[Bug 3412] [IcedTea8] Backport "8164293: HotSpot leaking memory in long-running requests"
bugzilla-daemon at icedtea.classpath.org
bugzilla-daemon at icedtea.classpath.org
Mon Jul 10 18:04:56 UTC 2017
http://icedtea.classpath.org/bugzilla/show_bug.cgi?id=3412
--- Comment #1 from hg commits <mercurial at icedtea.classpath.org> ---
details:
http://icedtea.classpath.org//hg/icedtea8?cmd=changeset;node=0c708efe5036
author: Andrew John Hughes <gnu_andrew at member.fsf.org>
date: Fri Jul 07 04:11:20 2017 +0100
Bump to icedtea-3.5.0pre01.
Upstream changes:
- PR3384: aarch32: aarch32 should default to client variant as server
fails to build
- PR3392, RH1273760: Support using RSAandMGF1 with the SHA hash
algorithms in the PKCS11 provider
- S8139303, PR3384: aarch32: add support for ARM aarch32
- S8164293, PR3412, RH1459641: HotSpot leaking memory in long-running
requests
- S8164652, PR3386: aarch32: C1 port
- S8167584, PR3384: aarch32: use "arm" for os.arch system property
- S8175813, PR3394, RH1448880: PPC64: "mbind: Invalid argument" when
-XX:+UseNUMA is used
- S8175887, PR3415: C1 value numbering handling of Unsafe.get*Volatile is
incorrect
- S8179084, PR3409, RH1455694: HotSpot VM fails to start when
AggressiveHeap is set
- S8180048, PR3411, RH1449870: Interned string and symbol table leak
memory during parallel unlinking
- S8181055, PR3394, RH1448880: PPC64: "mbind: Invalid argument" still
seen after 8175813
- S8181419, PR3413, RH1463144: Race in jdwp invoker handling may lead to
crashes or invalid results
ChangeLog:
2017-07-06 Andrew John Hughes <gnu.andrew at member.fsf.org>
Bump to icedtea-3.5.0pre01.
* patches/aarch32-c1.patch,
* patches/aarch32-conf.patch,
* patches/aarch32-jdk.patch:
Removed as applied upstream.
* Makefile.am:
(CORBA_CHANGESET): Update to icedtea-3.5.0pre01 tag.
(JAXP_CHANGESET): Likewise.
(JAXWS_CHANGESET): Likewise.
(JDK_CHANGESET): Likewise.
(LANGTOOLS_CHANGESET): Likewise.
(OPENJDK_CHANGESET): Likewise.
(NASHORN_CHANGESET): Likewise.
(CORBA_SHA256SUM): Likewise.
(JAXP_SHA256SUM): Likewise.
(JAXWS_SHA256SUM): Likewise.
(JDK_SHA256SUM): Likewise.
(LANGTOOLS_SHA256SUM): Likewise.
(OPENJDK_SHA256SUM): Likewise.
(NASHORN_SHA256SUM): Likewise.
(ICEDTEA_PATCHES): Add HotSpot patches for Shenandoah
and AArch32 ports. Remove AArch32 fixes now applied
upstream.
* NEWS: Updated.
* configure.ac: Bump to 3.5.0pre01.
* hotspot.map.in: Update to icedtea-3.5.0pre01 tag.
* patches/hotspot/aarch32/8164293-pr3412-rh1459641.patch,
* patches/hotspot/aarch32/8175813-pr3394-rh1448880.patch,
* patches/hotspot/aarch32/8175887-pr3415.patch,
* patches/hotspot/aarch32/8179084-pr3409-rh1455694.patch,
* patches/hotspot/aarch32/8180048-pr3411-rh1449870.patch:
Symlink to Shenandoah versions of same patches.
* patches/hotspot/aarch32/8181055-pr3394-rh1448880.patch:
AArch32 version of 8181055 as there are uclibc changes
in os_linux.cpp
* patches/hotspot/shenandoah/8164293-pr3412-rh1459641.patch,
* patches/hotspot/shenandoah/8175813-pr3394-rh1448880.patch,
* patches/hotspot/shenandoah/8175887-pr3415.patch,
* patches/hotspot/shenandoah/8179084-pr3409-rh1455694.patch,
* patches/hotspot/shenandoah/8180048-pr3411-rh1449870.patch,
* patches/hotspot/shenandoah/8181055-pr3394-rh1448880.patch:
Copies of upstream HotSpot patches for Shenandoah. Patches
are identical to those upstream.
--
You are receiving this mail because:
You are on the CC list for the bug.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://mail.openjdk.java.net/pipermail/distro-pkg-dev/attachments/20170710/f244bb13/attachment-0001.html>
More information about the distro-pkg-dev
mailing list