/hg/release/icedtea6-1.13: 2 new changesets
andrew at icedtea.classpath.org
andrew at icedtea.classpath.org
Fri Oct 24 17:45:48 UTC 2014
changeset b151eb4fe5bc in /hg/release/icedtea6-1.13
details: http://icedtea.classpath.org/hg/release/icedtea6-1.13?cmd=changeset;node=b151eb4fe5bc
author: Andrew John Hughes <gnu.andrew at redhat.com>
date: Fri Oct 24 17:59:53 2014 +0100
S7122142, RH1151372: (ann) Race condition between isAnnotationPresent and getAnnotations
S7161796, RH1151372: PhaseStringOpts::fetch_static_field tries to fetch field from the Klass instead of the mirror
2014-10-24 Andrew John Hughes <gnu.andrew at redhat.com>
* Makefile.am:
(ICEDTEA_PATCHES): Add new patches.
* NEWS: Updated.
* patches/openjdk/7122142-annotation_race_condition.patch:
Backport fix for annotation race condition.
* patches/openjdk/7161796-wrong_fetch_in_fetch_static_field.patch:
Fix for HotSpot bug hit by 7122142.
changeset 766bf00e3bf2 in /hg/release/icedtea6-1.13
details: http://icedtea.classpath.org/hg/release/icedtea6-1.13?cmd=changeset;node=766bf00e3bf2
author: Andrew John Hughes <gnu.andrew at redhat.com>
date: Fri Oct 24 18:45:33 2014 +0100
S8000897, RH1155012: VM crash in CompileBroker
2014-10-24 Andrew John Hughes <gnu.andrew at redhat.com>
* Makefile.am,
(ICEDTEA_PATCHES): Add new patch.
* NEWS: Updated.
* patches/openjdk/8000897-use_corresponding_digest_length.patch:
Fix for SHA-2 bug discovered in RH1155012.
diffstat:
ChangeLog | 18 +
Makefile.am | 5 +-
NEWS | 4 +
patches/openjdk/7122142-annotation_race_condition.patch | 1955 ++++++++++
patches/openjdk/7161796-wrong_fetch_in_fetch_static_field.patch | 40 +
patches/openjdk/8000897-use_corresponding_digest_length.patch | 29 +
6 files changed, 2050 insertions(+), 1 deletions(-)
diffs (truncated from 2090 to 500 lines):
diff -r 2590e85d1b00 -r 766bf00e3bf2 ChangeLog
--- a/ChangeLog Wed Oct 15 23:22:58 2014 +0100
+++ b/ChangeLog Fri Oct 24 18:45:33 2014 +0100
@@ -1,3 +1,21 @@
+2014-10-24 Andrew John Hughes <gnu.andrew at redhat.com>
+
+ * Makefile.am,
+ (ICEDTEA_PATCHES): Add new patch.
+ * NEWS: Updated.
+ * patches/openjdk/8000897-use_corresponding_digest_length.patch:
+ Fix for SHA-2 bug discovered in RH1155012.
+
+2014-10-24 Andrew John Hughes <gnu.andrew at redhat.com>
+
+ * Makefile.am:
+ (ICEDTEA_PATCHES): Add new patches.
+ * NEWS: Updated.
+ * patches/openjdk/7122142-annotation_race_condition.patch:
+ Backport fix for annotation race condition.
+ * patches/openjdk/7161796-wrong_fetch_in_fetch_static_field.patch:
+ Fix for HotSpot bug hit by 7122142.
