/hg/release/icedtea6-1.13: 2 new changesets

andrew at icedtea.classpath.org andrew at icedtea.classpath.org
Fri Oct 24 17:45:48 UTC 2014


changeset b151eb4fe5bc in /hg/release/icedtea6-1.13
details: http://icedtea.classpath.org/hg/release/icedtea6-1.13?cmd=changeset;node=b151eb4fe5bc
author: Andrew John Hughes <gnu.andrew at redhat.com>
date: Fri Oct 24 17:59:53 2014 +0100

	S7122142, RH1151372: (ann) Race condition between isAnnotationPresent and getAnnotations
	S7161796, RH1151372: PhaseStringOpts::fetch_static_field tries to fetch field from the Klass instead of the mirror

	2014-10-24  Andrew John Hughes  <gnu.andrew at redhat.com>

		* Makefile.am:
		(ICEDTEA_PATCHES): Add new patches.
		* NEWS: Updated.
		* patches/openjdk/7122142-annotation_race_condition.patch:
		Backport fix for annotation race condition.
		* patches/openjdk/7161796-wrong_fetch_in_fetch_static_field.patch:
		Fix for HotSpot bug hit by 7122142.


changeset 766bf00e3bf2 in /hg/release/icedtea6-1.13
details: http://icedtea.classpath.org/hg/release/icedtea6-1.13?cmd=changeset;node=766bf00e3bf2
author: Andrew John Hughes <gnu.andrew at redhat.com>
date: Fri Oct 24 18:45:33 2014 +0100

	S8000897, RH1155012: VM crash in CompileBroker

	2014-10-24  Andrew John Hughes  <gnu.andrew at redhat.com>

		* Makefile.am,
		(ICEDTEA_PATCHES): Add new patch.
		* NEWS: Updated.
		* patches/openjdk/8000897-use_corresponding_digest_length.patch:
		Fix for SHA-2 bug discovered in RH1155012.


diffstat:

 ChangeLog                                                       |    18 +
 Makefile.am                                                     |     5 +-
 NEWS                                                            |     4 +
 patches/openjdk/7122142-annotation_race_condition.patch         |  1955 ++++++++++
 patches/openjdk/7161796-wrong_fetch_in_fetch_static_field.patch |    40 +
 patches/openjdk/8000897-use_corresponding_digest_length.patch   |    29 +
 6 files changed, 2050 insertions(+), 1 deletions(-)

diffs (truncated from 2090 to 500 lines):

diff -r 2590e85d1b00 -r 766bf00e3bf2 ChangeLog
--- a/ChangeLog	Wed Oct 15 23:22:58 2014 +0100
+++ b/ChangeLog	Fri Oct 24 18:45:33 2014 +0100
@@ -1,3 +1,21 @@
+2014-10-24  Andrew John Hughes  <gnu.andrew at redhat.com>
+
+	* Makefile.am,
+	(ICEDTEA_PATCHES): Add new patch.
+	* NEWS: Updated.
+	* patches/openjdk/8000897-use_corresponding_digest_length.patch:
+	Fix for SHA-2 bug discovered in RH1155012.
+
+2014-10-24  Andrew John Hughes  <gnu.andrew at redhat.com>
+
+	* Makefile.am:
+	(ICEDTEA_PATCHES): Add new patches.
+	* NEWS: Updated.
+	* patches/openjdk/7122142-annotation_race_condition.patch:
+	Backport fix for annotation race condition.
+	* patches/openjdk/7161796-wrong_fetch_in_fetch_static_field.patch:
+	Fix for HotSpot bug hit by 7122142.
+
 2014-10-15  Andrew John Hughes  <gnu.andrew at redhat.com>
 
