[aarch64-port-dev ] hg: aarch64-port/jdk8u/hotspot: 8157306: Random infrequent null pointer exceptions in javac

Andrew Hughes gnu.andrew at redhat.com
Wed Aug 10 16:02:10 UTC 2016


snip...
> 
> > I don't think this is a bad thing, but I would appreciate some
> > clarification on what is appropriate for this tree. As a case in
> > point, Zero is broken (crashes on -version) in this tree and will
> > remain so until we pick up 8154210 from 8u112, probably in early
> > November after the October CPU. Is this to be expected, or should we
> > consider including such fixes which cause major runtime crashes?
> 
> Do you not mean including such fixes to major runtime crashes?
> 

Yes, sorry, bad phrasing.

> But importing critical fixes already in jdk8u is OK, I think.  I guess
> we must already be patching this in the packages we ship from Red Hat.
> 
> Andrew.
> 

We are. So far I've stuck to just importing the current upstream release
from 8u (currently 8u102 waiting for review [0]). We could widen that to
cherry-pick certain fixes from 8u that we believe are critical enough to
not wait until they are included in the upstream release.

The Red Hat packages currently include the following fixes from future
releases:

# Patches upstream and appearing in 8u111                                                                                      
# S8159244, PR3074: Partially initialized string object created by C2's string concat optimization may escape                  
Patch527: 8159244-pr3074.patch

# Patches upstream and appearing in 8u112                                                                                      
# S8044762, PR2960: com/sun/jdi/OptionTest.java test time out                                                                  
Patch521: 8044762-pr2960.patch
# S8049226, PR2960: com/sun/jdi/OptionTest.java test times out again                                                           
Patch522: 8049226-pr2960.patch
# 8154210: Zero: Better byte behaviour                                                                                         
Patch606: 8154210.patch
# S8158260, PR2991, RH1341258: JVM on PPC64 LE crashes due to an illegal instruction in JITed code                             
Patch524: 8158260-pr2991-rh1341258.patch

[0] http://mail.openjdk.java.net/pipermail/aarch64-port-dev/2016-August/003711.html
-- 
Andrew :)

Senior Free Java Software Engineer
Red Hat, Inc. (http://www.redhat.com)

PGP Key: ed25519/35964222 (hkp://keys.gnupg.net)
Fingerprint = 5132 579D D154 0ED2 3E04  C5A0 CFDA 0F9B 3596 4222




More information about the aarch64-port-dev mailing list