Merge branch 'master' into openEuler-20.03-LTS-SP3
This commit is contained in:
commit
a8718e6426
4815
7092821-java.security.Provider.getService-is-synchro.patch
Normal file
4815
7092821-java.security.Provider.getService-is-synchro.patch
Normal file
File diff suppressed because it is too large
Load Diff
170
8067941-TESTBUG-Fix-tests-for-OS-with-64K-page-size.patch
Normal file
170
8067941-TESTBUG-Fix-tests-for-OS-with-64K-page-size.patch
Normal file
@ -0,0 +1,170 @@
|
||||
From c97998519552b7d8287125e46a3db2f29293784f Mon Sep 17 00:00:00 2001
|
||||
From: xiezhaokun <xiezhaokun@huawei.com>
|
||||
Date: Wed, 8 Jun 2022 10:32:52 +0800
|
||||
Subject: [PATCH 08/10] 8067941: [TESTBUG] Fix tests for OS with 64K page size
|
||||
|
||||
---
|
||||
hotspot/src/share/vm/memory/metaspace.cpp | 8 +++++---
|
||||
hotspot/test/compiler/6865265/StackOverflowBug.java | 2 +-
|
||||
hotspot/test/compiler/8009761/Test8009761.java | 2 +-
|
||||
.../exceptions/TestRecursiveReplacedException.java | 2 +-
|
||||
.../compiler/uncommontrap/StackOverflowGuardPagesOff.java | 2 +-
|
||||
.../compiler/uncommontrap/TestStackBangMonitorOwned.java | 2 +-
|
||||
hotspot/test/compiler/uncommontrap/TestStackBangRbp.java | 2 +-
|
||||
hotspot/test/gc/arguments/TestMaxHeapSizeTools.java | 2 +-
|
||||
hotspot/test/gc/g1/TestHumongousAllocInitialMark.java | 4 +++-
|
||||
9 files changed, 15 insertions(+), 11 deletions(-)
|
||||
|
||||
diff --git a/hotspot/src/share/vm/memory/metaspace.cpp b/hotspot/src/share/vm/memory/metaspace.cpp
|
||||
index 600bcfd1..2912f41b 100644
|
||||
--- a/hotspot/src/share/vm/memory/metaspace.cpp
|
||||
+++ b/hotspot/src/share/vm/memory/metaspace.cpp
|
||||
@@ -3937,11 +3937,13 @@ class TestVirtualSpaceNodeTest {
|
||||
assert(cm.sum_free_chunks() == 2*MediumChunk, "sizes should add up");
|
||||
}
|
||||
|
||||
- { // 4 pages of VSN is committed, some is used by chunks
|
||||
+ const size_t page_chunks = 4 * (size_t)os::vm_page_size() / BytesPerWord;
|
||||
+ // This doesn't work for systems with vm_page_size >= 16K.
|
||||
+ if (page_chunks < MediumChunk) {
|
||||
+ // 4 pages of VSN is committed, some is used by chunks
|
||||
ChunkManager cm(SpecializedChunk, SmallChunk, MediumChunk);
|
||||
VirtualSpaceNode vsn(vsn_test_size_bytes);
|
||||
- const size_t page_chunks = 4 * (size_t)os::vm_page_size() / BytesPerWord;
|
||||
- assert(page_chunks < MediumChunk, "Test expects medium chunks to be at least 4*page_size");
|
||||
+
|
||||
vsn.initialize();
|
||||
vsn.expand_by(page_chunks, page_chunks);
|
||||
vsn.get_chunk_vs(SmallChunk);
|
||||
diff --git a/hotspot/test/compiler/6865265/StackOverflowBug.java b/hotspot/test/compiler/6865265/StackOverflowBug.java
|
||||
index 295a6b41..c5d0f3b6 100644
|
||||
--- a/hotspot/test/compiler/6865265/StackOverflowBug.java
|
||||
+++ b/hotspot/test/compiler/6865265/StackOverflowBug.java
|
||||
@@ -28,7 +28,7 @@
|
||||
* @summary JVM crashes with "missing exception handler" error
|
||||
* @author volker.simonis@sap.com
|
||||
*
|
||||
- * @run main/othervm -XX:CompileThreshold=100 -Xbatch -Xss248k StackOverflowBug
|
||||
+ * @run main/othervm -XX:CompileThreshold=100 -Xbatch -Xss512k StackOverflowBug
|
||||
*/
|
||||
|
||||
|
||||
diff --git a/hotspot/test/compiler/8009761/Test8009761.java b/hotspot/test/compiler/8009761/Test8009761.java
|
||||
index 401458b6..b41f49fd 100644
|
||||
--- a/hotspot/test/compiler/8009761/Test8009761.java
|
||||
+++ b/hotspot/test/compiler/8009761/Test8009761.java
|
||||
@@ -25,7 +25,7 @@
|
||||
* @test
|
||||
* @bug 8009761
|
||||
* @summary Deoptimization on sparc doesn't set Llast_SP correctly in the interpreter frames it creates
|
||||
- * @run main/othervm -XX:CompileCommand=exclude,Test8009761::m2 -XX:-UseOnStackReplacement -XX:-BackgroundCompilation -Xss256K Test8009761
|
||||
+ * @run main/othervm -XX:CompileCommand=exclude,Test8009761::m2 -XX:-UseOnStackReplacement -XX:-BackgroundCompilation -Xss512K Test8009761
|
||||
*
|
||||
*/
|
||||
|
||||
diff --git a/hotspot/test/compiler/exceptions/TestRecursiveReplacedException.java b/hotspot/test/compiler/exceptions/TestRecursiveReplacedException.java
|
||||
index 996d82a0..950ed18c 100644
|
||||
--- a/hotspot/test/compiler/exceptions/TestRecursiveReplacedException.java
|
||||
+++ b/hotspot/test/compiler/exceptions/TestRecursiveReplacedException.java
|
||||
@@ -25,7 +25,7 @@
|
||||
* @test
|
||||
* @bug 8054224
|
||||
* @summary Recursive method compiled by C1 is unable to catch StackOverflowError
|
||||
- * @run main/othervm -Xcomp -XX:CompileOnly=Test.run -XX:+TieredCompilation -XX:TieredStopAtLevel=2 -Xss256K TestRecursiveReplacedException
|
||||
+ * @run main/othervm -Xcomp -XX:CompileOnly=Test.run -XX:+TieredCompilation -XX:TieredStopAtLevel=2 -Xss512K TestRecursiveReplacedException
|
||||
*
|
||||
*/
|
||||
|
||||
diff --git a/hotspot/test/compiler/uncommontrap/StackOverflowGuardPagesOff.java b/hotspot/test/compiler/uncommontrap/StackOverflowGuardPagesOff.java
|
||||
index 4ad409bb..835283c0 100644
|
||||
--- a/hotspot/test/compiler/uncommontrap/StackOverflowGuardPagesOff.java
|
||||
+++ b/hotspot/test/compiler/uncommontrap/StackOverflowGuardPagesOff.java
|
||||
@@ -25,7 +25,7 @@
|
||||
* @test
|
||||
* @bug 8029383
|
||||
* @summary stack overflow if callee is marked for deoptimization causes crash
|
||||
- * @run main/othervm -XX:TieredStopAtLevel=1 -XX:-BackgroundCompilation -XX:CompileCommand=dontinline,StackOverflowGuardPagesOff::m1 -XX:CompileCommand=exclude,StackOverflowGuardPagesOff::m2 -Xss256K -XX:-UseOnStackReplacement StackOverflowGuardPagesOff
|
||||
+ * @run main/othervm -XX:TieredStopAtLevel=1 -XX:-BackgroundCompilation -XX:CompileCommand=dontinline,StackOverflowGuardPagesOff::m1 -XX:CompileCommand=exclude,StackOverflowGuardPagesOff::m2 -Xss512K -XX:-UseOnStackReplacement StackOverflowGuardPagesOff
|
||||
*
|
||||
*/
|
||||
|
||||
diff --git a/hotspot/test/compiler/uncommontrap/TestStackBangMonitorOwned.java b/hotspot/test/compiler/uncommontrap/TestStackBangMonitorOwned.java
|
||||
index 3d93d7d5..c07a995d 100644
|
||||
--- a/hotspot/test/compiler/uncommontrap/TestStackBangMonitorOwned.java
|
||||
+++ b/hotspot/test/compiler/uncommontrap/TestStackBangMonitorOwned.java
|
||||
@@ -25,7 +25,7 @@
|
||||
* @test
|
||||
* @bug 8032410
|
||||
* @summary Stack overflow at deoptimization doesn't release owned monitors
|
||||
- * @run main/othervm -XX:-BackgroundCompilation -XX:CompileCommand=dontinline,TestStackBangMonitorOwned::m1 -XX:CompileCommand=exclude,TestStackBangMonitorOwned::m2 -Xss256K -XX:-UseOnStackReplacement TestStackBangMonitorOwned