 	PR2033: patches/ecj/jaxws-getdtdtype.patch no
diff -r 2590e85d1b00 -r 766bf00e3bf2 Makefile.am
--- a/Makefile.am	Wed Oct 15 23:22:58 2014 +0100
+++ b/Makefile.am	Fri Oct 24 18:45:33 2014 +0100
@@ -617,7 +617,10 @@
 	patches/openjdk/8006935-long_keys_in_hmac_prf.patch \
 	patches/openjdk/7106773-512_bits_rsa.patch \
 	patches/pr1904-icedtea_and_distro_versioning.patch \
-	patches/openjdk/8017173-xml_cipher_rsa_oaep_cant_be_instantiated.patch
+	patches/openjdk/8017173-xml_cipher_rsa_oaep_cant_be_instantiated.patch \
+	patches/openjdk/7122142-annotation_race_condition.patch \
+	patches/openjdk/7161796-wrong_fetch_in_fetch_static_field.patch \
+	patches/openjdk/8000897-use_corresponding_digest_length.patch
 
 if WITH_RHINO
 ICEDTEA_PATCHES += \
diff -r 2590e85d1b00 -r 766bf00e3bf2 NEWS
--- a/NEWS	Wed Oct 15 23:22:58 2014 +0100
+++ b/NEWS	Fri Oct 24 18:45:33 2014 +0100
@@ -14,6 +14,10 @@
 
 New in release 1.13.6 (2015-01-XX):
 
+* Backports
+  - S7122142, RH1151372: (ann) Race condition between isAnnotationPresent and getAnnotations
+  - S7161796, RH1151372: PhaseStringOpts::fetch_static_field tries to fetch field from the Klass instead of the mirror
+  - S8000897, RH1155012: VM crash in CompileBroker
 * Bug fixes
   - PR2033: patches/ecj/jaxws-getdtdtype.patch no longer applies since removal of JAXWS drop
 
