field(env, obj, fid)); \
   1333     } \
   1334     static void SetStatic##_jname##Field(JNIEnv* env, jclass c, jfieldID fid, _ctype value) { \
   1335         CHECK_JNI_ENTRY(kFlag_Default, "Ecf" _type, env, c, fid, value); \
   1336         sc.CheckStaticFieldID(c, fid); \
   1337         /* "value" arg only used when type == ref */ \
   1338         jvalue java_type_value; \
   1339         java_type_value._jvalue_type = value; \
   1340         sc.CheckFieldType(java_type_value, fid, _type[0], true); \
   1341         baseEnv(env)->SetStatic##_jname##Field(env, c, fid, value); \
   1342         CHECK_JNI_EXIT_VOID(); \
   1343     } \
   1344     static void Set##_jname##Field(JNIEnv* env, jobject obj, jfieldID fid, _ctype value) { \
   1345         CHECK_JNI_ENTRY(kFlag_Default, "ELf" _type, env, obj, fid, value); \
   1346         sc.CheckInstanceFieldID(obj, fid); \
   1347         /* "value" arg only used when type == ref */ \
   1348         jvalue java_type_value; \
   1349         java_type_value._jvalue_type = value; \
   1350         sc.CheckFieldType(java_type_value, fid, _type[0], false); \
   1351         baseEnv(env)->Set##_jname##Field(env, obj, fid, value); \
   1352         CHECK_JNI_EXIT_VOID(); \
   1353     }
   1354 
   1355 FIELD_ACCESSORS(jobject, Object, l, "L");
   1356 FIELD_ACCESSORS(jboolean, Boolean, z, "Z");
   1357 FIELD_ACCESSORS(jbyte, Byte, b, "B");
   1358 FIELD_ACCESSORS(jchar, Char, c, "C");
   1359 FIELD_ACCESSORS(jshort, Short, s, "S");
   1360 FIELD_ACCESSORS(jint, Int, i, "I");
   1361 FIELD_ACCESSORS(jlong, Long, j, "J");
   1362 FIELD_ACCESSORS(jfloat, Float, f, "F");
   1363 FIELD_ACCESSORS(jdouble, Double, d, "D");
   1364 
   1365 #define CALL(_ctype, _jname, _retdecl, _retasgn, _retok, _retsig) \
   1366     /* Virtual... */ \
   1367     static _ctype Call##_jname##Method(JNIEnv* env, jobject obj, \
   1368         jmethodID mid, ...) \
   1369     { \
   1370         CHECK_JNI_ENTRY(kFlag_Default, "ELm.", env, obj, mid); /* TODO: args! */ \
   1371         sc.CheckSig(mid, _retsig, false); \
   1372         sc.CheckVirtualMethod(obj, mid); \
   1373         _retdecl; \
   1374         va_list args; \
   1375         va_start(args, mid); \
   1376         _retasgn(baseEnv(env)->Call##_jname##MethodV(env, obj, mid, args)); \
   1377         va_end(args); \
   1378         _retok; \
   1379     } \
   1380     static _ctype Call##_jname##MethodV(JNIEnv* env, jobject obj, \
   1381         jmethodID mid, va_list args) \
   1382     { \
   1383         CHECK_JNI_ENTRY(kFlag_Default, "ELm.", env, obj, mid); /* TODO: args! */ \
   1384         sc.CheckSig(mid, _retsig, false); \
   1385         sc.CheckVirtualMethod(obj, mid); \
   1386         _retdecl; \
   1387         _retasgn(baseEnv(env)->Call##_jname##MethodV(env, obj, mid, args)); \
   1388         _retok; \
   1389     } \
   1390     static _ctype Call##_jname##MethodA(JNIEnv* env, jobject obj, \
   1391         jmethodID mid, jvalue* args) \
   1392     { \
   1393         CHECK_JNI_ENTRY(kFlag_Default, "ELm.", env, obj, mid); /* TODO: args! */ \
   1394         sc.CheckSig(mid, _retsig, false); \
   1395         sc.CheckVirtualMethod(obj, mid); \
   1396         _retdecl; \
   1397         _retasgn(baseEnv(env)->Call##_jname##MethodA(env, obj, mid, args)); \
   1398         _retok; \
   1399     } \
   1400     /* Non-virtual... */ \
   1401     static _ctype CallNonvirtual##_jname##Method(JNIEnv* env, \
   1402         jobject obj, jclass c, jmethodID mid, ...) \
   1403     { \
   1404         CHECK_JNI_ENTRY(kFlag_Default, "ELcm.", env, obj, c, mid); /* TODO: args! */ \
   1405         sc.CheckSig(mid, _retsig, false); \
   1406         sc.CheckVirtualMethod(obj, mid); \
   1407         _retdecl; \
   1408         va_list args; \
   1409         va_start(args, mid); \
   1410         _retasgn(baseEnv(env)->CallNonvirtual##_jname##MethodV(env, obj, c, mid, args)); \
   1411         va_end(args); \
   1412         _retok; \
   1413     } \
   1414     static _ctype CallNonvirtual##_jname##MethodV(JNIEnv* env, \
   1415         jobject obj, jclass c, jmethodID mid, va_list args) \
   1416     { \
   1417         CHECK_JNI_ENTRY(kFlag_Default, "ELcm.", env, obj, c, mid); /* TODO: args! */ \
   1418         sc.CheckSig(mid, _retsig, false); \
   1419         sc.CheckVirtualMethod(obj, mid); \
   1420         _retdecl; \
   1421         _retasgn(baseEnv(env)->CallNonvirtual##_jname##MethodV(env, obj, c, mid, args)); \
   1422         _retok; \
   1423     } \
   1424     static _ctype CallNonvirtual##_jname##MethodA(JNIEnv* env, \
   1425         jobject obj, jclass c, jmethodID mid, jvalue* args) \