+
2014-10-15 Andrew John Hughes <gnu.andrew at redhat.com>
PR2033: patches/ecj/jaxws-getdtdtype.patch no
diff -r 2590e85d1b00 -r 766bf00e3bf2 Makefile.am
--- a/Makefile.am Wed Oct 15 23:22:58 2014 +0100
+++ b/Makefile.am Fri Oct 24 18:45:33 2014 +0100
@@ -617,7 +617,10 @@
patches/openjdk/8006935-long_keys_in_hmac_prf.patch \
patches/openjdk/7106773-512_bits_rsa.patch \
patches/pr1904-icedtea_and_distro_versioning.patch \
- patches/openjdk/8017173-xml_cipher_rsa_oaep_cant_be_instantiated.patch
+ patches/openjdk/8017173-xml_cipher_rsa_oaep_cant_be_instantiated.patch \
+ patches/openjdk/7122142-annotation_race_condition.patch \
+ patches/openjdk/7161796-wrong_fetch_in_fetch_static_field.patch \
+ patches/openjdk/8000897-use_corresponding_digest_length.patch
if WITH_RHINO
ICEDTEA_PATCHES += \
diff -r 2590e85d1b00 -r 766bf00e3bf2 NEWS
--- a/NEWS Wed Oct 15 23:22:58 2014 +0100
+++ b/NEWS Fri Oct 24 18:45:33 2014 +0100
@@ -14,6 +14,10 @@
New in release 1.13.6 (2015-01-XX):
+* Backports
+ - S7122142, RH1151372: (ann) Race condition between isAnnotationPresent and getAnnotations
+ - S7161796, RH1151372: PhaseStringOpts::fetch_static_field tries to fetch field from the Klass instead of the mirror
+ - S8000897, RH1155012: VM crash in CompileBroker
* Bug fixes
- PR2033: patches/ecj/jaxws-getdtdtype.patch no longer applies since removal of JAXWS drop
diff -r 2590e85d1b00 -r 766bf00e3bf2 patches/openjdk/7122142-annotation_race_condition.patch
--- /dev/null Thu Jan 01 00:00:00 1970 +0000
+++ b/patches/openjdk/7122142-annotation_race_condition.patch Fri Oct 24 18:45:33 2014 +0100
@@ -0,0 +1,1955 @@
+diff -Nru openjdk.orig/jdk/src/share/classes/java/lang/Class.java openjdk/jdk/src/share/classes/java/lang/Class.java
+--- openjdk.orig/jdk/src/share/classes/java/lang/Class.java 2014-10-14 22:40:53.675702174 +0100
++++ openjdk/jdk/src/share/classes/java/lang/Class.java 2014-10-23 21:50:17.185342994 +0100
+@@ -1,5 +1,5 @@
+ /*
+- * Copyright (c) 1994, 2012, Oracle and/or its affiliates. All rights reserved.
++ * Copyright (c) 1994, 2014, Oracle and/or its affiliates. All rights reserved.
+ * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
+ *
+ * This code is free software; you can redistribute it and/or modify it
+@@ -275,7 +275,7 @@
+ }
+
+ /** Called after security check for system loader access checks have been made. */
+- private static native Class forName0(String name, boolean initialize,
++ private static native Class<?> forName0(String name, boolean initialize,
+ ClassLoader loader,
+ Class<?> caller)
+ throws ClassNotFoundException;
+@@ -346,15 +346,15 @@
+ );
+ }
+ try {
+- Class[] empty = {};
++ Class<?>[] empty = {};
+ final Constructor<T> c = getConstructor0(empty, Member.DECLARED);
+ // Disable accessibility checks on the constructor
+ // since we have to do the security check here anyway
+ // (the stack depth is wrong for the Constructor's
+ // security check to work)
+- java.security.AccessController.doPrivileged
+- (new java.security.PrivilegedAction() {
+- public Object run() {
++ java.security.AccessController.doPrivileged(
++ new java.security.PrivilegedAction<Void>() {
++ public Void run() {
+ c.setAccessible(true);
+ return null;
+ }
+@@ -384,7 +384,7 @@
+ }
+ }
+ private volatile transient Constructor<T> cachedConstructor;
+- private volatile transient Class newInstanceCallerCache;
++ private volatile transient Class<?> newInstanceCallerCache;
+
+
+ /**
+@@ -642,7 +642,7 @@
+ if (getGenericSignature() != null)
+ return (TypeVariable<Class<T>>[])getGenericInfo().getTypeParameters();
+ else
+- return (TypeVariable<Class<T>>[])new TypeVariable[0];
++ return (TypeVariable<Class<T>>[])new TypeVariable<?>[0];
+ }
+
+
+@@ -906,7 +906,7 @@
+
+ MethodRepository typeInfo = MethodRepository.make(enclosingInfo.getDescriptor(),
+ getFactory());
+- Class returnType = toClass(typeInfo.getReturnType());
++ Class<?> returnType = toClass(typeInfo.getReturnType());
+ Type [] parameterTypes = typeInfo.getParameterTypes();
+ Class<?>[] parameterClasses = new Class<?>[parameterTypes.length];
+
+@@ -1010,12 +1010,12 @@
+
+ }
+
+- private static Class toClass(Type o) {
++ private static Class<?> toClass(Type o) {
+ if (o instanceof GenericArrayType)
+ return Array.newInstance(toClass(((GenericArrayType)o).getGenericComponentType()),
+ 0)
+ .getClass();
+- return (Class)o;
++ return (Class<?>)o;
+ }
+
+ /**
+@@ -1345,13 +1345,13 @@
+ // out anything other than public members and (2) public member access
+ // has already been ok'd by the SecurityManager.