diff -r 2590e85d1b00 -r 766bf00e3bf2 patches/openjdk/7122142-annotation_race_condition.patch
--- /dev/null	Thu Jan 01 00:00:00 1970 +0000
+++ b/patches/openjdk/7122142-annotation_race_condition.patch	Fri Oct 24 18:45:33 2014 +0100
@@ -0,0 +1,1955 @@
+diff -Nru openjdk.orig/jdk/src/share/classes/java/lang/Class.java openjdk/jdk/src/share/classes/java/lang/Class.java
+--- openjdk.orig/jdk/src/share/classes/java/lang/Class.java	2014-10-14 22:40:53.675702174 +0100
++++ openjdk/jdk/src/share/classes/java/lang/Class.java	2014-10-23 21:50:17.185342994 +0100
+@@ -1,5 +1,5 @@
+ /*
+- * Copyright (c) 1994, 2012, Oracle and/or its affiliates. All rights reserved.
++ * Copyright (c) 1994, 2014, Oracle and/or its affiliates. All rights reserved.
+  * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
+  *
+  * This code is free software; you can redistribute it and/or modify it
+@@ -275,7 +275,7 @@
+     }
+ 
+     /** Called after security check for system loader access checks have been made. */
+-    private static native Class forName0(String name, boolean initialize,
++    private static native Class<?> forName0(String name, boolean initialize,
+                                             ClassLoader loader,
+                                             Class<?> caller)
+         throws ClassNotFoundException;
+@@ -346,15 +346,15 @@
+                 );
+             }
+             try {
+-                Class[] empty = {};
++                Class<?>[] empty = {};
+                 final Constructor<T> c = getConstructor0(empty, Member.DECLARED);
+                 // Disable accessibility checks on the constructor
+                 // since we have to do the security check here anyway
+                 // (the stack depth is wrong for the Constructor's
+                 // security check to work)
+-                java.security.AccessController.doPrivileged
+-                    (new java.security.PrivilegedAction() {
+-                            public Object run() {
++                java.security.AccessController.doPrivileged(
++                    new java.security.PrivilegedAction<Void>() {
++                        public Void run() {
+                                 c.setAccessible(true);
+                                 return null;
+                             }
+@@ -384,7 +384,7 @@
+         }
+     }
+     private volatile transient Constructor<T> cachedConstructor;
+-    private volatile transient Class       newInstanceCallerCache;
++    private volatile transient Class<?>       newInstanceCallerCache;
+ 
+ 
+     /**
+@@ -642,7 +642,7 @@
+         if (getGenericSignature() != null)
+             return (TypeVariable<Class<T>>[])getGenericInfo().getTypeParameters();
+         else
+-            return (TypeVariable<Class<T>>[])new TypeVariable[0];
++            return (TypeVariable<Class<T>>[])new TypeVariable<?>[0];
+     }
+ 
+ 
+@@ -906,7 +906,7 @@
+ 
+             MethodRepository typeInfo = MethodRepository.make(enclosingInfo.getDescriptor(),
+                                                               getFactory());
+-            Class      returnType       = toClass(typeInfo.getReturnType());
++            Class<?>   returnType       = toClass(typeInfo.getReturnType());
+             Type []    parameterTypes   = typeInfo.getParameterTypes();
+             Class<?>[] parameterClasses = new Class<?>[parameterTypes.length];
+ 
+@@ -1010,12 +1010,12 @@
+ 
+     }
+ 
+-    private static Class toClass(Type o) {
++    private static Class<?> toClass(Type o) {
+         if (o instanceof GenericArrayType)
+             return Array.newInstance(toClass(((GenericArrayType)o).getGenericComponentType()),
+                                      0)
+                 .getClass();
+-        return (Class)o;
++        return (Class<?>)o;
+      }
+ 
+     /**
+@@ -1345,13 +1345,13 @@
+         // out anything other than public members and (2) public member access
+         // has already been ok'd by the SecurityManager.
+ 
+-        Class[] result = (Class[]) java.security.AccessController.doPrivileged
+-            (new java.security.PrivilegedAction() {
+-                public Object run() {
+-                    java.util.List<Class> list = new java.util.ArrayList();
+-                    Class currentClass = Class.this;
++        return java.security.AccessController.doPrivileged(
++            new java.security.PrivilegedAction<Class<?>[]>() {
++                public Class[] run() {
++                    List<Class<?>> list = new ArrayList<Class<?>>();
++                    Class<?> currentClass = Class.this;
+                     while (currentClass != null) {
+-                        Class[] members = currentClass.getDeclaredClasses();