   1426     { \
   1427         CHECK_JNI_ENTRY(kFlag_Default, "ELcm.", env, obj, c, mid); /* TODO: args! */ \
   1428         sc.CheckSig(mid, _retsig, false); \
   1429         sc.CheckVirtualMethod(obj, mid); \
   1430         _retdecl; \
   1431         _retasgn(baseEnv(env)->CallNonvirtual##_jname##MethodA(env, obj, c, mid, args)); \
   1432         _retok; \
   1433     } \
   1434     /* Static... */ \
   1435     static _ctype CallStatic##_jname##Method(JNIEnv* env, jclass c, jmethodID mid, ...) \
   1436     { \
   1437         CHECK_JNI_ENTRY(kFlag_Default, "Ecm.", env, c, mid); /* TODO: args! */ \
   1438         sc.CheckSig(mid, _retsig, true); \
   1439         sc.CheckStaticMethod(c, mid); \
   1440         _retdecl; \
   1441         va_list args; \
   1442         va_start(args, mid); \
   1443         _retasgn(baseEnv(env)->CallStatic##_jname##MethodV(env, c, mid, args)); \
   1444         va_end(args); \
   1445         _retok; \
   1446     } \
   1447     static _ctype CallStatic##_jname##MethodV(JNIEnv* env, jclass c, jmethodID mid, va_list args) \
   1448     { \
   1449         CHECK_JNI_ENTRY(kFlag_Default, "Ecm.", env, c, mid); /* TODO: args! */ \
   1450         sc.CheckSig(mid, _retsig, true); \
   1451         sc.CheckStaticMethod(c, mid); \
   1452         _retdecl; \
   1453          _retasgn(baseEnv(env)->CallStatic##_jname##MethodV(env, c, mid, args)); \
   1454         _retok; \
   1455     } \
   1456     static _ctype CallStatic##_jname##MethodA(JNIEnv* env, jclass c, jmethodID mid, jvalue* args) \
   1457     { \
   1458         CHECK_JNI_ENTRY(kFlag_Default, "Ecm.", env, c, mid); /* TODO: args! */ \
   1459         sc.CheckSig(mid, _retsig, true); \
   1460         sc.CheckStaticMethod(c, mid); \
   1461         _retdecl; \
   1462         _retasgn(baseEnv(env)->CallStatic##_jname##MethodA(env, c, mid, args)); \
   1463         _retok; \
   1464     }
   1465 
   1466 #define NON_VOID_RETURN(_retsig, _ctype) return CHECK_JNI_EXIT(_retsig, (_ctype) result)
   1467 #define VOID_RETURN CHECK_JNI_EXIT_VOID()
   1468 
   1469 CALL(jobject, Object, mirror::Object* result, result = reinterpret_cast<mirror::Object*>, NON_VOID_RETURN("L", jobject), "L");
   1470 CALL(jboolean, Boolean, jboolean result, result =, NON_VOID_RETURN("Z", jboolean), "Z");
   1471 CALL(jbyte, Byte, jbyte result, result =, NON_VOID_RETURN("B", jbyte), "B");
   1472 CALL(jchar, Char, jchar result, result =, NON_VOID_RETURN("C", jchar), "C");
   1473 CALL(jshort, Short, jshort result, result =, NON_VOID_RETURN("S", jshort), "S");
   1474 CALL(jint, Int, jint result, result =, NON_VOID_RETURN("I", jint), "I");
   1475 CALL(jlong, Long, jlong result, result =, NON_VOID_RETURN("J", jlong), "J");
   1476 CALL(jfloat, Float, jfloat result, result =, NON_VOID_RETURN("F", jfloat), "F");
   1477 CALL(jdouble, Double, jdouble result, result =, NON_VOID_RETURN("D", jdouble), "D");
   1478 CALL(void, Void, , , VOID_RETURN, "V");
   1479 
   1480   static jstring NewString(JNIEnv* env, const jchar* unicodeChars, jsize len) {
   1481     CHECK_JNI_ENTRY(kFlag_Default, "Epz", env, unicodeChars, len);
   1482     return CHECK_JNI_EXIT("s", baseEnv(env)->NewString(env, unicodeChars, len));
   1483   }
   1484 
   1485   static jsize GetStringLength(JNIEnv* env, jstring string) {
   1486     CHECK_JNI_ENTRY(kFlag_CritOkay, "Es", env, string);
   1487     return CHECK_JNI_EXIT("I", baseEnv(env)->GetStringLength(env, string));
   1488   }
   1489 
   1490   static const jchar* GetStringChars(JNIEnv* env, jstring java_string, jboolean* isCopy) {
   1491     CHECK_JNI_ENTRY(kFlag_CritOkay, "Esp", env, java_string, isCopy);
   1492     const jchar* result = baseEnv(env)->GetStringChars(env, java_string, isCopy);
   1493     if (sc.ForceCopy() && result != nullptr) {
   1494       mirror::String* s = sc.soa().Decode<mirror::String*>(java_string);
   1495       int byteCount = s->GetLength() * 2;
   1496       result = (const jchar*) GuardedCopy::Create(result, byteCount, false);
   1497       if (isCopy != nullptr) {
   1498         *isCopy = JNI_TRUE;
   1499       }
   1500     }
   1501     return CHECK_JNI_EXIT("p", result);
   1502   }
   1503 
   1504   static void ReleaseStringChars(JNIEnv* env, jstring string, const jchar* chars) {
   1505     CHECK_JNI_ENTRY(kFlag_Default | kFlag_ExcepOkay, "Esp", env, string, chars);
   1506     sc.CheckNonNull(chars);
   1507     if (sc.ForceCopy()) {
   1508       GuardedCopy::Check(__FUNCTION__, chars, false);
   1509       chars = reinterpret_cast<const jchar*>(GuardedCopy::Destroy(const_cast<jchar*>(chars)));
   1510     }
   1511     baseEnv(env)->ReleaseStringChars(env, string, chars);
