1 /*
   2  * Copyright (c) 2008, 2016, Oracle and/or its affiliates. All rights reserved.
   3  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
   4  *
   5  * This code is free software; you can redistribute it and/or modify it
   6  * under the terms of the GNU General Public License version 2 only, as
   7  * published by the Free Software Foundation.  Oracle designates this
   8  * particular file as subject to the "Classpath" exception as provided
   9  * by Oracle in the LICENSE file that accompanied this code.
  10  *
  11  * This code is distributed in the hope that it will be useful, but WITHOUT
  12  * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
  13  * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
  14  * version 2 for more details (a copy is included in the LICENSE file that
  15  * accompanied this code).
  16  *
  17  * You should have received a copy of the GNU General Public License version
  18  * 2 along with this work; if not, write to the Free Software Foundation,
  19  * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
  20  *
  21  * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
  22  * or visit www.oracle.com if you need additional information or have any
  23  * questions.
  24  */
  25 
  26 package java.lang.invoke;
  27 
  28 import java.lang.reflect.*;
  29 import java.util.BitSet;
  30 import java.util.List;
  31 import java.util.Arrays;
  32 
  33 import sun.invoke.util.ValueConversions;
  34 import sun.invoke.util.VerifyAccess;
  35 import sun.invoke.util.Wrapper;
  36 import sun.reflect.CallerSensitive;
  37 import sun.reflect.Reflection;
  38 import sun.reflect.misc.ReflectUtil;
  39 import sun.security.util.SecurityConstants;
  40 import java.lang.invoke.LambdaForm.BasicType;
  41 import static java.lang.invoke.LambdaForm.BasicType.*;
  42 import static java.lang.invoke.MethodHandleStatics.*;
  43 import static java.lang.invoke.MethodHandleImpl.Intrinsic;
  44 import static java.lang.invoke.MethodHandleNatives.Constants.*;
  45 
  46 import java.util.concurrent.ConcurrentHashMap;
  47 
  48 /**
  49  * This class consists exclusively of static methods that operate on or return
  50  * method handles. They fall into several categories:
  51  * <ul>
  52  * <li>Lookup methods which help create method handles for methods and fields.
  53  * <li>Combinator methods, which combine or transform pre-existing method handles into new ones.
  54  * <li>Other factory methods to create method handles that emulate other common JVM operations or control flow patterns.
  55  * </ul>
  56  * <p>
  57  * @author John Rose, JSR 292 EG
  58  * @since 1.7
  59  */
  60 public class MethodHandles {
  61 
  62     private MethodHandles() { }  // do not instantiate
  63 
  64     private static final MemberName.Factory IMPL_NAMES = MemberName.getFactory();
  65     static { MethodHandleImpl.initStatics(); }
  66     // See IMPL_LOOKUP below.
  67 
  68     //// Method handle creation from ordinary methods.
  69 
  70     /**
  71      * Returns a {@link Lookup lookup object} with
  72      * full capabilities to emulate all supported bytecode behaviors of the caller.
  73      * These capabilities include <a href="MethodHandles.Lookup.html#privacc">private access</a> to the caller.
  74      * Factory methods on the lookup object can create
  75      * <a href="MethodHandleInfo.html#directmh">direct method handles</a>
  76      * for any member that the caller has access to via bytecodes,
  77      * including protected and private fields and methods.
  78      * This lookup object is a <em>capability</em> which may be delegated to trusted agents.
  79      * Do not store it in place where untrusted code can access it.
  80      * <p>
  81      * This method is caller sensitive, which means that it may return different
  82      * values to different callers.
  83      * <p>
  84      * For any given caller class {@code C}, the lookup object returned by this call
  85      * has equivalent capabilities to any lookup object
  86      * supplied by the JVM to the bootstrap method of an
  87      * <a href="package-summary.html#indyinsn">invokedynamic instruction</a>
  88      * executing in the same caller class {@code C}.
  89      * @return a lookup object for the caller of this method, with private access
  90      */
  91     @CallerSensitive
  92     public static Lookup lookup() {
  93         return new Lookup(Reflection.getCallerClass());
  94     }
  95 
  96     /**
  97      * Returns a {@link Lookup lookup object} which is trusted minimally.
  98      * It can only be used to create method handles to
  99      * publicly accessible fields and methods.
 100      * <p>
 101      * As a matter of pure convention, the {@linkplain Lookup#lookupClass lookup class}
 102      * of this lookup object will be {@link java.lang.Object}.
 103      *
 104      * <p style="font-size:smaller;">
 105      * <em>Discussion:</em>
 106      * The lookup class can be changed to any other class {@code C} using an expression of the form
 107      * {@link Lookup#in publicLookup().in(C.class)}.
 108      * Since all classes have equal access to public names,
 109      * such a change would confer no new access rights.
 110      * A public lookup object is always subject to
 111      * <a href="MethodHandles.Lookup.html#secmgr">security manager checks</a>.
 112      * Also, it cannot access
 113      * <a href="MethodHandles.Lookup.html#callsens">caller sensitive methods</a>.
 114      * @return a lookup object which is trusted minimally
 115      */
 116     public static Lookup publicLookup() {
 117         return Lookup.PUBLIC_LOOKUP;
 118     }
 119 
 120     /**
 121      * Performs an unchecked "crack" of a
 122      * <a href="MethodHandleInfo.html#directmh">direct method handle</a>.
 123      * The result is as if the user had obtained a lookup object capable enough
 124      * to crack the target method handle, called
 125      * {@link java.lang.invoke.MethodHandles.Lookup#revealDirect Lookup.revealDirect}
 126      * on the target to obtain its symbolic reference, and then called
 127      * {@link java.lang.invoke.MethodHandleInfo#reflectAs MethodHandleInfo.reflectAs}
 128      * to resolve the symbolic reference to a member.
 129      * <p>
 130      * If there is a security manager, its {@code checkPermission} method
 131      * is called with a {@code ReflectPermission("suppressAccessChecks")} permission.
 132      * @param <T> the desired type of the result, either {@link Member} or a subtype
 133      * @param target a direct method handle to crack into symbolic reference components
 134      * @param expected a class object representing the desired result type {@code T}
 135      * @return a reference to the method, constructor, or field object
 136      * @exception SecurityException if the caller is not privileged to call {@code setAccessible}
 137      * @exception NullPointerException if either argument is {@code null}
 138      * @exception IllegalArgumentException if the target is not a direct method handle
 139      * @exception ClassCastException if the member is not of the expected type
 140      * @since 1.8
 141      */
 142     public static <T extends Member> T
 143     reflectAs(Class<T> expected, MethodHandle target) {
 144         SecurityManager smgr = System.getSecurityManager();
 145         if (smgr != null)  smgr.checkPermission(ACCESS_PERMISSION);
 146         Lookup lookup = Lookup.IMPL_LOOKUP;  // use maximally privileged lookup
 147         return lookup.revealDirect(target).reflectAs(expected, lookup);
 148     }
 149     // Copied from AccessibleObject, as used by Method.setAccessible, etc.:
 150     static final private java.security.Permission ACCESS_PERMISSION =
 151         new ReflectPermission("suppressAccessChecks");
 152 
 153     /**
 154      * A <em>lookup object</em> is a factory for creating method handles,
 155      * when the creation requires access checking.
 156      * Method handles do not perform
 157      * access checks when they are called, but rather when they are created.
 158      * Therefore, method handle access
 159      * restrictions must be enforced when a method handle is created.
 160      * The caller class against which those restrictions are enforced
 161      * is known as the {@linkplain #lookupClass lookup class}.
 162      * <p>
 163      * A lookup class which needs to create method handles will call
 164      * {@link MethodHandles#lookup MethodHandles.lookup} to create a factory for itself.
 165      * When the {@code Lookup} factory object is created, the identity of the lookup class is
 166      * determined, and securely stored in the {@code Lookup} object.
 167      * The lookup class (or its delegates) may then use factory methods
 168      * on the {@code Lookup} object to create method handles for access-checked members.
 169      * This includes all methods, constructors, and fields which are allowed to the lookup class,
 170      * even private ones.
 171      *
 172      * <h1><a name="lookups"></a>Lookup Factory Methods</h1>
 173      * The factory methods on a {@code Lookup} object correspond to all major
 174      * use cases for methods, constructors, and fields.
 175      * Each method handle created by a factory method is the functional
 176      * equivalent of a particular <em>bytecode behavior</em>.
 177      * (Bytecode behaviors are described in section 5.4.3.5 of the Java Virtual Machine Specification.)
 178      * Here is a summary of the correspondence between these factory methods and
 179      * the behavior the resulting method handles:
 180      * <table border=1 cellpadding=5 summary="lookup method behaviors">
 181      * <tr>
 182      *     <th><a name="equiv"></a>lookup expression</th>
 183      *     <th>member</th>
 184      *     <th>bytecode behavior</th>
 185      * </tr>
 186      * <tr>
 187      *     <td>{@link java.lang.invoke.MethodHandles.Lookup#findGetter lookup.findGetter(C.class,"f",FT.class)}</td>
 188      *     <td>{@code FT f;}</td><td>{@code (T) this.f;}</td>
 189      * </tr>
 190      * <tr>
 191      *     <td>{@link java.lang.invoke.MethodHandles.Lookup#findStaticGetter lookup.findStaticGetter(C.class,"f",FT.class)}</td>
 192      *     <td>{@code static}<br>{@code FT f;}</td><td>{@code (T) C.f;}</td>
 193      * </tr>
 194      * <tr>
 195      *     <td>{@link java.lang.invoke.MethodHandles.Lookup#findSetter lookup.findSetter(C.class,"f",FT.class)}</td>
 196      *     <td>{@code FT f;}</td><td>{@code this.f = x;}</td>
 197      * </tr>
 198      * <tr>
 199      *     <td>{@link java.lang.invoke.MethodHandles.Lookup#findStaticSetter lookup.findStaticSetter(C.class,"f",FT.class)}</td>
 200      *     <td>{@code static}<br>{@code FT f;}</td><td>{@code C.f = arg;}</td>
 201      * </tr>
 202      * <tr>
 203      *     <td>{@link java.lang.invoke.MethodHandles.Lookup#findVirtual lookup.findVirtual(C.class,"m",MT)}</td>
 204      *     <td>{@code T m(A*);}</td><td>{@code (T) this.m(arg*);}</td>
 205      * </tr>
 206      * <tr>
 207      *     <td>{@link java.lang.invoke.MethodHandles.Lookup#findStatic lookup.findStatic(C.class,"m",MT)}</td>
 208      *     <td>{@code static}<br>{@code T m(A*);}</td><td>{@code (T) C.m(arg*);}</td>
 209      * </tr>
 210      * <tr>
 211      *     <td>{@link java.lang.invoke.MethodHandles.Lookup#findSpecial lookup.findSpecial(C.class,"m",MT,this.class)}</td>
 212      *     <td>{@code T m(A*);}</td><td>{@code (T) super.m(arg*);}</td>
 213      * </tr>
 214      * <tr>
 215      *     <td>{@link java.lang.invoke.MethodHandles.Lookup#findConstructor lookup.findConstructor(C.class,MT)}</td>
 216      *     <td>{@code C(A*);}</td><td>{@code new C(arg*);}</td>
 217      * </tr>
 218      * <tr>
 219      *     <td>{@link java.lang.invoke.MethodHandles.Lookup#unreflectGetter lookup.unreflectGetter(aField)}</td>
 220      *     <td>({@code static})?<br>{@code FT f;}</td><td>{@code (FT) aField.get(thisOrNull);}</td>
 221      * </tr>
 222      * <tr>
 223      *     <td>{@link java.lang.invoke.MethodHandles.Lookup#unreflectSetter lookup.unreflectSetter(aField)}</td>
 224      *     <td>({@code static})?<br>{@code FT f;}</td><td>{@code aField.set(thisOrNull, arg);}</td>
 225      * </tr>
 226      * <tr>
 227      *     <td>{@link java.lang.invoke.MethodHandles.Lookup#unreflect lookup.unreflect(aMethod)}</td>
 228      *     <td>({@code static})?<br>{@code T m(A*);}</td><td>{@code (T) aMethod.invoke(thisOrNull, arg*);}</td>
 229      * </tr>
 230      * <tr>
 231      *     <td>{@link java.lang.invoke.MethodHandles.Lookup#unreflectConstructor lookup.unreflectConstructor(aConstructor)}</td>
 232      *     <td>{@code C(A*);}</td><td>{@code (C) aConstructor.newInstance(arg*);}</td>
 233      * </tr>
 234      * <tr>
 235      *     <td>{@link java.lang.invoke.MethodHandles.Lookup#unreflect lookup.unreflect(aMethod)}</td>
 236      *     <td>({@code static})?<br>{@code T m(A*);}</td><td>{@code (T) aMethod.invoke(thisOrNull, arg*);}</td>
 237      * </tr>
 238      * </table>
 239      *
 240      * Here, the type {@code C} is the class or interface being searched for a member,
 241      * documented as a parameter named {@code refc} in the lookup methods.
 242      * The method type {@code MT} is composed from the return type {@code T}
 243      * and the sequence of argument types {@code A*}.
 244      * The constructor also has a sequence of argument types {@code A*} and
 245      * is deemed to return the newly-created object of type {@code C}.
 246      * Both {@code MT} and the field type {@code FT} are documented as a parameter named {@code type}.
 247      * The formal parameter {@code this} stands for the self-reference of type {@code C};
 248      * if it is present, it is always the leading argument to the method handle invocation.
 249      * (In the case of some {@code protected} members, {@code this} may be
 250      * restricted in type to the lookup class; see below.)
 251      * The name {@code arg} stands for all the other method handle arguments.
 252      * In the code examples for the Core Reflection API, the name {@code thisOrNull}
 253      * stands for a null reference if the accessed method or field is static,
 254      * and {@code this} otherwise.
 255      * The names {@code aMethod}, {@code aField}, and {@code aConstructor} stand
 256      * for reflective objects corresponding to the given members.
 257      * <p>
 258      * In cases where the given member is of variable arity (i.e., a method or constructor)
 259      * the returned method handle will also be of {@linkplain MethodHandle#asVarargsCollector variable arity}.
 260      * In all other cases, the returned method handle will be of fixed arity.
 261      * <p style="font-size:smaller;">
 262      * <em>Discussion:</em>
 263      * The equivalence between looked-up method handles and underlying
 264      * class members and bytecode behaviors
 265      * can break down in a few ways:
 266      * <ul style="font-size:smaller;">
 267      * <li>If {@code C} is not symbolically accessible from the lookup class's loader,
 268      * the lookup can still succeed, even when there is no equivalent
 269      * Java expression or bytecoded constant.
 270      * <li>Likewise, if {@code T} or {@code MT}
 271      * is not symbolically accessible from the lookup class's loader,
 272      * the lookup can still succeed.
 273      * For example, lookups for {@code MethodHandle.invokeExact} and
 274      * {@code MethodHandle.invoke} will always succeed, regardless of requested type.
 275      * <li>If there is a security manager installed, it can forbid the lookup
 276      * on various grounds (<a href="MethodHandles.Lookup.html#secmgr">see below</a>).
 277      * By contrast, the {@code ldc} instruction on a {@code CONSTANT_MethodHandle}
 278      * constant is not subject to security manager checks.
 279      * <li>If the looked-up method has a
 280      * <a href="MethodHandle.html#maxarity">very large arity</a>,
 281      * the method handle creation may fail, due to the method handle
 282      * type having too many parameters.
 283      * </ul>
 284      *
 285      * <h1><a name="access"></a>Access checking</h1>
 286      * Access checks are applied in the factory methods of {@code Lookup},
 287      * when a method handle is created.
 288      * This is a key difference from the Core Reflection API, since
 289      * {@link java.lang.reflect.Method#invoke java.lang.reflect.Method.invoke}
 290      * performs access checking against every caller, on every call.
 291      * <p>
 292      * All access checks start from a {@code Lookup} object, which
 293      * compares its recorded lookup class against all requests to
 294      * create method handles.
 295      * A single {@code Lookup} object can be used to create any number
 296      * of access-checked method handles, all checked against a single
 297      * lookup class.
 298      * <p>
 299      * A {@code Lookup} object can be shared with other trusted code,
 300      * such as a metaobject protocol.
 301      * A shared {@code Lookup} object delegates the capability
 302      * to create method handles on private members of the lookup class.
 303      * Even if privileged code uses the {@code Lookup} object,
 304      * the access checking is confined to the privileges of the
 305      * original lookup class.
 306      * <p>
 307      * A lookup can fail, because
 308      * the containing class is not accessible to the lookup class, or
 309      * because the desired class member is missing, or because the
 310      * desired class member is not accessible to the lookup class, or
 311      * because the lookup object is not trusted enough to access the member.
 312      * In any of these cases, a {@code ReflectiveOperationException} will be
 313      * thrown from the attempted lookup.  The exact class will be one of
 314      * the following:
 315      * <ul>
 316      * <li>NoSuchMethodException &mdash; if a method is requested but does not exist
 317      * <li>NoSuchFieldException &mdash; if a field is requested but does not exist
 318      * <li>IllegalAccessException &mdash; if the member exists but an access check fails
 319      * </ul>
 320      * <p>
 321      * In general, the conditions under which a method handle may be
 322      * looked up for a method {@code M} are no more restrictive than the conditions
 323      * under which the lookup class could have compiled, verified, and resolved a call to {@code M}.
 324      * Where the JVM would raise exceptions like {@code NoSuchMethodError},
 325      * a method handle lookup will generally raise a corresponding
 326      * checked exception, such as {@code NoSuchMethodException}.
 327      * And the effect of invoking the method handle resulting from the lookup
 328      * is <a href="MethodHandles.Lookup.html#equiv">exactly equivalent</a>
 329      * to executing the compiled, verified, and resolved call to {@code M}.
 330      * The same point is true of fields and constructors.
 331      * <p style="font-size:smaller;">
 332      * <em>Discussion:</em>
 333      * Access checks only apply to named and reflected methods,
 334      * constructors, and fields.
 335      * Other method handle creation methods, such as
 336      * {@link MethodHandle#asType MethodHandle.asType},
 337      * do not require any access checks, and are used
 338      * independently of any {@code Lookup} object.
 339      * <p>
 340      * If the desired member is {@code protected}, the usual JVM rules apply,
 341      * including the requirement that the lookup class must be either be in the
 342      * same package as the desired member, or must inherit that member.
 343      * (See the Java Virtual Machine Specification, sections 4.9.2, 5.4.3.5, and 6.4.)
 344      * In addition, if the desired member is a non-static field or method
 345      * in a different package, the resulting method handle may only be applied
 346      * to objects of the lookup class or one of its subclasses.
 347      * This requirement is enforced by narrowing the type of the leading
 348      * {@code this} parameter from {@code C}
 349      * (which will necessarily be a superclass of the lookup class)
 350      * to the lookup class itself.
 351      * <p>
 352      * The JVM imposes a similar requirement on {@code invokespecial} instruction,
 353      * that the receiver argument must match both the resolved method <em>and</em>
 354      * the current class.  Again, this requirement is enforced by narrowing the
 355      * type of the leading parameter to the resulting method handle.
 356      * (See the Java Virtual Machine Specification, section 4.10.1.9.)
 357      * <p>
 358      * The JVM represents constructors and static initializer blocks as internal methods
 359      * with special names ({@code "<init>"} and {@code "<clinit>"}).
 360      * The internal syntax of invocation instructions allows them to refer to such internal
 361      * methods as if they were normal methods, but the JVM bytecode verifier rejects them.
 362      * A lookup of such an internal method will produce a {@code NoSuchMethodException}.
 363      * <p>
 364      * In some cases, access between nested classes is obtained by the Java compiler by creating
 365      * an wrapper method to access a private method of another class
 366      * in the same top-level declaration.