++                        Class<?>[] members = currentClass.getDeclaredClasses();
+                         for (int i = 0; i < members.length; i++) {
+                             if (Modifier.isPublic(members[i].getModifiers())) {
+                                 list.add(members[i]);
+@@ -1359,12 +1359,9 @@
+                         }
+                         currentClass = currentClass.getSuperclass();
+                     }
+-                    Class[] empty = {};
+-                    return list.toArray(empty);
++                    return list.toArray(new Class[0]);
+                 }
+             });
+-
+-        return result;
+     }
+ 
+ 
+@@ -2288,7 +2285,7 @@
+             return name;
+         }
+         if (!name.startsWith("/")) {
+-            Class c = this;
++            Class<?> c = this;
+             while (c.isArray()) {
+                 c = c.getComponentType();
+             }
+@@ -2305,44 +2302,111 @@
+     }
+ 
+     /**
++     * Atomic operations support.
++     */
++    private static class Atomic {
++        // initialize Unsafe machinery here, since we need to call Class.class instance method
++        // and have to avoid calling it in the static initializer of the Class class...
++        private static final Unsafe unsafe = Unsafe.getUnsafe();
++        // offset of Class.reflectionData instance field
++        private static final long reflectionDataOffset;
++        // offset of Class.annotationType instance field
++        private static final long annotationTypeOffset;
++
++        static {
++            Field[] fields = Class.class.getDeclaredFields0(false); // bypass caches
++            reflectionDataOffset = objectFieldOffset(fields, "reflectionData");
++            annotationTypeOffset = objectFieldOffset(fields, "annotationType");
++        }
++
++        private static long objectFieldOffset(Field[] fields, String fieldName) {
++            Field field = searchFields(fields, fieldName);
++            if (field == null) {
++                throw new Error("No " + fieldName + " field found in java.lang.Class");
++            }
++            return unsafe.objectFieldOffset(field);
++        }
++
++        static <T> boolean casReflectionData(Class<?> clazz,
++                                             SoftReference<ReflectionData<T>> oldData,
++                                             SoftReference<ReflectionData<T>> newData) {
++            return unsafe.compareAndSwapObject(clazz, reflectionDataOffset, oldData, newData);
++        }
++
++        static <T> boolean casAnnotationType(Class<?> clazz,
++                                             AnnotationType oldType,
++                                             AnnotationType newType) {
++            return unsafe.compareAndSwapObject(clazz, annotationTypeOffset, oldType, newType);
++        }
++    }
++
++    /**
+      * Reflection support.
+      */
+ 
+     // Caches for certain reflective results
+     private static boolean useCaches = true;
+-    private volatile transient SoftReference declaredFields;
+-    private volatile transient SoftReference publicFields;
+-    private volatile transient SoftReference declaredMethods;
+-    private volatile transient SoftReference publicMethods;
+-    private volatile transient SoftReference declaredConstructors;
+-    private volatile transient SoftReference publicConstructors;
+-    // Intermediate results for getFields and getMethods
+-    private volatile transient SoftReference declaredPublicFields;
+-    private volatile transient SoftReference declaredPublicMethods;
++
++    // reflection data that might get invalidated when JVM TI RedefineClasses() is called
++    static class ReflectionData<T> {
++        volatile Field[] declaredFields;
++        volatile Field[] publicFields;
++        volatile Method[] declaredMethods;
++        volatile Method[] publicMethods;
++        volatile Constructor<T>[] declaredConstructors;
++        volatile Constructor<T>[] publicConstructors;
++        // Intermediate results for getFields and getMethods
++        volatile Field[] declaredPublicFields;
++        volatile Method[] declaredPublicMethods;
++        // Value of classRedefinedCount when we created this ReflectionData instance
++        final int redefinedCount;
++
++        ReflectionData(int redefinedCount) {
++            this.redefinedCount = redefinedCount;
++        }
++    }
++
++    private volatile transient SoftReference<ReflectionData<T>> reflectionData;
+ 
+     // Incremented by the VM on each call to JVM TI RedefineClasses()
+     // that redefines this class or a superclass.
+     private volatile transient int classRedefinedCount = 0;
+ 
+-    // Value of classRedefinedCount when we last cleared the cached values
