John Rose a écrit :
On Apr 24, 2008, at 2:26 AM, Rémi Forax wrote:

In my opinion, getResource() is not the only method that makes this
assumption

The getResource method probably needs to be adjusted since anonymous classes have names that are intentionally distorted. The anonymous class name ends with "/${hashcode}" so that attempts to do forName will rapidly fail, and so that it is clear which classes are anonymous.
Are you sure hashcode are unique and never creates a name collisions ?
The logic for Class.resolveName needs to take this case into account if resources are to work. (I assume that it is a good idea for them to "work", but maybe it's not.) It's a good question, and a nice experiment.

-- John
Perhaps it's a good idea to try to surface isAnonymousClass() a Java level
or even better getHostClass() (or getAnonymousHostClass()).
I will try to create a patch for that this week-end, i seems to be a good idea
to try to understand the VM internals.

Another experiment,
trying to resolve an anonymous class using ClassLoader.resolveClass() leads to a crash in SystemDictionnary.
Step to reproduce, change sun.misc.Launcher by the one in attachement,
I have chnage the application classloader to load all non bootstrap class as anonymous one (see findClass) but when it tries to call resolveClass() (in ClassLoader.loadClass()) on an anonymous class,
the VM crashs.

I don't know if trying to resolve an anonymous class is legal or not.

The following lines are a cut&paste of the crash using the fastdebug VM (patched with anonk and callcc).

Rémi

[EMAIL PROTECTED] eclipse]$ java -davinci -Xbootclasspath/p:classes -cp test/classes:/usr/local/java/demo/jfc/SwingSet2/SwingSet2.jar AllAnonymousLauncher SwingSet2
load anonymous AllAnonymousLauncher
resource [EMAIL PROTECTED]
anonymous loaded class AllAnonymousLauncher/26208195
# To suppress the following error report, specify this argument
# after -XX: or in .hotspotrc:  SuppressErrorAt=/systemDictionary.cpp:850
#
# An unexpected error has been detected by Java Runtime Environment:
#
# Internal Error (/home/forax/java/workspace/davinci/sources/hotspot/src/share/vm/classfile/systemDictionary.cpp:850), pid=15414, tid=3084950416
#  Error: assert(kk == k(),"should be present in dictionary")
#
# Java VM: OpenJDK Client VM (12.0-b01-internal-fastdebug mixed mode linux-x86)
# An error report file with more information is saved as:
# /home/forax/java/workspace/davinci/eclipse/hs_err_pid15414.log
#
# If you would like to submit a bug report, please visit:
#   http://java.sun.com/webapps/bugreport/crash.jsp
#
Current thread is 3084950416
Dumping core ...
Abandon


/*
 * Copyright 1998-2005 Sun Microsystems, Inc.  All Rights Reserved.
 * DO NOT ALTER OR REMOVE COPYRIGHT NOTICES OR THIS FILE HEADER.
 *
 * This code is free software; you can redistribute it and/or modify it
 * under the terms of the GNU General Public License version 2 only, as
 * published by the Free Software Foundation.  Sun designates this
 * particular file as subject to the "Classpath" exception as provided
 * by Sun in the LICENSE file that accompanied this code.
 *
 * This code is distributed in the hope that it will be useful, but WITHOUT
 * ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or
 * FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License
 * version 2 for more details (a copy is included in the LICENSE file that
 * accompanied this code).
 *
 * You should have received a copy of the GNU General Public License version
 * 2 along with this work; if not, write to the Free Software Foundation,
 * Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.
 *
 * Please contact Sun Microsystems, Inc., 4150 Network Circle, Santa Clara,
 * CA 95054 USA or visit www.sun.com if you need additional information or
 * have any questions.
 */

package sun.misc;

import java.io.File;
import java.io.IOException;
import java.io.FilePermission;
import java.net.URL;
import java.net.URLClassLoader;
import java.net.MalformedURLException;
import java.net.URLStreamHandler;
import java.net.URLStreamHandlerFactory;
import java.util.HashSet;
import java.util.StringTokenizer;
import java.util.Set;
import java.util.Vector;
import java.security.AccessController;
import java.security.PrivilegedAction;
import java.security.PrivilegedExceptionAction;
import java.security.AccessControlContext;
import java.security.PermissionCollection;
import java.security.Permissions;
import java.security.Permission;
import java.security.ProtectionDomain;
import java.security.CodeSource;
import sun.security.action.GetPropertyAction;
import sun.security.util.SecurityConstants;
import sun.net.www.ParseUtil;