 367      * For example, a nested class {@code C.D}
 368      * can access private members within other related classes such as
 369      * {@code C}, {@code C.D.E}, or {@code C.B},
 370      * but the Java compiler may need to generate wrapper methods in
 371      * those related classes.  In such cases, a {@code Lookup} object on
 372      * {@code C.E} would be unable to those private members.
 373      * A workaround for this limitation is the {@link Lookup#in Lookup.in} method,
 374      * which can transform a lookup on {@code C.E} into one on any of those other
 375      * classes, without special elevation of privilege.
 376      * <p>
 377      * The accesses permitted to a given lookup object may be limited,
 378      * according to its set of {@link #lookupModes lookupModes},
 379      * to a subset of members normally accessible to the lookup class.
 380      * For example, the {@link MethodHandles#publicLookup publicLookup}
 381      * method produces a lookup object which is only allowed to access
 382      * public members in public classes.
 383      * The caller sensitive method {@link MethodHandles#lookup lookup}
 384      * produces a lookup object with full capabilities relative to
 385      * its caller class, to emulate all supported bytecode behaviors.
 386      * Also, the {@link Lookup#in Lookup.in} method may produce a lookup object
 387      * with fewer access modes than the original lookup object.
 388      *
 389      * <p style="font-size:smaller;">
 390      * <a name="privacc"></a>
 391      * <em>Discussion of private access:</em>
 392      * We say that a lookup has <em>private access</em>
 393      * if its {@linkplain #lookupModes lookup modes}
 394      * include the possibility of accessing {@code private} members.
 395      * As documented in the relevant methods elsewhere,
 396      * only lookups with private access possess the following capabilities:
 397      * <ul style="font-size:smaller;">
 398      * <li>access private fields, methods, and constructors of the lookup class
 399      * <li>create method handles which invoke <a href="MethodHandles.Lookup.html#callsens">caller sensitive</a> methods,
 400      *     such as {@code Class.forName}
 401      * <li>create method handles which {@link Lookup#findSpecial emulate invokespecial} instructions
 402      * <li>avoid <a href="MethodHandles.Lookup.html#secmgr">package access checks</a>
 403      *     for classes accessible to the lookup class
 404      * <li>create {@link Lookup#in delegated lookup objects} which have private access to other classes
 405      *     within the same package member
 406      * </ul>
 407      * <p style="font-size:smaller;">
 408      * Each of these permissions is a consequence of the fact that a lookup object
 409      * with private access can be securely traced back to an originating class,
 410      * whose <a href="MethodHandles.Lookup.html#equiv">bytecode behaviors</a> and Java language access permissions
 411      * can be reliably determined and emulated by method handles.
 412      *
 413      * <h1><a name="secmgr"></a>Security manager interactions</h1>
 414      * Although bytecode instructions can only refer to classes in
 415      * a related class loader, this API can search for methods in any
 416      * class, as long as a reference to its {@code Class} object is
 417      * available.  Such cross-loader references are also possible with the
 418      * Core Reflection API, and are impossible to bytecode instructions
 419      * such as {@code invokestatic} or {@code getfield}.
 420      * There is a {@linkplain java.lang.SecurityManager security manager API}
 421      * to allow applications to check such cross-loader references.
 422      * These checks apply to both the {@code MethodHandles.Lookup} API
 423      * and the Core Reflection API
 424      * (as found on {@link java.lang.Class Class}).
 425      * <p>
 426      * If a security manager is present, member lookups are subject to
 427      * additional checks.
 428      * From one to three calls are made to the security manager.
 429      * Any of these calls can refuse access by throwing a
 430      * {@link java.lang.SecurityException SecurityException}.
 431      * Define {@code smgr} as the security manager,
 432      * {@code lookc} as the lookup class of the current lookup object,
 433      * {@code refc} as the containing class in which the member
 434      * is being sought, and {@code defc} as the class in which the
 435      * member is actually defined.
 436      * The value {@code lookc} is defined as <em>not present</em>
 437      * if the current lookup object does not have
 438      * <a href="MethodHandles.Lookup.html#privacc">private access</a>.
 439      * The calls are made according to the following rules:
 440      * <ul>
 441      * <li><b>Step 1:</b>
 442      *     If {@code lookc} is not present, or if its class loader is not
 443      *     the same as or an ancestor of the class loader of {@code refc},
 444      *     then {@link SecurityManager#checkPackageAccess
 445      *     smgr.checkPackageAccess(refcPkg)} is called,
 446      *     where {@code refcPkg} is the package of {@code refc}.
 447      * <li><b>Step 2:</b>
 448      *     If the retrieved member is not public and
 449      *     {@code lookc} is not present, then
 450      *     {@link SecurityManager#checkPermission smgr.checkPermission}
 451      *     with {@code RuntimePermission("accessDeclaredMembers")} is called.
 452      * <li><b>Step 3:</b>
 453      *     If the retrieved member is not public,
 454      *     and if {@code lookc} is not present,
 455      *     and if {@code defc} and {@code refc} are different,
 456      *     then {@link SecurityManager#checkPackageAccess
 457      *     smgr.checkPackageAccess(defcPkg)} is called,
 458      *     where {@code defcPkg} is the package of {@code defc}.
 459      * </ul>
 460      * Security checks are performed after other access checks have passed.
 461      * Therefore, the above rules presuppose a member that is public,
 462      * or else that is being accessed from a lookup class that has
 463      * rights to access the member.
 464      *
 465      * <h1><a name="callsens"></a>Caller sensitive methods</h1>
 466      * A small number of Java methods have a special property called caller sensitivity.
 467      * A <em>caller-sensitive</em> method can behave differently depending on the
 468      * identity of its immediate caller.
 469      * <p>
 470      * If a method handle for a caller-sensitive method is requested,
 471      * the general rules for <a href="MethodHandles.Lookup.html#equiv">bytecode behaviors</a> apply,
 472      * but they take account of the lookup class in a special way.
 473      * The resulting method handle behaves as if it were called
 474      * from an instruction contained in the lookup class,
 475      * so that the caller-sensitive method detects the lookup class.
 476      * (By contrast, the invoker of the method handle is disregarded.)
 477      * Thus, in the case of caller-sensitive methods,
 478      * different lookup classes may give rise to
 479      * differently behaving method handles.
 480      * <p>
 481      * In cases where the lookup object is
 482      * {@link MethodHandles#publicLookup() publicLookup()},
 483      * or some other lookup object without
 484      * <a href="MethodHandles.Lookup.html#privacc">private access</a>,
 485      * the lookup class is disregarded.
 486      * In such cases, no caller-sensitive method handle can be created,
 487      * access is forbidden, and the lookup fails with an
 488      * {@code IllegalAccessException}.
 489      * <p style="font-size:smaller;">
 490      * <em>Discussion:</em>
 491      * For example, the caller-sensitive method
 492      * {@link java.lang.Class#forName(String) Class.forName(x)}
 493      * can return varying classes or throw varying exceptions,
 494      * depending on the class loader of the class that calls it.
 495      * A public lookup of {@code Class.forName} will fail, because
 496      * there is no reasonable way to determine its bytecode behavior.
 497      * <p style="font-size:smaller;">
 498      * If an application caches method handles for broad sharing,
 499      * it should use {@code publicLookup()} to create them.
 500      * If there is a lookup of {@code Class.forName}, it will fail,
 501      * and the application must take appropriate action in that case.
 502      * It may be that a later lookup, perhaps during the invocation of a
 503      * bootstrap method, can incorporate the specific identity
 504      * of the caller, making the method accessible.
 505      * <p style="font-size:smaller;">
 506      * The function {@code MethodHandles.lookup} is caller sensitive
 507      * so that there can be a secure foundation for lookups.
 508      * Nearly all other methods in the JSR 292 API rely on lookup
 509      * objects to check access requests.
 510      */
 511     public static final
 512     class Lookup {
 513         /** The class on behalf of whom the lookup is being performed. */
 514         private final Class<?> lookupClass;
 515 
 516         /** The allowed sorts of members which may be looked up (PUBLIC, etc.). */
 517         private final int allowedModes;
 518 
 519         /** A single-bit mask representing {@code public} access,
 520          *  which may contribute to the result of {@link #lookupModes lookupModes}.
 521          *  The value, {@code 0x01}, happens to be the same as the value of the
 522          *  {@code public} {@linkplain java.lang.reflect.Modifier#PUBLIC modifier bit}.
 523          */
 524         public static final int PUBLIC = Modifier.PUBLIC;
 525 
 526         /** A single-bit mask representing {@code private} access,
 527          *  which may contribute to the result of {@link #lookupModes lookupModes}.
 528          *  The value, {@code 0x02}, happens to be the same as the value of the
 529          *  {@code private} {@linkplain java.lang.reflect.Modifier#PRIVATE modifier bit}.
 530          */
 531         public static final int PRIVATE = Modifier.PRIVATE;
 532 
 533         /** A single-bit mask representing {@code protected} access,
 534          *  which may contribute to the result of {@link #lookupModes lookupModes}.
 535          *  The value, {@code 0x04}, happens to be the same as the value of the
 536          *  {@code protected} {@linkplain java.lang.reflect.Modifier#PROTECTED modifier bit}.
 537          */
 538         public static final int PROTECTED = Modifier.PROTECTED;
 539 
 540         /** A single-bit mask representing {@code package} access (default access),
 541          *  which may contribute to the result of {@link #lookupModes lookupModes}.
 542          *  The value is {@code 0x08}, which does not correspond meaningfully to
 543          *  any particular {@linkplain java.lang.reflect.Modifier modifier bit}.
 544          */
 545         public static final int PACKAGE = Modifier.STATIC;
 546 
 547         private static final int ALL_MODES = (PUBLIC | PRIVATE | PROTECTED | PACKAGE);
 548         private static final int TRUSTED   = -1;
 549 
 550         private static int fixmods(int mods) {
 551             mods &= (ALL_MODES - PACKAGE);
 552             return (mods != 0) ? mods : PACKAGE;
 553         }
 554 
 555         /** Tells which class is performing the lookup.  It is this class against
 556          *  which checks are performed for visibility and access permissions.
 557          *  <p>
 558          *  The class implies a maximum level of access permission,
 559          *  but the permissions may be additionally limited by the bitmask
 560          *  {@link #lookupModes lookupModes}, which controls whether non-public members
 561          *  can be accessed.
 562          *  @return the lookup class, on behalf of which this lookup object finds members
 563          */
 564         public Class<?> lookupClass() {
 565             return lookupClass;
 566         }
 567 
 568         // This is just for calling out to MethodHandleImpl.
 569         private Class<?> lookupClassOrNull() {
 570             return (allowedModes == TRUSTED) ? null : lookupClass;
 571         }
 572 
 573         /** Tells which access-protection classes of members this lookup object can produce.
 574          *  The result is a bit-mask of the bits
 575          *  {@linkplain #PUBLIC PUBLIC (0x01)},
 576          *  {@linkplain #PRIVATE PRIVATE (0x02)},
 577          *  {@linkplain #PROTECTED PROTECTED (0x04)},
 578          *  and {@linkplain #PACKAGE PACKAGE (0x08)}.
 579          *  <p>
 580          *  A freshly-created lookup object
 581          *  on the {@linkplain java.lang.invoke.MethodHandles#lookup() caller's class}
 582          *  has all possible bits set, since the caller class can access all its own members.
 583          *  A lookup object on a new lookup class
 584          *  {@linkplain java.lang.invoke.MethodHandles.Lookup#in created from a previous lookup object}
 585          *  may have some mode bits set to zero.
 586          *  The purpose of this is to restrict access via the new lookup object,
 587          *  so that it can access only names which can be reached by the original
 588          *  lookup object, and also by the new lookup class.
 589          *  @return the lookup modes, which limit the kinds of access performed by this lookup object
 590          */
 591         public int lookupModes() {
 592             return allowedModes & ALL_MODES;
 593         }
 594 
 595         /** Embody the current class (the lookupClass) as a lookup class
 596          * for method handle creation.
 597          * Must be called by from a method in this package,
 598          * which in turn is called by a method not in this package.
 599          */
 600         Lookup(Class<?> lookupClass) {
 601             this(lookupClass, ALL_MODES);
 602             // make sure we haven't accidentally picked up a privileged class:
 603             checkUnprivilegedlookupClass(lookupClass, ALL_MODES);
 604         }
 605 
 606         private Lookup(Class<?> lookupClass, int allowedModes) {
 607             this.lookupClass = lookupClass;
 608             this.allowedModes = allowedModes;
 609         }
 610 
 611         /**
 612          * Creates a lookup on the specified new lookup class.
 613          * The resulting object will report the specified
 614          * class as its own {@link #lookupClass lookupClass}.
 615          * <p>
 616          * However, the resulting {@code Lookup} object is guaranteed
 617          * to have no more access capabilities than the original.
 618          * In particular, access capabilities can be lost as follows:<ul>
 619          * <li>If the new lookup class differs from the old one,
 620          * protected members will not be accessible by virtue of inheritance.
 621          * (Protected members may continue to be accessible because of package sharing.)
 622          * <li>If the new lookup class is in a different package
 623          * than the old one, protected and default (package) members will not be accessible.
 624          * <li>If the new lookup class is not within the same package member
 625          * as the old one, private members will not be accessible.
 626          * <li>If the new lookup class is not accessible to the old lookup class,
 627          * then no members, not even public members, will be accessible.
 628          * (In all other cases, public members will continue to be accessible.)
 629          * </ul>
 630          *
 631          * @param requestedLookupClass the desired lookup class for the new lookup object
 632          * @return a lookup object which reports the desired lookup class
 633          * @throws NullPointerException if the argument is null
 634          */
 635         public Lookup in(Class<?> requestedLookupClass) {
 636             requestedLookupClass.getClass();  // null check
 637             if (allowedModes == TRUSTED)  // IMPL_LOOKUP can make any lookup at all
 638                 return new Lookup(requestedLookupClass, ALL_MODES);
 639             if (requestedLookupClass == this.lookupClass)
 640                 return this;  // keep same capabilities
 641             int newModes = (allowedModes & (ALL_MODES & ~PROTECTED));
 642             if ((newModes & PACKAGE) != 0
 643                 && !VerifyAccess.isSamePackage(this.lookupClass, requestedLookupClass)) {
 644                 newModes &= ~(PACKAGE|PRIVATE);
 645             }
 646             // Allow nestmate lookups to be created without special privilege:
 647             if ((newModes & PRIVATE) != 0
 648                 && !VerifyAccess.isSamePackageMember(this.lookupClass, requestedLookupClass)) {
 649                 newModes &= ~PRIVATE;
 650             }
 651             if ((newModes & PUBLIC) != 0
 652                 && !VerifyAccess.isClassAccessible(requestedLookupClass, this.lookupClass, allowedModes)) {
 653                 // The requested class it not accessible from the lookup class.
 654                 // No permissions.
 655                 newModes = 0;
 656             }
 657             checkUnprivilegedlookupClass(requestedLookupClass, newModes);
 658             return new Lookup(requestedLookupClass, newModes);
 659         }
 660 
 661         // Make sure outer class is initialized first.
 662         static { IMPL_NAMES.getClass(); }
 663 
 664         /** Version of lookup which is trusted minimally.
 665          *  It can only be used to create method handles to
 666          *  publicly accessible members.
 667          */
 668         static final Lookup PUBLIC_LOOKUP = new Lookup(Object.class, PUBLIC);
 669 
 670         /** Package-private version of lookup which is trusted. */
 671         static final Lookup IMPL_LOOKUP = new Lookup(Object.class, TRUSTED);
 672 
 673         private static void checkUnprivilegedlookupClass(Class<?> lookupClass, int allowedModes) {
 674             String name = lookupClass.getName();
 675             if (name.startsWith("java.lang.invoke."))
 676                 throw newIllegalArgumentException("illegal lookupClass: "+lookupClass);
 677 
 678             // For caller-sensitive MethodHandles.lookup()
 679             // disallow lookup more restricted packages
 680             if (allowedModes == ALL_MODES && lookupClass.getClassLoader() == null) {
 681                 if (name.startsWith("java.") ||
 682                         (name.startsWith("sun.") && !name.startsWith("sun.invoke."))) {
 683                     throw newIllegalArgumentException("illegal lookupClass: " + lookupClass);
 684                 }
 685             }
 686         }
 687 
 688         /**
 689          * Displays the name of the class from which lookups are to be made.
 690          * (The name is the one reported by {@link java.lang.Class#getName() Class.getName}.)
 691          * If there are restrictions on the access permitted to this lookup,
 692          * this is indicated by adding a suffix to the class name, consisting
 693          * of a slash and a keyword.  The keyword represents the strongest
 694          * allowed access, and is chosen as follows:
 695          * <ul>
 696          * <li>If no access is allowed, the suffix is "/noaccess".
 697          * <li>If only public access is allowed, the suffix is "/public".
 698          * <li>If only public and package access are allowed, the suffix is "/package".
 699          * <li>If only public, package, and private access are allowed, the suffix is "/private".
 700          * </ul>
 701          * If none of the above cases apply, it is the case that full
 702          * access (public, package, private, and protected) is allowed.
 703          * In this case, no suffix is added.
 704          * This is true only of an object obtained originally from
 705          * {@link java.lang.invoke.MethodHandles#lookup MethodHandles.lookup}.
 706          * Objects created by {@link java.lang.invoke.MethodHandles.Lookup#in Lookup.in}
 707          * always have restricted access, and will display a suffix.
 708          * <p>
 709          * (It may seem strange that protected access should be
 710          * stronger than private access.  Viewed independently from
 711          * package access, protected access is the first to be lost,
 712          * because it requires a direct subclass relationship between
 713          * caller and callee.)
 714          * @see #in
 715          */
 716         @Override
 717         public String toString() {
 718             String cname = lookupClass.getName();
 719             switch (allowedModes) {
 720             case 0:  // no privileges
 721                 return cname + "/noaccess";
 722             case PUBLIC:
 723                 return cname + "/public";
 724             case PUBLIC|PACKAGE:
 725                 return cname + "/package";
 726             case ALL_MODES & ~PROTECTED:
 727                 return cname + "/private";
 728             case ALL_MODES:
 729                 return cname;
 730             case TRUSTED:
 731                 return "/trusted";  // internal only; not exported
 732             default:  // Should not happen, but it's a bitfield...
 733                 cname = cname + "/" + Integer.toHexString(allowedModes);
 734                 assert(false) : cname;
 735                 return cname;
 736             }
 737         }
 738 
 739         /**
 740          * Produces a method handle for a static method.
 741          * The type of the method handle will be that of the method.
 742          * (Since static methods do not take receivers, there is no
 743          * additional receiver argument inserted into the method handle type,
 744          * as there would be with {@link #findVirtual findVirtual} or {@link #findSpecial findSpecial}.)
 745          * The method and all its argument types must be accessible to the lookup object.
 746          * <p>
 747          * The returned method handle will have
 748          * {@linkplain MethodHandle#asVarargsCollector variable arity} if and only if
 749          * the method's variable arity modifier bit ({@code 0x0080}) is set.
 750          * <p>
 751          * If the returned method handle is invoked, the method's class will
 752          * be initialized, if it has not already been initialized.
 753          * <p><b>Example:</b>
 754          * <blockquote><pre>{@code
 755 import static java.lang.invoke.MethodHandles.*;
 756 import static java.lang.invoke.MethodType.*;
 757 ...
