Intrinsic methods and time to safepoint

Florian Weimer fweimer at redhat.com
Thu Sep 16 12:30:21 UTC 2021


* Roland Westrelin:

> 2) would seem much easier to implement and would work for both c1 and c2
> (if some of these intrinsics end up implemented by c1).

I think this has been done for some critical native JNI functions in the
past (the CRC code?).

Thanks,
Florian



More information about the hotspot-dev mailing list