|
||||
+ * @run main/othervm -XX:-BackgroundCompilation -XX:CompileCommand=dontinline,TestStackBangMonitorOwned::m1 -XX:CompileCommand=exclude,TestStackBangMonitorOwned::m2 -Xss512K -XX:-UseOnStackReplacement TestStackBangMonitorOwned
|
||||
*
|
||||
*/
|
||||
public class TestStackBangMonitorOwned {
|
||||
diff --git a/hotspot/test/compiler/uncommontrap/TestStackBangRbp.java b/hotspot/test/compiler/uncommontrap/TestStackBangRbp.java
|
||||
index 38d4e206..9b96951a 100644
|
||||
--- a/hotspot/test/compiler/uncommontrap/TestStackBangRbp.java
|
||||
+++ b/hotspot/test/compiler/uncommontrap/TestStackBangRbp.java
|
||||
@@ -25,7 +25,7 @@
|
||||
* @test
|
||||
* @bug 8028308
|
||||
* @summary rbp not restored when stack overflow is thrown from deopt/uncommon trap blobs
|
||||
- * @run main/othervm -XX:-BackgroundCompilation -XX:CompileCommand=dontinline,TestStackBangRbp::m1 -XX:CompileCommand=exclude,TestStackBangRbp::m2 -Xss256K -XX:-UseOnStackReplacement TestStackBangRbp
|
||||
+ * @run main/othervm -XX:-BackgroundCompilation -XX:CompileCommand=dontinline,TestStackBangRbp::m1 -XX:CompileCommand=exclude,TestStackBangRbp::m2 -Xss512K -XX:-UseOnStackReplacement TestStackBangRbp
|
||||
*
|
||||
*/
|
||||
public class TestStackBangRbp {
|
||||
diff --git a/hotspot/test/gc/arguments/TestMaxHeapSizeTools.java b/hotspot/test/gc/arguments/TestMaxHeapSizeTools.java
|
||||
index b5859b5c..99ed508d 100644
|
||||
--- a/hotspot/test/gc/arguments/TestMaxHeapSizeTools.java
|
||||
+++ b/hotspot/test/gc/arguments/TestMaxHeapSizeTools.java
|
||||
@@ -112,7 +112,7 @@ class TestMaxHeapSizeTools {
|
||||
}
|
||||
|
||||
private static void checkInvalidMinInitialHeapCombinations(String gcflag) throws Exception {
|
||||
- expectError(new String[] { gcflag, "-Xms8M", "-XX:InitialHeapSize=4M", "-version" });
|
||||
+ expectError(new String[] { gcflag, "-Xms64M", "-XX:InitialHeapSize=32M", "-version" });
|
||||
}
|
||||
|
||||
private static void checkValidMinInitialHeapCombinations(String gcflag) throws Exception {
|
||||
diff --git a/hotspot/test/gc/g1/TestHumongousAllocInitialMark.java b/hotspot/test/gc/g1/TestHumongousAllocInitialMark.java
|
||||
index 473ce666..b6e5c3d6 100644
|
||||
--- a/hotspot/test/gc/g1/TestHumongousAllocInitialMark.java
|
||||
+++ b/hotspot/test/gc/g1/TestHumongousAllocInitialMark.java
|
||||
@@ -31,7 +31,9 @@
|
||||
import com.oracle.java.testlibrary.*;
|
||||
|
||||
public class TestHumongousAllocInitialMark {
|
||||
- private static final int heapSize = 200; // MB
|
||||
+ // Heap sizes < 224 MB are increased to 224 MB if vm_page_size == 64K to
|
||||
+ // fulfill alignment constraints.
|
||||
+ private static final int heapSize = 224; // MB
|
||||
private static final int heapRegionSize = 1; // MB
|
||||
private static final int initiatingHeapOccupancyPercent = 50; // %
|
||||
|
||||
diff --git a/hotspot/test/runtime/6929067/invoke.c b/hotspot/test/runtime/6929067/invoke.c
|
||||
index 8dde2cd6..cf8014be 100644
|
||||
--- a/hotspot/test/runtime/6929067/invoke.c
|
||||
+++ b/hotspot/test/runtime/6929067/invoke.c
|
||||
@@ -68,7 +68,7 @@ floobydust (void *p)
|
||||
int
|
||||
main (int argc, const char** argv)
|
||||
{
|
||||
- options[0].optionString = "-Xss320k";
|
||||
+ options[0].optionString = "-Xss512k";
|
||||
|
||||
vm_args.version = JNI_VERSION_1_2;
|
||||
vm_args.ignoreUnrecognized = JNI_TRUE;
|
||||
diff --git a/hotspot/test/runtime/InitialThreadOverflow/invoke.cxx b/hotspot/test/runtime/InitialThreadOverflow/invoke.cxx
|
||||
index 55213c0f..2bca88f1 100644
|
||||
--- a/hotspot/test/runtime/InitialThreadOverflow/invoke.cxx
|
||||
+++ b/hotspot/test/runtime/InitialThreadOverflow/invoke.cxx
|
||||
@@ -48,7 +48,7 @@ floobydust (void *p) {
|
||||
int
|
||||
main (int argc, const char** argv) {
|
||||
JavaVMOption options[1];
|
||||
- options[0].optionString = (char*) "-Xss320k";
|
||||
+ options[0].optionString = (char*) "-Xss512k";
|
||||
|
||||
JavaVMInitArgs vm_args;
|
||||
vm_args.version = JNI_VERSION_1_2;
|
||||
@ -1,85 +0,0 @@
|
||||
From 72853c670c97aae4eab64a5e9edb3c7176beaf6a Mon Sep 17 00:00:00 2001
|
||||
Date: Fri, 22 Jan 2021 16:36:41 +0800
|
||||
Subject: 8168926: C2: Bytecode escape analyzer crashes due to
|
||||
stack overflow
|
||||
|
||||
Summary: <C2>:8168926: C2: Bytecode escape analyzer crashes due to stack overflow
|
||||
LLT: N/A
|
||||
Bug url: https://bugs.openjdk.java.net/browse/JDK-8168926
|
||||
---
|
||||
hotspot/src/share/vm/ci/bcEscapeAnalyzer.cpp | 30 ++++++++++++++++++--
|
||||
hotspot/src/share/vm/ci/ciMethod.hpp | 12 +++++---
|
||||
2 files changed, 35 insertions(+), 7 deletions(-)
|
||||
|
||||
diff --git a/hotspot/src/share/vm/ci/bcEscapeAnalyzer.cpp b/hotspot/src/share/vm/ci/bcEscapeAnalyzer.cpp
|
||||
index 2b9e0e514..34bdbe94d 100644
|
||||
--- a/hotspot/src/share/vm/ci/bcEscapeAnalyzer.cpp
|
||||
+++ b/hotspot/src/share/vm/ci/bcEscapeAnalyzer.cpp
|
||||
@@ -894,9 +894,33 @@ void BCEscapeAnalyzer::iterate_one_block(ciBlock *blk, StateInfo &state, Growabl
|
||||
ciMethod* target = s.get_method(ignored_will_link, &declared_signature);
|
||||
ciKlass* holder = s.get_declared_method_holder();
|
||||
assert(declared_signature != NULL, "cannot be null");
|
||||
- // Push appendix argument, if one.
|
||||
- if (s.has_appendix()) {
|
||||
- state.apush(unknown_obj);
|
||||
+ // If the current bytecode has an attached appendix argument,
|
||||
+ // push an unknown object to represent that argument. (Analysis
|
||||
+ // of dynamic call sites, especially invokehandle calls, needs
|
||||
+ // the appendix argument on the stack, in addition to "regular" arguments
|
||||
+ // pushed onto the stack by bytecode instructions preceding the call.)
|
||||
+ //
|
||||
+ // The escape analyzer does _not_ use the ciBytecodeStream::has_appendix(s)
|
||||
+ // method to determine whether the current bytecode has an appendix argument.
|
||||
+ // The has_appendix() method obtains the appendix from the
|
||||
+ // ConstantPoolCacheEntry::_f1 field, which can happen concurrently with
|
||||
+ // resolution of dynamic call sites. Callees in the
|
||||
+ // ciBytecodeStream::get_method() call above also access the _f1 field;
|
||||
+ // interleaving the get_method() and has_appendix() calls in the current
|
||||
+ // method with call site resolution can lead to an inconsistent view of
|
||||
+ // the current method's argument count. In particular, some interleaving(s)
|
||||
+ // can cause the method's argument count to not include the appendix, which
|
||||
+ // then leads to stack over-/underflow in the escape analyzer.