 758 MethodHandle MH_asList = publicLookup().findStatic(Arrays.class,
 759   "asList", methodType(List.class, Object[].class));
 760 assertEquals("[x, y]", MH_asList.invoke("x", "y").toString());
 761          * }</pre></blockquote>
 762          * @param refc the class from which the method is accessed
 763          * @param name the name of the method
 764          * @param type the type of the method
 765          * @return the desired method handle
 766          * @throws NoSuchMethodException if the method does not exist
 767          * @throws IllegalAccessException if access checking fails,
 768          *                                or if the method is not {@code static},
 769          *                                or if the method's variable arity modifier bit
 770          *                                is set and {@code asVarargsCollector} fails
 771          * @exception SecurityException if a security manager is present and it
 772          *                              <a href="MethodHandles.Lookup.html#secmgr">refuses access</a>
 773          * @throws NullPointerException if any argument is null
 774          */
 775         public
 776         MethodHandle findStatic(Class<?> refc, String name, MethodType type) throws NoSuchMethodException, IllegalAccessException {
 777             MemberName method = resolveOrFail(REF_invokeStatic, refc, name, type);
 778             return getDirectMethod(REF_invokeStatic, refc, method, findBoundCallerClass(method));
 779         }
 780 
 781         /**
 782          * Produces a method handle for a virtual method.
 783          * The type of the method handle will be that of the method,
 784          * with the receiver type (usually {@code refc}) prepended.
 785          * The method and all its argument types must be accessible to the lookup object.
 786          * <p>
 787          * When called, the handle will treat the first argument as a receiver
 788          * and dispatch on the receiver's type to determine which method
 789          * implementation to enter.
 790          * (The dispatching action is identical with that performed by an
 791          * {@code invokevirtual} or {@code invokeinterface} instruction.)
 792          * <p>
 793          * The first argument will be of type {@code refc} if the lookup
 794          * class has full privileges to access the member.  Otherwise
 795          * the member must be {@code protected} and the first argument
 796          * will be restricted in type to the lookup class.
 797          * <p>
 798          * The returned method handle will have
 799          * {@linkplain MethodHandle#asVarargsCollector variable arity} if and only if
 800          * the method's variable arity modifier bit ({@code 0x0080}) is set.
 801          * <p>
 802          * Because of the general <a href="MethodHandles.Lookup.html#equiv">equivalence</a> between {@code invokevirtual}
 803          * instructions and method handles produced by {@code findVirtual},
 804          * if the class is {@code MethodHandle} and the name string is
 805          * {@code invokeExact} or {@code invoke}, the resulting
 806          * method handle is equivalent to one produced by
 807          * {@link java.lang.invoke.MethodHandles#exactInvoker MethodHandles.exactInvoker} or
 808          * {@link java.lang.invoke.MethodHandles#invoker MethodHandles.invoker}
 809          * with the same {@code type} argument.
 810          *
 811          * <b>Example:</b>
 812          * <blockquote><pre>{@code
 813 import static java.lang.invoke.MethodHandles.*;
 814 import static java.lang.invoke.MethodType.*;
 815 ...
 816 MethodHandle MH_concat = publicLookup().findVirtual(String.class,
 817   "concat", methodType(String.class, String.class));
 818 MethodHandle MH_hashCode = publicLookup().findVirtual(Object.class,
 819   "hashCode", methodType(int.class));
 820 MethodHandle MH_hashCode_String = publicLookup().findVirtual(String.class,
 821   "hashCode", methodType(int.class));
 822 assertEquals("xy", (String) MH_concat.invokeExact("x", "y"));
 823 assertEquals("xy".hashCode(), (int) MH_hashCode.invokeExact((Object)"xy"));
 824 assertEquals("xy".hashCode(), (int) MH_hashCode_String.invokeExact("xy"));
 825 // interface method:
 826 MethodHandle MH_subSequence = publicLookup().findVirtual(CharSequence.class,
 827   "subSequence", methodType(CharSequence.class, int.class, int.class));
 828 assertEquals("def", MH_subSequence.invoke("abcdefghi", 3, 6).toString());
 829 // constructor "internal method" must be accessed differently:
 830 MethodType MT_newString = methodType(void.class); //()V for new String()
 831 try { assertEquals("impossible", lookup()
 832         .findVirtual(String.class, "<init>", MT_newString));
 833  } catch (NoSuchMethodException ex) { } // OK
 834 MethodHandle MH_newString = publicLookup()
 835   .findConstructor(String.class, MT_newString);
 836 assertEquals("", (String) MH_newString.invokeExact());
 837          * }</pre></blockquote>
 838          *
 839          * @param refc the class or interface from which the method is accessed
 840          * @param name the name of the method
 841          * @param type the type of the method, with the receiver argument omitted
 842          * @return the desired method handle
 843          * @throws NoSuchMethodException if the method does not exist
 844          * @throws IllegalAccessException if access checking fails,
 845          *                                or if the method is {@code static}
 846          *                                or if the method's variable arity modifier bit
 847          *                                is set and {@code asVarargsCollector} fails
 848          * @exception SecurityException if a security manager is present and it
 849          *                              <a href="MethodHandles.Lookup.html#secmgr">refuses access</a>
 850          * @throws NullPointerException if any argument is null
 851          */
 852         public MethodHandle findVirtual(Class<?> refc, String name, MethodType type) throws NoSuchMethodException, IllegalAccessException {
 853             if (refc == MethodHandle.class) {
 854                 MethodHandle mh = findVirtualForMH(name, type);
 855                 if (mh != null)  return mh;
 856             }
 857             byte refKind = (refc.isInterface() ? REF_invokeInterface : REF_invokeVirtual);
 858             MemberName method = resolveOrFail(refKind, refc, name, type);
 859             return getDirectMethod(refKind, refc, method, findBoundCallerClass(method));
 860         }
 861         private MethodHandle findVirtualForMH(String name, MethodType type) {
 862             // these names require special lookups because of the implicit MethodType argument
 863             if ("invoke".equals(name))
 864                 return invoker(type);
 865             if ("invokeExact".equals(name))
 866                 return exactInvoker(type);
 867             if ("invokeBasic".equals(name))
 868                 return basicInvoker(type);
 869             assert(!MemberName.isMethodHandleInvokeName(name));
 870             return null;
 871         }
 872 
 873         /**
 874          * Produces a method handle which creates an object and initializes it, using
 875          * the constructor of the specified type.
 876          * The parameter types of the method handle will be those of the constructor,
 877          * while the return type will be a reference to the constructor's class.
 878          * The constructor and all its argument types must be accessible to the lookup object.
 879          * <p>
 880          * The requested type must have a return type of {@code void}.
 881          * (This is consistent with the JVM's treatment of constructor type descriptors.)
 882          * <p>
 883          * The returned method handle will have
 884          * {@linkplain MethodHandle#asVarargsCollector variable arity} if and only if
 885          * the constructor's variable arity modifier bit ({@code 0x0080}) is set.
 886          * <p>
 887          * If the returned method handle is invoked, the constructor's class will
 888          * be initialized, if it has not already been initialized.
 889          * <p><b>Example:</b>
 890          * <blockquote><pre>{@code
 891 import static java.lang.invoke.MethodHandles.*;
 892 import static java.lang.invoke.MethodType.*;
 893 ...
 894 MethodHandle MH_newArrayList = publicLookup().findConstructor(
 895   ArrayList.class, methodType(void.class, Collection.class));
 896 Collection orig = Arrays.asList("x", "y");
 897 Collection copy = (ArrayList) MH_newArrayList.invokeExact(orig);
 898 assert(orig != copy);
 899 assertEquals(orig, copy);
 900 // a variable-arity constructor:
 901 MethodHandle MH_newProcessBuilder = publicLookup().findConstructor(
 902   ProcessBuilder.class, methodType(void.class, String[].class));
 903 ProcessBuilder pb = (ProcessBuilder)
 904   MH_newProcessBuilder.invoke("x", "y", "z");
 905 assertEquals("[x, y, z]", pb.command().toString());
 906          * }</pre></blockquote>
 907          * @param refc the class or interface from which the method is accessed
 908          * @param type the type of the method, with the receiver argument omitted, and a void return type
 909          * @return the desired method handle
 910          * @throws NoSuchMethodException if the constructor does not exist
 911          * @throws IllegalAccessException if access checking fails
 912          *                                or if the method's variable arity modifier bit
 913          *                                is set and {@code asVarargsCollector} fails
 914          * @exception SecurityException if a security manager is present and it
 915          *                              <a href="MethodHandles.Lookup.html#secmgr">refuses access</a>
 916          * @throws NullPointerException if any argument is null
 917          */
 918         public MethodHandle findConstructor(Class<?> refc, MethodType type) throws NoSuchMethodException, IllegalAccessException {
 919             if (refc.isArray()) {
 920                 throw new NoSuchMethodException("no constructor for array class: " + refc.getName());
 921             }
 922             String name = "<init>";
 923             MemberName ctor = resolveOrFail(REF_newInvokeSpecial, refc, name, type);
 924             return getDirectConstructor(refc, ctor);
 925         }
 926 
 927         /**
 928          * Produces an early-bound method handle for a virtual method.
 929          * It will bypass checks for overriding methods on the receiver,
 930          * <a href="MethodHandles.Lookup.html#equiv">as if called</a> from an {@code invokespecial}
 931          * instruction from within the explicitly specified {@code specialCaller}.
 932          * The type of the method handle will be that of the method,
 933          * with a suitably restricted receiver type prepended.
 934          * (The receiver type will be {@code specialCaller} or a subtype.)
 935          * The method and all its argument types must be accessible
 936          * to the lookup object.
 937          * <p>
 938          * Before method resolution,
 939          * if the explicitly specified caller class is not identical with the
 940          * lookup class, or if this lookup object does not have
 941          * <a href="MethodHandles.Lookup.html#privacc">private access</a>
 942          * privileges, the access fails.
 943          * <p>
 944          * The returned method handle will have
 945          * {@linkplain MethodHandle#asVarargsCollector variable arity} if and only if
 946          * the method's variable arity modifier bit ({@code 0x0080}) is set.
 947          * <p style="font-size:smaller;">
 948          * <em>(Note:  JVM internal methods named {@code "<init>"} are not visible to this API,
 949          * even though the {@code invokespecial} instruction can refer to them
 950          * in special circumstances.  Use {@link #findConstructor findConstructor}
 951          * to access instance initialization methods in a safe manner.)</em>
 952          * <p><b>Example:</b>
 953          * <blockquote><pre>{@code
 954 import static java.lang.invoke.MethodHandles.*;
 955 import static java.lang.invoke.MethodType.*;
 956 ...
 957 static class Listie extends ArrayList {
 958   public String toString() { return "[wee Listie]"; }
 959   static Lookup lookup() { return MethodHandles.lookup(); }
 960 }
 961 ...
 962 // no access to constructor via invokeSpecial:
 963 MethodHandle MH_newListie = Listie.lookup()
 964   .findConstructor(Listie.class, methodType(void.class));
 965 Listie l = (Listie) MH_newListie.invokeExact();
 966 try { assertEquals("impossible", Listie.lookup().findSpecial(
 967         Listie.class, "<init>", methodType(void.class), Listie.class));
 968  } catch (NoSuchMethodException ex) { } // OK
 969 // access to super and self methods via invokeSpecial:
 970 MethodHandle MH_super = Listie.lookup().findSpecial(
 971   ArrayList.class, "toString" , methodType(String.class), Listie.class);
 972 MethodHandle MH_this = Listie.lookup().findSpecial(
 973   Listie.class, "toString" , methodType(String.class), Listie.class);
 974 MethodHandle MH_duper = Listie.lookup().findSpecial(
 975   Object.class, "toString" , methodType(String.class), Listie.class);
 976 assertEquals("[]", (String) MH_super.invokeExact(l));
 977 assertEquals(""+l, (String) MH_this.invokeExact(l));
 978 assertEquals("[]", (String) MH_duper.invokeExact(l)); // ArrayList method
 979 try { assertEquals("inaccessible", Listie.lookup().findSpecial(
 980         String.class, "toString", methodType(String.class), Listie.class));
 981  } catch (IllegalAccessException ex) { } // OK
 982 Listie subl = new Listie() { public String toString() { return "[subclass]"; } };
 983 assertEquals(""+l, (String) MH_this.invokeExact(subl)); // Listie method
 984          * }</pre></blockquote>
 985          *
 986          * @param refc the class or interface from which the method is accessed
 987          * @param name the name of the method (which must not be "&lt;init&gt;")
 988          * @param type the type of the method, with the receiver argument omitted
 989          * @param specialCaller the proposed calling class to perform the {@code invokespecial}
 990          * @return the desired method handle
 991          * @throws NoSuchMethodException if the method does not exist
 992          * @throws IllegalAccessException if access checking fails
 993          *                                or if the method's variable arity modifier bit
 994          *                                is set and {@code asVarargsCollector} fails
 995          * @exception SecurityException if a security manager is present and it
 996          *                              <a href="MethodHandles.Lookup.html#secmgr">refuses access</a>
 997          * @throws NullPointerException if any argument is null
 998          */
 999         public MethodHandle findSpecial(Class<?> refc, String name, MethodType type,
1000                                         Class<?> specialCaller) throws NoSuchMethodException, IllegalAccessException {
1001             checkSpecialCaller(specialCaller);
1002             Lookup specialLookup = this.in(specialCaller);
1003             MemberName method = specialLookup.resolveOrFail(REF_invokeSpecial, refc, name, type);
1004             return specialLookup.getDirectMethod(REF_invokeSpecial, refc, method, findBoundCallerClass(method));
1005         }
1006 
1007         /**
1008          * Produces a method handle giving read access to a non-static field.
1009          * The type of the method handle will have a return type of the field's
1010          * value type.
1011          * The method handle's single argument will be the instance containing
1012          * the field.
1013          * Access checking is performed immediately on behalf of the lookup class.
1014          * @param refc the class or interface from which the method is accessed
1015          * @param name the field's name
1016          * @param type the field's type
1017          * @return a method handle which can load values from the field
1018          * @throws NoSuchFieldException if the field does not exist
1019          * @throws IllegalAccessException if access checking fails, or if the field is {@code static}
1020          * @exception SecurityException if a security manager is present and it
1021          *                              <a href="MethodHandles.Lookup.html#secmgr">refuses access</a>
1022          * @throws NullPointerException if any argument is null
1023          */
1024         public MethodHandle findGetter(Class<?> refc, String name, Class<?> type) throws NoSuchFieldException, IllegalAccessException {
1025             MemberName field = resolveOrFail(REF_getField, refc, name, type);
1026             return getDirectField(REF_getField, refc, field);
1027         }
1028 
1029         /**
1030          * Produces a method handle giving write access to a non-static field.
1031          * The type of the method handle will have a void return type.
1032          * The method handle will take two arguments, the instance containing
1033          * the field, and the value to be stored.
1034          * The second argument will be of the field's value type.
1035          * Access checking is performed immediately on behalf of the lookup class.
1036          * @param refc the class or interface from which the method is accessed
1037          * @param name the field's name
1038          * @param type the field's type
1039          * @return a method handle which can store values into the field
1040          * @throws NoSuchFieldException if the field does not exist
1041          * @throws IllegalAccessException if access checking fails, or if the field is {@code static}
1042          * @exception SecurityException if a security manager is present and it
1043          *                              <a href="MethodHandles.Lookup.html#secmgr">refuses access</a>
1044          * @throws NullPointerException if any argument is null
1045          */
1046         public MethodHandle findSetter(Class<?> refc, String name, Class<?> type) throws NoSuchFieldException, IllegalAccessException {
1047             MemberName field = resolveOrFail(REF_putField, refc, name, type);
1048             return getDirectField(REF_putField, refc, field);
1049         }
1050 
1051         /**
1052          * Produces a method handle giving read access to a static field.
1053          * The type of the method handle will have a return type of the field's
1054          * value type.
1055          * The method handle will take no arguments.
1056          * Access checking is performed immediately on behalf of the lookup class.
1057          * <p>
1058          * If the returned method handle is invoked, the field's class will
1059          * be initialized, if it has not already been initialized.
1060          * @param refc the class or interface from which the method is accessed
1061          * @param name the field's name
1062          * @param type the field's type
1063          * @return a method handle which can load values from the field
1064          * @throws NoSuchFieldException if the field does not exist
1065          * @throws IllegalAccessException if access checking fails, or if the field is not {@code static}
1066          * @exception SecurityException if a security manager is present and it
1067          *                              <a href="MethodHandles.Lookup.html#secmgr">refuses access</a>
1068          * @throws NullPointerException if any argument is null
1069          */
1070         public MethodHandle findStaticGetter(Class<?> refc, String name, Class<?> type) throws NoSuchFieldException, IllegalAccessException {
1071             MemberName field = resolveOrFail(REF_getStatic, refc, name, type);
1072             return getDirectField(REF_getStatic, refc, field);
1073         }
1074 
1075         /**
1076          * Produces a method handle giving write access to a static field.
1077          * The type of the method handle will have a void return type.
1078          * The method handle will take a single
1079          * argument, of the field's value type, the value to be stored.
1080          * Access checking is performed immediately on behalf of the lookup class.
1081          * <p>
1082          * If the returned method handle is invoked, the field's class will
1083          * be initialized, if it has not already been initialized.
1084          * @param refc the class or interface from which the method is accessed
1085          * @param name the field's name
1086          * @param type the field's type
1087          * @return a method handle which can store values into the field
1088          * @throws NoSuchFieldException if the field does not exist
1089          * @throws IllegalAccessException if access checking fails, or if the field is not {@code static}
1090          * @exception SecurityException if a security manager is present and it
1091          *                              <a href="MethodHandles.Lookup.html#secmgr">refuses access</a>
1092          * @throws NullPointerException if any argument is null
1093          */
1094         public MethodHandle findStaticSetter(Class<?> refc, String name, Class<?> type) throws NoSuchFieldException, IllegalAccessException {
1095             MemberName field = resolveOrFail(REF_putStatic, refc, name, type);
1096             return getDirectField(REF_putStatic, refc, field);
1097         }
1098 
1099         /**
1100          * Produces an early-bound method handle for a non-static method.
1101          * The receiver must have a supertype {@code defc} in which a method
1102          * of the given name and type is accessible to the lookup class.
1103          * The method and all its argument types must be accessible to the lookup object.
1104          * The type of the method handle will be that of the method,
1105          * without any insertion of an additional receiver parameter.
1106          * The given receiver will be bound into the method handle,
1107          * so that every call to the method handle will invoke the
1108          * requested method on the given receiver.
1109          * <p>
1110          * The returned method handle will have
1111          * {@linkplain MethodHandle#asVarargsCollector variable arity} if and only if
1112          * the method's variable arity modifier bit ({@code 0x0080}) is set
1113          * <em>and</em> the trailing array argument is not the only argument.
1114          * (If the trailing array argument is the only argument,
1115          * the given receiver value will be bound to it.)
1116          * <p>
1117          * This is equivalent to the following code:
1118          * <blockquote><pre>{@code
1119 import static java.lang.invoke.MethodHandles.*;
1120 import static java.lang.invoke.MethodType.*;
1121 ...
1122 MethodHandle mh0 = lookup().findVirtual(defc, name, type);
1123 MethodHandle mh1 = mh0.bindTo(receiver);
1124 MethodType mt1 = mh1.type();
1125 if (mh0.isVarargsCollector())
1126   mh1 = mh1.asVarargsCollector(mt1.parameterType(mt1.parameterCount()-1));
1127 return mh1;
1128          * }</pre></blockquote>
1129          * where {@code defc} is either {@code receiver.getClass()} or a super
1130          * type of that class, in which the requested method is accessible
1131          * to the lookup class.
1132          * (Note that {@code bindTo} does not preserve variable arity.)
