RFR 8054008: Using -XX:-LazyBootClassLoader crashes with ACCESS_VIOLATION on Win 64bit

Lois Foltan lois.foltan at oracle.com
Tue Nov 11 18:42:30 UTC 2014


On 11/11/2014 1:30 PM, Jiangli Zhou wrote:
> Hi Lois,
>
> Actually there was an updated webrev based on Roland's feedback. Since 
> you are replying to the original request, not sure if you reviewed the 
> latest webrev. If not, here is the link: 
> http://cr.openjdk.java.net/~jiangli/8054008/webrev.02/.

My apologies, I did review .02 but responded to your first RFR request.  
Looks fine.
Lois

>
> Thanks,
> Jiangli
>
> On 11/11/2014 10:22 AM, Lois Foltan wrote:
>> Hi Jiangli,
>> Yes, this looks good, reviewed.
>> Lois
>>
>> On 11/6/2014 8:35 PM, Jiangli Zhou wrote:
>>> Hi,
>>>
>>> Please review the following changes that fix the crash with 
>>> -XX:-LazyBootClassLoader on windows x64 platforms (fastdebug only). 
>>> During VM initialization,  current_stack_pointer() could be called 
>>> before the VM generates stub routines. The generated get_previous_sp 
>>> routine cannot be used during that time, use the estimated value for 
>>> the sp value instead. The x86 implementation is unaffected by the 
>>> change and always returns the estimated sp value as before.
>>>
>>> bug: https://bugs.openjdk.java.net/browse/JDK-8054008
>>> webrev: http://cr.openjdk.java.net/~jiangli/8054008/webrev/
>>>
>>> Tested with JPRT and ExtBadJAR test.
>>>
>>> Background:
>>> As part of the VM initialization, classLoader_init() calls ZIP_Open 
>>> from the zip library for processing the boot class path when 
>>> -XX:-LazyBootClassLoader is specified. The call path re-enters VM 
>>> before returning from the zip library call. Following is the 
>>> backtrace right before when the crash happens. The windows x64 
>>> version of current_stack_pointer() uses generated stub routine 
>>> get_previous_sp (generated by generate_get_previous_sp()) to obtain 
>>> the stack pointer value. Since classLoader_init() happens before 
>>> stubRoutines_init1() and the stub routines are not generated at the 
>>> time, the execution jumps to address 0 (referenced by 
>>> _get_previous_sp_entry which should contain the address of the 
>>> generated routine after stubRoutines_init1()) when it's trying to 
>>> call the stub routine and crashes.
>>>
>>>
>>>      jvm.dll!os::current_stack_pointer() Line 468 C++
>>>      jvm.dll!os::verify_stack_alignment() Line 638 + 0x5 bytes C++
>>>      jvm.dll!JVM_NativePath(char * path) Line 691 C++
>>>      zip.dll!000007feebc49de0()
>>>      [Frames below may be incorrect and/or missing, no symbols 
>>> loaded for zip.dll]
>>>      zip.dll!000007feebc4af1d()
>>>      zip.dll!000007feebc4b004()
>>>      jvm.dll!ClassLoader::create_class_path_entry(const char * path, 
>>> const stat * st, bool lazy, bool throw_exception, Thread * 
>>> __the_thread__) Line 666 + 0x13 bytes C++
>>>      jvm.dll!ClassLoader::update_class_path_entry_list(const char * 
>>> path, bool check_for_duplicates, bool throw_exception) Line 763 + 
>>> 0x2d bytes C++
>>>      jvm.dll!ClassLoader::setup_search_path(const char * class_path) 
>>> Line 630 C++
>>>      jvm.dll!ClassLoader::setup_bootstrap_search_path() Line 594 C++
>>>      jvm.dll!ClassLoader::initialize() Line 1237 C++
>>>      jvm.dll!classLoader_init() Line 1291 C++
>>>      jvm.dll!init_globals() Line 100 C++
>>>      jvm.dll!Threads::create_vm(JavaVMInitArgs * args, bool * 
>>> canTryAgain) Line 3414 + 0x5 bytes C++
>>>      jvm.dll!JNI_CreateJavaVM(JavaVM_ * * vm, void * * penv, void * 
>>> args) Line 5199 + 0x12 bytes C++
>>>      java.exe!000000013f0520f6()
>>>      java.exe!000000013f05cb63()
>>>      java.exe!000000013f05cbf7()
>>>      kernel32.dll!0000000076ba59ed()
>>>      ntdll.dll!0000000076cdc541()
>>>
>>> Thanks,
>>> Jiangli
>>>
>>
>



More information about the hotspot-runtime-dev mailing list