/**
 * This class is used by the system to launch the main application.
Launcher */
public class Launcher {
    private static URLStreamHandlerFactory factory = new Factory();
    private static Launcher launcher = new Launcher();

    public static Launcher getLauncher() {
        return launcher;
    }

    private ClassLoader loader;

    public Launcher() {
        // Create the extension class loader
        ClassLoader extcl;
        try {
            extcl = ExtClassLoader.getExtClassLoader();
        } catch (IOException e) {
            throw new InternalError(
                "Could not create extension class loader");
        }

        // Now create the class loader to use to launch the application
        try {
            loader = AppClassLoader.getAppClassLoader(extcl);
        } catch (IOException e) {
            throw new InternalError(
                "Could not create application class loader");
        }

        // Also set the context class loader for the primordial thread.
        Thread.currentThread().setContextClassLoader(loader);

        // Finally, install a security manager if requested
        String s = System.getProperty("java.security.manager");
        if (s != null) {
            SecurityManager sm = null;
            if ("".equals(s) || "default".equals(s)) {
                sm = new java.lang.SecurityManager();
            } else {
                try {
                    sm = (SecurityManager)loader.loadClass(s).newInstance();
                } catch (IllegalAccessException e) {
                } catch (InstantiationException e) {
                } catch (ClassNotFoundException e) {
                } catch (ClassCastException e) {
                }
            }
            if (sm != null) {
                System.setSecurityManager(sm);
            } else {
                throw new InternalError(
                    "Could not create SecurityManager: " + s);
            }
        }
    }

    /*
     * Returns the class loader used to launch the main application.
     */
    public ClassLoader getClassLoader() {
        return loader;
    }

    /*
     * The class loader used for loading installed extensions.
     */
    static class ExtClassLoader extends URLClassLoader {
        private File[] dirs;

        /**
         * create an ExtClassLoader. The ExtClassLoader is created
         * within a context that limits which files it can read
         */
        public static ExtClassLoader getExtClassLoader() throws IOException
        {
            final File[] dirs = getExtDirs();

            try {
                // Prior implementations of this doPrivileged() block supplied
                // aa synthesized ACC via a call to the private method
                // ExtClassLoader.getContext().

                return AccessController.doPrivileged(
                    new PrivilegedExceptionAction<ExtClassLoader>() {
                        public ExtClassLoader run() throws IOException {
                            int len = dirs.length;
                            for (int i = 0; i < len; i++) {
                                MetaIndex.registerDirectory(dirs[i]);
                            }
                            return new ExtClassLoader(dirs);
                        }
                    });
            } catch (java.security.PrivilegedActionException e) {
                    throw (IOException) e.getException();
            }
        }

        void addExtURL(URL url) {
                super.addURL(url);
        }

        /*
         * Creates a new ExtClassLoader for the specified directories.
         */
        public ExtClassLoader(File[] dirs) throws IOException {
            super(getExtURLs(dirs), null, factory);
            this.dirs = dirs;
        }

        private static File[] getExtDirs() {
            String s = System.getProperty("java.ext.dirs");
            File[] dirs;
            if (s != null) {
                StringTokenizer st =
                    new StringTokenizer(s, File.pathSeparator);
                int count = st.countTokens();
                dirs = new File[count];
                for (int i = 0; i < count; i++) {
                    dirs[i] = new File(st.nextToken());
                }
            } else {
                dirs = new File[0];
            }
            return dirs;
        }

        private static URL[] getExtURLs(File[] dirs) throws IOException {
            Vector<URL> urls = new Vector<URL>();
            for (int i = 0; i < dirs.length; i++) {
                String[] files = dirs[i].list();
                if (files != null) {
                    for (int j = 0; j < files.length; j++) {
                        if (!files[j].equals("meta-index")) {
                            File f = new File(dirs[i], files[j]);
                            urls.add(getFileURL(f));
                        }
                    }
                }
            }
            URL[] ua = new URL[urls.size()];
            urls.copyInto(ua);
            return ua;
        }

        /*
         * Searches the installed extension directories for the specified
         * library name. For each extension directory, we first look for
         * the native library in the subdirectory whose name is the value
         * of the system property <code>os.arch</code>. Failing that, we
         * look in the extension directory itself.
         */
        public String findLibrary(String name) {
            name = System.mapLibraryName(name);
            for (int i = 0; i < dirs.length; i++) {
                // Look in architecture-specific subdirectory first
                String arch = System.getProperty("os.arch");
                if (arch != null) {
                    File file = new File(new File(dirs[i], arch), name);
                    if (file.exists()) {
                        return file.getAbsolutePath();
                    }
                }
                // Then check the extension directory
                File file = new File(dirs[i], name);
                if (file.exists()) {
                    return file.getAbsolutePath();
                }
            }
            return null;
        }

        private static AccessControlContext getContext(File[] dirs)
            throws IOException
        {
            PathPermissions perms =
                new PathPermissions(dirs);