   1512     CHECK_JNI_EXIT_VOID();
   1513   }
   1514 
   1515   static jstring NewStringUTF(JNIEnv* env, const char* bytes) {
   1516     CHECK_JNI_ENTRY(kFlag_NullableUtf, "Eu", env, bytes);  // TODO: show pointer and truncate string.
   1517     return CHECK_JNI_EXIT("s", baseEnv(env)->NewStringUTF(env, bytes));
   1518   }
   1519 
   1520   static jsize GetStringUTFLength(JNIEnv* env, jstring string) {
   1521     CHECK_JNI_ENTRY(kFlag_CritOkay, "Es", env, string);
   1522     return CHECK_JNI_EXIT("I", baseEnv(env)->GetStringUTFLength(env, string));
   1523   }
   1524 
   1525   static const char* GetStringUTFChars(JNIEnv* env, jstring string, jboolean* isCopy) {
   1526     CHECK_JNI_ENTRY(kFlag_CritOkay, "Esp", env, string, isCopy);
   1527     const char* result = baseEnv(env)->GetStringUTFChars(env, string, isCopy);
   1528     if (sc.ForceCopy() && result != nullptr) {
   1529       result = (const char*) GuardedCopy::Create(result, strlen(result) + 1, false);
   1530       if (isCopy != nullptr) {
   1531         *isCopy = JNI_TRUE;
   1532       }
   1533     }
   1534     return CHECK_JNI_EXIT("u", result);  // TODO: show pointer and truncate string.
   1535   }
   1536 
   1537   static void ReleaseStringUTFChars(JNIEnv* env, jstring string, const char* utf) {
   1538     CHECK_JNI_ENTRY(kFlag_ExcepOkay | kFlag_Release, "Esu", env, string, utf);  // TODO: show pointer and truncate string.
   1539     if (sc.ForceCopy()) {
   1540       GuardedCopy::Check(__FUNCTION__, utf, false);
   1541       utf = reinterpret_cast<const char*>(GuardedCopy::Destroy(const_cast<char*>(utf)));
   1542     }
   1543     baseEnv(env)->ReleaseStringUTFChars(env, string, utf);
   1544     CHECK_JNI_EXIT_VOID();
   1545   }
   1546 
   1547   static jsize GetArrayLength(JNIEnv* env, jarray array) {
   1548     CHECK_JNI_ENTRY(kFlag_CritOkay, "Ea", env, array);
   1549     return CHECK_JNI_EXIT("I", baseEnv(env)->GetArrayLength(env, array));
   1550   }
   1551 
   1552   static jobjectArray NewObjectArray(JNIEnv* env, jsize length, jclass elementClass, jobject initialElement) {
   1553     CHECK_JNI_ENTRY(kFlag_Default, "EzcL", env, length, elementClass, initialElement);
   1554     return CHECK_JNI_EXIT("a", baseEnv(env)->NewObjectArray(env, length, elementClass, initialElement));
   1555   }
   1556 
   1557   static jobject GetObjectArrayElement(JNIEnv* env, jobjectArray array, jsize index) {
   1558     CHECK_JNI_ENTRY(kFlag_Default, "EaI", env, array, index);
   1559     return CHECK_JNI_EXIT("L", baseEnv(env)->GetObjectArrayElement(env, array, index));
   1560   }
   1561 
   1562   static void SetObjectArrayElement(JNIEnv* env, jobjectArray array, jsize index, jobject value) {
   1563     CHECK_JNI_ENTRY(kFlag_Default, "EaIL", env, array, index, value);
   1564     baseEnv(env)->SetObjectArrayElement(env, array, index, value);
   1565     CHECK_JNI_EXIT_VOID();
   1566   }
   1567 
   1568 #define NEW_PRIMITIVE_ARRAY(_artype, _jname) \
   1569     static _artype New##_jname##Array(JNIEnv* env, jsize length) { \
   1570         CHECK_JNI_ENTRY(kFlag_Default, "Ez", env, length); \
   1571         return CHECK_JNI_EXIT("a", baseEnv(env)->New##_jname##Array(env, length)); \
   1572     }
   1573 NEW_PRIMITIVE_ARRAY(jbooleanArray, Boolean);
   1574 NEW_PRIMITIVE_ARRAY(jbyteArray, Byte);
   1575 NEW_PRIMITIVE_ARRAY(jcharArray, Char);
   1576 NEW_PRIMITIVE_ARRAY(jshortArray, Short);
   1577 NEW_PRIMITIVE_ARRAY(jintArray, Int);
   1578 NEW_PRIMITIVE_ARRAY(jlongArray, Long);
   1579 NEW_PRIMITIVE_ARRAY(jfloatArray, Float);
   1580 NEW_PRIMITIVE_ARRAY(jdoubleArray, Double);
   1581 
   1582 struct ForceCopyGetChecker {
   1583  public:
   1584   ForceCopyGetChecker(ScopedCheck& sc, jboolean* isCopy) {
   1585     force_copy = sc.ForceCopy();
   1586     no_copy = 0;
   1587     if (force_copy && isCopy != nullptr) {
   1588       // Capture this before the base call tramples on it.