|
||||
+ //
|
||||
+ // Instead of pushing the argument if has_appendix() is true, the escape analyzer
|
||||
+ // pushes an appendix for all call sites targeted by invokedynamic and invokehandle
|
||||
+ // instructions, except if the call site is the _invokeBasic intrinsic
|
||||
+ // (that intrinsic is always targeted by an invokehandle instruction but does
|
||||
+ // not have an appendix argument).
|
||||
+ if (target->is_loaded() &&
|
||||
+ Bytecodes::has_optional_appendix(s.cur_bc_raw()) &&
|
||||
+ target->intrinsic_id() != vmIntrinsics::_invokeBasic) {
|
||||
+ state.apush(unknown_obj);
|
||||
}
|
||||
// Pass in raw bytecode because we need to see invokehandle instructions.
|
||||
invoke(state, s.cur_bc_raw(), target, holder);
|
||||
diff --git a/hotspot/src/share/vm/ci/ciMethod.hpp b/hotspot/src/share/vm/ci/ciMethod.hpp
|
||||
index 307452422..99d8dbe67 100644
|
||||
--- a/hotspot/src/share/vm/ci/ciMethod.hpp
|
||||
+++ b/hotspot/src/share/vm/ci/ciMethod.hpp
|
||||
@@ -133,15 +133,19 @@ class ciMethod : public ciMetadata {
|
||||
check_is_loaded();
|
||||
return _signature->size() + (_flags.is_static() ? 0 : 1);
|
||||
}
|
||||
- // Report the number of elements on stack when invoking this method.
|
||||
- // This is different than the regular arg_size because invokedynamic
|
||||
- // has an implicit receiver.
|
||||
+ // Report the number of elements on stack when invoking the current method.
|
||||
+ // If the method is loaded, arg_size() gives precise information about the
|
||||
+ // number of stack elements (using the method's signature and its flags).
|
||||
+ // However, if the method is not loaded, the number of stack elements must
|
||||
+ // be determined differently, as the method's flags are not yet available.
|
||||
+ // The invoke_arg_size() method assumes in that case that all bytecodes except
|
||||
+ // invokestatic and invokedynamic have a receiver that is also pushed onto the
|
||||
+ // stack by the caller of the current method.
|
||||
int invoke_arg_size(Bytecodes::Code code) const {
|
||||
if (is_loaded()) {
|
||||
return arg_size();
|
||||
} else {
|
||||
int arg_size = _signature->size();
|
||||
- // Add a receiver argument, maybe:
|
||||
if (code != Bytecodes::_invokestatic &&
|
||||
code != Bytecodes::_invokedynamic) {
|
||||
arg_size++;
|
||||
--
|
||||
2.19.0
|
||||
|
||||
29
8173339-AArch64-Fix-minimum-stack-size-computations.patch
Normal file
29
8173339-AArch64-Fix-minimum-stack-size-computations.patch
Normal file
@ -0,0 +1,29 @@
|
||||
From 85a351276984f56d817560db8b5b837254ec2994 Mon Sep 17 00:00:00 2001
|
||||
From: zhangyipeng <zhangyipeng7@huawei.com>
|
||||
Date: Tue, 7 Jun 2022 20:10:03 +0800
|
||||
Subject: [PATCH 05/10] 8173339: AArch64: Fix minimum stack size computations
|
||||
|
||||
Bug url: https://bugs.openjdk.java.net/browse/JDK-8173339
|
||||
---
|
||||
hotspot/src/cpu/aarch64/vm/globals_aarch64.hpp | 5 ++++-
|
||||
1 file changed, 4 insertions(+), 1 deletion(-)
|
||||
|
||||
diff --git a/hotspot/src/cpu/aarch64/vm/globals_aarch64.hpp b/hotspot/src/cpu/aarch64/vm/globals_aarch64.hpp
|
||||
index 6610cc4fb..7c6b24879 100644
|
||||
--- a/hotspot/src/cpu/aarch64/vm/globals_aarch64.hpp
|
||||
+++ b/hotspot/src/cpu/aarch64/vm/globals_aarch64.hpp
|
||||
@@ -56,7 +56,10 @@ define_pd_global(intx, InlineFrequencyCount, 100);
|
||||
define_pd_global(intx, StackYellowPages, 2);
|
||||
define_pd_global(intx, StackRedPages, 1);
|
||||
|
||||
-define_pd_global(intx, StackShadowPages, 4 DEBUG_ONLY(+5));
|
||||
+// Java_java_net_SocketOutputStream_socketWrite0() uses a 64k buffer on the
|
||||
+// stack if compiled for unix and LP64. To pass stack overflow tests we need
|
||||
+// 20 shadow pages.
|
||||
+define_pd_global(intx, StackShadowPages, 20 DEBUG_ONLY(+5));
|
||||
|
||||
define_pd_global(intx, PreInflateSpin, 10);
|
||||
|
||||
--
|
||||
2.22.0
|
||||
|
||||
156
8194154.patch
156
8194154.patch
@ -1,156 +0,0 @@
|
||||
From 5547d1f77577ad8514136255eed16921e4d02845 Mon Sep 17 00:00:00 2001
|
||||
Date: Fri, 22 Jan 2021 15:23:47 +0800
|
||||
Subject: 8194154: System property user.dir should not be changed
|
||||
|
||||
Summary: <io>: System property user.dir should not be changed
|
||||
LLT: jdk/test/java/io/File/UserDirChangedTest.java
|
||||
Bug url: https://bugs.openjdk.java.net/browse/JDK-8194154
|
||||
---
|
||||
.../classes/java/io/UnixFileSystem.java | 11 +++-
|
||||
.../classes/java/io/WinNTFileSystem.java | 11 +++-
|
||||
jdk/test/java/io/File/UserDirChangedTest.java | 51 +++++++++++++++++++
|
||||
3 files changed, 69 insertions(+), 4 deletions(-)
|
||||
create mode 100644 jdk/test/java/io/File/UserDirChangedTest.java
|
||||
|
||||
diff --git a/jdk/src/solaris/classes/java/io/UnixFileSystem.java b/jdk/src/solaris/classes/java/io/UnixFileSystem.java
|
||||
index fb0fef636..a6ef2d3a6 100644
|
||||
--- a/jdk/src/solaris/classes/java/io/UnixFileSystem.java
|
||||
+++ b/jdk/src/solaris/classes/java/io/UnixFileSystem.java
|
||||
@@ -1,5 +1,5 @@
|
||||
/*
|
||||
- * Copyright (c) 1998, 2022, Oracle and/or its affiliates. All rights reserved.
|
||||
+ * Copyright (c) 1998, 2018, Oracle and/or its affiliates. All rights reserved.
|
||||
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
||||
*
|
||||
* This code is free software; you can redistribute it and/or modify it
|
||||
@@ -34,6 +34,7 @@ class UnixFileSystem extends FileSystem {
|
||||
private final char slash;
|
||||
private final char colon;
|
||||
private final String javaHome;
|
||||
+ private final String userDir;
|
||||
|
||||
public UnixFileSystem() {
|
||||
slash = AccessController.doPrivileged(
|
||||
@@ -42,6 +43,8 @@ class UnixFileSystem extends FileSystem {
|
||||
new GetPropertyAction("path.separator")).charAt(0);
|
||||
javaHome = AccessController.doPrivileged(
|
||||
new GetPropertyAction("java.home"));
|
||||
+ userDir = AccessController.doPrivileged(
|
||||
+ new GetPropertyAction("user.dir"));
|
||||
}
|
||||
|
||||
|
||||
@@ -130,7 +133,11 @@ class UnixFileSystem extends FileSystem {
|
||||
|
||||
public String resolve(File f) {
|
||||
if (isAbsolute(f)) return f.getPath();
|
||||
- return resolve(System.getProperty("user.dir"), f.getPath());
|
||||
+ SecurityManager sm = System.getSecurityManager();
|
||||
+ if (sm != null) {
|
||||
+ sm.checkPropertyAccess("user.dir");
|
||||
+ }
|
||||
+ return resolve(userDir, f.getPath());
|
||||
}
|
||||
|
||||
// Caches for canonicalization results to improve startup performance.
|
||||
diff --git a/jdk/src/windows/classes/java/io/WinNTFileSystem.java b/jdk/src/windows/classes/java/io/WinNTFileSystem.java
|
||||
index caa47f80c..1844a662a 100644
|
||||
--- a/jdk/src/windows/classes/java/io/WinNTFileSystem.java
|
||||
+++ b/jdk/src/windows/classes/java/io/WinNTFileSystem.java
|
||||
@@ -1,5 +1,5 @@
|
||||
/*
|
||||
- * Copyright (c) 2001, 2022, Oracle and/or its affiliates. All rights reserved.