            ProtectionDomain domain = new ProtectionDomain(
                new CodeSource(perms.getCodeBase(),
                    (java.security.cert.Certificate[]) null),
                perms);

            AccessControlContext acc =
                new AccessControlContext(new ProtectionDomain[] { domain });

            return acc;
        }
    }

    /**
     * The class loader used for loading from java.class.path.
     * runs in a restricted security context.
     */
    static class AppClassLoader extends URLClassLoader {

        public static ClassLoader getAppClassLoader(final ClassLoader extcl)
            throws IOException
        {
            final String s = System.getProperty("java.class.path");
            final File[] path = (s == null) ? new File[0] : getClassPath(s);

            // Note: on bugid 4256530
            // Prior implementations of this doPrivileged() block supplied
            // a rather restrictive ACC via a call to the private method
            // AppClassLoader.getContext(). This proved overly restrictive
            // when loading  classes. Specifically it prevent
            // accessClassInPackage.sun.* grants from being honored.
            //
            return AccessController.doPrivileged(
                new PrivilegedAction<AppClassLoader>() {
                    public AppClassLoader run() {
                    URL[] urls =
                        (s == null) ? new URL[0] : pathToURLs(path);
                    return new AppClassLoader(urls, extcl);
                }
            });
        }

        /*
         * Creates a new AppClassLoader
         */
        AppClassLoader(URL[] urls, ClassLoader parent) {
            super(urls, parent, factory);
        }

        /**
         * Override loadClass so we can checkPackageAccess.
         */
        public synchronized Class loadClass(String name, boolean resolve)
            throws ClassNotFoundException
        {
            int i = name.lastIndexOf('.');
            if (i != -1) {
                SecurityManager sm = System.getSecurityManager();
                if (sm != null) {
                    sm.checkPackageAccess(name.substring(0, i));
                }
            }
            /*
            // find loaded class
            java.lang.ref.WeakReference<Class<?>> ref=cache.get(name);
            if (ref != null) {
                Class<?> clazz = ref.get();
                if (clazz != null)
                    return clazz;
              
                System.err.println("need to reload " + name);
            }*/
            
            return (super.loadClass(name, resolve));
        }
        
        // load as anonymous
        @Override
        public Class<?> findClass(String name) throws ClassNotFoundException {
            System.out.println("load anonymous "+name);
            
            URLClassPath urlClassPath = getURLClassPath();
            String path = name.replace('.', '/')+".class";
            Resource res = urlClassPath.getResource(path, false);
            if (res == null) {
                throw new ClassNotFoundException(name);
            }
            
            System.out.println("resource "+res);
            
            Class<?> clazz;
            try {
                clazz = loader.loadClass(res.getBytes());
            } catch(IOException e) {
                System.err.println(e);
                throw (ClassNotFoundException)new ClassNotFoundException().initCause(e);
            }
          
            System.out.println("anonymous loaded "+clazz);
            
            cache.put(name, new java.lang.ref.WeakReference<Class<?>>(clazz));
            return clazz;
        }
        
        private final java.dyn.AnonymousClassLoader loader=
          new java.dyn.AnonymousClassLoader(null);
        private final java.util.HashMap<String,java.lang.ref.WeakReference<Class<?>>> cache=
            new java.util.HashMap<String,java.lang.ref.WeakReference<Class<?>>>();
        
        private URLClassPath getURLClassPath() {
            try {
                return (URLClassPath)URL_CLASS_LOADER_DOT_UCP.get(this);
            } catch(IllegalAccessException e) {
                throw new AssertionError(e);
            }
        }
        
        private static final java.lang.reflect.Field URL_CLASS_LOADER_DOT_UCP;
        static {
            java.lang.reflect.Field field;
            try {
                field=URLClassLoader.class.getDeclaredField("ucp");
            } catch(NoSuchFieldException e) {
                throw new AssertionError(e);
            }
            field.setAccessible(true);
            URL_CLASS_LOADER_DOT_UCP = field;
        }
        
        /**
         * allow any classes loaded from classpath to exit the VM.
         */
        protected PermissionCollection getPermissions(CodeSource codesource)
        {
            PermissionCollection perms = super.getPermissions(codesource);
            perms.add(new RuntimePermission("exitVM"));
            return perms;
        }