   1589       no_copy = *reinterpret_cast<uint32_t*>(isCopy);
   1590     }
   1591   }
   1592 
   1593   template<typename ResultT>
   1594   ResultT Check(JNIEnv* env, jarray array, jboolean* isCopy, ResultT result) {
   1595     if (force_copy && result != nullptr) {
   1596       result = reinterpret_cast<ResultT>(CreateGuardedPACopy(env, array, isCopy));
   1597     }
   1598     return result;
   1599   }
   1600 
   1601   uint32_t no_copy;
   1602   bool force_copy;
   1603 };
   1604 
   1605 #define GET_PRIMITIVE_ARRAY_ELEMENTS(_ctype, _jname) \
   1606   static _ctype* Get##_jname##ArrayElements(JNIEnv* env, _ctype##Array array, jboolean* isCopy) { \
   1607     CHECK_JNI_ENTRY(kFlag_Default, "Eap", env, array, isCopy); \
   1608     _ctype* result = ForceCopyGetChecker(sc, isCopy).Check(env, array, isCopy, baseEnv(env)->Get##_jname##ArrayElements(env, array, isCopy)); \
   1609     return CHECK_JNI_EXIT("p", result); \
   1610   }
   1611 
   1612 #define RELEASE_PRIMITIVE_ARRAY_ELEMENTS(_ctype, _jname) \
   1613   static void Release##_jname##ArrayElements(JNIEnv* env, _ctype##Array array, _ctype* elems, jint mode) { \
   1614     CHECK_JNI_ENTRY(kFlag_Default | kFlag_ExcepOkay, "Eapr", env, array, elems, mode); \
   1615     sc.CheckNonNull(elems); \
   1616     if (sc.ForceCopy()) { \
   1617       ReleaseGuardedPACopy(env, array, elems, mode); \
   1618     } \
   1619     baseEnv(env)->Release##_jname##ArrayElements(env, array, elems, mode); \
   1620     CHECK_JNI_EXIT_VOID(); \
   1621   }
   1622 
   1623 #define GET_PRIMITIVE_ARRAY_REGION(_ctype, _jname) \
   1624     static void Get##_jname##ArrayRegion(JNIEnv* env, _ctype##Array array, jsize start, jsize len, _ctype* buf) { \
   1625         CHECK_JNI_ENTRY(kFlag_Default, "EaIIp", env, array, start, len, buf); \
   1626         baseEnv(env)->Get##_jname##ArrayRegion(env, array, start, len, buf); \
   1627         CHECK_JNI_EXIT_VOID(); \
   1628     }
   1629 
   1630 #define SET_PRIMITIVE_ARRAY_REGION(_ctype, _jname) \
   1631     static void Set##_jname##ArrayRegion(JNIEnv* env, _ctype##Array array, jsize start, jsize len, const _ctype* buf) { \
   1632         CHECK_JNI_ENTRY(kFlag_Default, "EaIIp", env, array, start, len, buf); \
   1633         baseEnv(env)->Set##_jname##ArrayRegion(env, array, start, len, buf); \
   1634         CHECK_JNI_EXIT_VOID(); \
   1635     }
   1636 
   1637 #define PRIMITIVE_ARRAY_FUNCTIONS(_ctype, _jname, _typechar) \
   1638     GET_PRIMITIVE_ARRAY_ELEMENTS(_ctype, _jname); \
   1639     RELEASE_PRIMITIVE_ARRAY_ELEMENTS(_ctype, _jname); \
   1640     GET_PRIMITIVE_ARRAY_REGION(_ctype, _jname); \
   1641     SET_PRIMITIVE_ARRAY_REGION(_ctype, _jname);
   1642 
   1643 // TODO: verify primitive array type matches call type.
   1644 PRIMITIVE_ARRAY_FUNCTIONS(jboolean, Boolean, 'Z');
   1645 PRIMITIVE_ARRAY_FUNCTIONS(jbyte, Byte, 'B');
   1646 PRIMITIVE_ARRAY_FUNCTIONS(jchar, Char, 'C');
   1647 PRIMITIVE_ARRAY_FUNCTIONS(jshort, Short, 'S');
   1648 PRIMITIVE_ARRAY_FUNCTIONS(jint, Int, 'I');
   1649 PRIMITIVE_ARRAY_FUNCTIONS(jlong, Long, 'J');
   1650 PRIMITIVE_ARRAY_FUNCTIONS(jfloat, Float, 'F');
   1651 PRIMITIVE_ARRAY_FUNCTIONS(jdouble, Double, 'D');
   1652 
   1653   static jint RegisterNatives(JNIEnv* env, jclass c, const JNINativeMethod* methods, jint nMethods) {
   1654     CHECK_JNI_ENTRY(kFlag_Default, "EcpI", env, c, methods, nMethods);
   1655     return CHECK_JNI_EXIT("I", baseEnv(env)->RegisterNatives(env, c, methods, nMethods));
   1656   }
   1657 
   1658   static jint UnregisterNatives(JNIEnv* env, jclass c) {
   1659     CHECK_JNI_ENTRY(kFlag_Default, "Ec", env, c);
   1660     return CHECK_JNI_EXIT("I", baseEnv(env)->UnregisterNatives(env, c));
   1661   }
   1662 
   1663   static jint MonitorEnter(JNIEnv* env, jobject obj) {
   1664     CHECK_JNI_ENTRY(kFlag_Default, "EL", env, obj);
   1665     if (!sc.CheckInstance(ScopedCheck::kObject, obj)) {
   1666       return JNI_ERR;  // Only for jni_internal_test. Real code will have aborted already.
   1667     }
   1668     return CHECK_JNI_EXIT("I", baseEnv(env)->MonitorEnter(env, obj));
   1669   }
   1670 
   1671   static jint MonitorExit(JNIEnv* env, jobject obj) {
   1672     CHECK_JNI_ENTRY(kFlag_Default | kFlag_ExcepOkay, "EL", env, obj);
   1673     if (!sc.CheckInstance(ScopedCheck::kObject, obj)) {
   1674       return JNI_ERR;  // Only for jni_internal_test. Real code will have aborted already.
