Welcome!

Java IoT Authors: Pat Romanski, Scott Allen, Liz McMillan, AppDynamics Blog, Elizabeth White

Related Topics: Java IoT

Java IoT: Article

Calling Java From C

A framework for easier JNI

Though most Java developers think of the Java Native Interface (JNI) as a framework for developing native libraries that can be called from Java, relatively few know that JNI also supports communication in the reverse direction: it provides native programs written in C with the ability to call Java objects. However, the coding is thorny; logic that can be coded readily in a few lines of Java requires several times more lines of C, thanks to JNI's granular programming model and peculiar approaches to exception handling and garbage collection. This article explores the nature and typical use of the C-to-Java JNI interface and presents the design of a framework that eases the programming effort.

The JNI Architecture
As Figure 1 illustrates, JNI is actually a pair of APIs:

  • "JNI Proper" supports the manipulation of Java objects and classes, such as the ability to call object methods.
  • The Invocation API is a smaller C library that enables C programs to create and destroy a Java Virtual Machine (JVM).
A C-to-Java program (that is, a C program that uses Java) calls the Invocation API to create a JVM, and calls JNI Proper to use Java objects. As for the Java-to-C direction (not discussed in this article), Java code calls a native method, which is implemented as a C native library function; the C code uses JNI to interpret its Java input types and build its Java output types.

The JVM is packaged as a shared library ("jvm.dll" in the Sun SDK on Windows platforms and "libjvm.so" on Solaris) and exposes JNI Proper and the Invocation API as public exports. As a runtime entity, a JVM is really just the JVM library linked to an executable C program. Any Java developer can code such a program, e.g., "myCtoJProgram.exe", shown in Figure 2. Interestingly, the famed SDK C program known as the "launcher" (java.exe on Windows, Java on Solaris) is written in just the same way (for more, see sidebar JNI Case Study: Java Launcher). Completing the picture are native libraries, such as "myNative.dll", whose functions can be called from Java; these libraries are linked to the runtime process alongside the JVM.

A C-to-Java JNI Design: The Zip Example
The launcher is the best-known example of a C program that uses the JNI's C-to-Java interface; its purpose is to house a JVM and bootstrap a Java application on the JVM by calling the application's main method. Other, less obvious examples are C programs that require functionality whose best or only implementation is Java objects that must be called "in process." Examples include programs that:

  • Create, extract, or list the contents of zip files. The Java SDK java.util.zip package is the most suitable API available.
  • Transform XML to XML, HTML, or PDF. Though C XML APIs exist, Java's support for XML is vastly superior. Launching a JVM to do XML with Java is a plausible strategy for a C program.
  • Call an Enterprise JavaBean (EJB). The C program uses JNI to execute standard EJB client-side logic.
The example of listing the contents of a zip file highlights the coding challenge of C-to-Java JNI. (Source code for this article can be downloaded from www.sys-con.com/java/sourcec.cfm.) The Java code to perform this logic, shown in Listing 1, is trivial: line 4 instantiates the class ZipFile in java.util.zip, passing the zip file name to the constructor; lines 5-9 loop over a java.util.Enumeration of java.util.zip.ZipEntry objects getting, in line 8, the name of each entry in the zip file.

Developing the equivalent logic in C requires hundreds of lines of code. The main steps are summarized in Table 1. Listing 2 shows the code for steps 7 and 8; the JNI calls in lines 5, 10, 15, and 21 are followed by calls in lines 7, 11, 16, and 22 to the checkException() function (implementation not shown), which in turn calls the JNI exception handling functions ExceptionCheck(), ExceptionDescribe(), and ExceptionClear() to swallow and report Java exceptions triggered by the JNI calls.

The C code in the zip example can be made easier and less cumbersome by using two design patterns:

  1. Java Proxy: Put the hard code where it belongs, on the Java side. Develop a Java object, called a proxy, that performs complex logic on behalf of the C code. The C code need only call the proxy.
  2. C Façade: Hide JNI's peculiar programming model in a C façade library. Have the C program call the façade rather than JNI directly. In addition, build proxy support into the façade; expose façade functions to call the proxy.
The proxy and façade constitute an abstract framework for use in any program resembling the zip program. Java proxies implement the interface shown in Listing 3; the execute() method is defined generically as accepting an input, performing some action or set of actions, and returning an output. Listing 4 shows the proxy implementation for the zip example. The execute() method expects as input a string specifying the name of the zip file (line 26); it implements logic similar to that in Listing 1 to enumerate the entries in the zip file (lines 26-33) and returns a string containing the name of the entries in a pipe-delimited list (see lines 30-32 and 35). The method could also have returned an array or Java collection type, but the calling C program is likely happier parsing a string than contending with JNI array or collection class iteration logic.