|
||||
+ * Copyright (c) 2001, 2018, Oracle and/or its affiliates. All rights reserved.
|
||||
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
||||
*
|
||||
* This code is free software; you can redistribute it and/or modify it
|
||||
@@ -40,6 +40,7 @@ class WinNTFileSystem extends FileSystem {
|
||||
private final char slash;
|
||||
private final char altSlash;
|
||||
private final char semicolon;
|
||||
+ private final String userDir;
|
||||
|
||||
// Whether to enable alternative data streams (ADS) by suppressing
|
||||
// checking the path for invalid characters, in particular ":".
|
||||
@@ -47,6 +48,8 @@ class WinNTFileSystem extends FileSystem {
|
||||
semicolon = AccessController.doPrivileged(
|
||||
new GetPropertyAction("path.separator")).charAt(0);
|
||||
altSlash = (this.slash == '\\') ? '/' : '\\';
|
||||
+ userDir = AccessController.doPrivileged(
|
||||
+ new GetPropertyAction("user.dir"));
|
||||
}
|
||||
|
||||
private boolean isSlash(char c) {
|
||||
@@ -343,7 +346,11 @@ class WinNTFileSystem extends FileSystem {
|
||||
private String getUserPath() {
|
||||
/* For both compatibility and security,
|
||||
we must look this up every time */
|
||||
- return normalize(System.getProperty("user.dir"));
|
||||
+ SecurityManager sm = System.getSecurityManager();
|
||||
+ if (sm != null) {
|
||||
+ sm.checkPropertyAccess("user.dir");
|
||||
+ }
|
||||
+ return normalize(userDir);
|
||||
}
|
||||
|
||||
private String getDrive(String path) {
|
||||
diff --git a/jdk/test/java/io/File/UserDirChangedTest.java b/jdk/test/java/io/File/UserDirChangedTest.java
|
||||
new file mode 100644
|
||||
index 000000000..9eccb768e
|
||||
--- /dev/null
|
||||
+++ b/jdk/test/java/io/File/UserDirChangedTest.java
|
||||
@@ -0,0 +1,51 @@
|
||||
+/*
|
||||
+ * Copyright (c) 2018, Oracle and/or its affiliates. All rights reserved.
|
||||
+ * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
||||
+ *
|
||||
+ * This code is free software; you can redistribute it and/or modify it
|
||||
+ * under the terms of the GNU General Public License version 2 only, as
|
||||
+ * published by the Free Software Foundation.
|
||||
+ *
|
||||
+ * This code is distributed in the hope that it will be useful, but WITHOUT
|
||||
+ * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
|
||||
+ * FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
|
||||
+ * version 2 for more details (a copy is included in the LICENSE file that
|
||||
+ * accompanied this code).
|
||||
+ *
|
||||
+ * You should have received a copy of the GNU General Public License version
|
||||
+ * 2 along with this work; if not, write to the Free Software Foundation,
|
||||
+ * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
|
||||
+ *
|
||||
+ * Please contact Oracle, 500 Oracle Parkway, Redwood Shores, CA 94065 USA
|
||||
+ * or visit www.oracle.com if you need additional information or have any
|
||||
+ * questions.
|
||||
+ */
|
||||
+
|
||||
+/* @test
|
||||
+ @bug 8194154
|
||||
+ @summary Test changing property user.dir on impacting getCanonicalPath
|
||||
+ @run main/othervm UserDirChangedTest
|
||||
+ */
|
||||
+
|
||||
+import java.io.File;
|
||||
+
|
||||
+public class UserDirChangedTest {
|
||||
+ public static void main(String[] args) throws Exception {
|
||||
+ String keyUserDir = "user.dir";
|
||||
+ String userDirNew = "/home/a/b/c/";
|
||||
+ String fileName = "./a";
|
||||
+
|
||||
+ String userDir = System.getProperty(keyUserDir);
|
||||
+ File file = new File(fileName);
|
||||
+ String canFilePath = file.getCanonicalPath();
|
||||
+
|
||||
+ // now reset user.dir, this will cause crash on linux without bug 8194154 fixed.
|
||||
+ System.setProperty(keyUserDir, userDirNew);
|
||||
+ String newCanFilePath = file.getCanonicalPath();
|
||||
+ System.out.format("%24s %48s%n", "Canonical Path = ", canFilePath);
|
||||
+ System.out.format("%24s %48s%n", "new Canonical Path = ", newCanFilePath);
|
||||
+ if (!canFilePath.equals(newCanFilePath)) {
|
||||
+ throw new RuntimeException("Changing property user.dir should have no effect on getCanonicalPath");
|
||||
+ }
|
||||
+ }
|
||||
+}
|
||||
--
|
||||
2.19.0
|
||||
|
||||
File diff suppressed because it is too large
Load Diff
@ -3,11 +3,6 @@ From: d30023828 <douyiwang@huawei.com>
|
||||
Date: Wed, 9 Feb 2022 18:32:05 +0800
|
||||
Subject: [PATCH 3/8] 8268819: SA: Remove libthread_db dependency on Linux
|
||||
|
||||
DTS/AR: DTS2022020914784
|
||||
Summary:hotspot:SA: Remove libthread_db dependency on Linux
|
||||
LLT:NA
|
||||
Patch Type:backport
|
||||
Bug url:https://bugs.openjdk.java.net/browse/JDK-8268819
|
||||
---
|
||||
.../agent/src/os/linux/LinuxDebuggerLocal.c | 3 +-
|
||||
hotspot/agent/src/os/linux/Makefile | 6 +-
|
||||
@ -319,23 +314,16 @@ index 802e5b0bb..a8e0c2a5c 100644
|
||||
-
|
||||
#endif /* _PROC_SERVICE_H_ */
|
||||
diff --git a/hotspot/agent/src/os/linux/ps_core.c b/hotspot/agent/src/os/linux/ps_core.c
|
||||
index b7fe4c095..6da43f195 100644
|
||||
index 6fb8c940..5728bcc4 100644
|
||||
--- a/hotspot/agent/src/os/linux/ps_core.c
|
||||
+++ b/hotspot/agent/src/os/linux/ps_core.c
|
||||
@@ -1,5 +1,5 @@
|
||||
/*
|
||||
- * Copyright (c) 2003, 2013, Oracle and/or its affiliates. All rights reserved.
|
||||
+ * Copyright (c) 2003, 2019, Oracle and/or its affiliates. All rights reserved.
|
||||
* DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
|
||||
*
|
||||
* This code is free software; you can redistribute it and/or modify it
|
||||
@@ -31,6 +31,7 @@
|
||||
#include <elf.h>
|
||||
#include <link.h>
|
||||
#include "libproc_impl.h"
|
||||
+#include "proc_service.h"
|
||||
#include "salibelf.h"
|
||||
|
||||
|
||||
// This file has the libproc implementation to read core files.
|
||||
@@ -546,8 +547,7 @@ static bool core_handle_prstatus(struct ps_prochandle* ph, const char* buf, size
|
||||
prstatus_t* prstat = (prstatus_t*) buf;
|
||||
@ -343,9 +331,9 @@ index b7fe4c095..6da43f195 100644
|
||||
print_debug("got integer regset for lwp %d\n", prstat->pr_pid);
|
||||
- // we set pthread_t to -1 for core dump
|
||||
- if((newthr = add_thread_info(ph, (pthread_t) -1, prstat->pr_pid)) == NULL)
|
||||
+ if((newthr = add_thread_info(ph, prstat->pr_pid)) == NULL)
|
||||
+ if((newthr = add_thread_info(ph, prstat->pr_pid)) == NULL)
|
||||
return false;
|
||||
|
||||
|
||||
// copy regs
|
||||
diff --git a/hotspot/agent/src/os/linux/ps_proc.c b/hotspot/agent/src/os/linux/ps_proc.c
|
||||
index c4d6a9ecc..748cc1397 100644
|
||||
|
||||
38
change-sa-jdi.jar-make-file-for-BEP.PATCH
Normal file
38
change-sa-jdi.jar-make-file-for-BEP.PATCH
Normal file
@ -0,0 +1,38 @@
|
||||
From 980b919fde4e1353a9ff989fb78031a48d395ec0 Mon Sep 17 00:00:00 2001
|
||||
From: zhangyipeng <zhangyipeng7@huawei.com>
|
||||
Date: Fri, 6 May 2022 15:23:26 +0800
|
||||
Subject: [PATCH 02/10] change sa-jdi.jar make file for BEP
|
||||
|
||||
---
|
||||
hotspot/make/linux/makefiles/sa.make | 8 ++++++--
|
||||
1 file changed, 6 insertions(+), 2 deletions(-)
|
||||
|
||||
diff --git a/hotspot/make/linux/makefiles/sa.make b/hotspot/make/linux/makefiles/sa.make
|
||||
index cdcb16a1a..6388d95c9 100644
|
||||
--- a/hotspot/make/linux/makefiles/sa.make
|
||||
+++ b/hotspot/make/linux/makefiles/sa.make
|
||||
@@ -50,6 +50,7 @@ SA_CLASSPATH = $(BOOT_JAVA_HOME)/lib/tools.jar
|
||||
MODULELIB_PATH= $(BOOT_JAVA_HOME)/lib/modules
|
||||
|
||||
AGENT_FILES_LIST := $(GENERATED)/agent.classes.list
|
||||
+SA_CLASSDIR_JAR_CONTENTS := $(GENERATED)/sa.jar_contents
|
||||
|
||||
SA_CLASSDIR = $(GENERATED)/saclasses
|
||||
|
||||
@@ -104,8 +105,11 @@ $(GENERATED)/sa-jdi.jar:: $(AGENT_FILES)
|
||||
$(QUIETLY) rm -f $(SA_CLASSDIR)/sun/jvm/hotspot/ui/resources/*
|
||||
$(QUIETLY) cp $(AGENT_SRC_DIR)/sun/jvm/hotspot/ui/resources/*.png $(SA_CLASSDIR)/sun/jvm/hotspot/ui/resources/
|
||||
$(QUIETLY) cp -r $(AGENT_SRC_DIR)/images/* $(SA_CLASSDIR)/
|
||||
- $(QUIETLY) $(REMOTE) $(RUN.JAR) cf $@ -C $(SA_CLASSDIR)/ .
