268 |
|
* Table accesses require volatile/atomic reads, writes, and |
269 |
|
* CASes. Because there is no other way to arrange this without |
270 |
|
* adding further indirections, we use intrinsics |
271 |
< |
* (sun.misc.Unsafe) operations. |
271 |
> |
* (jdk.internal.misc.Unsafe) operations. |
272 |
|
* |
273 |
|
* We use the top (sign) bit of Node hash fields for control |
274 |
|
* purposes -- it is available anyway because of addressing |
3266 |
|
return true; |
3267 |
|
} |
3268 |
|
|
3269 |
< |
private static final sun.misc.Unsafe U = sun.misc.Unsafe.getUnsafe(); |
3269 |
> |
private static final jdk.internal.misc.Unsafe U = jdk.internal.misc.Unsafe.getUnsafe(); |
3270 |
|
private static final long LOCKSTATE; |
3271 |
|
static { |
3272 |
|
try { |
6309 |
|
} |
6310 |
|
|
6311 |
|
// Unsafe mechanics |
6312 |
< |
private static final sun.misc.Unsafe U = sun.misc.Unsafe.getUnsafe(); |
6312 |
> |
private static final jdk.internal.misc.Unsafe U = jdk.internal.misc.Unsafe.getUnsafe(); |
6313 |
|
private static final long SIZECTL; |
6314 |
|
private static final long TRANSFERINDEX; |
6315 |
|
private static final long BASECOUNT; |