If the C zip program were to call the proxy using JNI directly, its length would be shorter but the complexity of JNI would remain. Using the façade reduces the length even further and shields the code from JNI oddities. A design for the façade is depicted in Figure 3. The façade consists of a set of data types, modeled as C structures, and a set of functions. The data types represent entities such as JVM (cjJVM_t), class (cjClass_t), method (cjMethod_t), and object (cjObject_t). The functions are operations performed on the entities (e.g., cjJVMConnect() and cjJVMDisconnect() performed on the JVM), and a special set of proxy operations. Table 2 describes and lists the JNI usage of each of the C functions.

Listing 5 is the complete source code of the C zip program that uses the proxy and façade. (Listing 5 can be downloaded from www.sys-con.com/java/sourcec.cfm.) The program launches a JVM (line 26), gets a reference to the proxy class (line 29), instantiates it (line 33), and calls the execute() method (line 36). The remaining code (lines 40-50) cleans up the proxy object and class and destroys the JVM.

Conclusion
Hosting the hard logic in a Java proxy and wrapping JNI calls to the proxy in a C façade reduces the complexity of C-to-Java programming with JNI.

References

  • "Java Native Interface Specification," Sun Microsystems: java.sun.com/j2se/1.5.0/guide/jni/spec/jniTOC.html
  • "Tutorial on JNI," Sun Microsystems: java.sun.com/docs/books/tutorial/native1.1/concepts/index.html

    SIDEBAR

    JNI Case Study: Java Launcher
    Every Java developer who uses the Sun SDK is grateful for the C program known as the launcher (its executable name is "java"), which uses the JNI Invocation API to create a JVM, load a Java class into the JVM, and call its main() method, thereby launching a Java application on behalf of the caller. If the launcher did not exist, a good C developer with JNI knowledge could write an equivalent program in less than a week.

    The launcher's source code is available from Sun and is packaged with the SDK (version 1.4.2_04, which can be downloaded from java.sun.com/j2se/1.4.2/download.html). In the base directory of the installed SDK is a file called src.zip. If you extract that file, the exploded "launcher" directory contains the four source files that constitute the launcher program: java.h, java.c, java_md.h, and java_md.c. The launcher's source code is unmistakably C: murky, idiomatic, and circuitous. On the other hand, the end result is a functional program that has been run successfully innumerable times by innumerable users. Understanding how it works is a case study in the use of JNI.

    Suppose there is a class called Hi in the package com.mike that has a public main() method and thus can be started as a Java application through the launcher. The following is the source code:

    
    1	package com.mike;
    2	
    3	Public class Hi
    4	{
    5	   public static void main(String args[])
    6	   {
    7	      ...
    8	   }
    9	}
    

    The Hi application is started under SDK 1.4.2_04 on Windows 2000 with the following commands:

    1 set JAVA_HOME=c:\j2sdk1.4.2_04
    2 set _JAVA_LAUNCHER_DEBUG=true
    3 %JAVA_HOME%\bin\java -classpath src -Xms32m -Xmx64m -Dmy.property=1 com.mike.Hi arg1 arg2

    Line 3 calls the launcher executable Java in the bin directory of my SDK (which, as line 1 indicates, is c:\j2sdk1.4.2_04). The arguments passed to the launcher are:

    • -classpath src: Look for my "Hi" class in the directory src.
    • -Xms32m: Set its minimum heap size to 32MB.
    • -Xmx64m: Set the maximum heap size to 64MB.
    • -Dmy.property=1: Make a property available to the application with the key my.property and value 1.
    • com.mike.Hi: Run the application in this class.
    • arg1 arg2: Pass arguments "arg1" and "arg2" to the application's main method.
    Line 2 sets an environment variable called _JAVA_LAUNCHER_DEBUG, which causes the launcher to generate debugging output to the console at runtime:

    
    1	----_JAVA_LAUNCHER_DEBUG----
    2	JRE path is c:\j2sdk1.4.2_04\jre
    3	jvm.cfg[0] = ->-client<-
    4	jvm.cfg[1] = ->-server<-
    5	jvm.cfg[2] = ->-hotspot<-
    6	jvm.cfg[3] = ->-classic<-
    7	jvm.cfg[4] = ->-native<-
    8	jvm.cfg[5] = ->-green<-
    9	1306 micro seconds to parse jvm.cfg
    10	JVM path is c:\j2sdk1.4.2_04\jre\bin\client\jvm.dll
    11	5571 micro seconds to LoadJavaVM
    12	JavaVM args:
    13	    version 0x00010002, ignoreUnrecognized is JNI_FALSE, nOptions is 6
    14	    option[ 0] = '-Djava.class.path=.'
    15	    option[ 1] = '-Djava.class.path=src'
    16	    option[ 2] = '-Xms32m'
    17	    option[ 3] = '-Xmx64m'
    18	    option[ 4] = '-Dmy.property=1'
    19	    option[ 5] = '-Dsun.java.command=com.mike.Hi arg1 arg2'
    20	125113 micro seconds to InitializeJVM
    21	Main-Class is 'com.mike.Hi'
    22	Apps' argc is 2
    23	    argv[ 0] = 'arg1'
    24	    argv[ 1] = 'arg2'
    25	32937 micro seconds to load main class
    26	----_JAVA_LAUNCHER_DEBUG----
    

    The launcher begins by finding the JRE (line 2) and the right JVM (lines 3-10), and then loads the JVM dynamically (line 11); as we'll see, this logic is platform dependent. In this case, because we didn't name a specific JVM when calling the launcher, the launcher defaults to "client" (more on this below). Lines 12-19 show the arguments that the launcher will pass to the JVM; these correspond to the arguments passed to the launcher. In line 20, the launcher starts the JVM. The class whose main method that launcher will call is given on line 21; the arguments passed to it are shown in lines 22-24.

    The launcher's logical design (as of version 1.4.2_04) is depicted in Figure 4.

    The launcher consists of two modules: java.c, which contains the main function of the launcher program as well as platform-independent helper functions, and java_md.c, which houses platform-specific functions. The modules share a bidirectional dependency: func-tions in java.c call java_md.c and vice versa; for example, main() in java.c calls CreateExecutionEnvironment() in java_md.c, which in turn calls ReadKnownVMs() in java.c.

    The source code in java_md.c is different for each SDK platform release. For example, the Windows SDK has the Windows version of java_md.c but does not have the Solaris version. If you want to see both (as I did as I was writing this article), you must download both releases.

    The main steps in the launcher's processing are the following:

    1.  Create the execution environment: The CreateExecutionEnvironment() function, implemented in java_md.c, is a platform-specific search for the JRE path, JVM path, and JVM type for use by the launcher. The Windows version looks up the JRE path in the registry (on my machine, the registry key HKEY_LOCAL_MACHINE\Software\JavaSoft\Java Runtime Edition\1.4\JavaHome is C:\Program Files\Java\j2re1.4.2_04), and then checks whether the JVM type selected by the caller (corresponding to "-client" or "-server" launcher command-line options) is one of the allowable types listed in the file JREPath\lib\Arch\jvm.cfg (on my machine "Arch" is "i386"). If the caller did not specify a JVM type, the launcher defaults to the first type listed in jvm.cfg (on my machine it's "client"). The JVM path on Windows is JREPath\bin\JVMType\jvm.dll (e.g., JREPath\bin\client\jvm.dll for the client JVM).

    2.  Load the JVM dynamically: Whereas most programs let the operating system implicitly link shared libraries to their processes, the launcher, which allows the user to specify at runtime which version of the JVM library to use (the "-client" or "-server" command-line arguments to the launcher), explicitly loads the JVM library using a platform-specific interface. The logic resides in java_md.c's LoadJavaVM() function. On Windows, this function calls the Win32 LoadLibrary() to load the JVM DLL and link it to the launcher process, and then calls the Win32 GetProcAddress() function to get a pointer to the invocation API function JNI_CreateJavaVM() used in step 4.

    3.  Prepare JVM runtime options based on command-line options passed to the launcher: Command-line options such as -D, -X, and -classpath are assembled into an array to be passed to the JVM. The launcher adds an additional property for use by the JVM of the form -Djava.sun.command=class arg1 arg2 ..., where class is the fully qualified name of the target class and "arg1 arg2 ..." is the list of command-line arguments to be passed to its main method.

    4.  Create the JVM: The launcher calls the JVM's JNI_Create-JavaVM() function, passing the options prepared above.

    5.  Load the target class into the JVM by calling the JNI FindClass() method: The launcher first replaces dots with slashes in the class name (e.g., it converts com.mike.Hi to com/mike/Hi) because the JVM expects slashes instead of dots.

    6.  Call the main method of the target class: First, the launcher gets a reference to the main() method by calling the JNI GetStaticMethodID() function, passing the class reference acquired in step 5, the method name ("main"), and the signature ("([Ljava/lang/String;)V", the JVM's peculiar representation of a void method that accepts an array of java.lang.String objects). Second, the launcher calls the method via CallStaticVoidMethod(). The launcher prepares the string array method input using some of the JNI's array functions (NewObjectArray(), SetObjectArrayElement()), and handles exceptions in the main method using JNI's ExceptionOccurred(), ExceptionDescribe(), and ExceptionClear().