|
||||
- $(QUIETLY) $(REMOTE) $(RUN.JAR) uf $@ -C $(AGENT_SRC_DIR) META-INF/services/com.sun.jdi.connect.Connector
|
||||
+ $(QUIETLY) rm -f $(SA_CLASSDIR_JAR_CONTENTS) && touch $(SA_CLASSDIR_JAR_CONTENTS)
|
||||
+ $(QUIETLY) find $(SA_CLASSDIR) -type f | sed 's|$(SA_CLASSDIR)/||g' >> $(SA_CLASSDIR_JAR_CONTENTS)
|
||||
+ $(QUIETLY) cd $(AGENT_SRC_DIR) && $(REMOTE) $(RUN.JAR) cf $@ META-INF/services/com.sun.jdi.connect.Connector
|
||||
+ $(QUIETLY) cd $(SA_CLASSDIR) && $(REMOTE) $(RUN.JAR) uf $@ @$(SA_CLASSDIR_JAR_CONTENTS)
|
||||
+ $(QUIETLY) cd $(TOPDIR)
|
||||
$(QUIETLY) $(REMOTE) $(RUN.JAVAH) -classpath $(SA_CLASSDIR) -d $(GENERATED) -jni sun.jvm.hotspot.debugger.x86.X86ThreadContext
|
||||
$(QUIETLY) $(REMOTE) $(RUN.JAVAH) -classpath $(SA_CLASSDIR) -d $(GENERATED) -jni sun.jvm.hotspot.debugger.amd64.AMD64ThreadContext
|
||||
$(QUIETLY) $(REMOTE) $(RUN.JAVAH) -classpath $(SA_CLASSDIR) -d $(GENERATED) -jni sun.jvm.hotspot.debugger.aarch64.AARCH64ThreadContext
|
||||
--
|
||||
2.22.0
|
||||
|
||||
@ -1,16 +0,0 @@
|
||||
diff --git a/make/common/NativeCompilation.gmk b/make/common/NativeCompilation.gmk
|
||||
index 0e0346374..2d9bdbeed 100644
|
||||
--- a/make/common/NativeCompilation.gmk
|
||||
+++ b/make/common/NativeCompilation.gmk
|
||||
@@ -537,7 +537,7 @@ define SetupNativeCompilation
|
||||
# to be rebuilt properly.
|
||||
$$($1_DEBUGINFO_ZIP): $$($1_DEBUGINFO_FILES) $$($1_TARGET)
|
||||
$(CD) $$($1_OBJECT_DIR) \
|
||||
- && $(ZIP) -q $$@ $$($1_DEBUGINFO_FILES)
|
||||
+ && $(ZIP) -q $$@ $$(subst $$($1_OBJECT_DIR)/,,$$($1_DEBUGINFO_FILES))
|
||||
endif
|
||||
else
|
||||
ifneq ($$($1_STRIP_POLICY), no_strip)
|
||||
--
|
||||
2.22.0
|
||||
|
||||
@ -17,38 +17,10 @@ Signed-off-by: He Dongbo <hedongbo@huawei.com>
|
||||
create mode 100644 jdk/test/micro/org/openeuler/bench/security/openssl/HMacBenchmark.java
|
||||
|
||||
diff --git a/common/autoconf/generated-configure.sh b/common/autoconf/generated-configure.sh
|
||||
index 60298422f..bdfdd207b 100644
|
||||
index 27cff542..d19c772e 100644
|
||||
--- a/common/autoconf/generated-configure.sh
|
||||
+++ b/common/autoconf/generated-configure.sh
|
||||
@@ -4288,7 +4288,7 @@ TOOLCHAIN_DESCRIPTION_xlc="IBM XL C/C++"
|
||||
|
||||
################################################################################
|
||||
# The order of these defines the priority by which we try to find them.
|
||||
-VALID_VS_VERSIONS="2010 2012 2013 2015 2017"
|
||||
+VALID_VS_VERSIONS="2010 2012 2013 2015 2017 2019"
|
||||
|
||||
VS_DESCRIPTION_2010="Microsoft Visual Studio 2010"
|
||||
VS_VERSION_INTERNAL_2010=100
|
||||
@@ -4346,6 +4346,18 @@ VS_SDK_INSTALLDIR_2017=
|
||||
VS_VS_PLATFORM_NAME_2017="v141"
|
||||
VS_SDK_PLATFORM_NAME_2017=
|
||||
|
||||
+VS_DESCRIPTION_2019="Microsoft Visual Studio 2019 - CURRENTLY NOT WORKING"
|
||||
+VS_VERSION_INTERNAL_2019=141
|
||||
+VS_MSVCR_2019=vcruntime140.dll
|
||||
+VS_MSVCP_2019=msvcp140.dll
|
||||
+VS_ENVVAR_2019="VS150COMNTOOLS"
|
||||
+VS_USE_UCRT_2019="true"
|
||||
+VS_VS_INSTALLDIR_2019="Microsoft Visual Studio/2019"
|
||||
+VS_EDITIONS_2019="Community Professional Enterprise"
|
||||
+VS_SDK_INSTALLDIR_2019=
|
||||
+VS_VS_PLATFORM_NAME_2019="v141"
|
||||
+VS_SDK_PLATFORM_NAME_2019=
|
||||
+
|
||||
################################################################################
|
||||
|
||||
|
||||
@@ -25694,10 +25706,10 @@ $as_echo "$as_me: Valid Visual Studio versions: $VALID_VS_VERSIONS." >&6;}
|
||||
@@ -25937,10 +25937,10 @@ $as_echo "$as_me: Valid Visual Studio versions: $VALID_VS_VERSIONS." >&6;}
|
||||
{ $as_echo "$as_me:${as_lineno-$LINENO}: Found Visual Studio installation at $VS_BASE using $METHOD" >&5
|
||||
$as_echo "$as_me: Found Visual Studio installation at $VS_BASE using $METHOD" >&6;}
|
||||
if test "x$OPENJDK_TARGET_CPU_BITS" = x32; then
|
||||
@ -61,7 +33,7 @@ index 60298422f..bdfdd207b 100644
|
||||
fi
|
||||
|
||||
for VCVARSFILE in $VCVARSFILES; do
|
||||
@@ -25751,10 +25763,10 @@ $as_echo "$as_me: Warning: None of $VCVARSFILES were found, Visual Studio instal
|
||||
@@ -25994,10 +25994,10 @@ $as_echo "$as_me: Warning: None of $VCVARSFILES were found, Visual Studio instal
|
||||
{ $as_echo "$as_me:${as_lineno-$LINENO}: Found Visual Studio installation at $VS_BASE using $METHOD" >&5
|
||||
$as_echo "$as_me: Found Visual Studio installation at $VS_BASE using $METHOD" >&6;}
|
||||
if test "x$OPENJDK_TARGET_CPU_BITS" = x32; then
|
||||
@ -74,7 +46,7 @@ index 60298422f..bdfdd207b 100644
|
||||
fi
|
||||
|
||||
for VCVARSFILE in $VCVARSFILES; do
|
||||
@@ -25790,8 +25802,6 @@ $as_echo "$as_me: directory within the Visual Studio installation" >&6;}
|
||||
@@ -26033,8 +26033,6 @@ $as_echo "$as_me: directory within the Visual Studio installation" >&6;}
|
||||
fi
|
||||
fi
|
||||
|
||||
@ -83,7 +55,7 @@ index 60298422f..bdfdd207b 100644
|
||||
if test "x$VS_COMNTOOLS" != x; then
|
||||
|
||||
if test "x$VS_ENV_CMD" = x; then
|
||||
@@ -25824,10 +25834,10 @@ $as_echo "$as_me: directory within the Visual Studio installation" >&6;}
|
||||
@@ -26067,10 +26065,10 @@ $as_echo "$as_me: directory within the Visual Studio installation" >&6;}
|
||||
{ $as_echo "$as_me:${as_lineno-$LINENO}: Found Visual Studio installation at $VS_BASE using $METHOD" >&5
|
||||
$as_echo "$as_me: Found Visual Studio installation at $VS_BASE using $METHOD" >&6;}
|
||||
if test "x$OPENJDK_TARGET_CPU_BITS" = x32; then
|
||||
@ -96,7 +68,7 @@ index 60298422f..bdfdd207b 100644
|
||||
fi
|
||||
|
||||
for VCVARSFILE in $VCVARSFILES; do
|
||||
@@ -25883,10 +25893,10 @@ $as_echo "$as_me: Warning: None of $VCVARSFILES were found, Visual Studio instal