+
+- Class[] result = (Class[]) java.security.AccessController.doPrivileged
+- (new java.security.PrivilegedAction() {
+- public Object run() {
+- java.util.List<Class> list = new java.util.ArrayList();
+- Class currentClass = Class.this;
++ return java.security.AccessController.doPrivileged(
++ new java.security.PrivilegedAction<Class<?>[]>() {
++ public Class[] run() {
++ List<Class<?>> list = new ArrayList<Class<?>>();
++ Class<?> currentClass = Class.this;
+ while (currentClass != null) {
+- Class[] members = currentClass.getDeclaredClasses();
++ Class<?>[] members = currentClass.getDeclaredClasses();
+ for (int i = 0; i < members.length; i++) {
+ if (Modifier.isPublic(members[i].getModifiers())) {
+ list.add(members[i]);
+@@ -1359,12 +1359,9 @@
+ }
+ currentClass = currentClass.getSuperclass();
+ }
+- Class[] empty = {};
+- return list.toArray(empty);
++ return list.toArray(new Class[0]);
+ }
+ });
+-
+- return result;
+ }
+
+
+@@ -2288,7 +2285,7 @@
+ return name;
+ }
+ if (!name.startsWith("/")) {
+- Class c = this;
++ Class<?> c = this;
+ while (c.isArray()) {
+ c = c.getComponentType();
+ }
+@@ -2305,44 +2302,111 @@
+ }
+
+ /**
++ * Atomic operations support.
++ */
++ private static class Atomic {
++ // initialize Unsafe machinery here, since we need to call Class.class instance method
++ // and have to avoid calling it in the static initializer of the Class class...
++ private static final Unsafe unsafe = Unsafe.getUnsafe();
++ // offset of Class.reflectionData instance field
++ private static final long reflectionDataOffset;
++ // offset of Class.annotationType instance field
++ private static final long annotationTypeOffset;
++
++ static {
++ Field[] fields = Class.class.getDeclaredFields0(false); // bypass caches
++ reflectionDataOffset = objectFieldOffset(fields, "reflectionData");
++ annotationTypeOffset = objectFieldOffset(fields, "annotationType");
++ }
++
++ private static long objectFieldOffset(Field[] fields, String fieldName) {
++ Field field = searchFields(fields, fieldName);
++ if (field == null) {
++ throw new Error("No " + fieldName + " field found in java.lang.Class");
++ }
++ return unsafe.objectFieldOffset(field);
++ }
++
++ static <T> boolean casReflectionData(Class<?> clazz,
++ SoftReference<ReflectionData<T>> oldData,
++ SoftReference<ReflectionData<T>> newData) {
++ return unsafe.compareAndSwapObject(clazz, reflectionDataOffset, oldData, newData);
++ }
++
++ static <T> boolean casAnnotationType(Class<?> clazz,
++ AnnotationType oldType,
++ AnnotationType newType) {
++ return unsafe.compareAndSwapObject(clazz, annotationTypeOffset, oldType, newType);
++ }
++ }
++
++ /**
+ * Reflection support.
+ */
+
+ // Caches for certain reflective results
+ private static boolean useCaches = true;
+- private volatile transient SoftReference declaredFields;
+- private volatile transient SoftReference publicFields;
+- private volatile transient SoftReference declaredMethods;
+- private volatile transient SoftReference publicMethods;
+- private volatile transient SoftReference declaredConstructors;
+- private volatile transient SoftReference publicConstructors;
+- // Intermediate results for getFields and getMethods
+- private volatile transient SoftReference declaredPublicFields;
+- private volatile transient SoftReference declaredPublicMethods;
++
++ // reflection data that might get invalidated when JVM TI RedefineClasses() is called
++ static class ReflectionData<T> {
++ volatile Field[] declaredFields;
++ volatile Field[] publicFields;
++ volatile Method[] declaredMethods;
++ volatile Method[] publicMethods;
++ volatile Constructor<T>[] declaredConstructors;
++ volatile Constructor<T>[] publicConstructors;
++ // Intermediate results for getFields and getMethods
++ volatile Field[] declaredPublicFields;
++ volatile Method[] declaredPublicMethods;
++ // Value of classRedefinedCount when we created this ReflectionData instance
++ final int redefinedCount;
++
++ ReflectionData(int redefinedCount) {
++ this.redefinedCount = redefinedCount;
++ }
++ }
++
++ private volatile transient SoftReference<ReflectionData<T>> reflectionData;
+
+ // Incremented by the VM on each call to JVM TI RedefineClasses()
+ // that redefines this class or a superclass.