+-    // that are sensitive to class redefinition.
+-    private volatile transient int lastRedefinedCount = 0;
+-
+-    // Clears cached values that might possibly have been obsoleted by
+-    // a class redefinition.
+-    private void clearCachesOnClassRedefinition() {
+-        if (lastRedefinedCount != classRedefinedCount) {
+-            declaredFields = publicFields = declaredPublicFields = null;
+-            declaredMethods = publicMethods = declaredPublicMethods = null;
+-            declaredConstructors = publicConstructors = null;
+-            annotations = declaredAnnotations = null;
+-
+-            // Use of "volatile" (and synchronization by caller in the case
+-            // of annotations) ensures that no thread sees the update to
+-            // lastRedefinedCount before seeing the caches cleared.
+-            // We do not guard against brief windows during which multiple
+-            // threads might redundantly work to fill an empty cache.
+-            lastRedefinedCount = classRedefinedCount;
++    // Lazily create and cache ReflectionData
++    private ReflectionData<T> reflectionData() {
++        SoftReference<ReflectionData<T>> reflectionData = this.reflectionData;
++        int classRedefinedCount = this.classRedefinedCount;
++        ReflectionData<T> rd;
++        if (useCaches &&
++            reflectionData != null &&
++            (rd = reflectionData.get()) != null &&
++            rd.redefinedCount == classRedefinedCount) {
++            return rd;
++        }
++        // else no SoftReference or cleared SoftReference or stale ReflectionData
++        // -> create and replace new instance
++        return newReflectionData(reflectionData, classRedefinedCount);
++    }
++
++    private ReflectionData<T> newReflectionData(SoftReference<ReflectionData<T>> oldReflectionData,
++                                                int classRedefinedCount) {
++        if (!useCaches) return null;
++
++        while (true) {
++            ReflectionData<T> rd = new ReflectionData<T>(classRedefinedCount);
++            // try to CAS it...
++            if (Atomic.casReflectionData(this, oldReflectionData,
++	      new SoftReference<ReflectionData<T>>(rd))) {
++                return rd;
++            }
++            // else retry
++            oldReflectionData = this.reflectionData;
++            classRedefinedCount = this.classRedefinedCount;
++            if (oldReflectionData != null &&
++                (rd = oldReflectionData.get()) != null &&
++                rd.redefinedCount == classRedefinedCount) {
++                return rd;
++            }
+         }
+     }
+ 
+@@ -2370,7 +2434,7 @@
+     }
+ 
+     // Annotations handling
+-    private native byte[] getRawAnnotations();
++    native byte[] getRawAnnotations();
+ 
+     native ConstantPool getConstantPool();
+ 
+@@ -2385,27 +2449,19 @@
+     // via ReflectionFactory.copyField.
+     private Field[] privateGetDeclaredFields(boolean publicOnly) {
+         checkInitted();
+-        Field[] res = null;
+-        if (useCaches) {
+-            clearCachesOnClassRedefinition();
+-            if (publicOnly) {
+-                if (declaredPublicFields != null) {
+-                    res = (Field[]) declaredPublicFields.get();
+-                }
+-            } else {
+-                if (declaredFields != null) {
+-                    res = (Field[]) declaredFields.get();
+-                }
+-            }
++        Field[] res;
++        ReflectionData<T> rd = reflectionData();
++        if (rd != null) {
++            res = publicOnly ? rd.declaredPublicFields : rd.declaredFields;
+             if (res != null) return res;
+         }
+         // No cached value available; request value from VM
+         res = Reflection.filterFields(this, getDeclaredFields0(publicOnly));
+-        if (useCaches) {
++        if (rd != null) {
+             if (publicOnly) {
+-                declaredPublicFields = new SoftReference(res);
++                rd.declaredPublicFields = res;
+             } else {
+-                declaredFields = new SoftReference(res);
++                rd.declaredFields = res;
+             }
+         }
+         return res;
+@@ -2414,22 +2470,20 @@
+     // Returns an array of "root" fields. These Field objects must NOT
+     // be propagated to the outside world, but must instead be copied
+     // via ReflectionFactory.copyField.
+-    private Field[] privateGetPublicFields(Set traversedInterfaces) {
++    private Field[] privateGetPublicFields(Set<Class<?>> traversedInterfaces) {
+         checkInitted();
+-        Field[] res = null;
+-        if (useCaches) {
+-            clearCachesOnClassRedefinition();
+-            if (publicFields != null) {