1133          * @param receiver the object from which the method is accessed
1134          * @param name the name of the method
1135          * @param type the type of the method, with the receiver argument omitted
1136          * @return the desired method handle
1137          * @throws NoSuchMethodException if the method does not exist
1138          * @throws IllegalAccessException if access checking fails
1139          *                                or if the method's variable arity modifier bit
1140          *                                is set and {@code asVarargsCollector} fails
1141          * @exception SecurityException if a security manager is present and it
1142          *                              <a href="MethodHandles.Lookup.html#secmgr">refuses access</a>
1143          * @throws NullPointerException if any argument is null
1144          * @see MethodHandle#bindTo
1145          * @see #findVirtual
1146          */
1147         public MethodHandle bind(Object receiver, String name, MethodType type) throws NoSuchMethodException, IllegalAccessException {
1148             Class<? extends Object> refc = receiver.getClass(); // may get NPE
1149             MemberName method = resolveOrFail(REF_invokeSpecial, refc, name, type);
1150             MethodHandle mh = getDirectMethodNoRestrict(REF_invokeSpecial, refc, method, findBoundCallerClass(method));
1151             return mh.bindArgumentL(0, receiver).setVarargs(method);
1152         }
1153 
1154         /**
1155          * Makes a <a href="MethodHandleInfo.html#directmh">direct method handle</a>
1156          * to <i>m</i>, if the lookup class has permission.
1157          * If <i>m</i> is non-static, the receiver argument is treated as an initial argument.
1158          * If <i>m</i> is virtual, overriding is respected on every call.
1159          * Unlike the Core Reflection API, exceptions are <em>not</em> wrapped.
1160          * The type of the method handle will be that of the method,
1161          * with the receiver type prepended (but only if it is non-static).
1162          * If the method's {@code accessible} flag is not set,
1163          * access checking is performed immediately on behalf of the lookup class.
1164          * If <i>m</i> is not public, do not share the resulting handle with untrusted parties.
1165          * <p>
1166          * The returned method handle will have
1167          * {@linkplain MethodHandle#asVarargsCollector variable arity} if and only if
1168          * the method's variable arity modifier bit ({@code 0x0080}) is set.
1169          * <p>
1170          * If <i>m</i> is static, and
1171          * if the returned method handle is invoked, the method's class will
1172          * be initialized, if it has not already been initialized.
1173          * @param m the reflected method
1174          * @return a method handle which can invoke the reflected method
1175          * @throws IllegalAccessException if access checking fails
1176          *                                or if the method's variable arity modifier bit
1177          *                                is set and {@code asVarargsCollector} fails
1178          * @throws NullPointerException if the argument is null
1179          */
1180         public MethodHandle unreflect(Method m) throws IllegalAccessException {
1181             if (m.getDeclaringClass() == MethodHandle.class) {
1182                 MethodHandle mh = unreflectForMH(m);
1183                 if (mh != null)  return mh;
1184             }
1185             MemberName method = new MemberName(m);
1186             byte refKind = method.getReferenceKind();
1187             if (refKind == REF_invokeSpecial)
1188                 refKind = REF_invokeVirtual;
1189             assert(method.isMethod());
1190             Lookup lookup = m.isAccessible() ? IMPL_LOOKUP : this;
1191             return lookup.getDirectMethodNoSecurityManager(refKind, method.getDeclaringClass(), method, findBoundCallerClass(method));
1192         }
1193         private MethodHandle unreflectForMH(Method m) {
1194             // these names require special lookups because they throw UnsupportedOperationException
1195             if (MemberName.isMethodHandleInvokeName(m.getName()))
1196                 return MethodHandleImpl.fakeMethodHandleInvoke(new MemberName(m));
1197             return null;
1198         }
1199 
1200         /**
1201          * Produces a method handle for a reflected method.
1202          * It will bypass checks for overriding methods on the receiver,
1203          * <a href="MethodHandles.Lookup.html#equiv">as if called</a> from an {@code invokespecial}
1204          * instruction from within the explicitly specified {@code specialCaller}.
1205          * The type of the method handle will be that of the method,
1206          * with a suitably restricted receiver type prepended.
1207          * (The receiver type will be {@code specialCaller} or a subtype.)
1208          * If the method's {@code accessible} flag is not set,
1209          * access checking is performed immediately on behalf of the lookup class,
1210          * as if {@code invokespecial} instruction were being linked.
1211          * <p>
1212          * Before method resolution,
1213          * if the explicitly specified caller class is not identical with the
1214          * lookup class, or if this lookup object does not have
1215          * <a href="MethodHandles.Lookup.html#privacc">private access</a>
1216          * privileges, the access fails.
1217          * <p>
1218          * The returned method handle will have
1219          * {@linkplain MethodHandle#asVarargsCollector variable arity} if and only if
1220          * the method's variable arity modifier bit ({@code 0x0080}) is set.
1221          * @param m the reflected method
1222          * @param specialCaller the class nominally calling the method
1223          * @return a method handle which can invoke the reflected method
1224          * @throws IllegalAccessException if access checking fails
1225          *                                or if the method's variable arity modifier bit
1226          *                                is set and {@code asVarargsCollector} fails
1227          * @throws NullPointerException if any argument is null
1228          */
1229         public MethodHandle unreflectSpecial(Method m, Class<?> specialCaller) throws IllegalAccessException {
1230             checkSpecialCaller(specialCaller);
1231             Lookup specialLookup = this.in(specialCaller);
1232             MemberName method = new MemberName(m, true);
1233             assert(method.isMethod());
1234             // ignore m.isAccessible:  this is a new kind of access
1235             return specialLookup.getDirectMethodNoSecurityManager(REF_invokeSpecial, method.getDeclaringClass(), method, findBoundCallerClass(method));
1236         }
1237 
1238         /**
1239          * Produces a method handle for a reflected constructor.
1240          * The type of the method handle will be that of the constructor,
1241          * with the return type changed to the declaring class.
1242          * The method handle will perform a {@code newInstance} operation,
1243          * creating a new instance of the constructor's class on the
1244          * arguments passed to the method handle.
1245          * <p>
1246          * If the constructor's {@code accessible} flag is not set,
1247          * access checking is performed immediately on behalf of the lookup class.
1248          * <p>
1249          * The returned method handle will have
1250          * {@linkplain MethodHandle#asVarargsCollector variable arity} if and only if
1251          * the constructor's variable arity modifier bit ({@code 0x0080}) is set.
1252          * <p>
1253          * If the returned method handle is invoked, the constructor's class will
1254          * be initialized, if it has not already been initialized.
1255          * @param c the reflected constructor
1256          * @return a method handle which can invoke the reflected constructor
1257          * @throws IllegalAccessException if access checking fails
1258          *                                or if the method's variable arity modifier bit
1259          *                                is set and {@code asVarargsCollector} fails
1260          * @throws NullPointerException if the argument is null
1261          */
1262         public MethodHandle unreflectConstructor(Constructor<?> c) throws IllegalAccessException {
1263             MemberName ctor = new MemberName(c);
1264             assert(ctor.isConstructor());
1265             Lookup lookup = c.isAccessible() ? IMPL_LOOKUP : this;
1266             return lookup.getDirectConstructorNoSecurityManager(ctor.getDeclaringClass(), ctor);
1267         }
1268 
1269         /**
1270          * Produces a method handle giving read access to a reflected field.
1271          * The type of the method handle will have a return type of the field's
1272          * value type.
1273          * If the field is static, the method handle will take no arguments.
1274          * Otherwise, its single argument will be the instance containing
1275          * the field.
1276          * If the field's {@code accessible} flag is not set,
1277          * access checking is performed immediately on behalf of the lookup class.
1278          * <p>
1279          * If the field is static, and
1280          * if the returned method handle is invoked, the field's class will
1281          * be initialized, if it has not already been initialized.
1282          * @param f the reflected field
1283          * @return a method handle which can load values from the reflected field
1284          * @throws IllegalAccessException if access checking fails
1285          * @throws NullPointerException if the argument is null
1286          */
1287         public MethodHandle unreflectGetter(Field f) throws IllegalAccessException {
1288             return unreflectField(f, false);
1289         }
1290         private MethodHandle unreflectField(Field f, boolean isSetter) throws IllegalAccessException {
1291             MemberName field = new MemberName(f, isSetter);
1292             assert(isSetter
1293                     ? MethodHandleNatives.refKindIsSetter(field.getReferenceKind())
1294                     : MethodHandleNatives.refKindIsGetter(field.getReferenceKind()));
1295             Lookup lookup = f.isAccessible() ? IMPL_LOOKUP : this;
1296             return lookup.getDirectFieldNoSecurityManager(field.getReferenceKind(), f.getDeclaringClass(), field);
1297         }
1298 
1299         /**
1300          * Produces a method handle giving write access to a reflected field.
1301          * The type of the method handle will have a void return type.
1302          * If the field is static, the method handle will take a single
1303          * argument, of the field's value type, the value to be stored.
1304          * Otherwise, the two arguments will be the instance containing
1305          * the field, and the value to be stored.
1306          * If the field's {@code accessible} flag is not set,
1307          * access checking is performed immediately on behalf of the lookup class.
1308          * <p>
1309          * If the field is static, and
1310          * if the returned method handle is invoked, the field's class will
1311          * be initialized, if it has not already been initialized.
1312          * @param f the reflected field
1313          * @return a method handle which can store values into the reflected field
1314          * @throws IllegalAccessException if access checking fails
1315          * @throws NullPointerException if the argument is null
1316          */
1317         public MethodHandle unreflectSetter(Field f) throws IllegalAccessException {
1318             return unreflectField(f, true);
1319         }
1320 
1321         /**
1322          * Cracks a <a href="MethodHandleInfo.html#directmh">direct method handle</a>
1323          * created by this lookup object or a similar one.
1324          * Security and access checks are performed to ensure that this lookup object
1325          * is capable of reproducing the target method handle.
1326          * This means that the cracking may fail if target is a direct method handle
1327          * but was created by an unrelated lookup object.
1328          * This can happen if the method handle is <a href="MethodHandles.Lookup.html#callsens">caller sensitive</a>
1329          * and was created by a lookup object for a different class.
1330          * @param target a direct method handle to crack into symbolic reference components
1331          * @return a symbolic reference which can be used to reconstruct this method handle from this lookup object
1332          * @exception SecurityException if a security manager is present and it
1333          *                              <a href="MethodHandles.Lookup.html#secmgr">refuses access</a>
1334          * @throws IllegalArgumentException if the target is not a direct method handle or if access checking fails
1335          * @exception NullPointerException if the target is {@code null}
1336          * @see MethodHandleInfo
1337          * @since 1.8
1338          */
1339         public MethodHandleInfo revealDirect(MethodHandle target) {
1340             MemberName member = target.internalMemberName();
1341             if (member == null || (!member.isResolved() && !member.isMethodHandleInvoke()))
1342                 throw newIllegalArgumentException("not a direct method handle");
1343             Class<?> defc = member.getDeclaringClass();
1344             byte refKind = member.getReferenceKind();
1345             assert(MethodHandleNatives.refKindIsValid(refKind));
1346             if (refKind == REF_invokeSpecial && !target.isInvokeSpecial())
1347                 // Devirtualized method invocation is usually formally virtual.
1348                 // To avoid creating extra MemberName objects for this common case,
1349                 // we encode this extra degree of freedom using MH.isInvokeSpecial.
1350                 refKind = REF_invokeVirtual;
1351             if (refKind == REF_invokeVirtual && defc.isInterface())
1352                 // Symbolic reference is through interface but resolves to Object method (toString, etc.)
1353                 refKind = REF_invokeInterface;
1354             // Check SM permissions and member access before cracking.
1355             try {
1356                 checkAccess(refKind, defc, member);
1357                 checkSecurityManager(defc, member);
1358             } catch (IllegalAccessException ex) {
1359                 throw new IllegalArgumentException(ex);
1360             }
1361             if (allowedModes != TRUSTED && member.isCallerSensitive()) {
1362                 Class<?> callerClass = target.internalCallerClass();
1363                 if (!hasPrivateAccess() || callerClass != lookupClass())
1364                     throw new IllegalArgumentException("method handle is caller sensitive: "+callerClass);
1365             }
1366             // Produce the handle to the results.
1367             return new InfoFromMemberName(this, member, refKind);
1368         }
1369 
1370         /// Helper methods, all package-private.
1371 
1372         MemberName resolveOrFail(byte refKind, Class<?> refc, String name, Class<?> type) throws NoSuchFieldException, IllegalAccessException {
1373             checkSymbolicClass(refc);  // do this before attempting to resolve
1374             name.getClass();  // NPE
1375             type.getClass();  // NPE
1376             return IMPL_NAMES.resolveOrFail(refKind, new MemberName(refc, name, type, refKind), lookupClassOrNull(),
1377                                             NoSuchFieldException.class);
1378         }
1379 
1380         MemberName resolveOrFail(byte refKind, Class<?> refc, String name, MethodType type) throws NoSuchMethodException, IllegalAccessException {
1381             checkSymbolicClass(refc);  // do this before attempting to resolve
1382             name.getClass();  // NPE
1383             type.getClass();  // NPE
1384             checkMethodName(refKind, name);  // NPE check on name
1385             return IMPL_NAMES.resolveOrFail(refKind, new MemberName(refc, name, type, refKind), lookupClassOrNull(),
1386                                             NoSuchMethodException.class);
1387         }
1388 
1389         MemberName resolveOrFail(byte refKind, MemberName member) throws ReflectiveOperationException {
1390             checkSymbolicClass(member.getDeclaringClass());  // do this before attempting to resolve
1391             member.getName().getClass();  // NPE
1392             member.getType().getClass();  // NPE
1393             return IMPL_NAMES.resolveOrFail(refKind, member, lookupClassOrNull(),
1394                                             ReflectiveOperationException.class);
1395         }
1396 
1397         void checkSymbolicClass(Class<?> refc) throws IllegalAccessException {
1398             refc.getClass();  // NPE
1399             Class<?> caller = lookupClassOrNull();
1400             if (caller != null && !VerifyAccess.isClassAccessible(refc, caller, allowedModes))
1401                 throw new MemberName(refc).makeAccessException("symbolic reference class is not public", this);
1402         }
1403 
1404         /** Check name for an illegal leading "&lt;" character. */
1405         void checkMethodName(byte refKind, String name) throws NoSuchMethodException {
1406             if (name.startsWith("<") && refKind != REF_newInvokeSpecial)
1407                 throw new NoSuchMethodException("illegal method name: "+name);
1408         }
1409 
1410 
1411         /**
1412          * Find my trustable caller class if m is a caller sensitive method.
1413          * If this lookup object has private access, then the caller class is the lookupClass.
1414          * Otherwise, if m is caller-sensitive, throw IllegalAccessException.
1415          */
1416         Class<?> findBoundCallerClass(MemberName m) throws IllegalAccessException {
1417             Class<?> callerClass = null;
1418             if (MethodHandleNatives.isCallerSensitive(m)) {
1419                 // Only lookups with private access are allowed to resolve caller-sensitive methods
1420                 if (hasPrivateAccess()) {
1421                     callerClass = lookupClass;
1422                 } else {
1423                     throw new IllegalAccessException("Attempt to lookup caller-sensitive method using restricted lookup object");
1424                 }
1425             }
1426             return callerClass;
1427         }
1428 
1429         private boolean hasPrivateAccess() {
1430             return (allowedModes & PRIVATE) != 0;
1431         }
1432 
1433         /**
1434          * Perform necessary <a href="MethodHandles.Lookup.html#secmgr">access checks</a>.
1435          * Determines a trustable caller class to compare with refc, the symbolic reference class.
1436          * If this lookup object has private access, then the caller class is the lookupClass.
1437          */
1438         void checkSecurityManager(Class<?> refc, MemberName m) {
1439             SecurityManager smgr = System.getSecurityManager();
1440             if (smgr == null)  return;
1441             if (allowedModes == TRUSTED)  return;
1442 
1443             // Step 1:
1444             boolean fullPowerLookup = hasPrivateAccess();
1445             if (!fullPowerLookup ||
1446                 !VerifyAccess.classLoaderIsAncestor(lookupClass, refc)) {
1447                 ReflectUtil.checkPackageAccess(refc);
1448             }
1449 
1450             // Step 2:
1451             if (m.isPublic()) return;
1452             if (!fullPowerLookup) {
1453                 smgr.checkPermission(SecurityConstants.CHECK_MEMBER_ACCESS_PERMISSION);
1454             }
1455 
1456             // Step 3:
1457             Class<?> defc = m.getDeclaringClass();
1458             if (!fullPowerLookup && defc != refc) {
1459                 ReflectUtil.checkPackageAccess(defc);
1460             }
1461         }
1462 
1463         void checkMethod(byte refKind, Class<?> refc, MemberName m) throws IllegalAccessException {
1464             boolean wantStatic = (refKind == REF_invokeStatic);
1465             String message;
1466             if (m.isConstructor())
1467                 message = "expected a method, not a constructor";
1468             else if (!m.isMethod())
1469                 message = "expected a method";
1470             else if (wantStatic != m.isStatic())
1471                 message = wantStatic ? "expected a static method" : "expected a non-static method";
1472             else
1473                 { checkAccess(refKind, refc, m); return; }
1474             throw m.makeAccessException(message, this);
1475         }
1476 
1477         void checkField(byte refKind, Class<?> refc, MemberName m) throws IllegalAccessException {
1478             boolean wantStatic = !MethodHandleNatives.refKindHasReceiver(refKind);
1479             String message;
1480             if (wantStatic != m.isStatic())
1481                 message = wantStatic ? "expected a static field" : "expected a non-static field";
1482             else
1483                 { checkAccess(refKind, refc, m); return; }
1484             throw m.makeAccessException(message, this);
1485         }
1486 
1487         /** Check public/protected/private bits on the symbolic reference class and its member. */
1488         void checkAccess(byte refKind, Class<?> refc, MemberName m) throws IllegalAccessException {
1489             assert(m.referenceKindIsConsistentWith(refKind) &&
1490                    MethodHandleNatives.refKindIsValid(refKind) &&
1491                    (MethodHandleNatives.refKindIsField(refKind) == m.isField()));
1492             int allowedModes = this.allowedModes;
1493             if (allowedModes == TRUSTED)  return;
1494             int mods = m.getModifiers();
1495             if (Modifier.isProtected(mods) &&
1496                     refKind == REF_invokeVirtual &&
1497                     m.getDeclaringClass() == Object.class &&
1498                     m.getName().equals("clone") &&
1499                     refc.isArray()) {
1500                 // The JVM does this hack also.
1501                 // (See ClassVerifier::verify_invoke_instructions
1502                 // and LinkResolver::check_method_accessability.)
1503                 // Because the JVM does not allow separate methods on array types,
1504                 // there is no separate method for int[].clone.
1505                 // All arrays simply inherit Object.clone.
1506                 // But for access checking logic, we make Object.clone
1507                 // (normally protected) appear to be public.
1508                 // Later on, when the DirectMethodHandle is created,
1509                 // its leading argument will be restricted to the
1510                 // requested array type.
1511                 // N.B. The return type is not adjusted, because
1512                 // that is *not* the bytecode behavior.
1513                 mods ^= Modifier.PROTECTED | Modifier.PUBLIC;
1514             }
1515             if (Modifier.isProtected(mods) && refKind == REF_newInvokeSpecial) {
1516                 // cannot "new" a protected ctor in a different package
1517                 mods ^= Modifier.PROTECTED;
1518             }
1519             if (Modifier.isFinal(mods) &&
1520                     MethodHandleNatives.refKindIsSetter(refKind))
1521                 throw m.makeAccessException("unexpected set of a final field", this);
1522             if (Modifier.isPublic(mods) && Modifier.isPublic(refc.getModifiers()) && allowedModes != 0)
1523                 return;  // common case
1524             int requestedModes = fixmods(mods);  // adjust 0 => PACKAGE
1525             if ((requestedModes & allowedModes) != 0) {
1526                 if (VerifyAccess.isMemberAccessible(refc, m.getDeclaringClass(),
1527                                                     mods, lookupClass(), allowedModes))
1528                     return;
1529             } else {
1530                 // Protected members can also be checked as if they were package-private.