   1675     }
   1676     return CHECK_JNI_EXIT("I", baseEnv(env)->MonitorExit(env, obj));
   1677   }
   1678 
   1679   static jint GetJavaVM(JNIEnv *env, JavaVM **vm) {
   1680     CHECK_JNI_ENTRY(kFlag_Default, "Ep", env, vm);
   1681     return CHECK_JNI_EXIT("I", baseEnv(env)->GetJavaVM(env, vm));
   1682   }
   1683 
   1684   static void GetStringRegion(JNIEnv* env, jstring str, jsize start, jsize len, jchar* buf) {
   1685     CHECK_JNI_ENTRY(kFlag_CritOkay, "EsIIp", env, str, start, len, buf);
   1686     baseEnv(env)->GetStringRegion(env, str, start, len, buf);
   1687     CHECK_JNI_EXIT_VOID();
   1688   }
   1689 
   1690   static void GetStringUTFRegion(JNIEnv* env, jstring str, jsize start, jsize len, char* buf) {
   1691     CHECK_JNI_ENTRY(kFlag_CritOkay, "EsIIp", env, str, start, len, buf);
   1692     baseEnv(env)->GetStringUTFRegion(env, str, start, len, buf);
   1693     CHECK_JNI_EXIT_VOID();
   1694   }
   1695 
   1696   static void* GetPrimitiveArrayCritical(JNIEnv* env, jarray array, jboolean* isCopy) {
   1697     CHECK_JNI_ENTRY(kFlag_CritGet, "Eap", env, array, isCopy);
   1698     void* result = baseEnv(env)->GetPrimitiveArrayCritical(env, array, isCopy);
   1699     if (sc.ForceCopy() && result != nullptr) {
   1700       result = CreateGuardedPACopy(env, array, isCopy);
   1701     }
   1702     return CHECK_JNI_EXIT("p", result);
   1703   }
   1704 
   1705   static void ReleasePrimitiveArrayCritical(JNIEnv* env, jarray array, void* carray, jint mode) {
   1706     CHECK_JNI_ENTRY(kFlag_CritRelease | kFlag_ExcepOkay, "Eapr", env, array, carray, mode);
   1707     sc.CheckNonNull(carray);
   1708     if (sc.ForceCopy()) {
   1709       ReleaseGuardedPACopy(env, array, carray, mode);
   1710     }
   1711     baseEnv(env)->ReleasePrimitiveArrayCritical(env, array, carray, mode);
   1712     CHECK_JNI_EXIT_VOID();
   1713   }
   1714 
   1715   static const jchar* GetStringCritical(JNIEnv* env, jstring java_string, jboolean* isCopy) {
   1716     CHECK_JNI_ENTRY(kFlag_CritGet, "Esp", env, java_string, isCopy);
   1717     const jchar* result = baseEnv(env)->GetStringCritical(env, java_string, isCopy);
   1718     if (sc.ForceCopy() && result != nullptr) {
   1719       mirror::String* s = sc.soa().Decode<mirror::String*>(java_string);
   1720       int byteCount = s->GetLength() * 2;
   1721       result = (const jchar*) GuardedCopy::Create(result, byteCount, false);
   1722       if (isCopy != nullptr) {
   1723         *isCopy = JNI_TRUE;
   1724       }
   1725     }
   1726     return CHECK_JNI_EXIT("p", result);
   1727   }
   1728 
   1729   static void ReleaseStringCritical(JNIEnv* env, jstring string, const jchar* carray) {
   1730     CHECK_JNI_ENTRY(kFlag_CritRelease | kFlag_ExcepOkay, "Esp", env, string, carray);
   1731     sc.CheckNonNull(carray);
   1732     if (sc.ForceCopy()) {
   1733       GuardedCopy::Check(__FUNCTION__, carray, false);
   1734       carray = reinterpret_cast<const jchar*>(GuardedCopy::Destroy(const_cast<jchar*>(carray)));
   1735     }
   1736     baseEnv(env)->ReleaseStringCritical(env, string, carray);
   1737     CHECK_JNI_EXIT_VOID();
   1738   }
   1739 
   1740   static jweak NewWeakGlobalRef(JNIEnv* env, jobject obj) {
   1741     CHECK_JNI_ENTRY(kFlag_Default, "EL", env, obj);
   1742     return CHECK_JNI_EXIT("L", baseEnv(env)->NewWeakGlobalRef(env, obj));
   1743   }
   1744 
   1745   static jboolean ExceptionCheck(JNIEnv* env) {
   1746     CHECK_JNI_ENTRY(kFlag_CritOkay | kFlag_ExcepOkay, "E", env);
   1747     return CHECK_JNI_EXIT("b", baseEnv(env)->ExceptionCheck(env));
   1748   }
   1749 
   1750   static jobjectRefType GetObjectRefType(JNIEnv* env, jobject obj) {
   1751     // Note: we use "Ep" rather than "EL" because this is the one JNI function
   1752     // that it's okay to pass an invalid reference to.
   1753     CHECK_JNI_ENTRY(kFlag_Default, "Ep", env, obj);
   1754     // TODO: proper decoding of jobjectRefType!
   1755     return CHECK_JNI_EXIT("I", baseEnv(env)->GetObjectRefType(env, obj));
   1756   }
   1757 
   1758   static jobject NewDirectByteBuffer(JNIEnv* env, void* address, jlong capacity) {
   1759     CHECK_JNI_ENTRY(kFlag_Default, "EpJ", env, address, capacity);
   1760     if (address == nullptr) {
   1761       JniAbortF(__FUNCTION__, "non-nullable address is NULL");
   1762       return nullptr;
   1763     }
   1764     return CHECK_JNI_EXIT("L", baseEnv(env)->NewDirectByteBuffer(env, address, capacity));
   1765   }
   1766 
   1767   static void* GetDirectBufferAddress(JNIEnv* env, jobject buf) {
   1768     CHECK_JNI_ENTRY(kFlag_Default, "EL", env, buf);
   1769     // TODO: check that 'buf' is a java.nio.Buffer.