|
||||
@@ -26126,10 +26124,10 @@ $as_echo "$as_me: Warning: None of $VCVARSFILES were found, Visual Studio instal
|
||||
{ $as_echo "$as_me:${as_lineno-$LINENO}: Found Visual Studio installation at $VS_BASE using $METHOD" >&5
|
||||
$as_echo "$as_me: Found Visual Studio installation at $VS_BASE using $METHOD" >&6;}
|
||||
if test "x$OPENJDK_TARGET_CPU_BITS" = x32; then
|
||||
@ -109,7 +81,7 @@ index 60298422f..bdfdd207b 100644
|
||||
fi
|
||||
|
||||
for VCVARSFILE in $VCVARSFILES; do
|
||||
@@ -25944,10 +25954,10 @@ $as_echo "$as_me: Warning: None of $VCVARSFILES were found, Visual Studio instal
|
||||
@@ -26187,10 +26185,10 @@ $as_echo "$as_me: Warning: None of $VCVARSFILES were found, Visual Studio instal
|
||||
{ $as_echo "$as_me:${as_lineno-$LINENO}: Found Visual Studio installation at $VS_BASE using $METHOD" >&5
|
||||
$as_echo "$as_me: Found Visual Studio installation at $VS_BASE using $METHOD" >&6;}
|
||||
if test "x$OPENJDK_TARGET_CPU_BITS" = x32; then
|
||||
@ -122,7 +94,7 @@ index 60298422f..bdfdd207b 100644
|
||||
fi
|
||||
|
||||
for VCVARSFILE in $VCVARSFILES; do
|
||||
@@ -26002,10 +26012,10 @@ $as_echo "$as_me: Warning: None of $VCVARSFILES were found, Visual Studio instal
|
||||
@@ -26245,10 +26243,10 @@ $as_echo "$as_me: Warning: None of $VCVARSFILES were found, Visual Studio instal
|
||||
{ $as_echo "$as_me:${as_lineno-$LINENO}: Found Visual Studio installation at $VS_BASE using $METHOD" >&5
|
||||
$as_echo "$as_me: Found Visual Studio installation at $VS_BASE using $METHOD" >&6;}
|
||||
if test "x$OPENJDK_TARGET_CPU_BITS" = x32; then
|
||||
@ -135,7 +107,7 @@ index 60298422f..bdfdd207b 100644
|
||||
fi
|
||||
|
||||
for VCVARSFILE in $VCVARSFILES; do
|
||||
@@ -26059,10 +26069,10 @@ $as_echo "$as_me: Warning: None of $VCVARSFILES were found, Visual Studio instal
|
||||
@@ -26302,10 +26300,10 @@ $as_echo "$as_me: Warning: None of $VCVARSFILES were found, Visual Studio instal
|
||||
{ $as_echo "$as_me:${as_lineno-$LINENO}: Found Visual Studio installation at $VS_BASE using $METHOD" >&5
|
||||
$as_echo "$as_me: Found Visual Studio installation at $VS_BASE using $METHOD" >&6;}
|
||||
if test "x$OPENJDK_TARGET_CPU_BITS" = x32; then
|
||||
@ -149,38 +121,10 @@ index 60298422f..bdfdd207b 100644
|
||||
|
||||
for VCVARSFILE in $VCVARSFILES; do
|
||||
diff --git a/common/autoconf/toolchain_windows.m4 b/common/autoconf/toolchain_windows.m4
|
||||
index a78f9ac66..0b5efdad2 100644
|
||||
index 9e617c33..f024da1e 100644
|
||||
--- a/common/autoconf/toolchain_windows.m4
|
||||
+++ b/common/autoconf/toolchain_windows.m4
|
||||
@@ -25,7 +25,7 @@
|
||||
|
||||
################################################################################
|
||||
# The order of these defines the priority by which we try to find them.
|
||||
-VALID_VS_VERSIONS="2010 2012 2013 2015 2017"
|
||||
+VALID_VS_VERSIONS="2010 2012 2013 2015 2017 2019"
|
||||
|
||||
VS_DESCRIPTION_2010="Microsoft Visual Studio 2010"
|
||||
VS_VERSION_INTERNAL_2010=100
|
||||
@@ -83,6 +83,18 @@ VS_SDK_INSTALLDIR_2017=
|
||||
VS_VS_PLATFORM_NAME_2017="v141"
|
||||
VS_SDK_PLATFORM_NAME_2017=
|
||||
|
||||
+VS_DESCRIPTION_2019="Microsoft Visual Studio 2019 - CURRENTLY NOT WORKING"
|
||||
+VS_VERSION_INTERNAL_2019=141
|
||||
+VS_MSVCR_2019=vcruntime140.dll
|
||||
+VS_MSVCP_2019=msvcp140.dll
|
||||
+VS_ENVVAR_2019="VS150COMNTOOLS"
|
||||
+VS_USE_UCRT_2019="true"
|
||||
+VS_VS_INSTALLDIR_2019="Microsoft Visual Studio/2019"
|
||||
+VS_EDITIONS_2019="Community Professional Enterprise"
|
||||
+VS_SDK_INSTALLDIR_2019=
|
||||
+VS_VS_PLATFORM_NAME_2019="v141"
|
||||
+VS_SDK_PLATFORM_NAME_2019=
|
||||
+
|
||||
################################################################################
|
||||
|
||||
AC_DEFUN([TOOLCHAIN_CHECK_POSSIBLE_VISUAL_STUDIO_ROOT],
|
||||
@@ -107,10 +119,10 @@ AC_DEFUN([TOOLCHAIN_CHECK_POSSIBLE_VISUAL_STUDIO_ROOT],
|
||||
@@ -121,10 +121,10 @@ AC_DEFUN([TOOLCHAIN_CHECK_POSSIBLE_VISUAL_STUDIO_ROOT],
|
||||
if test -d "$VS_BASE"; then
|
||||
AC_MSG_NOTICE([Found Visual Studio installation at $VS_BASE using $METHOD])
|
||||
if test "x$OPENJDK_TARGET_CPU_BITS" = x32; then
|
||||
@ -193,7 +137,7 @@ index a78f9ac66..0b5efdad2 100644
|
||||
fi
|
||||
|
||||
for VCVARSFILE in $VCVARSFILES; do
|
||||
@@ -198,8 +210,6 @@ AC_DEFUN([TOOLCHAIN_FIND_VISUAL_STUDIO_BAT_FILE],
|
||||
@@ -212,8 +212,6 @@ AC_DEFUN([TOOLCHAIN_FIND_VISUAL_STUDIO_BAT_FILE],
|
||||
fi
|
||||
fi
|
||||
|
||||
|
||||
@ -1,27 +0,0 @@
|
||||
From a447db8644fe785db481a425fe3efa62cb11122f Mon Sep 17 00:00:00 2001
|
||||
Date: Mon, 25 Apr 2022 17:12:39 +0800
|
||||
Subject: [PATCH] Fix make bugs when git and hg not exist
|
||||
|
||||
---
|
||||
make/common/MakeBase.gmk | 4 ++--
|
||||
1 file changed, 2 insertions(+), 2 deletions(-)
|
||||
|
||||
diff --git a/make/common/MakeBase.gmk b/make/common/MakeBase.gmk
|
||||
index 2ba3d04..c97a42a 100644
|
||||
--- a/make/common/MakeBase.gmk
|
||||
+++ b/make/common/MakeBase.gmk
|
||||
@@ -318,9 +318,9 @@ SCM_TIP_FILECMD := $(PRINTF) "$(SCM):%s" \
|
||||
# Emit the scm:id pair to $@
|
||||
define GetSourceTips
|
||||
$(CD) $(SRC_ROOT) ; \
|
||||
- if [ -d $(SCM_DIR) -a "$(SCM_VERSION)" != "" ] ; then \
|
||||
+ if [ -d "$(SCM_DIR)" -a "$(SCM_VERSION)" != "" ] ; then \
|
||||
$(ID_COMMAND) >> $@ ; \
|
||||
- elif [ -f $(SCM_TIP_FILENAME) ] ; then \
|
||||
+ elif [ -f "$(SCM_TIP_FILENAME)" ] ; then \
|
||||
$(SCM_TIP_FILECMD) >> $@ ; \
|
||||
fi;
|
||||
$(PRINTF) "\n" >> $@
|
||||
--
|
||||
1.8.3.1
|
||||
|
||||
Binary file not shown.