1531                 if ((requestedModes & PROTECTED) != 0 && (allowedModes & PACKAGE) != 0
1532                         && VerifyAccess.isSamePackage(m.getDeclaringClass(), lookupClass()))
1533                     return;
1534             }
1535             throw m.makeAccessException(accessFailedMessage(refc, m), this);
1536         }
1537 
1538         String accessFailedMessage(Class<?> refc, MemberName m) {
1539             Class<?> defc = m.getDeclaringClass();
1540             int mods = m.getModifiers();
1541             // check the class first:
1542             boolean classOK = (Modifier.isPublic(defc.getModifiers()) &&
1543                                (defc == refc ||
1544                                 Modifier.isPublic(refc.getModifiers())));
1545             if (!classOK && (allowedModes & PACKAGE) != 0) {
1546                 classOK = (VerifyAccess.isClassAccessible(defc, lookupClass(), ALL_MODES) &&
1547                            (defc == refc ||
1548                             VerifyAccess.isClassAccessible(refc, lookupClass(), ALL_MODES)));
1549             }
1550             if (!classOK)
1551                 return "class is not public";
1552             if (Modifier.isPublic(mods))
1553                 return "access to public member failed";  // (how?)
1554             if (Modifier.isPrivate(mods))
1555                 return "member is private";
1556             if (Modifier.isProtected(mods))
1557                 return "member is protected";
1558             return "member is private to package";
1559         }
1560 
1561         private static final boolean ALLOW_NESTMATE_ACCESS = false;
1562 
1563         private void checkSpecialCaller(Class<?> specialCaller) throws IllegalAccessException {
1564             int allowedModes = this.allowedModes;
1565             if (allowedModes == TRUSTED)  return;
1566             if (!hasPrivateAccess()
1567                 || (specialCaller != lookupClass()
1568                     && !(ALLOW_NESTMATE_ACCESS &&
1569                          VerifyAccess.isSamePackageMember(specialCaller, lookupClass()))))
1570                 throw new MemberName(specialCaller).
1571                     makeAccessException("no private access for invokespecial", this);
1572         }
1573 
1574         private boolean restrictProtectedReceiver(MemberName method) {
1575             // The accessing class only has the right to use a protected member
1576             // on itself or a subclass.  Enforce that restriction, from JVMS 5.4.4, etc.
1577             if (!method.isProtected() || method.isStatic()
1578                 || allowedModes == TRUSTED
1579                 || method.getDeclaringClass() == lookupClass()
1580                 || VerifyAccess.isSamePackage(method.getDeclaringClass(), lookupClass())
1581                 || (ALLOW_NESTMATE_ACCESS &&
1582                     VerifyAccess.isSamePackageMember(method.getDeclaringClass(), lookupClass())))
1583                 return false;
1584             return true;
1585         }
1586         private MethodHandle restrictReceiver(MemberName method, DirectMethodHandle mh, Class<?> caller) throws IllegalAccessException {
1587             assert(!method.isStatic());
1588             // receiver type of mh is too wide; narrow to caller
1589             if (!method.getDeclaringClass().isAssignableFrom(caller)) {
1590                 throw method.makeAccessException("caller class must be a subclass below the method", caller);
1591             }
1592             MethodType rawType = mh.type();
1593             if (rawType.parameterType(0) == caller)  return mh;
1594             MethodType narrowType = rawType.changeParameterType(0, caller);
1595             assert(!mh.isVarargsCollector());  // viewAsType will lose varargs-ness
1596             assert(mh.viewAsTypeChecks(narrowType, true));
1597             return mh.copyWith(narrowType, mh.form);
1598         }
1599 
1600         /** Check access and get the requested method. */
1601         private MethodHandle getDirectMethod(byte refKind, Class<?> refc, MemberName method, Class<?> callerClass) throws IllegalAccessException {
1602             final boolean doRestrict    = true;
1603             final boolean checkSecurity = true;
1604             return getDirectMethodCommon(refKind, refc, method, checkSecurity, doRestrict, callerClass);
1605         }
1606         /** Check access and get the requested method, eliding receiver narrowing rules. */
1607         private MethodHandle getDirectMethodNoRestrict(byte refKind, Class<?> refc, MemberName method, Class<?> callerClass) throws IllegalAccessException {
1608             final boolean doRestrict    = false;
1609             final boolean checkSecurity = true;
1610             return getDirectMethodCommon(refKind, refc, method, checkSecurity, doRestrict, callerClass);
1611         }
1612         /** Check access and get the requested method, eliding security manager checks. */
1613         private MethodHandle getDirectMethodNoSecurityManager(byte refKind, Class<?> refc, MemberName method, Class<?> callerClass) throws IllegalAccessException {
1614             final boolean doRestrict    = true;
1615             final boolean checkSecurity = false;  // not needed for reflection or for linking CONSTANT_MH constants
1616             return getDirectMethodCommon(refKind, refc, method, checkSecurity, doRestrict, callerClass);
1617         }
1618         /** Common code for all methods; do not call directly except from immediately above. */
1619         private MethodHandle getDirectMethodCommon(byte refKind, Class<?> refc, MemberName method,
1620                                                    boolean checkSecurity,
1621                                                    boolean doRestrict, Class<?> callerClass) throws IllegalAccessException {
1622             checkMethod(refKind, refc, method);
1623             // Optionally check with the security manager; this isn't needed for unreflect* calls.
1624             if (checkSecurity)
1625                 checkSecurityManager(refc, method);
1626             assert(!method.isMethodHandleInvoke());
1627 
1628             if (refKind == REF_invokeSpecial &&
1629                 refc != lookupClass() &&
1630                 !refc.isInterface() &&
1631                 refc != lookupClass().getSuperclass() &&
1632                 refc.isAssignableFrom(lookupClass())) {
1633                 assert(!method.getName().equals("<init>"));  // not this code path
1634                 // Per JVMS 6.5, desc. of invokespecial instruction:
1635                 // If the method is in a superclass of the LC,
1636                 // and if our original search was above LC.super,
1637                 // repeat the search (symbolic lookup) from LC.super
1638                 // and continue with the direct superclass of that class,
1639                 // and so forth, until a match is found or no further superclasses exist.
1640                 // FIXME: MemberName.resolve should handle this instead.
1641                 Class<?> refcAsSuper = lookupClass();
1642                 MemberName m2;
1643                 do {
1644                     refcAsSuper = refcAsSuper.getSuperclass();
1645                     m2 = new MemberName(refcAsSuper,
1646                                         method.getName(),
1647                                         method.getMethodType(),
1648                                         REF_invokeSpecial);
1649                     m2 = IMPL_NAMES.resolveOrNull(refKind, m2, lookupClassOrNull());
1650                 } while (m2 == null &&         // no method is found yet
1651                          refc != refcAsSuper); // search up to refc
1652                 if (m2 == null)  throw new InternalError(method.toString());
1653                 method = m2;
1654                 refc = refcAsSuper;
1655                 // redo basic checks
1656                 checkMethod(refKind, refc, method);
1657             }
1658 
1659             DirectMethodHandle dmh = DirectMethodHandle.make(refKind, refc, method);
1660             MethodHandle mh = dmh;
1661             // Optionally narrow the receiver argument to refc using restrictReceiver.
1662             if (doRestrict &&
1663                    (refKind == REF_invokeSpecial ||
1664                        (MethodHandleNatives.refKindHasReceiver(refKind) &&
1665                            restrictProtectedReceiver(method)))) {
1666                 mh = restrictReceiver(method, dmh, lookupClass());
1667             }
1668             mh = maybeBindCaller(method, mh, callerClass);
1669             mh = mh.setVarargs(method);
1670             return mh;
1671         }
1672         private MethodHandle maybeBindCaller(MemberName method, MethodHandle mh,
1673                                              Class<?> callerClass)
1674                                              throws IllegalAccessException {
1675             if (allowedModes == TRUSTED || !MethodHandleNatives.isCallerSensitive(method))
1676                 return mh;
1677             Class<?> hostClass = lookupClass;
1678             if (!hasPrivateAccess())  // caller must have private access
1679                 hostClass = callerClass;  // callerClass came from a security manager style stack walk
1680             MethodHandle cbmh = MethodHandleImpl.bindCaller(mh, hostClass);
1681             // Note: caller will apply varargs after this step happens.
1682             return cbmh;
1683         }
1684         /** Check access and get the requested field. */
1685         private MethodHandle getDirectField(byte refKind, Class<?> refc, MemberName field) throws IllegalAccessException {
1686             final boolean checkSecurity = true;
1687             return getDirectFieldCommon(refKind, refc, field, checkSecurity);
1688         }
1689         /** Check access and get the requested field, eliding security manager checks. */
1690         private MethodHandle getDirectFieldNoSecurityManager(byte refKind, Class<?> refc, MemberName field) throws IllegalAccessException {
1691             final boolean checkSecurity = false;  // not needed for reflection or for linking CONSTANT_MH constants
1692             return getDirectFieldCommon(refKind, refc, field, checkSecurity);
1693         }
1694         /** Common code for all fields; do not call directly except from immediately above. */
1695         private MethodHandle getDirectFieldCommon(byte refKind, Class<?> refc, MemberName field,
1696                                                   boolean checkSecurity) throws IllegalAccessException {
1697             checkField(refKind, refc, field);
1698             // Optionally check with the security manager; this isn't needed for unreflect* calls.
1699             if (checkSecurity)
1700                 checkSecurityManager(refc, field);
1701             DirectMethodHandle dmh = DirectMethodHandle.make(refc, field);
1702             boolean doRestrict = (MethodHandleNatives.refKindHasReceiver(refKind) &&
1703                                     restrictProtectedReceiver(field));
1704             if (doRestrict)
1705                 return restrictReceiver(field, dmh, lookupClass());
1706             return dmh;
1707         }
1708         /** Check access and get the requested constructor. */
1709         private MethodHandle getDirectConstructor(Class<?> refc, MemberName ctor) throws IllegalAccessException {
1710             final boolean checkSecurity = true;
1711             return getDirectConstructorCommon(refc, ctor, checkSecurity);
1712         }
1713         /** Check access and get the requested constructor, eliding security manager checks. */
1714         private MethodHandle getDirectConstructorNoSecurityManager(Class<?> refc, MemberName ctor) throws IllegalAccessException {
1715             final boolean checkSecurity = false;  // not needed for reflection or for linking CONSTANT_MH constants
1716             return getDirectConstructorCommon(refc, ctor, checkSecurity);
1717         }
1718         /** Common code for all constructors; do not call directly except from immediately above. */
1719         private MethodHandle getDirectConstructorCommon(Class<?> refc, MemberName ctor,
1720                                                   boolean checkSecurity) throws IllegalAccessException {
1721             assert(ctor.isConstructor());
1722             checkAccess(REF_newInvokeSpecial, refc, ctor);
1723             // Optionally check with the security manager; this isn't needed for unreflect* calls.
1724             if (checkSecurity)
1725                 checkSecurityManager(refc, ctor);
1726             assert(!MethodHandleNatives.isCallerSensitive(ctor));  // maybeBindCaller not relevant here
1727             return DirectMethodHandle.make(ctor).setVarargs(ctor);
1728         }
1729 
1730         /** Hook called from the JVM (via MethodHandleNatives) to link MH constants:
1731          */
1732         /*non-public*/
1733         MethodHandle linkMethodHandleConstant(byte refKind, Class<?> defc, String name, Object type) throws ReflectiveOperationException {
1734             if (!(type instanceof Class || type instanceof MethodType))
1735                 throw new InternalError("unresolved MemberName");
1736             MemberName member = new MemberName(refKind, defc, name, type);
1737             MethodHandle mh = LOOKASIDE_TABLE.get(member);
1738             if (mh != null) {
1739                 checkSymbolicClass(defc);
1740                 return mh;
1741             }
1742             // Treat MethodHandle.invoke and invokeExact specially.
1743             if (defc == MethodHandle.class && refKind == REF_invokeVirtual) {
1744                 mh = findVirtualForMH(member.getName(), member.getMethodType());
1745                 if (mh != null) {
1746                     return mh;
1747                 }
1748             }
1749             MemberName resolved = resolveOrFail(refKind, member);
1750             mh = getDirectMethodForConstant(refKind, defc, resolved);
1751             if (mh instanceof DirectMethodHandle
1752                     && canBeCached(refKind, defc, resolved)) {
1753                 MemberName key = mh.internalMemberName();
1754                 if (key != null) {
1755                     key = key.asNormalOriginal();
1756                 }
1757                 if (member.equals(key)) {  // better safe than sorry
1758                     LOOKASIDE_TABLE.put(key, (DirectMethodHandle) mh);
1759                 }
1760             }
1761             return mh;
1762         }
1763         private
1764         boolean canBeCached(byte refKind, Class<?> defc, MemberName member) {
1765             if (refKind == REF_invokeSpecial) {
1766                 return false;
1767             }
1768             if (!Modifier.isPublic(defc.getModifiers()) ||
1769                     !Modifier.isPublic(member.getDeclaringClass().getModifiers()) ||
1770                     !member.isPublic() ||
1771                     member.isCallerSensitive()) {
1772                 return false;
1773             }
1774             ClassLoader loader = defc.getClassLoader();
1775             if (!sun.misc.VM.isSystemDomainLoader(loader)) {
1776                 ClassLoader sysl = ClassLoader.getSystemClassLoader();
1777                 boolean found = false;
1778                 while (sysl != null) {
1779                     if (loader == sysl) { found = true; break; }
1780                     sysl = sysl.getParent();
1781                 }
1782                 if (!found) {
1783                     return false;
1784                 }
1785             }
1786             try {
1787                 MemberName resolved2 = publicLookup().resolveOrFail(refKind,
1788                     new MemberName(refKind, defc, member.getName(), member.getType()));
1789                 checkSecurityManager(defc, resolved2);
1790             } catch (ReflectiveOperationException | SecurityException ex) {
1791                 return false;
1792             }
1793             return true;
1794         }
1795         private
1796         MethodHandle getDirectMethodForConstant(byte refKind, Class<?> defc, MemberName member)
1797                 throws ReflectiveOperationException {
1798             if (MethodHandleNatives.refKindIsField(refKind)) {
1799                 return getDirectFieldNoSecurityManager(refKind, defc, member);
1800             } else if (MethodHandleNatives.refKindIsMethod(refKind)) {
1801                 return getDirectMethodNoSecurityManager(refKind, defc, member, lookupClass);
1802             } else if (refKind == REF_newInvokeSpecial) {
1803                 return getDirectConstructorNoSecurityManager(defc, member);
1804             }
1805             // oops
1806             throw newIllegalArgumentException("bad MethodHandle constant #"+member);
1807         }
1808 
1809         static ConcurrentHashMap<MemberName, DirectMethodHandle> LOOKASIDE_TABLE = new ConcurrentHashMap<>();
1810     }
1811 
1812     /**
1813      * Produces a method handle giving read access to elements of an array.
1814      * The type of the method handle will have a return type of the array's
1815      * element type.  Its first argument will be the array type,
1816      * and the second will be {@code int}.
1817      * @param arrayClass an array type
1818      * @return a method handle which can load values from the given array type
1819      * @throws NullPointerException if the argument is null
1820      * @throws  IllegalArgumentException if arrayClass is not an array type
1821      */
1822     public static
1823     MethodHandle arrayElementGetter(Class<?> arrayClass) throws IllegalArgumentException {
1824         return MethodHandleImpl.makeArrayElementAccessor(arrayClass, false);
1825     }
1826 
1827     /**
1828      * Produces a method handle giving write access to elements of an array.
1829      * The type of the method handle will have a void return type.
1830      * Its last argument will be the array's element type.
1831      * The first and second arguments will be the array type and int.
1832      * @param arrayClass the class of an array
1833      * @return a method handle which can store values into the array type
1834      * @throws NullPointerException if the argument is null
1835      * @throws IllegalArgumentException if arrayClass is not an array type
1836      */
1837     public static
1838     MethodHandle arrayElementSetter(Class<?> arrayClass) throws IllegalArgumentException {
1839         return MethodHandleImpl.makeArrayElementAccessor(arrayClass, true);
1840     }
1841 
1842     /// method handle invocation (reflective style)
1843 
1844     /**
1845      * Produces a method handle which will invoke any method handle of the
1846      * given {@code type}, with a given number of trailing arguments replaced by
1847      * a single trailing {@code Object[]} array.
1848      * The resulting invoker will be a method handle with the following
1849      * arguments:
1850      * <ul>
1851      * <li>a single {@code MethodHandle} target
1852      * <li>zero or more leading values (counted by {@code leadingArgCount})
1853      * <li>an {@code Object[]} array containing trailing arguments
1854      * </ul>
1855      * <p>
1856      * The invoker will invoke its target like a call to {@link MethodHandle#invoke invoke} with
1857      * the indicated {@code type}.
1858      * That is, if the target is exactly of the given {@code type}, it will behave
1859      * like {@code invokeExact}; otherwise it behave as if {@link MethodHandle#asType asType}
1860      * is used to convert the target to the required {@code type}.
1861      * <p>
1862      * The type of the returned invoker will not be the given {@code type}, but rather
1863      * will have all parameters except the first {@code leadingArgCount}
1864      * replaced by a single array of type {@code Object[]}, which will be
1865      * the final parameter.
1866      * <p>
1867      * Before invoking its target, the invoker will spread the final array, apply
1868      * reference casts as necessary, and unbox and widen primitive arguments.
1869      * If, when the invoker is called, the supplied array argument does
1870      * not have the correct number of elements, the invoker will throw
1871      * an {@link IllegalArgumentException} instead of invoking the target.
1872      * <p>
1873      * This method is equivalent to the following code (though it may be more efficient):
1874      * <blockquote><pre>{@code
1875 MethodHandle invoker = MethodHandles.invoker(type);
1876 int spreadArgCount = type.parameterCount() - leadingArgCount;
1877 invoker = invoker.asSpreader(Object[].class, spreadArgCount);
1878 return invoker;
1879      * }</pre></blockquote>
1880      * This method throws no reflective or security exceptions.
1881      * @param type the desired target type
1882      * @param leadingArgCount number of fixed arguments, to be passed unchanged to the target
1883      * @return a method handle suitable for invoking any method handle of the given type
1884      * @throws NullPointerException if {@code type} is null
1885      * @throws IllegalArgumentException if {@code leadingArgCount} is not in
1886      *                  the range from 0 to {@code type.parameterCount()} inclusive,
1887      *                  or if the resulting method handle's type would have
1888      *          <a href="MethodHandle.html#maxarity">too many parameters</a>
1889      */
1890     static public
1891     MethodHandle spreadInvoker(MethodType type, int leadingArgCount) {
1892         if (leadingArgCount < 0 || leadingArgCount > type.parameterCount())
1893             throw newIllegalArgumentException("bad argument count", leadingArgCount);
1894         type = type.asSpreaderType(Object[].class, type.parameterCount() - leadingArgCount);
1895         return type.invokers().spreadInvoker(leadingArgCount);
1896     }
1897 
1898     /**
1899      * Produces a special <em>invoker method handle</em> which can be used to
1900      * invoke any method handle of the given type, as if by {@link MethodHandle#invokeExact invokeExact}.
1901      * The resulting invoker will have a type which is
1902      * exactly equal to the desired type, except that it will accept
1903      * an additional leading argument of type {@code MethodHandle}.