   1770     return CHECK_JNI_EXIT("p", baseEnv(env)->GetDirectBufferAddress(env, buf));
   1771   }
   1772 
   1773   static jlong GetDirectBufferCapacity(JNIEnv* env, jobject buf) {
   1774     CHECK_JNI_ENTRY(kFlag_Default, "EL", env, buf);
   1775     // TODO: check that 'buf' is a java.nio.Buffer.
   1776     return CHECK_JNI_EXIT("J", baseEnv(env)->GetDirectBufferCapacity(env, buf));
   1777   }
   1778 
   1779  private:
   1780   static inline const JNINativeInterface* baseEnv(JNIEnv* env) {
   1781     return reinterpret_cast<JNIEnvExt*>(env)->unchecked_functions;
   1782   }
   1783 };
   1784 
   1785 const JNINativeInterface gCheckNativeInterface = {
   1786   nullptr,  // reserved0.
   1787   nullptr,  // reserved1.
   1788   nullptr,  // reserved2.
   1789   nullptr,  // reserved3.
   1790   CheckJNI::GetVersion,
   1791   CheckJNI::DefineClass,
   1792   CheckJNI::FindClass,
   1793   CheckJNI::FromReflectedMethod,
   1794   CheckJNI::FromReflectedField,
   1795   CheckJNI::ToReflectedMethod,
   1796   CheckJNI::GetSuperclass,
   1797   CheckJNI::IsAssignableFrom,
   1798   CheckJNI::ToReflectedField,
   1799   CheckJNI::Throw,
   1800   CheckJNI::ThrowNew,
   1801   CheckJNI::ExceptionOccurred,
   1802   CheckJNI::ExceptionDescribe,
   1803   CheckJNI::ExceptionClear,
   1804   CheckJNI::FatalError,
   1805   CheckJNI::PushLocalFrame,
   1806   CheckJNI::PopLocalFrame,
   1807   CheckJNI::NewGlobalRef,
   1808   CheckJNI::DeleteGlobalRef,
   1809   CheckJNI::DeleteLocalRef,
   1810   CheckJNI::IsSameObject,
   1811   CheckJNI::NewLocalRef,
   1812   CheckJNI::EnsureLocalCapacity,
   1813   CheckJNI::AllocObject,
   1814   CheckJNI::NewObject,
   1815   CheckJNI::NewObjectV,
   1816   CheckJNI::NewObjectA,
   1817   CheckJNI::GetObjectClass,
   1818   CheckJNI::IsInstanceOf,
   1819   CheckJNI::GetMethodID,
   1820   CheckJNI::CallObjectMethod,
   1821   CheckJNI::CallObjectMethodV,
   1822   CheckJNI::CallObjectMethodA,
   1823   CheckJNI::CallBooleanMethod,
   1824   CheckJNI::CallBooleanMethodV,
   1825   CheckJNI::CallBooleanMethodA,
   1826   CheckJNI::CallByteMethod,
   1827   CheckJNI::CallByteMethodV,
   1828   CheckJNI::CallByteMethodA,
   1829   CheckJNI::CallCharMethod,
   1830   CheckJNI::CallCharMethodV,
   1831   CheckJNI::CallCharMethodA,
   1832   CheckJNI::CallShortMethod,
   1833   CheckJNI::CallShortMethodV,
   1834   CheckJNI::CallShortMethodA,
   1835   CheckJNI::CallIntMethod,
   1836   CheckJNI::CallIntMethodV,
   1837   CheckJNI::CallIntMethodA,
   1838   CheckJNI::CallLongMethod,
   1839   CheckJNI::CallLongMethodV,
   1840   CheckJNI::CallLongMethodA,
   1841   CheckJNI::CallFloatMethod,
   1842   CheckJNI::CallFloatMethodV,
   1843   CheckJNI::CallFloatMethodA,
   1844   CheckJNI::CallDoubleMethod,
   1845   CheckJNI::CallDoubleMethodV,
   1846   CheckJNI::CallDoubleMethodA,
   1847   CheckJNI::CallVoidMethod,
   1848   CheckJNI::CallVoidMethodV,
   1849   CheckJNI::CallVoidMethodA,
   1850   CheckJNI::CallNonvirtualObjectMethod,
   1851   CheckJNI::CallNonvirtualObjectMethodV,
   1852   CheckJNI::CallNonvirtualObjectMethodA,
   1853   CheckJNI::CallNonvirtualBooleanMethod,
   1854   CheckJNI::CallNonvirtualBooleanMethodV,
   1855   CheckJNI::CallNonvirtualBooleanMethodA,
   1856   CheckJNI::CallNonvirtualByteMethod,
   1857   CheckJNI::CallNonvirtualByteMethodV,
   1858   CheckJNI::CallNonvirtualByteMethodA,
   1859   CheckJNI::CallNonvirtualCharMethod,
   1860   CheckJNI::CallNonvirtualCharMethodV,
   1861   CheckJNI::CallNonvirtualCharMethodA,
   1862   CheckJNI::CallNonvirtualShortMethod,
   1863   CheckJNI::CallNonvirtualShortMethodV,
   1864   CheckJNI::CallNonvirtualShortMethodA,
   1865   CheckJNI::CallNonvirtualIntMethod,
   1866   CheckJNI::CallNonvirtualIntMethodV,
   1867   CheckJNI::CallNonvirtualIntMethodA,
   1868   CheckJNI::CallNonvirtualLongMethod,
   1869   CheckJNI::CallNonvirtualLongMethodV,
   1870   CheckJNI::CallNonvirtualLongMethodA,
   1871   CheckJNI::CallNonvirtualFloatMethod,
   1872   CheckJNI::CallNonvirtualFloatMethodV,
   1873   CheckJNI::CallNonvirtualFloatMethodA,