    7.  Shutdown the JVM: This is done by calling the JNI DetachCurrent-Thread() and DestroyJavaVM() functions.

    A mystery to many Java developers, the launcher is nothing more than a little C program that uses the JNI to initiate a Java application.

  • More Stories By Michael Havey

    Michael Havey is a Chordiant consultant with 10 years of industry experience, mostly with application integration. Michael's book Essential Business Process Modeling was published by O'Reilly in August 2005.

    Comments (5) View Comments

    Share your thoughts on this story.

    Add your comment
    You must be signed in to add a comment. Sign-in | Register

    In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.


    Most Recent Comments
    Bubb 07/26/07 08:47:36 PM EDT

    I got file not found when I accessed
    www.sys-con.com/java/sourcec.cfm

    DHAYANITHI R 03/23/05 03:01:47 AM EST

    Hi,
    Your matirial is good, But still now I can't understand how i call java function from C. Can u give some model source code, it is very usefull for me

    Michael 10/13/04 09:30:30 AM EDT

    It is really great article!!
    Is it possible to run on the Unix?

    Thanks,
    Michael

    pete 09/22/04 04:02:15 AM EDT

    it indeed is a very nice article.it helped me a lot for my assignment

    Jesse Barnum 08/21/04 10:45:44 PM EDT

    Thanks for this tutorial - it's exactly what I've been looking for. Everything that I see on JNI is for calling C from Java - this article is the other way around, which is just what I need to do.