1904      * <p>
1905      * This method is equivalent to the following code (though it may be more efficient):
1906      * {@code publicLookup().findVirtual(MethodHandle.class, "invokeExact", type)}
1907      *
1908      * <p style="font-size:smaller;">
1909      * <em>Discussion:</em>
1910      * Invoker method handles can be useful when working with variable method handles
1911      * of unknown types.
1912      * For example, to emulate an {@code invokeExact} call to a variable method
1913      * handle {@code M}, extract its type {@code T},
1914      * look up the invoker method {@code X} for {@code T},
1915      * and call the invoker method, as {@code X.invoke(T, A...)}.
1916      * (It would not work to call {@code X.invokeExact}, since the type {@code T}
1917      * is unknown.)
1918      * If spreading, collecting, or other argument transformations are required,
1919      * they can be applied once to the invoker {@code X} and reused on many {@code M}
1920      * method handle values, as long as they are compatible with the type of {@code X}.
1921      * <p style="font-size:smaller;">
1922      * <em>(Note:  The invoker method is not available via the Core Reflection API.
1923      * An attempt to call {@linkplain java.lang.reflect.Method#invoke java.lang.reflect.Method.invoke}
1924      * on the declared {@code invokeExact} or {@code invoke} method will raise an
1925      * {@link java.lang.UnsupportedOperationException UnsupportedOperationException}.)</em>
1926      * <p>
1927      * This method throws no reflective or security exceptions.
1928      * @param type the desired target type
1929      * @return a method handle suitable for invoking any method handle of the given type
1930      * @throws IllegalArgumentException if the resulting method handle's type would have
1931      *          <a href="MethodHandle.html#maxarity">too many parameters</a>
1932      */
1933     static public
1934     MethodHandle exactInvoker(MethodType type) {
1935         return type.invokers().exactInvoker();
1936     }
1937 
1938     /**
1939      * Produces a special <em>invoker method handle</em> which can be used to
1940      * invoke any method handle compatible with the given type, as if by {@link MethodHandle#invoke invoke}.
1941      * The resulting invoker will have a type which is
1942      * exactly equal to the desired type, except that it will accept
1943      * an additional leading argument of type {@code MethodHandle}.
1944      * <p>
1945      * Before invoking its target, if the target differs from the expected type,
1946      * the invoker will apply reference casts as
1947      * necessary and box, unbox, or widen primitive values, as if by {@link MethodHandle#asType asType}.
1948      * Similarly, the return value will be converted as necessary.
1949      * If the target is a {@linkplain MethodHandle#asVarargsCollector variable arity method handle},
1950      * the required arity conversion will be made, again as if by {@link MethodHandle#asType asType}.
1951      * <p>
1952      * This method is equivalent to the following code (though it may be more efficient):
1953      * {@code publicLookup().findVirtual(MethodHandle.class, "invoke", type)}
1954      * <p style="font-size:smaller;">
1955      * <em>Discussion:</em>
1956      * A {@linkplain MethodType#genericMethodType general method type} is one which
1957      * mentions only {@code Object} arguments and return values.
1958      * An invoker for such a type is capable of calling any method handle
1959      * of the same arity as the general type.
1960      * <p style="font-size:smaller;">
1961      * <em>(Note:  The invoker method is not available via the Core Reflection API.
1962      * An attempt to call {@linkplain java.lang.reflect.Method#invoke java.lang.reflect.Method.invoke}
1963      * on the declared {@code invokeExact} or {@code invoke} method will raise an
1964      * {@link java.lang.UnsupportedOperationException UnsupportedOperationException}.)</em>
1965      * <p>
1966      * This method throws no reflective or security exceptions.
1967      * @param type the desired target type
1968      * @return a method handle suitable for invoking any method handle convertible to the given type
1969      * @throws IllegalArgumentException if the resulting method handle's type would have
1970      *          <a href="MethodHandle.html#maxarity">too many parameters</a>
1971      */
1972     static public
1973     MethodHandle invoker(MethodType type) {
1974         return type.invokers().genericInvoker();
1975     }
1976 
1977     static /*non-public*/
1978     MethodHandle basicInvoker(MethodType type) {
1979         return type.invokers().basicInvoker();
1980     }
1981 
1982      /// method handle modification (creation from other method handles)
1983 
1984     /**
1985      * Produces a method handle which adapts the type of the
1986      * given method handle to a new type by pairwise argument and return type conversion.
1987      * The original type and new type must have the same number of arguments.
1988      * The resulting method handle is guaranteed to report a type
1989      * which is equal to the desired new type.
1990      * <p>
1991      * If the original type and new type are equal, returns target.
1992      * <p>
1993      * The same conversions are allowed as for {@link MethodHandle#asType MethodHandle.asType},
1994      * and some additional conversions are also applied if those conversions fail.
1995      * Given types <em>T0</em>, <em>T1</em>, one of the following conversions is applied
1996      * if possible, before or instead of any conversions done by {@code asType}:
1997      * <ul>
1998      * <li>If <em>T0</em> and <em>T1</em> are references, and <em>T1</em> is an interface type,
1999      *     then the value of type <em>T0</em> is passed as a <em>T1</em> without a cast.
2000      *     (This treatment of interfaces follows the usage of the bytecode verifier.)
2001      * <li>If <em>T0</em> is boolean and <em>T1</em> is another primitive,
2002      *     the boolean is converted to a byte value, 1 for true, 0 for false.
2003      *     (This treatment follows the usage of the bytecode verifier.)
2004      * <li>If <em>T1</em> is boolean and <em>T0</em> is another primitive,
2005      *     <em>T0</em> is converted to byte via Java casting conversion (JLS 5.5),
2006      *     and the low order bit of the result is tested, as if by {@code (x & 1) != 0}.
2007      * <li>If <em>T0</em> and <em>T1</em> are primitives other than boolean,
2008      *     then a Java casting conversion (JLS 5.5) is applied.
2009      *     (Specifically, <em>T0</em> will convert to <em>T1</em> by
2010      *     widening and/or narrowing.)
2011      * <li>If <em>T0</em> is a reference and <em>T1</em> a primitive, an unboxing
2012      *     conversion will be applied at runtime, possibly followed
2013      *     by a Java casting conversion (JLS 5.5) on the primitive value,
2014      *     possibly followed by a conversion from byte to boolean by testing
2015      *     the low-order bit.
2016      * <li>If <em>T0</em> is a reference and <em>T1</em> a primitive,
2017      *     and if the reference is null at runtime, a zero value is introduced.
2018      * </ul>
2019      * @param target the method handle to invoke after arguments are retyped
2020      * @param newType the expected type of the new method handle
2021      * @return a method handle which delegates to the target after performing
2022      *           any necessary argument conversions, and arranges for any
2023      *           necessary return value conversions
2024      * @throws NullPointerException if either argument is null
2025      * @throws WrongMethodTypeException if the conversion cannot be made
2026      * @see MethodHandle#asType
2027      */
2028     public static
2029     MethodHandle explicitCastArguments(MethodHandle target, MethodType newType) {
2030         explicitCastArgumentsChecks(target, newType);
2031         // use the asTypeCache when possible:
2032         MethodType oldType = target.type();
2033         if (oldType == newType)  return target;
2034         if (oldType.explicitCastEquivalentToAsType(newType)) {
2035             return target.asFixedArity().asType(newType);
2036         }
2037         return MethodHandleImpl.makePairwiseConvert(target, newType, false);
2038     }
2039 
2040     private static void explicitCastArgumentsChecks(MethodHandle target, MethodType newType) {
2041         if (target.type().parameterCount() != newType.parameterCount()) {
2042             throw new WrongMethodTypeException("cannot explicitly cast " + target + " to " + newType);
2043         }
2044     }
2045 
2046     /**
2047      * Produces a method handle which adapts the calling sequence of the
2048      * given method handle to a new type, by reordering the arguments.
2049      * The resulting method handle is guaranteed to report a type
2050      * which is equal to the desired new type.
2051      * <p>
2052      * The given array controls the reordering.
2053      * Call {@code #I} the number of incoming parameters (the value
2054      * {@code newType.parameterCount()}, and call {@code #O} the number
2055      * of outgoing parameters (the value {@code target.type().parameterCount()}).
2056      * Then the length of the reordering array must be {@code #O},
2057      * and each element must be a non-negative number less than {@code #I}.
2058      * For every {@code N} less than {@code #O}, the {@code N}-th
2059      * outgoing argument will be taken from the {@code I}-th incoming
2060      * argument, where {@code I} is {@code reorder[N]}.
2061      * <p>
2062      * No argument or return value conversions are applied.
2063      * The type of each incoming argument, as determined by {@code newType},
2064      * must be identical to the type of the corresponding outgoing parameter
2065      * or parameters in the target method handle.
2066      * The return type of {@code newType} must be identical to the return
2067      * type of the original target.
2068      * <p>
2069      * The reordering array need not specify an actual permutation.
2070      * An incoming argument will be duplicated if its index appears
2071      * more than once in the array, and an incoming argument will be dropped
2072      * if its index does not appear in the array.
2073      * As in the case of {@link #dropArguments(MethodHandle,int,List) dropArguments},
2074      * incoming arguments which are not mentioned in the reordering array
2075      * are may be any type, as determined only by {@code newType}.
2076      * <blockquote><pre>{@code
2077 import static java.lang.invoke.MethodHandles.*;
2078 import static java.lang.invoke.MethodType.*;
2079 ...
2080 MethodType intfn1 = methodType(int.class, int.class);
2081 MethodType intfn2 = methodType(int.class, int.class, int.class);
2082 MethodHandle sub = ... (int x, int y) -> (x-y) ...;
2083 assert(sub.type().equals(intfn2));
2084 MethodHandle sub1 = permuteArguments(sub, intfn2, 0, 1);
2085 MethodHandle rsub = permuteArguments(sub, intfn2, 1, 0);
2086 assert((int)rsub.invokeExact(1, 100) == 99);
2087 MethodHandle add = ... (int x, int y) -> (x+y) ...;
2088 assert(add.type().equals(intfn2));
2089 MethodHandle twice = permuteArguments(add, intfn1, 0, 0);
2090 assert(twice.type().equals(intfn1));
2091 assert((int)twice.invokeExact(21) == 42);
2092      * }</pre></blockquote>
2093      * @param target the method handle to invoke after arguments are reordered
2094      * @param newType the expected type of the new method handle
2095      * @param reorder an index array which controls the reordering
2096      * @return a method handle which delegates to the target after it
2097      *           drops unused arguments and moves and/or duplicates the other arguments
2098      * @throws NullPointerException if any argument is null
2099      * @throws IllegalArgumentException if the index array length is not equal to
2100      *                  the arity of the target, or if any index array element
2101      *                  not a valid index for a parameter of {@code newType},
2102      *                  or if two corresponding parameter types in
2103      *                  {@code target.type()} and {@code newType} are not identical,
2104      */
2105     public static
2106     MethodHandle permuteArguments(MethodHandle target, MethodType newType, int... reorder) {
2107         reorder = reorder.clone();  // get a private copy
2108         MethodType oldType = target.type();
2109         permuteArgumentChecks(reorder, newType, oldType);
2110         // first detect dropped arguments and handle them separately
2111         int[] originalReorder = reorder;
2112         BoundMethodHandle result = target.rebind();
2113         LambdaForm form = result.form;
2114         int newArity = newType.parameterCount();
2115         // Normalize the reordering into a real permutation,
2116         // by removing duplicates and adding dropped elements.
2117         // This somewhat improves lambda form caching, as well
2118         // as simplifying the transform by breaking it up into steps.
2119         for (int ddIdx; (ddIdx = findFirstDupOrDrop(reorder, newArity)) != 0; ) {
2120             if (ddIdx > 0) {
2121                 // We found a duplicated entry at reorder[ddIdx].
2122                 // Example:  (x,y,z)->asList(x,y,z)
2123                 // permuted by [1*,0,1] => (a0,a1)=>asList(a1,a0,a1)
2124                 // permuted by [0,1,0*] => (a0,a1)=>asList(a0,a1,a0)
2125                 // The starred element corresponds to the argument
2126                 // deleted by the dupArgumentForm transform.
2127                 int srcPos = ddIdx, dstPos = srcPos, dupVal = reorder[srcPos];
2128                 boolean killFirst = false;
2129                 for (int val; (val = reorder[--dstPos]) != dupVal; ) {
2130                     // Set killFirst if the dup is larger than an intervening position.
2131                     // This will remove at least one inversion from the permutation.
2132                     if (dupVal > val) killFirst = true;
2133                 }
2134                 if (!killFirst) {
2135                     srcPos = dstPos;
2136                     dstPos = ddIdx;
2137                 }
2138                 form = form.editor().dupArgumentForm(1 + srcPos, 1 + dstPos);
2139                 assert (reorder[srcPos] == reorder[dstPos]);
2140                 oldType = oldType.dropParameterTypes(dstPos, dstPos + 1);
2141                 // contract the reordering by removing the element at dstPos
2142                 int tailPos = dstPos + 1;
2143                 System.arraycopy(reorder, tailPos, reorder, dstPos, reorder.length - tailPos);
2144                 reorder = Arrays.copyOf(reorder, reorder.length - 1);
2145             } else {
2146                 int dropVal = ~ddIdx, insPos = 0;
2147                 while (insPos < reorder.length && reorder[insPos] < dropVal) {
2148                     // Find first element of reorder larger than dropVal.
2149                     // This is where we will insert the dropVal.
2150                     insPos += 1;
2151                 }
2152                 Class<?> ptype = newType.parameterType(dropVal);
2153                 form = form.editor().addArgumentForm(1 + insPos, BasicType.basicType(ptype));
2154                 oldType = oldType.insertParameterTypes(insPos, ptype);
2155                 // expand the reordering by inserting an element at insPos
2156                 int tailPos = insPos + 1;
2157                 reorder = Arrays.copyOf(reorder, reorder.length + 1);
2158                 System.arraycopy(reorder, insPos, reorder, tailPos, reorder.length - tailPos);
2159                 reorder[insPos] = dropVal;
2160             }
2161             assert (permuteArgumentChecks(reorder, newType, oldType));
2162         }
2163         assert (reorder.length == newArity);  // a perfect permutation
2164         // Note:  This may cache too many distinct LFs. Consider backing off to varargs code.
2165         form = form.editor().permuteArgumentsForm(1, reorder);
2166         if (newType == result.type() && form == result.internalForm())
2167             return result;
2168         return result.copyWith(newType, form);
2169     }
2170 
2171     /**
2172      * Return an indication of any duplicate or omission in reorder.
2173      * If the reorder contains a duplicate entry, return the index of the second occurrence.
2174      * Otherwise, return ~(n), for the first n in [0..newArity-1] that is not present in reorder.
2175      * Otherwise, return zero.
2176      * If an element not in [0..newArity-1] is encountered, return reorder.length.
2177      */
2178     private static int findFirstDupOrDrop(int[] reorder, int newArity) {
2179         final int BIT_LIMIT = 63;  // max number of bits in bit mask
2180         if (newArity < BIT_LIMIT) {
2181             long mask = 0;
2182             for (int i = 0; i < reorder.length; i++) {
2183                 int arg = reorder[i];
2184                 if (arg >= newArity) {
2185                     return reorder.length;
2186                 }
2187                 long bit = 1L << arg;
2188                 if ((mask & bit) != 0) {
2189                     return i;  // >0 indicates a dup
2190                 }
2191                 mask |= bit;
2192             }
2193             if (mask == (1L << newArity) - 1) {
2194                 assert(Long.numberOfTrailingZeros(Long.lowestOneBit(~mask)) == newArity);
2195                 return 0;
2196             }
2197             // find first zero
2198             long zeroBit = Long.lowestOneBit(~mask);
2199             int zeroPos = Long.numberOfTrailingZeros(zeroBit);
2200             assert(zeroPos <= newArity);
2201             if (zeroPos == newArity) {
2202                 return 0;
2203             }
2204             return ~zeroPos;
2205         } else {
2206             // same algorithm, different bit set
2207             BitSet mask = new BitSet(newArity);
2208             for (int i = 0; i < reorder.length; i++) {
2209                 int arg = reorder[i];
2210                 if (arg >= newArity) {
2211                     return reorder.length;
2212                 }
2213                 if (mask.get(arg)) {
2214                     return i;  // >0 indicates a dup
2215                 }
2216                 mask.set(arg);
2217             }
2218             int zeroPos = mask.nextClearBit(0);
2219             assert(zeroPos <= newArity);
2220             if (zeroPos == newArity) {
2221                 return 0;
2222             }
2223             return ~zeroPos;
2224         }
2225     }
2226 
2227     private static boolean permuteArgumentChecks(int[] reorder, MethodType newType, MethodType oldType) {
2228         if (newType.returnType() != oldType.returnType())
2229             throw newIllegalArgumentException("return types do not match",
2230                     oldType, newType);
2231         if (reorder.length == oldType.parameterCount()) {
2232             int limit = newType.parameterCount();
2233             boolean bad = false;
2234             for (int j = 0; j < reorder.length; j++) {
2235                 int i = reorder[j];
2236                 if (i < 0 || i >= limit) {
2237                     bad = true; break;
2238                 }
2239                 Class<?> src = newType.parameterType(i);
2240                 Class<?> dst = oldType.parameterType(j);
2241                 if (src != dst)
2242                     throw newIllegalArgumentException("parameter types do not match after reorder",
2243                             oldType, newType);
2244             }
2245             if (!bad)  return true;
2246         }
2247         throw newIllegalArgumentException("bad reorder array: "+Arrays.toString(reorder));
2248     }
2249 
2250     /**
2251      * Produces a method handle of the requested return type which returns the given
2252      * constant value every time it is invoked.
2253      * <p>
2254      * Before the method handle is returned, the passed-in value is converted to the requested type.
2255      * If the requested type is primitive, widening primitive conversions are attempted,
2256      * else reference conversions are attempted.
2257      * <p>The returned method handle is equivalent to {@code identity(type).bindTo(value)}.
2258      * @param type the return type of the desired method handle
2259      * @param value the value to return
2260      * @return a method handle of the given return type and no arguments, which always returns the given value
2261      * @throws NullPointerException if the {@code type} argument is null
2262      * @throws ClassCastException if the value cannot be converted to the required return type
2263      * @throws IllegalArgumentException if the given type is {@code void.class}
2264      */
2265     public static
2266     MethodHandle constant(Class<?> type, Object value) {
2267         if (type.isPrimitive()) {
2268             if (type == void.class)
2269                 throw newIllegalArgumentException("void type");
2270             Wrapper w = Wrapper.forPrimitiveType(type);
2271             value = w.convert(value, type);
2272             if (w.zero().equals(value))
2273                 return zero(w, type);
2274             return insertArguments(identity(type), 0, value);
2275         } else {
2276             if (value == null)
2277                 return zero(Wrapper.OBJECT, type);
2278             return identity(type).bindTo(value);
2279         }
2280     }
2281 
2282     /**
2283      * Produces a method handle which returns its sole argument when invoked.