+-                res = (Field[]) publicFields.get();
+-            }
++        Field[] res;
++        ReflectionData<T> rd = reflectionData();
++        if (rd != null) {
++            res = rd.publicFields;
+             if (res != null) return res;
+         }
+ 
+         // No cached value available; compute value recursively.
+         // Traverse in correct order for getField().
+-        List fields = new ArrayList();
++        List<Field> fields = new ArrayList<Field>();
+         if (traversedInterfaces == null) {
+-            traversedInterfaces = new HashSet();
++            traversedInterfaces = new HashSet<Class<?>>();
+         }
+ 
+         // Local fields
+@@ -2437,9 +2491,7 @@
+         addAll(fields, tmp);
+ 
+         // Direct superinterfaces, recursively
+-        Class[] interfaces = getInterfaces();
+-        for (int i = 0; i < interfaces.length; i++) {
+-            Class c = interfaces[i];
++        for (Class<?> c : getInterfaces()) {
+             if (!traversedInterfaces.contains(c)) {
+                 traversedInterfaces.add(c);
+                 addAll(fields, c.privateGetPublicFields(traversedInterfaces));
+@@ -2448,7 +2500,7 @@
+ 
+         // Direct superclass, recursively
+         if (!isInterface()) {
+-            Class c = getSuperclass();
++            Class<?> c = getSuperclass();
+             if (c != null) {
+                 addAll(fields, c.privateGetPublicFields(traversedInterfaces));
+             }
+@@ -2456,13 +2508,13 @@
+ 
+         res = new Field[fields.size()];
+         fields.toArray(res);
+-        if (useCaches) {
+-            publicFields = new SoftReference(res);
++        if (rd != null) {
++            rd.publicFields = res;
+         }
+         return res;
+     }
+ 
+-    private static void addAll(Collection c, Field[] o) {
++    private static void addAll(Collection<Field> c, Field[] o) {
+         for (int i = 0; i < o.length; i++) {
+             c.add(o[i]);
+         }
+@@ -2478,20 +2530,12 @@
+     // Returns an array of "root" constructors. These Constructor
+     // objects must NOT be propagated to the outside world, but must
+     // instead be copied via ReflectionFactory.copyConstructor.
+-    private Constructor[] privateGetDeclaredConstructors(boolean publicOnly) {
++    private Constructor<T>[] privateGetDeclaredConstructors(boolean publicOnly) {
+         checkInitted();
+-        Constructor[] res = null;
+-        if (useCaches) {
+-            clearCachesOnClassRedefinition();
+-            if (publicOnly) {
+-                if (publicConstructors != null) {
+-                    res = (Constructor[]) publicConstructors.get();
+-                }
+-            } else {
+-                if (declaredConstructors != null) {
+-                    res = (Constructor[]) declaredConstructors.get();
+-                }
+-            }
++        Constructor<T>[] res;
++        ReflectionData<T> rd = reflectionData();
++        if (rd != null) {
++            res = publicOnly ? rd.publicConstructors : rd.declaredConstructors;
+             if (res != null) return res;
+         }
+         // No cached value available; request value from VM
+@@ -2500,11 +2544,11 @@
+         } else {
+             res = getDeclaredConstructors0(publicOnly);
+         }
+-        if (useCaches) {
++        if (rd != null) {
+             if (publicOnly) {
+-                publicConstructors = new SoftReference(res);
++                rd.publicConstructors = res;
+             } else {
+-                declaredConstructors = new SoftReference(res);
++                rd.declaredConstructors = res;
+             }
+         }
+         return res;
+@@ -2521,27 +2565,19 @@
+     // via ReflectionFactory.copyMethod.
+     private Method[] privateGetDeclaredMethods(boolean publicOnly) {
+         checkInitted();
+-        Method[] res = null;
+-        if (useCaches) {
+-            clearCachesOnClassRedefinition();
+-            if (publicOnly) {
+-                if (declaredPublicMethods != null) {
+-                    res = (Method[]) declaredPublicMethods.get();
+-                }
+-            } else {
+-                if (declaredMethods != null) {
+-                    res = (Method[]) declaredMethods.get();
+-                }
+-            }
++        Method[] res;
++        ReflectionData<T> rd = reflectionData();
++        if (rd != null) {
++            res = publicOnly ? rd.declaredPublicMethods : rd.declaredMethods;
+             if (res != null) return res;
+         }
+         // No cached value available; request value from VM
+         res = Reflection.filterMethods(this, getDeclaredMethods0(publicOnly));
+-        if (useCaches) {
++        if (rd != null) {


More information about the distro-pkg-dev mailing list