    @ThingsExpo Stories
    Cognitive Computing is becoming the foundation for a new generation of solutions that have the potential to transform business. Unlike traditional approaches to building solutions, a cognitive computing approach allows the data to help determine the way applications are designed. This contrasts with conventional software development that begins with defining logic based on the current way a business operates. In her session at 18th Cloud Expo, Judith S. Hurwitz, President and CEO of Hurwitz & ...
    With an estimated 50 billion devices connected to the Internet by 2020, several industries will begin to expand their capabilities for retaining end point data at the edge to better utilize the range of data types and sheer volume of M2M data generated by the Internet of Things. In his session at @ThingsExpo, Don DeLoach, CEO and President of Infobright, will discuss the infrastructures businesses will need to implement to handle this explosion of data by providing specific use cases for filte...
    SYS-CON Events announced today that VAI, a leading ERP software provider, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. VAI (Vormittag Associates, Inc.) is a leading independent mid-market ERP software developer renowned for its flexible solutions and ability to automate critical business functions for the distribution, manufacturing, specialty retail and service sectors. An IBM Premier Business Part...
    Fortunately, meaningful and tangible business cases for IoT are plentiful in a broad array of industries and vertical markets. These range from simple warranty cost reduction for capital intensive assets, to minimizing downtime for vital business tools, to creating feedback loops improving product design, to improving and enhancing enterprise customer experiences. All of these business cases, which will be briefly explored in this session, hinge on cost effectively extracting relevant data from ...
    SYS-CON Events announced today that Men & Mice, the leading global provider of DNS, DHCP and IP address management overlay solutions, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. The Men & Mice Suite overlay solution is already known for its powerful application in heterogeneous operating environments, enabling enterprises to scale without fuss. Building on a solid range of diverse platform support,...
    As enterprises work to take advantage of Big Data technologies, they frequently become distracted by product-level decisions. In most new Big Data builds this approach is completely counter-productive: it presupposes tools that may not be a fit for development teams, forces IT to take on the burden of evaluating and maintaining unfamiliar technology, and represents a major up-front expense. In his session at @BigDataExpo at @ThingsExpo, Andrew Warfield, CTO and Co-Founder of Coho Data, will dis...
    SYS-CON Events announced today that iDevices®, the preeminent brand in the connected home industry, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. iDevices, the preeminent brand in the connected home industry, has a growing line of HomeKit-enabled products available at the largest retailers worldwide. Through the “Designed with iDevices” co-development program and its custom-built IoT Cloud Infrastruc...
    SYS-CON Events announced today that Pythian, a global IT services company specializing in helping companies adopt disruptive technologies to optimize revenue-generating systems, has been named “Bronze Sponsor” of SYS-CON's 18th Cloud Expo, which will take place on June 7-9, 2015 at the Javits Center in New York, New York. Founded in 1997, Pythian is a global IT services company that helps companies compete by adopting disruptive technologies such as cloud, Big Data, advanced analytics, and DevO...
    SYS-CON Events announced today that Alert Logic, Inc., the leading provider of Security-as-a-Service solutions for the cloud, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Alert Logic, Inc., provides Security-as-a-Service for on-premises, cloud, and hybrid infrastructures, delivering deep security insight and continuous protection for customers at a lower cost than traditional security solutions. Ful...
    SYS-CON Events announced today that Interoute, owner-operator of one of Europe's largest networks and a global cloud services platform, has been named “Bronze Sponsor” of SYS-CON's 18th Cloud Expo, which will take place on June 7-9, 2015 at the Javits Center in New York, New York. Interoute is the owner-operator of one of Europe's largest networks and a global cloud services platform which encompasses 12 data centers, 14 virtual data centers and 31 colocation centers, with connections to 195 ad...
    SYS-CON Events announced today that Commvault, a global leader in enterprise data protection and information management, has been named “Bronze Sponsor” of SYS-CON's 18th International Cloud Expo, which will take place on June 7–9, 2016, at the Javits Center in New York City, NY, and the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Commvault is a leading provider of data protection and information management...
    Eighty percent of a data scientist’s time is spent gathering and cleaning up data, and 80% of all data is unstructured and almost never analyzed. Cognitive computing, in combination with Big Data, is changing the equation by creating data reservoirs and using natural language processing to enable analysis of unstructured data sources. This is impacting every aspect of the analytics profession from how data is mined (and by whom) to how it is delivered. This is not some futuristic vision: it's ha...
    With the Apple Watch making its way onto wrists all over the world, it’s only a matter of time before it becomes a staple in the workplace. In fact, Forrester reported that 68 percent of technology and business decision-makers characterize wearables as a top priority for 2015. Recognizing their business value early on, FinancialForce.com was the first to bring ERP to wearables, helping streamline communication across front and back office functions. In his session at @ThingsExpo, Kevin Roberts...
    One of the bewildering things about DevOps is integrating the massive toolchain including the dozens of new tools that seem to crop up every year. Part of DevOps is Continuous Delivery and having a complex toolchain can add additional integration and setup to your developer environment. In his session at @DevOpsSummit at 18th Cloud Expo, Miko Matsumura, Chief Marketing Officer of Gradle Inc., will discuss which tools to use in a developer stack, how to provision the toolchain to minimize onboa...
    The cloud promises new levels of agility and cost-savings for Big Data, data warehousing and analytics. But it’s challenging to understand all the options – from IaaS and PaaS to newer services like HaaS (Hadoop as a Service) and BDaaS (Big Data as a Service). In her session at @BigDataExpo at @ThingsExpo, Hannah Smalltree, a director at Cazena, will provide an educational overview of emerging “as-a-service” options for Big Data in the cloud. This is critical background for IT and data profes...
    Silver Spring Networks, Inc. (NYSE: SSNI) extended its Internet of Things technology platform with performance enhancements to Gen5 – its fifth generation critical infrastructure networking platform. Already delivering nearly 23 million devices on five continents as one of the leading networking providers in the market, Silver Spring announced it is doubling the maximum speed of its Gen5 network to up to 2.4 Mbps, increasing computational performance by 10x, supporting simultaneous mesh communic...
    SYS-CON Events announced today that Fusion, a leading provider of cloud services, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Fusion, a leading provider of integrated cloud solutions to small, medium and large businesses, is the industry's single source for the cloud. Fusion's advanced, proprietary cloud service platform enables the integration of leading edge solutions in the cloud, including clou...
    Most people haven’t heard the word, “gamification,” even though they probably, and perhaps unwittingly, participate in it every day. Gamification is “the process of adding games or game-like elements to something (as a task) so as to encourage participation.” Further, gamification is about bringing game mechanics – rules, constructs, processes, and methods – into the real world in an effort to engage people. In his session at @ThingsExpo, Robert Endo, owner and engagement manager of Intrepid D...
    WebRTC has had a real tough three or four years, and so have those working with it. Only a few short years ago, the development world were excited about WebRTC and proclaiming how awesome it was. You might have played with the technology a couple of years ago, only to find the extra infrastructure requirements were painful to implement and poorly documented. This probably left a bitter taste in your mouth, especially when things went wrong.
    Learn how IoT, cloud, social networks and last but not least, humans, can be integrated into a seamless integration of cooperative organisms both cybernetic and biological. This has been enabled by recent advances in IoT device capabilities, messaging frameworks, presence and collaboration services, where devices can share information and make independent and human assisted decisions based upon social status from other entities. In his session at @ThingsExpo, Michael Heydt, founder of Seamless...