2284      * @param type the type of the sole parameter and return value of the desired method handle
2285      * @return a unary method handle which accepts and returns the given type
2286      * @throws NullPointerException if the argument is null
2287      * @throws IllegalArgumentException if the given type is {@code void.class}
2288      */
2289     public static
2290     MethodHandle identity(Class<?> type) {
2291         Wrapper btw = (type.isPrimitive() ? Wrapper.forPrimitiveType(type) : Wrapper.OBJECT);
2292         int pos = btw.ordinal();
2293         MethodHandle ident = IDENTITY_MHS[pos];
2294         if (ident == null) {
2295             ident = setCachedMethodHandle(IDENTITY_MHS, pos, makeIdentity(btw.primitiveType()));
2296         }
2297         if (ident.type().returnType() == type)
2298             return ident;
2299         // something like identity(Foo.class); do not bother to intern these
2300         assert(btw == Wrapper.OBJECT);
2301         return makeIdentity(type);
2302     }
2303     private static final MethodHandle[] IDENTITY_MHS = new MethodHandle[Wrapper.values().length];
2304     private static MethodHandle makeIdentity(Class<?> ptype) {
2305         MethodType mtype = MethodType.methodType(ptype, ptype);
2306         LambdaForm lform = LambdaForm.identityForm(BasicType.basicType(ptype));
2307         return MethodHandleImpl.makeIntrinsic(mtype, lform, Intrinsic.IDENTITY);
2308     }
2309 
2310     private static MethodHandle zero(Wrapper btw, Class<?> rtype) {
2311         int pos = btw.ordinal();
2312         MethodHandle zero = ZERO_MHS[pos];
2313         if (zero == null) {
2314             zero = setCachedMethodHandle(ZERO_MHS, pos, makeZero(btw.primitiveType()));
2315         }
2316         if (zero.type().returnType() == rtype)
2317             return zero;
2318         assert(btw == Wrapper.OBJECT);
2319         return makeZero(rtype);
2320     }
2321     private static final MethodHandle[] ZERO_MHS = new MethodHandle[Wrapper.values().length];
2322     private static MethodHandle makeZero(Class<?> rtype) {
2323         MethodType mtype = MethodType.methodType(rtype);
2324         LambdaForm lform = LambdaForm.zeroForm(BasicType.basicType(rtype));
2325         return MethodHandleImpl.makeIntrinsic(mtype, lform, Intrinsic.ZERO);
2326     }
2327 
2328     synchronized private static MethodHandle setCachedMethodHandle(MethodHandle[] cache, int pos, MethodHandle value) {
2329         // Simulate a CAS, to avoid racy duplication of results.
2330         MethodHandle prev = cache[pos];
2331         if (prev != null) return prev;
2332         return cache[pos] = value;
2333     }
2334 
2335     /**
2336      * Provides a target method handle with one or more <em>bound arguments</em>
2337      * in advance of the method handle's invocation.
2338      * The formal parameters to the target corresponding to the bound
2339      * arguments are called <em>bound parameters</em>.
2340      * Returns a new method handle which saves away the bound arguments.
2341      * When it is invoked, it receives arguments for any non-bound parameters,
2342      * binds the saved arguments to their corresponding parameters,
2343      * and calls the original target.
2344      * <p>
2345      * The type of the new method handle will drop the types for the bound
2346      * parameters from the original target type, since the new method handle
2347      * will no longer require those arguments to be supplied by its callers.
2348      * <p>
2349      * Each given argument object must match the corresponding bound parameter type.
2350      * If a bound parameter type is a primitive, the argument object
2351      * must be a wrapper, and will be unboxed to produce the primitive value.
2352      * <p>
2353      * The {@code pos} argument selects which parameters are to be bound.
2354      * It may range between zero and <i>N-L</i> (inclusively),
2355      * where <i>N</i> is the arity of the target method handle
2356      * and <i>L</i> is the length of the values array.
2357      * @param target the method handle to invoke after the argument is inserted
2358      * @param pos where to insert the argument (zero for the first)
2359      * @param values the series of arguments to insert
2360      * @return a method handle which inserts an additional argument,
2361      *         before calling the original method handle
2362      * @throws NullPointerException if the target or the {@code values} array is null
2363      * @see MethodHandle#bindTo
2364      */
2365     public static
2366     MethodHandle insertArguments(MethodHandle target, int pos, Object... values) {
2367         int insCount = values.length;
2368         Class<?>[] ptypes = insertArgumentsChecks(target, insCount, pos);
2369         if (insCount == 0)  return target;
2370         BoundMethodHandle result = target.rebind();
2371         for (int i = 0; i < insCount; i++) {
2372             Object value = values[i];
2373             Class<?> ptype = ptypes[pos+i];
2374             if (ptype.isPrimitive()) {
2375                 result = insertArgumentPrimitive(result, pos, ptype, value);
2376             } else {
2377                 value = ptype.cast(value);  // throw CCE if needed
2378                 result = result.bindArgumentL(pos, value);
2379             }
2380         }
2381         return result;
2382     }
2383 
2384     private static BoundMethodHandle insertArgumentPrimitive(BoundMethodHandle result, int pos,
2385                                                              Class<?> ptype, Object value) {
2386         Wrapper w = Wrapper.forPrimitiveType(ptype);
2387         // perform unboxing and/or primitive conversion
2388         value = w.convert(value, ptype);
2389         switch (w) {
2390         case INT:     return result.bindArgumentI(pos, (int)value);
2391         case LONG:    return result.bindArgumentJ(pos, (long)value);
2392         case FLOAT:   return result.bindArgumentF(pos, (float)value);
2393         case DOUBLE:  return result.bindArgumentD(pos, (double)value);
2394         default:      return result.bindArgumentI(pos, ValueConversions.widenSubword(value));
2395         }
2396     }
2397 
2398     private static Class<?>[] insertArgumentsChecks(MethodHandle target, int insCount, int pos) throws RuntimeException {
2399         MethodType oldType = target.type();
2400         int outargs = oldType.parameterCount();
2401         int inargs  = outargs - insCount;
2402         if (inargs < 0)
2403             throw newIllegalArgumentException("too many values to insert");
2404         if (pos < 0 || pos > inargs)
2405             throw newIllegalArgumentException("no argument type to append");
2406         return oldType.ptypes();
2407     }
2408 
2409     /**
2410      * Produces a method handle which will discard some dummy arguments
2411      * before calling some other specified <i>target</i> method handle.
2412      * The type of the new method handle will be the same as the target's type,
2413      * except it will also include the dummy argument types,
2414      * at some given position.
2415      * <p>
2416      * The {@code pos} argument may range between zero and <i>N</i>,
2417      * where <i>N</i> is the arity of the target.
2418      * If {@code pos} is zero, the dummy arguments will precede
2419      * the target's real arguments; if {@code pos} is <i>N</i>
2420      * they will come after.
2421      * <p>
2422      * <b>Example:</b>
2423      * <blockquote><pre>{@code
2424 import static java.lang.invoke.MethodHandles.*;
2425 import static java.lang.invoke.MethodType.*;
2426 ...
2427 MethodHandle cat = lookup().findVirtual(String.class,
2428   "concat", methodType(String.class, String.class));
2429 assertEquals("xy", (String) cat.invokeExact("x", "y"));
2430 MethodType bigType = cat.type().insertParameterTypes(0, int.class, String.class);
2431 MethodHandle d0 = dropArguments(cat, 0, bigType.parameterList().subList(0,2));
2432 assertEquals(bigType, d0.type());
2433 assertEquals("yz", (String) d0.invokeExact(123, "x", "y", "z"));
2434      * }</pre></blockquote>
2435      * <p>
2436      * This method is also equivalent to the following code:
2437      * <blockquote><pre>
2438      * {@link #dropArguments(MethodHandle,int,Class...) dropArguments}{@code (target, pos, valueTypes.toArray(new Class[0]))}
2439      * </pre></blockquote>
2440      * @param target the method handle to invoke after the arguments are dropped
2441      * @param valueTypes the type(s) of the argument(s) to drop
2442      * @param pos position of first argument to drop (zero for the leftmost)
2443      * @return a method handle which drops arguments of the given types,
2444      *         before calling the original method handle
2445      * @throws NullPointerException if the target is null,
2446      *                              or if the {@code valueTypes} list or any of its elements is null
2447      * @throws IllegalArgumentException if any element of {@code valueTypes} is {@code void.class},
2448      *                  or if {@code pos} is negative or greater than the arity of the target,
2449      *                  or if the new method handle's type would have too many parameters
2450      */
2451     public static
2452     MethodHandle dropArguments(MethodHandle target, int pos, List<Class<?>> valueTypes) {
2453         MethodType oldType = target.type();  // get NPE
2454         int dropped = dropArgumentChecks(oldType, pos, valueTypes);
2455         MethodType newType = oldType.insertParameterTypes(pos, valueTypes);
2456         if (dropped == 0)  return target;
2457         BoundMethodHandle result = target.rebind();
2458         LambdaForm lform = result.form;
2459         int insertFormArg = 1 + pos;
2460         for (Class<?> ptype : valueTypes) {
2461             lform = lform.editor().addArgumentForm(insertFormArg++, BasicType.basicType(ptype));
2462         }
2463         result = result.copyWith(newType, lform);
2464         return result;
2465     }
2466 
2467     private static int dropArgumentChecks(MethodType oldType, int pos, List<Class<?>> valueTypes) {
2468         int dropped = valueTypes.size();
2469         MethodType.checkSlotCount(dropped);
2470         int outargs = oldType.parameterCount();
2471         int inargs  = outargs + dropped;
2472         if (pos < 0 || pos > outargs)
2473             throw newIllegalArgumentException("no argument type to remove"
2474                     + Arrays.asList(oldType, pos, valueTypes, inargs, outargs)
2475                     );
2476         return dropped;
2477     }
2478 
2479     /**
2480      * Produces a method handle which will discard some dummy arguments
2481      * before calling some other specified <i>target</i> method handle.
2482      * The type of the new method handle will be the same as the target's type,
2483      * except it will also include the dummy argument types,
2484      * at some given position.
2485      * <p>
2486      * The {@code pos} argument may range between zero and <i>N</i>,
2487      * where <i>N</i> is the arity of the target.
2488      * If {@code pos} is zero, the dummy arguments will precede
2489      * the target's real arguments; if {@code pos} is <i>N</i>
2490      * they will come after.
2491      * <p>
2492      * <b>Example:</b>
2493      * <blockquote><pre>{@code
2494 import static java.lang.invoke.MethodHandles.*;
2495 import static java.lang.invoke.MethodType.*;
2496 ...
2497 MethodHandle cat = lookup().findVirtual(String.class,
2498   "concat", methodType(String.class, String.class));
2499 assertEquals("xy", (String) cat.invokeExact("x", "y"));
2500 MethodHandle d0 = dropArguments(cat, 0, String.class);
2501 assertEquals("yz", (String) d0.invokeExact("x", "y", "z"));
2502 MethodHandle d1 = dropArguments(cat, 1, String.class);
2503 assertEquals("xz", (String) d1.invokeExact("x", "y", "z"));
2504 MethodHandle d2 = dropArguments(cat, 2, String.class);
2505 assertEquals("xy", (String) d2.invokeExact("x", "y", "z"));
2506 MethodHandle d12 = dropArguments(cat, 1, int.class, boolean.class);
2507 assertEquals("xz", (String) d12.invokeExact("x", 12, true, "z"));
2508      * }</pre></blockquote>
2509      * <p>
2510      * This method is also equivalent to the following code:
2511      * <blockquote><pre>
2512      * {@link #dropArguments(MethodHandle,int,List) dropArguments}{@code (target, pos, Arrays.asList(valueTypes))}
2513      * </pre></blockquote>
2514      * @param target the method handle to invoke after the arguments are dropped
2515      * @param valueTypes the type(s) of the argument(s) to drop
2516      * @param pos position of first argument to drop (zero for the leftmost)
2517      * @return a method handle which drops arguments of the given types,
2518      *         before calling the original method handle
2519      * @throws NullPointerException if the target is null,
2520      *                              or if the {@code valueTypes} array or any of its elements is null
2521      * @throws IllegalArgumentException if any element of {@code valueTypes} is {@code void.class},
2522      *                  or if {@code pos} is negative or greater than the arity of the target,
2523      *                  or if the new method handle's type would have
2524      *                  <a href="MethodHandle.html#maxarity">too many parameters</a>
2525      */
2526     public static
2527     MethodHandle dropArguments(MethodHandle target, int pos, Class<?>... valueTypes) {
2528         return dropArguments(target, pos, Arrays.asList(valueTypes));
2529     }
2530 
2531     /**
2532      * Adapts a target method handle by pre-processing
2533      * one or more of its arguments, each with its own unary filter function,
2534      * and then calling the target with each pre-processed argument
2535      * replaced by the result of its corresponding filter function.
2536      * <p>
2537      * The pre-processing is performed by one or more method handles,
2538      * specified in the elements of the {@code filters} array.
2539      * The first element of the filter array corresponds to the {@code pos}
2540      * argument of the target, and so on in sequence.
2541      * <p>
2542      * Null arguments in the array are treated as identity functions,
2543      * and the corresponding arguments left unchanged.
2544      * (If there are no non-null elements in the array, the original target is returned.)
2545      * Each filter is applied to the corresponding argument of the adapter.
2546      * <p>
2547      * If a filter {@code F} applies to the {@code N}th argument of
2548      * the target, then {@code F} must be a method handle which
2549      * takes exactly one argument.  The type of {@code F}'s sole argument
2550      * replaces the corresponding argument type of the target
2551      * in the resulting adapted method handle.
2552      * The return type of {@code F} must be identical to the corresponding
2553      * parameter type of the target.
2554      * <p>
2555      * It is an error if there are elements of {@code filters}
2556      * (null or not)
2557      * which do not correspond to argument positions in the target.
2558      * <p><b>Example:</b>
2559      * <blockquote><pre>{@code
2560 import static java.lang.invoke.MethodHandles.*;
2561 import static java.lang.invoke.MethodType.*;
2562 ...
2563 MethodHandle cat = lookup().findVirtual(String.class,
2564   "concat", methodType(String.class, String.class));
2565 MethodHandle upcase = lookup().findVirtual(String.class,
2566   "toUpperCase", methodType(String.class));
2567 assertEquals("xy", (String) cat.invokeExact("x", "y"));
2568 MethodHandle f0 = filterArguments(cat, 0, upcase);
2569 assertEquals("Xy", (String) f0.invokeExact("x", "y")); // Xy
2570 MethodHandle f1 = filterArguments(cat, 1, upcase);
2571 assertEquals("xY", (String) f1.invokeExact("x", "y")); // xY
2572 MethodHandle f2 = filterArguments(cat, 0, upcase, upcase);
2573 assertEquals("XY", (String) f2.invokeExact("x", "y")); // XY
2574      * }</pre></blockquote>
2575      * <p> Here is pseudocode for the resulting adapter:
2576      * <blockquote><pre>{@code
2577      * V target(P... p, A[i]... a[i], B... b);
2578      * A[i] filter[i](V[i]);
2579      * T adapter(P... p, V[i]... v[i], B... b) {
2580      *   return target(p..., f[i](v[i])..., b...);
2581      * }
2582      * }</pre></blockquote>
2583      *
2584      * @param target the method handle to invoke after arguments are filtered
2585      * @param pos the position of the first argument to filter
2586      * @param filters method handles to call initially on filtered arguments
2587      * @return method handle which incorporates the specified argument filtering logic
2588      * @throws NullPointerException if the target is null
2589      *                              or if the {@code filters} array is null
2590      * @throws IllegalArgumentException if a non-null element of {@code filters}
2591      *          does not match a corresponding argument type of target as described above,
2592      *          or if the {@code pos+filters.length} is greater than {@code target.type().parameterCount()},
2593      *          or if the resulting method handle's type would have
2594      *          <a href="MethodHandle.html#maxarity">too many parameters</a>
2595      */
2596     public static
2597     MethodHandle filterArguments(MethodHandle target, int pos, MethodHandle... filters) {
2598         filterArgumentsCheckArity(target, pos, filters);
2599         MethodHandle adapter = target;
2600         int curPos = pos-1;  // pre-incremented
2601         for (MethodHandle filter : filters) {
2602             curPos += 1;
2603             if (filter == null)  continue;  // ignore null elements of filters
2604             adapter = filterArgument(adapter, curPos, filter);
2605         }
2606         return adapter;
2607     }
2608 
2609     /*non-public*/ static
2610     MethodHandle filterArgument(MethodHandle target, int pos, MethodHandle filter) {
2611         filterArgumentChecks(target, pos, filter);
2612         MethodType targetType = target.type();
2613         MethodType filterType = filter.type();
2614         BoundMethodHandle result = target.rebind();
2615         Class<?> newParamType = filterType.parameterType(0);
2616         LambdaForm lform = result.editor().filterArgumentForm(1 + pos, BasicType.basicType(newParamType));
2617         MethodType newType = targetType.changeParameterType(pos, newParamType);
2618         result = result.copyWithExtendL(newType, lform, filter);
2619         return result;
2620     }
2621 
2622     private static void filterArgumentsCheckArity(MethodHandle target, int pos, MethodHandle[] filters) {
2623         MethodType targetType = target.type();
2624         int maxPos = targetType.parameterCount();
2625         if (pos + filters.length > maxPos)
2626             throw newIllegalArgumentException("too many filters");
2627     }
2628 
2629     private static void filterArgumentChecks(MethodHandle target, int pos, MethodHandle filter) throws RuntimeException {
2630         MethodType targetType = target.type();
2631         MethodType filterType = filter.type();
2632         if (filterType.parameterCount() != 1
2633             || filterType.returnType() != targetType.parameterType(pos))
2634             throw newIllegalArgumentException("target and filter types do not match", targetType, filterType);
2635     }
2636 
2637     /**
2638      * Adapts a target method handle by pre-processing
2639      * a sub-sequence of its arguments with a filter (another method handle).
2640      * The pre-processed arguments are replaced by the result (if any) of the
2641      * filter function.
2642      * The target is then called on the modified (usually shortened) argument list.
2643      * <p>
2644      * If the filter returns a value, the target must accept that value as
2645      * its argument in position {@code pos}, preceded and/or followed by
2646      * any arguments not passed to the filter.
2647      * If the filter returns void, the target must accept all arguments
2648      * not passed to the filter.
2649      * No arguments are reordered, and a result returned from the filter
2650      * replaces (in order) the whole subsequence of arguments originally
2651      * passed to the adapter.
2652      * <p>
2653      * The argument types (if any) of the filter
2654      * replace zero or one argument types of the target, at position {@code pos},
2655      * in the resulting adapted method handle.
2656      * The return type of the filter (if any) must be identical to the
2657      * argument type of the target at position {@code pos}, and that target argument
2658      * is supplied by the return value of the filter.
2659      * <p>
2660      * In all cases, {@code pos} must be greater than or equal to zero, and
2661      * {@code pos} must also be less than or equal to the target's arity.
2662      * <p><b>Example:</b>
2663      * <blockquote><pre>{@code
2664 import static java.lang.invoke.MethodHandles.*;
2665 import static java.lang.invoke.MethodType.*;
2666 ...