   1874   CheckJNI::CallNonvirtualDoubleMethod,
   1875   CheckJNI::CallNonvirtualDoubleMethodV,
   1876   CheckJNI::CallNonvirtualDoubleMethodA,
   1877   CheckJNI::CallNonvirtualVoidMethod,
   1878   CheckJNI::CallNonvirtualVoidMethodV,
   1879   CheckJNI::CallNonvirtualVoidMethodA,
   1880   CheckJNI::GetFieldID,
   1881   CheckJNI::GetObjectField,
   1882   CheckJNI::GetBooleanField,
   1883   CheckJNI::GetByteField,
   1884   CheckJNI::GetCharField,
   1885   CheckJNI::GetShortField,
   1886   CheckJNI::GetIntField,
   1887   CheckJNI::GetLongField,
   1888   CheckJNI::GetFloatField,
   1889   CheckJNI::GetDoubleField,
   1890   CheckJNI::SetObjectField,
   1891   CheckJNI::SetBooleanField,
   1892   CheckJNI::SetByteField,
   1893   CheckJNI::SetCharField,
   1894   CheckJNI::SetShortField,
   1895   CheckJNI::SetIntField,
   1896   CheckJNI::SetLongField,
   1897   CheckJNI::SetFloatField,
   1898   CheckJNI::SetDoubleField,
   1899   CheckJNI::GetStaticMethodID,
   1900   CheckJNI::CallStaticObjectMethod,
   1901   CheckJNI::CallStaticObjectMethodV,
   1902   CheckJNI::CallStaticObjectMethodA,
   1903   CheckJNI::CallStaticBooleanMethod,
   1904   CheckJNI::CallStaticBooleanMethodV,
   1905   CheckJNI::CallStaticBooleanMethodA,
   1906   CheckJNI::CallStaticByteMethod,
   1907   CheckJNI::CallStaticByteMethodV,
   1908   CheckJNI::CallStaticByteMethodA,
   1909   CheckJNI::CallStaticCharMethod,
   1910   CheckJNI::CallStaticCharMethodV,
   1911   CheckJNI::CallStaticCharMethodA,
   1912   CheckJNI::CallStaticShortMethod,
   1913   CheckJNI::CallStaticShortMethodV,
   1914   CheckJNI::CallStaticShortMethodA,
   1915   CheckJNI::CallStaticIntMethod,
   1916   CheckJNI::CallStaticIntMethodV,
   1917   CheckJNI::CallStaticIntMethodA,
   1918   CheckJNI::CallStaticLongMethod,
   1919   CheckJNI::CallStaticLongMethodV,
   1920   CheckJNI::CallStaticLongMethodA,
   1921   CheckJNI::CallStaticFloatMethod,
   1922   CheckJNI::CallStaticFloatMethodV,
   1923   CheckJNI::CallStaticFloatMethodA,
   1924   CheckJNI::CallStaticDoubleMethod,
   1925   CheckJNI::CallStaticDoubleMethodV,
   1926   CheckJNI::CallStaticDoubleMethodA,
   1927   CheckJNI::CallStaticVoidMethod,
   1928   CheckJNI::CallStaticVoidMethodV,
   1929   CheckJNI::CallStaticVoidMethodA,
   1930   CheckJNI::GetStaticFieldID,
   1931   CheckJNI::GetStaticObjectField,
   1932   CheckJNI::GetStaticBooleanField,
   1933   CheckJNI::GetStaticByteField,
   1934   CheckJNI::GetStaticCharField,
   1935   CheckJNI::GetStaticShortField,
   1936   CheckJNI::GetStaticIntField,
   1937   CheckJNI::GetStaticLongField,
   1938   CheckJNI::GetStaticFloatField,
   1939   CheckJNI::GetStaticDoubleField,
   1940   CheckJNI::SetStaticObjectField,
   1941   CheckJNI::SetStaticBooleanField,
   1942   CheckJNI::SetStaticByteField,
   1943   CheckJNI::SetStaticCharField,
   1944   CheckJNI::SetStaticShortField,
   1945   CheckJNI::SetStaticIntField,
   1946   CheckJNI::SetStaticLongField,
   1947   CheckJNI::SetStaticFloatField,
   1948   CheckJNI::SetStaticDoubleField,
   1949   CheckJNI::NewString,
   1950   CheckJNI::GetStringLength,
   1951   CheckJNI::GetStringChars,
   1952   CheckJNI::ReleaseStringChars,
   1953   CheckJNI::NewStringUTF,
   1954   CheckJNI::GetStringUTFLength,
   1955   CheckJNI::GetStringUTFChars,
   1956   CheckJNI::ReleaseStringUTFChars,
   1957   CheckJNI::GetArrayLength,
   1958   CheckJNI::NewObjectArray,
   1959   CheckJNI::GetObjectArrayElement,
   1960   CheckJNI::SetObjectArrayElement,
   1961   CheckJNI::NewBooleanArray,
   1962   CheckJNI::NewByteArray,
   1963   CheckJNI::NewCharArray,
   1964   CheckJNI::NewShortArray,
   1965   CheckJNI::NewIntArray,
   1966   CheckJNI::NewLongArray,
   1967   CheckJNI::NewFloatArray,
   1968   CheckJNI::NewDoubleArray,
   1969   CheckJNI::GetBooleanArrayElements,
   1970   CheckJNI::GetByteArrayElements,
   1971   CheckJNI::GetCharArrayElements,
   1972   CheckJNI::GetShortArrayElements,
   1973   CheckJNI::GetIntArrayElements,
   1974   CheckJNI::GetLongArrayElements,