@ -146,13 +146,13 @@
|
||||
%global origin_nice OpenJDK
|
||||
%global top_level_dir_name %{origin}
|
||||
%global repo jdk8u
|
||||
%global revision jdk8u332-b09
|
||||
%global revision jdk8u342-b07
|
||||
%global full_revision %{repo}-%{revision}
|
||||
# Define IcedTea version used for SystemTap tapsets and desktop files
|
||||
%global icedteaver 3.15.0
|
||||
|
||||
%global updatever 332
|
||||
%global buildver b09
|
||||
%global updatever 342
|
||||
%global buildver b07
|
||||
# priority must be 7 digits in total. The expression is workarounding tip
|
||||
%global priority 1800%{updatever}
|
||||
|
||||
@ -916,7 +916,7 @@ Provides: java-%{javaver}-%{origin}-accessibility%{?1} = %{epoch}:%{version}-%{r
|
||||
|
||||
Name: java-%{javaver}-%{origin}
|
||||
Version: %{javaver}.%{updatever}.%{buildver}
|
||||
Release: 2
|
||||
Release: 0
|
||||
# java-1.5.0-ibm from jpackage.org set Epoch to 1 for unknown reasons
|
||||
# and this change was brought into RHEL-4. java-1.5.0-ibm packages
|
||||
# also included the epoch in their virtual provides. This created a
|
||||
@ -993,7 +993,6 @@ Patch58: Reduce-the-probability-of-the-crash-related-to-ciObj.patch
|
||||
Patch62: 8165857.patch
|
||||
Patch63: 8033552.patch
|
||||
Patch67: 8165860.patch
|
||||
Patch68: 8194154.patch
|
||||
Patch70: 8164948.patch
|
||||
|
||||
# 8u242
|
||||
@ -1044,7 +1043,6 @@ Patch142: 8207160.patch
|
||||
Patch144: add-appcds-test-case.patch
|
||||
|
||||
# 8u282
|
||||
Patch146: 8168926.patch
|
||||
Patch147: 8215047.patch
|
||||
Patch148: 8237894.patch
|
||||
Patch149: Remove-the-parentheses-around-company-name.patch
|
||||
@ -1075,13 +1073,11 @@ Patch177: downgrade-symver-of-memcpy-GLIBC.patch
|
||||
Patch178: fix-log-bug-enhance-aes-hmac-performance.patch
|
||||
Patch179: keep-the-binary-equal.patch
|
||||
Patch180: link-option-use-rpath-instead-of-runpath.patch
|
||||
Patch181: remove-gnu-debuglink-when-using-enable-debug-.patch
|
||||
Patch183: revert-windows-bugfix.patch
|
||||
Patch184: set-vm.vendor-by-configure.patch
|
||||
Patch185: update-cacerts-and-VerifyCACerts.java-test.patch
|
||||
Patch186: update-to-keep-same-with-master.patch
|
||||
Patch188: 8247691_incorrect_handling_of_VM_exceptions_in_C1_deopt_stub.patch
|
||||
Patch189: 8266187_Memory_leak_in_appendBootClassPath.patch
|
||||
Patch192: add_kae_implementation_add_default_conf_file.patch
|
||||
Patch193: improve_algorithmConstraints_checkAlgorithm_performance.patch
|
||||
Patch194: modify_the_default_iteration_time_and_forks_in_the_JMH_of_KAEProvider.patch
|
||||
@ -1105,7 +1101,6 @@ Patch212: enhance-the-TimeZone-s-path-solution-on-Euler.patch
|
||||
Patch214: fix-appcds-s-option-AppCDSLockFile.patch
|
||||
Patch215: PS-introduce-UsePSRelaxedForwardee-to-enable-using-r.patch
|
||||
Patch216: Parallel-Full-GC-for-G1.patch
|
||||
Patch217: 8202142-jfr-event-io-TestInstrumentation-is-unstable.patch
|
||||
Patch218: 8143251-Thread-suspend-on-VM_G1IncCollectionPause-do.patch
|
||||
Patch219: G1Uncommit-Introduce-G1PeriodGCNotRetry-control-whet.patch
|
||||
Patch220: JDK-debug-version-crash-when-using-AppCDS.patch
|
||||
@ -1121,7 +1116,6 @@ Patch229: downgrade-the-symver-of-fcntl64.patch
|
||||
|
||||
# 8u322
|
||||
Patch230: add-system-property-swing.JComboBox.useLegacyMode.patch
|
||||
Patch231: debuginfo.diz-should-not-contain-the-path-after-unzip.patch
|
||||
Patch232: 8173361-various-crashes-in-JvmtiExport-post_compiled.patch
|
||||
Patch233: fix-TestUseCompressedOopsErgo-run-failed.patch
|
||||
Patch235: fix-testme-Test6929067-run-faild.patch
|
||||
@ -1133,9 +1127,14 @@ Patch240: 8207011-Remove-uses-of-the-register-storage-class-specifier.patch
|
||||
Patch241: 8268819-SA-Remove-libthread_db-dependency-on-Linux.patch
|
||||
|
||||
# 8u332
|
||||
Patch242: fix-make-bugs-when-git-and-hg-not-exist.patch
|
||||
Patch243: Fix-compile-and-runtime-failures-for-minimal1-versio.patch
|
||||
Patch244: fix_X509TrustManagerImpl_symantec_distrust.patch
|
||||
Patch245: change-sa-jdi.jar-make-file-for-BEP.PATCH
|
||||
Patch246: 7092821-java.security.Provider.getService-is-synchro.patch
|
||||
Patch247: 8173339-AArch64-Fix-minimum-stack-size-computations.patch
|
||||
Patch248: 8067941-TESTBUG-Fix-tests-for-OS-with-64K-page-size.patch
|
||||
|
||||
# 8u342
|
||||
|
||||
#############################################
|
||||
#
|
||||
@ -1494,7 +1493,6 @@ pushd %{top_level_dir_name}
|
||||
%patch62 -p1
|
||||
%patch63 -p1
|
||||
%patch67 -p1
|
||||
%patch68 -p1
|
||||
%patch70 -p1
|
||||
%patch75 -p1
|
||||
%patch83 -p1
|
||||
@ -1533,7 +1531,6 @@ pushd %{top_level_dir_name}
|
||||
%patch141 -p1
|
||||
%patch142 -p1
|
||||
%patch144 -p1
|
||||
%patch146 -p1
|
||||
%patch147 -p1
|
||||
%patch148 -p1
|
||||
%patch149 -p1
|
||||
@ -1562,13 +1559,11 @@ pushd %{top_level_dir_name}
|
||||
%patch178 -p1
|
||||
%patch179 -p1
|
||||
%patch180 -p1
|
||||
%patch181 -p1
|
||||
%patch183 -p1
|
||||
%patch184 -p1
|
||||
%patch185 -p1
|
||||
%patch186 -p1
|
||||
%patch188 -p1
|
||||
%patch189 -p1
|
||||
%patch192 -p1
|
||||
%patch194 -p1
|
||||
%patch195 -p1
|
||||
@ -1589,7 +1584,6 @@ pushd %{top_level_dir_name}
|
||||
%patch214 -p1
|
||||
%patch215 -p1
|
||||
%patch216 -p1
|
||||
%patch217 -p1
|
||||
%patch218 -p1
|
||||
%patch219 -p1
|
||||
%patch220 -p1
|
||||
@ -1601,7 +1595,6 @@ pushd %{top_level_dir_name}
|
||||
%patch228 -p1
|
||||
%patch229 -p1
|
||||
%patch230 -p1
|
||||
%patch231 -p1
|
||||
%patch232 -p1
|
||||
%patch233 -p1
|
||||
%patch235 -p1
|
||||
@ -1611,9 +1604,12 @@ pushd %{top_level_dir_name}