2667 MethodHandle deepToString = publicLookup()
2668   .findStatic(Arrays.class, "deepToString", methodType(String.class, Object[].class));
2669 
2670 MethodHandle ts1 = deepToString.asCollector(String[].class, 1);
2671 assertEquals("[strange]", (String) ts1.invokeExact("strange"));
2672 
2673 MethodHandle ts2 = deepToString.asCollector(String[].class, 2);
2674 assertEquals("[up, down]", (String) ts2.invokeExact("up", "down"));
2675 
2676 MethodHandle ts3 = deepToString.asCollector(String[].class, 3);
2677 MethodHandle ts3_ts2 = collectArguments(ts3, 1, ts2);
2678 assertEquals("[top, [up, down], strange]",
2679              (String) ts3_ts2.invokeExact("top", "up", "down", "strange"));
2680 
2681 MethodHandle ts3_ts2_ts1 = collectArguments(ts3_ts2, 3, ts1);
2682 assertEquals("[top, [up, down], [strange]]",
2683              (String) ts3_ts2_ts1.invokeExact("top", "up", "down", "strange"));
2684 
2685 MethodHandle ts3_ts2_ts3 = collectArguments(ts3_ts2, 1, ts3);
2686 assertEquals("[top, [[up, down, strange], charm], bottom]",
2687              (String) ts3_ts2_ts3.invokeExact("top", "up", "down", "strange", "charm", "bottom"));
2688      * }</pre></blockquote>
2689      * <p> Here is pseudocode for the resulting adapter:
2690      * <blockquote><pre>{@code
2691      * T target(A...,V,C...);
2692      * V filter(B...);
2693      * T adapter(A... a,B... b,C... c) {
2694      *   V v = filter(b...);
2695      *   return target(a...,v,c...);
2696      * }
2697      * // and if the filter has no arguments:
2698      * T target2(A...,V,C...);
2699      * V filter2();
2700      * T adapter2(A... a,C... c) {
2701      *   V v = filter2();
2702      *   return target2(a...,v,c...);
2703      * }
2704      * // and if the filter has a void return:
2705      * T target3(A...,C...);
2706      * void filter3(B...);
2707      * void adapter3(A... a,B... b,C... c) {
2708      *   filter3(b...);
2709      *   return target3(a...,c...);
2710      * }
2711      * }</pre></blockquote>
2712      * <p>
2713      * A collection adapter {@code collectArguments(mh, 0, coll)} is equivalent to
2714      * one which first "folds" the affected arguments, and then drops them, in separate
2715      * steps as follows:
2716      * <blockquote><pre>{@code
2717      * mh = MethodHandles.dropArguments(mh, 1, coll.type().parameterList()); //step 2
2718      * mh = MethodHandles.foldArguments(mh, coll); //step 1
2719      * }</pre></blockquote>
2720      * If the target method handle consumes no arguments besides than the result
2721      * (if any) of the filter {@code coll}, then {@code collectArguments(mh, 0, coll)}
2722      * is equivalent to {@code filterReturnValue(coll, mh)}.
2723      * If the filter method handle {@code coll} consumes one argument and produces
2724      * a non-void result, then {@code collectArguments(mh, N, coll)}
2725      * is equivalent to {@code filterArguments(mh, N, coll)}.
2726      * Other equivalences are possible but would require argument permutation.
2727      *
2728      * @param target the method handle to invoke after filtering the subsequence of arguments
2729      * @param pos the position of the first adapter argument to pass to the filter,
2730      *            and/or the target argument which receives the result of the filter
2731      * @param filter method handle to call on the subsequence of arguments
2732      * @return method handle which incorporates the specified argument subsequence filtering logic
2733      * @throws NullPointerException if either argument is null
2734      * @throws IllegalArgumentException if the return type of {@code filter}
2735      *          is non-void and is not the same as the {@code pos} argument of the target,
2736      *          or if {@code pos} is not between 0 and the target's arity, inclusive,
2737      *          or if the resulting method handle's type would have
2738      *          <a href="MethodHandle.html#maxarity">too many parameters</a>
2739      * @see MethodHandles#foldArguments
2740      * @see MethodHandles#filterArguments
2741      * @see MethodHandles#filterReturnValue
2742      */
2743     public static
2744     MethodHandle collectArguments(MethodHandle target, int pos, MethodHandle filter) {
2745         MethodType newType = collectArgumentsChecks(target, pos, filter);
2746         MethodType collectorType = filter.type();
2747         BoundMethodHandle result = target.rebind();
2748         LambdaForm lform;
2749         if (collectorType.returnType().isArray() && filter.intrinsicName() == Intrinsic.NEW_ARRAY) {
2750             lform = result.editor().collectArgumentArrayForm(1 + pos, filter);
2751             if (lform != null) {
2752                 return result.copyWith(newType, lform);
2753             }
2754         }
2755         lform = result.editor().collectArgumentsForm(1 + pos, collectorType.basicType());
2756         return result.copyWithExtendL(newType, lform, filter);
2757     }
2758 
2759     private static MethodType collectArgumentsChecks(MethodHandle target, int pos, MethodHandle filter) throws RuntimeException {
2760         MethodType targetType = target.type();
2761         MethodType filterType = filter.type();
2762         Class<?> rtype = filterType.returnType();
2763         List<Class<?>> filterArgs = filterType.parameterList();
2764         if (rtype == void.class) {
2765             return targetType.insertParameterTypes(pos, filterArgs);
2766         }
2767         if (rtype != targetType.parameterType(pos)) {
2768             throw newIllegalArgumentException("target and filter types do not match", targetType, filterType);
2769         }
2770         return targetType.dropParameterTypes(pos, pos+1).insertParameterTypes(pos, filterArgs);
2771     }
2772 
2773     /**
2774      * Adapts a target method handle by post-processing
2775      * its return value (if any) with a filter (another method handle).
2776      * The result of the filter is returned from the adapter.
2777      * <p>
2778      * If the target returns a value, the filter must accept that value as
2779      * its only argument.
2780      * If the target returns void, the filter must accept no arguments.
2781      * <p>
2782      * The return type of the filter
2783      * replaces the return type of the target
2784      * in the resulting adapted method handle.
2785      * The argument type of the filter (if any) must be identical to the
2786      * return type of the target.
2787      * <p><b>Example:</b>
2788      * <blockquote><pre>{@code
2789 import static java.lang.invoke.MethodHandles.*;
2790 import static java.lang.invoke.MethodType.*;
2791 ...
2792 MethodHandle cat = lookup().findVirtual(String.class,
2793   "concat", methodType(String.class, String.class));
2794 MethodHandle length = lookup().findVirtual(String.class,
2795   "length", methodType(int.class));
2796 System.out.println((String) cat.invokeExact("x", "y")); // xy
2797 MethodHandle f0 = filterReturnValue(cat, length);
2798 System.out.println((int) f0.invokeExact("x", "y")); // 2
2799      * }</pre></blockquote>
2800      * <p> Here is pseudocode for the resulting adapter:
2801      * <blockquote><pre>{@code
2802      * V target(A...);
2803      * T filter(V);
2804      * T adapter(A... a) {
2805      *   V v = target(a...);
2806      *   return filter(v);
2807      * }
2808      * // and if the target has a void return:
2809      * void target2(A...);
2810      * T filter2();
2811      * T adapter2(A... a) {
2812      *   target2(a...);
2813      *   return filter2();
2814      * }
2815      * // and if the filter has a void return:
2816      * V target3(A...);
2817      * void filter3(V);
2818      * void adapter3(A... a) {
2819      *   V v = target3(a...);
2820      *   filter3(v);
2821      * }
2822      * }</pre></blockquote>
2823      * @param target the method handle to invoke before filtering the return value
2824      * @param filter method handle to call on the return value
2825      * @return method handle which incorporates the specified return value filtering logic
2826      * @throws NullPointerException if either argument is null
2827      * @throws IllegalArgumentException if the argument list of {@code filter}
2828      *          does not match the return type of target as described above
2829      */
2830     public static
2831     MethodHandle filterReturnValue(MethodHandle target, MethodHandle filter) {
2832         MethodType targetType = target.type();
2833         MethodType filterType = filter.type();
2834         filterReturnValueChecks(targetType, filterType);
2835         BoundMethodHandle result = target.rebind();
2836         BasicType rtype = BasicType.basicType(filterType.returnType());
2837         LambdaForm lform = result.editor().filterReturnForm(rtype, false);
2838         MethodType newType = targetType.changeReturnType(filterType.returnType());
2839         result = result.copyWithExtendL(newType, lform, filter);
2840         return result;
2841     }
2842 
2843     private static void filterReturnValueChecks(MethodType targetType, MethodType filterType) throws RuntimeException {
2844         Class<?> rtype = targetType.returnType();
2845         int filterValues = filterType.parameterCount();
2846         if (filterValues == 0
2847                 ? (rtype != void.class)
2848                 : (rtype != filterType.parameterType(0)))
2849             throw newIllegalArgumentException("target and filter types do not match", targetType, filterType);
2850     }
2851 
2852     /**
2853      * Adapts a target method handle by pre-processing
2854      * some of its arguments, and then calling the target with
2855      * the result of the pre-processing, inserted into the original
2856      * sequence of arguments.
2857      * <p>
2858      * The pre-processing is performed by {@code combiner}, a second method handle.
2859      * Of the arguments passed to the adapter, the first {@code N} arguments
2860      * are copied to the combiner, which is then called.
2861      * (Here, {@code N} is defined as the parameter count of the combiner.)
2862      * After this, control passes to the target, with any result
2863      * from the combiner inserted before the original {@code N} incoming
2864      * arguments.
2865      * <p>
2866      * If the combiner returns a value, the first parameter type of the target
2867      * must be identical with the return type of the combiner, and the next
2868      * {@code N} parameter types of the target must exactly match the parameters
2869      * of the combiner.
2870      * <p>
2871      * If the combiner has a void return, no result will be inserted,
2872      * and the first {@code N} parameter types of the target
2873      * must exactly match the parameters of the combiner.
2874      * <p>
2875      * The resulting adapter is the same type as the target, except that the
2876      * first parameter type is dropped,
2877      * if it corresponds to the result of the combiner.
2878      * <p>
2879      * (Note that {@link #dropArguments(MethodHandle,int,List) dropArguments} can be used to remove any arguments
2880      * that either the combiner or the target does not wish to receive.
2881      * If some of the incoming arguments are destined only for the combiner,
2882      * consider using {@link MethodHandle#asCollector asCollector} instead, since those
2883      * arguments will not need to be live on the stack on entry to the
2884      * target.)
2885      * <p><b>Example:</b>
2886      * <blockquote><pre>{@code
2887 import static java.lang.invoke.MethodHandles.*;
2888 import static java.lang.invoke.MethodType.*;
2889 ...
2890 MethodHandle trace = publicLookup().findVirtual(java.io.PrintStream.class,
2891   "println", methodType(void.class, String.class))
2892     .bindTo(System.out);
2893 MethodHandle cat = lookup().findVirtual(String.class,
2894   "concat", methodType(String.class, String.class));
2895 assertEquals("boojum", (String) cat.invokeExact("boo", "jum"));
2896 MethodHandle catTrace = foldArguments(cat, trace);
2897 // also prints "boo":
2898 assertEquals("boojum", (String) catTrace.invokeExact("boo", "jum"));
2899      * }</pre></blockquote>
2900      * <p> Here is pseudocode for the resulting adapter:
2901      * <blockquote><pre>{@code
2902      * // there are N arguments in A...
2903      * T target(V, A[N]..., B...);
2904      * V combiner(A...);
2905      * T adapter(A... a, B... b) {
2906      *   V v = combiner(a...);
2907      *   return target(v, a..., b...);
2908      * }
2909      * // and if the combiner has a void return:
2910      * T target2(A[N]..., B...);
2911      * void combiner2(A...);
2912      * T adapter2(A... a, B... b) {
2913      *   combiner2(a...);
2914      *   return target2(a..., b...);
2915      * }
2916      * }</pre></blockquote>
2917      * @param target the method handle to invoke after arguments are combined
2918      * @param combiner method handle to call initially on the incoming arguments
2919      * @return method handle which incorporates the specified argument folding logic
2920      * @throws NullPointerException if either argument is null
2921      * @throws IllegalArgumentException if {@code combiner}'s return type
2922      *          is non-void and not the same as the first argument type of
2923      *          the target, or if the initial {@code N} argument types
2924      *          of the target
2925      *          (skipping one matching the {@code combiner}'s return type)
2926      *          are not identical with the argument types of {@code combiner}
2927      */
2928     public static
2929     MethodHandle foldArguments(MethodHandle target, MethodHandle combiner) {
2930         int foldPos = 0;
2931         MethodType targetType = target.type();
2932         MethodType combinerType = combiner.type();
2933         Class<?> rtype = foldArgumentChecks(foldPos, targetType, combinerType);
2934         BoundMethodHandle result = target.rebind();
2935         boolean dropResult = (rtype == void.class);
2936         // Note:  This may cache too many distinct LFs. Consider backing off to varargs code.
2937         LambdaForm lform = result.editor().foldArgumentsForm(1 + foldPos, dropResult, combinerType.basicType());
2938         MethodType newType = targetType;
2939         if (!dropResult)
2940             newType = newType.dropParameterTypes(foldPos, foldPos + 1);
2941         result = result.copyWithExtendL(newType, lform, combiner);
2942         return result;
2943     }
2944 
2945     private static Class<?> foldArgumentChecks(int foldPos, MethodType targetType, MethodType combinerType) {
2946         int foldArgs   = combinerType.parameterCount();
2947         Class<?> rtype = combinerType.returnType();
2948         int foldVals = rtype == void.class ? 0 : 1;
2949         int afterInsertPos = foldPos + foldVals;
2950         boolean ok = (targetType.parameterCount() >= afterInsertPos + foldArgs);
2951         if (ok && !(combinerType.parameterList()
2952                     .equals(targetType.parameterList().subList(afterInsertPos,
2953                                                                afterInsertPos + foldArgs))))
2954             ok = false;
2955         if (ok && foldVals != 0 && combinerType.returnType() != targetType.parameterType(0))
2956             ok = false;
2957         if (!ok)
2958             throw misMatchedTypes("target and combiner types", targetType, combinerType);
2959         return rtype;
2960     }
2961 
2962     /**
2963      * Makes a method handle which adapts a target method handle,
2964      * by guarding it with a test, a boolean-valued method handle.
2965      * If the guard fails, a fallback handle is called instead.
2966      * All three method handles must have the same corresponding
2967      * argument and return types, except that the return type
2968      * of the test must be boolean, and the test is allowed
2969      * to have fewer arguments than the other two method handles.
2970      * <p> Here is pseudocode for the resulting adapter:
2971      * <blockquote><pre>{@code
2972      * boolean test(A...);
2973      * T target(A...,B...);
2974      * T fallback(A...,B...);
2975      * T adapter(A... a,B... b) {
2976      *   if (test(a...))
2977      *     return target(a..., b...);
2978      *   else
2979      *     return fallback(a..., b...);
2980      * }
2981      * }</pre></blockquote>
2982      * Note that the test arguments ({@code a...} in the pseudocode) cannot
2983      * be modified by execution of the test, and so are passed unchanged
2984      * from the caller to the target or fallback as appropriate.
2985      * @param test method handle used for test, must return boolean
2986      * @param target method handle to call if test passes
2987      * @param fallback method handle to call if test fails
2988      * @return method handle which incorporates the specified if/then/else logic
2989      * @throws NullPointerException if any argument is null
2990      * @throws IllegalArgumentException if {@code test} does not return boolean,
2991      *          or if all three method types do not match (with the return
2992      *          type of {@code test} changed to match that of the target).
2993      */
2994     public static
2995     MethodHandle guardWithTest(MethodHandle test,
2996                                MethodHandle target,
2997                                MethodHandle fallback) {
2998         MethodType gtype = test.type();
2999         MethodType ttype = target.type();
3000         MethodType ftype = fallback.type();
3001         if (!ttype.equals(ftype))
3002             throw misMatchedTypes("target and fallback types", ttype, ftype);
3003         if (gtype.returnType() != boolean.class)
3004             throw newIllegalArgumentException("guard type is not a predicate "+gtype);
3005         List<Class<?>> targs = ttype.parameterList();
3006         List<Class<?>> gargs = gtype.parameterList();
3007         if (!targs.equals(gargs)) {
3008             int gpc = gargs.size(), tpc = targs.size();
3009             if (gpc >= tpc || !targs.subList(0, gpc).equals(gargs))
3010                 throw misMatchedTypes("target and test types", ttype, gtype);
3011             test = dropArguments(test, gpc, targs.subList(gpc, tpc));
3012             gtype = test.type();
3013         }
3014         return MethodHandleImpl.makeGuardWithTest(test, target, fallback);
3015     }
3016 
3017     static RuntimeException misMatchedTypes(String what, MethodType t1, MethodType t2) {
3018         return newIllegalArgumentException(what + " must match: " + t1 + " != " + t2);
3019     }
3020 
3021     /**
3022      * Makes a method handle which adapts a target method handle,
3023      * by running it inside an exception handler.
3024      * If the target returns normally, the adapter returns that value.
3025      * If an exception matching the specified type is thrown, the fallback
3026      * handle is called instead on the exception, plus the original arguments.
3027      * <p>
3028      * The target and handler must have the same corresponding
3029      * argument and return types, except that handler may omit trailing arguments
3030      * (similarly to the predicate in {@link #guardWithTest guardWithTest}).
3031      * Also, the handler must have an extra leading parameter of {@code exType} or a supertype.
3032      * <p> Here is pseudocode for the resulting adapter:
3033      * <blockquote><pre>{@code
3034      * T target(A..., B...);
3035      * T handler(ExType, A...);
3036      * T adapter(A... a, B... b) {
3037      *   try {
3038      *     return target(a..., b...);
3039      *   } catch (ExType ex) {
3040      *     return handler(ex, a...);
3041      *   }
3042      * }
3043      * }</pre></blockquote>
3044      * Note that the saved arguments ({@code a...} in the pseudocode) cannot
3045      * be modified by execution of the target, and so are passed unchanged
3046      * from the caller to the handler, if the handler is invoked.
3047      * <p>
3048      * The target and handler must return the same type, even if the handler
3049      * always throws.  (This might happen, for instance, because the handler
3050      * is simulating a {@code finally} clause).
3051      * To create such a throwing handler, compose the handler creation logic
3052      * with {@link #throwException throwException},
3053      * in order to create a method handle of the correct return type.
3054      * @param target method handle to call
3055      * @param exType the type of exception which the handler will catch
3056      * @param handler method handle to call if a matching exception is thrown
3057      * @return method handle which incorporates the specified try/catch logic
3058      * @throws NullPointerException if any argument is null
3059      * @throws IllegalArgumentException if {@code handler} does not accept
3060      *          the given exception type, or if the method handle types do
3061      *          not match in their return types and their
3062      *          corresponding parameters
3063      */
3064     public static
3065     MethodHandle catchException(MethodHandle target,
3066                                 Class<? extends Throwable> exType,
3067                                 MethodHandle handler) {
3068         MethodType ttype = target.type();
3069         MethodType htype = handler.type();
3070         if (htype.parameterCount() < 1 ||
3071             !htype.parameterType(0).isAssignableFrom(exType))
3072             throw newIllegalArgumentException("handler does not accept exception type "+exType);
3073         if (htype.returnType() != ttype.returnType())
3074             throw misMatchedTypes("target and handler return types", ttype, htype);
3075         List<Class<?>> targs = ttype.parameterList();
3076         List<Class<?>> hargs = htype.parameterList();
3077         hargs = hargs.subList(1, hargs.size());  // omit leading parameter from handler
3078         if (!targs.equals(hargs)) {
3079             int hpc = hargs.size(), tpc = targs.size();
3080             if (hpc >= tpc || !targs.subList(0, hpc).equals(hargs))
3081                 throw misMatchedTypes("target and handler types", ttype, htype);
3082             handler = dropArguments(handler, 1+hpc, targs.subList(hpc, tpc));
3083             htype = handler.type();
3084         }
3085         return MethodHandleImpl.makeGuardWithCatch(target, exType, handler);
3086     }
3087 
3088     /**
3089      * Produces a method handle which will throw exceptions of the given {@code exType}.
3090      * The method handle will accept a single argument of {@code exType},
3091      * and immediately throw it as an exception.
3092      * The method type will nominally specify a return of {@code returnType}.
3093      * The return type may be anything convenient:  It doesn't matter to the
3094      * method handle's behavior, since it will never return normally.
3095      * @param returnType the return type of the desired method handle
3096      * @param exType the parameter type of the desired method handle
3097      * @return method handle which can throw the given exceptions
3098      * @throws NullPointerException if either argument is null
3099      */
3100     public static
3101     MethodHandle throwException(Class<?> returnType, Class<? extends Throwable> exType) {
3102         if (!Throwable.class.isAssignableFrom(exType))
3103             throw new ClassCastException(exType.getName());
3104         return MethodHandleImpl.throwException(MethodType.methodType(returnType, exType));
3105     }
3106 }