   1975   CheckJNI::GetFloatArrayElements,
   1976   CheckJNI::GetDoubleArrayElements,
   1977   CheckJNI::ReleaseBooleanArrayElements,
   1978   CheckJNI::ReleaseByteArrayElements,
   1979   CheckJNI::ReleaseCharArrayElements,
   1980   CheckJNI::ReleaseShortArrayElements,
   1981   CheckJNI::ReleaseIntArrayElements,
   1982   CheckJNI::ReleaseLongArrayElements,
   1983   CheckJNI::ReleaseFloatArrayElements,
   1984   CheckJNI::ReleaseDoubleArrayElements,
   1985   CheckJNI::GetBooleanArrayRegion,
   1986   CheckJNI::GetByteArrayRegion,
   1987   CheckJNI::GetCharArrayRegion,
   1988   CheckJNI::GetShortArrayRegion,
   1989   CheckJNI::GetIntArrayRegion,
   1990   CheckJNI::GetLongArrayRegion,
   1991   CheckJNI::GetFloatArrayRegion,
   1992   CheckJNI::GetDoubleArrayRegion,
   1993   CheckJNI::SetBooleanArrayRegion,
   1994   CheckJNI::SetByteArrayRegion,
   1995   CheckJNI::SetCharArrayRegion,
   1996   CheckJNI::SetShortArrayRegion,
   1997   CheckJNI::SetIntArrayRegion,
   1998   CheckJNI::SetLongArrayRegion,
   1999   CheckJNI::SetFloatArrayRegion,
   2000   CheckJNI::SetDoubleArrayRegion,
   2001   CheckJNI::RegisterNatives,
   2002   CheckJNI::UnregisterNatives,
   2003   CheckJNI::MonitorEnter,
   2004   CheckJNI::MonitorExit,
   2005   CheckJNI::GetJavaVM,
   2006   CheckJNI::GetStringRegion,
   2007   CheckJNI::GetStringUTFRegion,
   2008   CheckJNI::GetPrimitiveArrayCritical,
   2009   CheckJNI::ReleasePrimitiveArrayCritical,
   2010   CheckJNI::GetStringCritical,
   2011   CheckJNI::ReleaseStringCritical,
   2012   CheckJNI::NewWeakGlobalRef,
   2013   CheckJNI::DeleteWeakGlobalRef,
   2014   CheckJNI::ExceptionCheck,
   2015   CheckJNI::NewDirectByteBuffer,
   2016   CheckJNI::GetDirectBufferAddress,
   2017   CheckJNI::GetDirectBufferCapacity,
   2018   CheckJNI::GetObjectRefType,
   2019 };
   2020 
   2021 const JNINativeInterface* GetCheckJniNativeInterface() {
   2022   return &gCheckNativeInterface;
   2023 }
   2024 
   2025 class CheckJII {
   2026  public:
   2027   static jint DestroyJavaVM(JavaVM* vm) {
   2028     ScopedCheck sc(vm, false, __FUNCTION__);
   2029     sc.Check(true, "v", vm);
   2030     return CHECK_JNI_EXIT("I", BaseVm(vm)->DestroyJavaVM(vm));
   2031   }
   2032 
   2033   static jint AttachCurrentThread(JavaVM* vm, JNIEnv** p_env, void* thr_args) {
   2034     ScopedCheck sc(vm, false, __FUNCTION__);
   2035     sc.Check(true, "vpp", vm, p_env, thr_args);
   2036     return CHECK_JNI_EXIT("I", BaseVm(vm)->AttachCurrentThread(vm, p_env, thr_args));
   2037   }
   2038 
   2039   static jint AttachCurrentThreadAsDaemon(JavaVM* vm, JNIEnv** p_env, void* thr_args) {
   2040     ScopedCheck sc(vm, false, __FUNCTION__);
   2041     sc.Check(true, "vpp", vm, p_env, thr_args);
   2042     return CHECK_JNI_EXIT("I", BaseVm(vm)->AttachCurrentThreadAsDaemon(vm, p_env, thr_args));
   2043   }
   2044 
   2045   static jint DetachCurrentThread(JavaVM* vm) {
   2046     ScopedCheck sc(vm, true, __FUNCTION__);
   2047     sc.Check(true, "v", vm);
   2048     return CHECK_JNI_EXIT("I", BaseVm(vm)->DetachCurrentThread(vm));
   2049   }
   2050 
   2051   static jint GetEnv(JavaVM* vm, void** env, jint version) {
   2052     ScopedCheck sc(vm, true, __FUNCTION__);
   2053     sc.Check(true, "vpI", vm);
   2054     return CHECK_JNI_EXIT("I", BaseVm(vm)->GetEnv(vm, env, version));
   2055   }
   2056 
   2057  private:
   2058   static inline const JNIInvokeInterface* BaseVm(JavaVM* vm) {
   2059     return reinterpret_cast<JavaVMExt*>(vm)->unchecked_functions;
   2060   }
   2061 };
   2062 
   2063 const JNIInvokeInterface gCheckInvokeInterface = {
   2064   nullptr,  // reserved0
   2065   nullptr,  // reserved1
   2066   nullptr,  // reserved2
   2067   CheckJII::DestroyJavaVM,
   2068   CheckJII::AttachCurrentThread,
   2069   CheckJII::DetachCurrentThread,
   2070   CheckJII::GetEnv,
   2071   CheckJII::AttachCurrentThreadAsDaemon
   2072 };
   2073 
   2074 const JNIInvokeInterface* GetCheckJniInvokeInterface() {
   2075   return &gCheckInvokeInterface;
   2076 }
   2077 
   2078 }  // namespace art
   2079