        /**
         * This class loader supports dynamic additions to the class path
         * at runtime.
         *
         * @see java.lang.instrument.Instrumentation#appendToSystemClassPathSearch
         */
        private void appendToClassPathForInstrumentation(String path) {
            assert(Thread.holdsLock(this));

            // addURL is a no-op if path already contains the URL
            super.addURL( getFileURL(new File(path)) );
        }

        /**
         * create a context that can read any directories (recursively)
         * mentioned in the class path. In the case of a jar, it has to
         * be the directory containing the jar, not just the jar, as jar
         * files might refer to other jar files.
         */

        private static AccessControlContext getContext(File[] cp)
            throws java.net.MalformedURLException
        {
            PathPermissions perms =
                new PathPermissions(cp);

            ProtectionDomain domain =
                new ProtectionDomain(new CodeSource(perms.getCodeBase(),
                    (java.security.cert.Certificate[]) null),
                perms);

            AccessControlContext acc =
                new AccessControlContext(new ProtectionDomain[] { domain });

            return acc;
        }
    }

    public static URLClassPath getBootstrapClassPath() {
        String prop = AccessController.doPrivileged(
            new GetPropertyAction("sun.boot.class.path"));
        URL[] urls;
        if (prop != null) {
            final String path = prop;
            urls = AccessController.doPrivileged(
                new PrivilegedAction<URL[]>() {
                    public URL[] run() {
                        File[] classPath = getClassPath(path);
                        int len = classPath.length;
                        Set<File> seenDirs = new HashSet<File>();
                        for (int i = 0; i < len; i++) {
                            File curEntry = classPath[i];
                            // Negative test used to properly handle
                            // nonexistent jars on boot class path
                            if (!curEntry.isDirectory()) {
                                curEntry = curEntry.getParentFile();
                            }
                            if (curEntry != null && seenDirs.add(curEntry)) {
                                MetaIndex.registerDirectory(curEntry);
                            }
                        }
                        return pathToURLs(classPath);
                    }
                }
            );
        } else {
            urls = new URL[0];
        }
        return new URLClassPath(urls, factory);
    }

    private static URL[] pathToURLs(File[] path) {
        URL[] urls = new URL[path.length];
        for (int i = 0; i < path.length; i++) {
            urls[i] = getFileURL(path[i]);
        }
        // DEBUG
        //for (int i = 0; i < urls.length; i++) {
        //  System.out.println("urls[" + i + "] = " + '"' + urls[i] + '"');
        //}
        return urls;
    }

    private static File[] getClassPath(String cp) {
        File[] path;
        if (cp != null) {
            int count = 0, maxCount = 1;
            int pos = 0, lastPos = 0;
            // Count the number of separators first
            while ((pos = cp.indexOf(File.pathSeparator, lastPos)) != -1) {
                maxCount++;
                lastPos = pos + 1;
            }
            path = new File[maxCount];
            lastPos = pos = 0;
            // Now scan for each path component
            while ((pos = cp.indexOf(File.pathSeparator, lastPos)) != -1) {
                if (pos - lastPos > 0) {
                    path[count++] = new File(cp.substring(lastPos, pos));
                } else {
                    // empty path component translates to "."
                    path[count++] = new File(".");
                }
                lastPos = pos + 1;
            }
            // Make sure we include the last path component
            if (lastPos < cp.length()) {
                path[count++] = new File(cp.substring(lastPos));
            } else {
                path[count++] = new File(".");
            }
            // Trim array to correct size
            if (count != maxCount) {
                File[] tmp = new File[count];
                System.arraycopy(path, 0, tmp, 0, count);
                path = tmp;
            }
        } else {
            path = new File[0];
        }
        // DEBUG
        //for (int i = 0; i < path.length; i++) {
        //  System.out.println("path[" + i + "] = " + '"' + path[i] + '"');
        //}
        return path;
    }

    private static URLStreamHandler fileHandler;

    static URL getFileURL(File file) {
        try {
            file = file.getCanonicalFile();
        } catch (IOException e) {}

        try {
            return ParseUtil.fileToEncodedURL(file);
        } catch (MalformedURLException e) {
            // Should never happen since we specify the protocol...
            throw new InternalError();
        }
    }