+ private volatile transient int classRedefinedCount = 0;
+
+- // Value of classRedefinedCount when we last cleared the cached values
+- // that are sensitive to class redefinition.
+- private volatile transient int lastRedefinedCount = 0;
+-
+- // Clears cached values that might possibly have been obsoleted by
+- // a class redefinition.
+- private void clearCachesOnClassRedefinition() {
+- if (lastRedefinedCount != classRedefinedCount) {
+- declaredFields = publicFields = declaredPublicFields = null;
+- declaredMethods = publicMethods = declaredPublicMethods = null;
+- declaredConstructors = publicConstructors = null;
+- annotations = declaredAnnotations = null;
+-
+- // Use of "volatile" (and synchronization by caller in the case
+- // of annotations) ensures that no thread sees the update to
+- // lastRedefinedCount before seeing the caches cleared.
+- // We do not guard against brief windows during which multiple
+- // threads might redundantly work to fill an empty cache.
+- lastRedefinedCount = classRedefinedCount;
++ // Lazily create and cache ReflectionData
++ private ReflectionData<T> reflectionData() {
++ SoftReference<ReflectionData<T>> reflectionData = this.reflectionData;
++ int classRedefinedCount = this.classRedefinedCount;
++ ReflectionData<T> rd;
++ if (useCaches &&
++ reflectionData != null &&
++ (rd = reflectionData.get()) != null &&
++ rd.redefinedCount == classRedefinedCount) {
++ return rd;
++ }
++ // else no SoftReference or cleared SoftReference or stale ReflectionData
++ // -> create and replace new instance
++ return newReflectionData(reflectionData, classRedefinedCount);
++ }
++
++ private ReflectionData<T> newReflectionData(SoftReference<ReflectionData<T>> oldReflectionData,
++ int classRedefinedCount) {
++ if (!useCaches) return null;
++
++ while (true) {
++ ReflectionData<T> rd = new ReflectionData<T>(classRedefinedCount);
++ // try to CAS it...
++ if (Atomic.casReflectionData(this, oldReflectionData,
++ new SoftReference<ReflectionData<T>>(rd))) {
++ return rd;
++ }
++ // else retry
++ oldReflectionData = this.reflectionData;
++ classRedefinedCount = this.classRedefinedCount;
++ if (oldReflectionData != null &&
++ (rd = oldReflectionData.get()) != null &&
++ rd.redefinedCount == classRedefinedCount) {
++ return rd;
++ }
+ }
+ }
+
+@@ -2370,7 +2434,7 @@
+ }
+
+ // Annotations handling
+- private native byte[] getRawAnnotations();
++ native byte[] getRawAnnotations();
+
+ native ConstantPool getConstantPool();
+
+@@ -2385,27 +2449,19 @@
+ // via ReflectionFactory.copyField.
+ private Field[] privateGetDeclaredFields(boolean publicOnly) {
+ checkInitted();
+- Field[] res = null;
+- if (useCaches) {
+- clearCachesOnClassRedefinition();
+- if (publicOnly) {
+- if (declaredPublicFields != null) {
+- res = (Field[]) declaredPublicFields.get();
+- }
+- } else {
+- if (declaredFields != null) {
+- res = (Field[]) declaredFields.get();
+- }
+- }
++ Field[] res;
++ ReflectionData<T> rd = reflectionData();
++ if (rd != null) {
++ res = publicOnly ? rd.declaredPublicFields : rd.declaredFields;
+ if (res != null) return res;
+ }
+ // No cached value available; request value from VM
+ res = Reflection.filterFields(this, getDeclaredFields0(publicOnly));
+- if (useCaches) {
++ if (rd != null) {
+ if (publicOnly) {
+- declaredPublicFields = new SoftReference(res);
++ rd.declaredPublicFields = res;
+ } else {
+- declaredFields = new SoftReference(res);
++ rd.declaredFields = res;
+ }
+ }
+ return res;
+@@ -2414,22 +2470,20 @@
+ // Returns an array of "root" fields. These Field objects must NOT
+ // be propagated to the outside world, but must instead be copied
+ // via ReflectionFactory.copyField.