|
||||
%patch239 -p1
|
||||
%patch240 -p1
|
||||
%patch241 -p1
|
||||
%patch242 -p1
|
||||
%patch243 -p1
|
||||
%patch244 -p1
|
||||
%patch245 -p1
|
||||
%patch246 -p1
|
||||
%patch247 -p1
|
||||
%patch248 -p1
|
||||
popd
|
||||
|
||||
# System library fixes
|
||||
@ -2231,6 +2227,32 @@ require "copy_jdk_configs.lua"
|
||||
%endif
|
||||
|
||||
%changelog
|
||||
* Fri Jul 22 2022 kuenking111 <wangkun49@huawei.com> - 1:1.8.0.342-b07.0
|
||||
- del 8168926.patch
|
||||
- del 8194154.patch
|
||||
- del 8202142-jfr-event-io-TestInstrumentation-is-unstable.patch
|
||||
- del 8266187_Memory_leak_in_appendBootClassPath.patch
|
||||
- del debuginfo.diz-should-not-contain-the-path-after-unzip.patch
|
||||
- del fix-make-bugs-when-git-and-hg-not-exist.patch
|
||||
- modified 7092821-java.security.Provider.getService-is-synchro.patch
|
||||
- modified 8268819-SA-Remove-libthread_db-dependency-on-Linux.patch
|
||||
- modified fix-log-bug-enhance-aes-hmac-performance.patch
|
||||
|
||||
* Fri Jul 15 2022 kuenking111 <wangkun49@huawei.com> - 1:1.8.0.332-b09.7
|
||||
- del remove-gnu-debuglink-when-using-enable-debug-.patch
|
||||
|
||||
* Mon Jul 4 2022 kuenking111 <wangkun49@huawei.com> - 1:1.8.0.332-b09.6
|
||||
- add 8067941-TESTBUG-Fix-tests-for-OS-with-64K-page-size.patch
|
||||
|
||||
* Mon Jul 4 2022 kuenking111 <wangkun49@huawei.com> - 1:1.8.0.332-b09.5
|
||||
- add 8173339-AArch64-Fix-minimum-stack-size-computations.patch
|
||||
|
||||
* Mon Jul 4 2022 kuenking111 <wangkun49@huawei.com> - 1:1.8.0.332-b09.4
|
||||
- add 7092821-java.security.Provider.getService-is-synchro.patch
|
||||
|
||||
* Thu Jun 30 2022 kuenking111 <wangkun49@huawei.com> - 1:1.8.0.332-b09.3
|
||||
- add change-sa-jdi.jar-make-file-for-BEP.PATCH
|
||||
|
||||
* Thu Apr 28 2022 kuenking111 <wangkun49@huawei.com> - 1:1.8.0.332-b09.2
|
||||
- add fix_X509TrustManagerImpl_symantec_distrust.patch
|
||||
|
||||
@ -2278,6 +2300,8 @@ require "copy_jdk_configs.lua"
|
||||
- deleted Delete-expired-certificate-globalsignr2ca.patch
|
||||
- deleted inline-optimize-for-aarch64.patch
|
||||
|
||||
* Tue Jan 05 2021 noah <hedongbo@huawei.com> - 1:1.8.0.312-b07.11
|
||||
- adapted to newst cjc to fix issue with rpm 4.17
|
||||
|
||||
* Tue Dec 21 2021 kuenking111 <wangkun49@huawei.com> - 1:1.8.0.312-b07.10
|
||||
- delete stack protection
|
||||
|
||||
@ -1,68 +0,0 @@
|
||||
From 39774b66e6b962a89a02504f08c20b309f9eef1f Mon Sep 17 00:00:00 2001
|
||||
From: zhangyipeng <zhangyipeng7@huawei.com>
|
||||
Date: Thu, 4 Mar 2021 10:10:30 +0800
|
||||
Subject: [PATCH] [Huawei]remove gnu debuglink when using enable debug
|
||||
symbols
|
||||
|
||||
|
||||
|
||||
Signed-off-by: Sun Jianye <sunjianye@huawei.com>
|
||||
---
|
||||
hotspot/make/linux/makefiles/jsig.make | 1 -
|
||||
hotspot/make/linux/makefiles/saproc.make | 1 -
|
||||
hotspot/make/linux/makefiles/vm.make | 1 -
|
||||
make/common/NativeCompilation.gmk | 2 +-
|
||||
4 files changed, 1 insertion(+), 4 deletions(-)
|
||||
|
||||
diff --git a/hotspot/make/linux/makefiles/jsig.make b/hotspot/make/linux/makefiles/jsig.make
|
||||
index 6290db5af..9838a50aa 100644
|
||||
--- a/hotspot/make/linux/makefiles/jsig.make
|
||||
+++ b/hotspot/make/linux/makefiles/jsig.make
|
||||
@@ -63,7 +63,6 @@ $(LIBJSIG): $(JSIGSRCDIR)/jsig.c $(LIBJSIG_MAPFILE)
|
||||
ifeq ($(ENABLE_FULL_DEBUG_SYMBOLS),1)
|
||||
ifneq ($(STRIP_POLICY),no_strip)
|
||||
$(QUIETLY) $(OBJCOPY) --only-keep-debug $@ $(LIBJSIG_DEBUGINFO)
|
||||
- $(QUIETLY) $(OBJCOPY) --add-gnu-debuglink=$(LIBJSIG_DEBUGINFO) $@
|
||||
endif
|
||||
ifeq ($(STRIP_POLICY),all_strip)
|
||||
$(QUIETLY) $(STRIP) $@
|
||||
diff --git a/hotspot/make/linux/makefiles/saproc.make b/hotspot/make/linux/makefiles/saproc.make
|
||||
index ffc0ec5ce..dfeb254da 100644
|
||||
--- a/hotspot/make/linux/makefiles/saproc.make
|
||||
+++ b/hotspot/make/linux/makefiles/saproc.make
|
||||
@@ -107,7 +107,6 @@ $(LIBSAPROC): $(SASRCFILES) $(SAMAPFILE)
|
||||
ifeq ($(ENABLE_FULL_DEBUG_SYMBOLS),1)
|
||||
ifneq ($(STRIP_POLICY),no_strip)
|
||||
$(QUIETLY) $(OBJCOPY) --only-keep-debug $@ $(LIBSAPROC_DEBUGINFO)
|
||||
- $(QUIETLY) $(OBJCOPY) --add-gnu-debuglink=$(LIBSAPROC_DEBUGINFO) $@
|
||||
endif
|
||||
ifeq ($(STRIP_POLICY),all_strip)
|
||||
$(QUIETLY) $(STRIP) $@
|
||||
diff --git a/hotspot/make/linux/makefiles/vm.make b/hotspot/make/linux/makefiles/vm.make
|
||||
index 1985db071..408b0cc9d 100644
|
||||
--- a/hotspot/make/linux/makefiles/vm.make
|
||||
+++ b/hotspot/make/linux/makefiles/vm.make
|
||||
@@ -359,7 +359,6 @@ $(LIBJVM): $(LIBJVM.o) $(LIBJVM_MAPFILE) $(LD_SCRIPT)
|
||||
ifeq ($(ENABLE_FULL_DEBUG_SYMBOLS),1)
|
||||
ifneq ($(STRIP_POLICY),no_strip)
|
||||
$(QUIETLY) $(OBJCOPY) --only-keep-debug $@ $(LIBJVM_DEBUGINFO)
|
||||
- $(QUIETLY) $(OBJCOPY) --add-gnu-debuglink=$(LIBJVM_DEBUGINFO) $@
|
||||
endif
|
||||
ifeq ($(STRIP_POLICY),all_strip)
|
||||
$(QUIETLY) $(STRIP) $@
|
||||
diff --git a/make/common/NativeCompilation.gmk b/make/common/NativeCompilation.gmk
|
||||
index 9980e8ab9..4fa9f14cf 100644
|
||||
--- a/make/common/NativeCompilation.gmk
|
||||
+++ b/make/common/NativeCompilation.gmk
|
||||
@@ -487,7 +487,7 @@ define SetupNativeCompilation
|
||||
$$($1_DEBUGINFO_FILES): $$($1_TARGET)
|
||||
$(RM) $$@
|
||||
$(OBJCOPY) --only-keep-debug $$< $$@
|
||||
- $(CD) $$(@D) && $(OBJCOPY) --add-gnu-debuglink=$$(@F) $$<
|
||||
+ $(CD) $$(@D)
|
||||
$(TOUCH) $$@
|
||||
endif
|
||||
else ifeq ($(OPENJDK_TARGET_OS), aix)
|
||||
--
|
||||
2.19.0
|
||||
|
||||
Loading…
x
Reference in New Issue
Block a user