+- private Field[] privateGetPublicFields(Set traversedInterfaces) {
++ private Field[] privateGetPublicFields(Set<Class<?>> traversedInterfaces) {
+ checkInitted();
+- Field[] res = null;
+- if (useCaches) {
+- clearCachesOnClassRedefinition();
+- if (publicFields != null) {
+- res = (Field[]) publicFields.get();
+- }
++ Field[] res;
++ ReflectionData<T> rd = reflectionData();
++ if (rd != null) {
++ res = rd.publicFields;
+ if (res != null) return res;
+ }
+
+ // No cached value available; compute value recursively.
+ // Traverse in correct order for getField().
+- List fields = new ArrayList();
++ List<Field> fields = new ArrayList<Field>();
+ if (traversedInterfaces == null) {
+- traversedInterfaces = new HashSet();
++ traversedInterfaces = new HashSet<Class<?>>();
+ }
+
+ // Local fields
+@@ -2437,9 +2491,7 @@
+ addAll(fields, tmp);
+
+ // Direct superinterfaces, recursively
+- Class[] interfaces = getInterfaces();
+- for (int i = 0; i < interfaces.length; i++) {
+- Class c = interfaces[i];
++ for (Class<?> c : getInterfaces()) {
+ if (!traversedInterfaces.contains(c)) {
+ traversedInterfaces.add(c);
+ addAll(fields, c.privateGetPublicFields(traversedInterfaces));
+@@ -2448,7 +2500,7 @@
+
+ // Direct superclass, recursively
+ if (!isInterface()) {
+- Class c = getSuperclass();
++ Class<?> c = getSuperclass();
+ if (c != null) {
+ addAll(fields, c.privateGetPublicFields(traversedInterfaces));
+ }
+@@ -2456,13 +2508,13 @@
+
+ res = new Field[fields.size()];
+ fields.toArray(res);
+- if (useCaches) {
+- publicFields = new SoftReference(res);
++ if (rd != null) {
++ rd.publicFields = res;
+ }
+ return res;
+ }
+
+- private static void addAll(Collection c, Field[] o) {
++ private static void addAll(Collection<Field> c, Field[] o) {
+ for (int i = 0; i < o.length; i++) {
+ c.add(o[i]);
+ }
+@@ -2478,20 +2530,12 @@
+ // Returns an array of "root" constructors. These Constructor
+ // objects must NOT be propagated to the outside world, but must
+ // instead be copied via ReflectionFactory.copyConstructor.
+- private Constructor[] privateGetDeclaredConstructors(boolean publicOnly) {
++ private Constructor<T>[] privateGetDeclaredConstructors(boolean publicOnly) {
+ checkInitted();
+- Constructor[] res = null;
+- if (useCaches) {
+- clearCachesOnClassRedefinition();
+- if (publicOnly) {
+- if (publicConstructors != null) {
+- res = (Constructor[]) publicConstructors.get();
+- }
+- } else {
+- if (declaredConstructors != null) {
+- res = (Constructor[]) declaredConstructors.get();
+- }
+- }
++ Constructor<T>[] res;
++ ReflectionData<T> rd = reflectionData();
++ if (rd != null) {
++ res = publicOnly ? rd.publicConstructors : rd.declaredConstructors;
+ if (res != null) return res;
+ }
+ // No cached value available; request value from VM
+@@ -2500,11 +2544,11 @@
+ } else {
+ res = getDeclaredConstructors0(publicOnly);
+ }
+- if (useCaches) {
++ if (rd != null) {
+ if (publicOnly) {
+- publicConstructors = new SoftReference(res);
++ rd.publicConstructors = res;
+ } else {
+- declaredConstructors = new SoftReference(res);
++ rd.declaredConstructors = res;
+ }
+ }
+ return res;
+@@ -2521,27 +2565,19 @@
+ // via ReflectionFactory.copyMethod.
+ private Method[] privateGetDeclaredMethods(boolean publicOnly) {
+ checkInitted();
+- Method[] res = null;
+- if (useCaches) {
+- clearCachesOnClassRedefinition();
+- if (publicOnly) {
+- if (declaredPublicMethods != null) {
+- res = (Method[]) declaredPublicMethods.get();
+- }
+- } else {
+- if (declaredMethods != null) {
+- res = (Method[]) declaredMethods.get();
+- }
+- }
++ Method[] res;
++ ReflectionData<T> rd = reflectionData();
++ if (rd != null) {
++ res = publicOnly ? rd.declaredPublicMethods : rd.declaredMethods;
+ if (res != null) return res;
+ }
+ // No cached value available; request value from VM
+ res = Reflection.filterMethods(this, getDeclaredMethods0(publicOnly));
+- if (useCaches) {
++ if (rd != null) {
More information about the distro-pkg-dev
mailing list