    /*
     * The stream handler factory for loading system protocol handlers.
     */
    private static class Factory implements URLStreamHandlerFactory {
        private static String PREFIX = "sun.net.www.protocol";

        public URLStreamHandler createURLStreamHandler(String protocol) {
            String name = PREFIX + "." + protocol + ".Handler";
            try {
                Class c = Class.forName(name);
                return (URLStreamHandler)c.newInstance();
            } catch (ClassNotFoundException e) {
                e.printStackTrace();
            } catch (InstantiationException e) {
                e.printStackTrace();
            } catch (IllegalAccessException e) {
                e.printStackTrace();
            }
            throw new InternalError("could not load " + protocol +
                                    "system protocol handler");
        }
    }
}

class PathPermissions extends PermissionCollection {
    // use serialVersionUID from JDK 1.2.2 for interoperability
    private static final long serialVersionUID = 8133287259134945693L;

    private File path[];
    private Permissions perms;

    URL codeBase;

    PathPermissions(File path[])
    {
        this.path = path;
        this.perms = null;
        this.codeBase = null;
    }

    URL getCodeBase()
    {
        return codeBase;
    }

    public void add(java.security.Permission permission) {
        throw new SecurityException("attempt to add a permission");
    }

    private synchronized void init()
    {
        if (perms != null)
            return;

        perms = new Permissions();

        // this is needed to be able to create the classloader itself!
        perms.add(SecurityConstants.CREATE_CLASSLOADER_PERMISSION);

        // add permission to read any "java.*" property
        perms.add(new java.util.PropertyPermission("java.*",
            SecurityConstants.PROPERTY_READ_ACTION));

        AccessController.doPrivileged(new PrivilegedAction<Void>() {
            public Void run() {
                for (int i=0; i < path.length; i++) {
                    File f = path[i];
                    String path;
                    try {
                        path = f.getCanonicalPath();
                    } catch (IOException ioe) {
                        path = f.getAbsolutePath();
                    }
                    if (i == 0) {
                        codeBase = Launcher.getFileURL(new File(path));
                    }
                    if (f.isDirectory()) {
                        if (path.endsWith(File.separator)) {
                            perms.add(new FilePermission(path+"-",
                                SecurityConstants.FILE_READ_ACTION));
                        } else {
                            perms.add(new FilePermission(
                                path + File.separator+"-",
                                SecurityConstants.FILE_READ_ACTION));
                        }
                    } else {
                        int endIndex = path.lastIndexOf(File.separatorChar);
                        if (endIndex != -1) {
                            path = path.substring(0, endIndex+1) + "-";
                            perms.add(new FilePermission(path,
                                SecurityConstants.FILE_READ_ACTION));
                        } else {
                            // XXX?
                        }
                    }
                }
                return null;
            }
        });
    }

    public boolean implies(java.security.Permission permission) {
        if (perms == null)
            init();
        return perms.implies(permission);
    }

    public java.util.Enumeration<Permission> elements() {
        if (perms == null)
            init();
        synchronized (perms) {
            return perms.elements();
        }
    }

    public String toString() {
        if (perms == null)
            init();
        return perms.toString();
    }
}
import java.lang.reflect.Method;
import java.util.Arrays;

public class AllAnonymousLauncher {

  public static void main(String[] args) throws Exception {
    ClassLoader loader = AllAnonymousLauncher.class.getClassLoader();
    //Class<?> clazz = loader.loadClass(args[0]);
    Class<?> clazz = Class.forName(args[0]);
    
    Method method = clazz.getMethod("main",String[].class);
    method.invoke(null,
      new Object[] {
        Arrays.asList(args).subList(1,args.length).toArray(new String[args.length-1])
      });
  }
}
#
# An unexpected error has been detected by Java Runtime Environment:
#
#  Internal Error (/home/forax/java/workspace/davinci/sources/hotspot/src/share/vm/classfile/systemDictionary.cpp:850), pid=15414, tid=3084950416
#  Error: assert(kk == k(),"should be present in dictionary")
#
# Java VM: OpenJDK Client VM (12.0-b01-internal-fastdebug mixed mode linux-x86)
# If you would like to submit a bug report, please visit:
#   http://java.sun.com/webapps/bugreport/crash.jsp
#

---------------  T H R E A D  ---------------

Current thread (0x09c98800):  JavaThread "main" [_thread_in_vm, id=15415, stack(0xb7db9000,0xb7e0a000)]

Stack: [0xb7db9000,0xb7e0a000],  sp=0xb7e090a0,  free space=320k
Native frames: (J=compiled Java code, j=interpreted, Vv=VM code, C=native code)
V  [libjvm.so+0x71f764]
V  [libjvm.so+0x3870d1]
V  [libjvm.so+0x6a85af]
V  [libjvm.so+0x6ab372]
V  [libjvm.so+0x4a3fc1]
V  [libjvm.so+0x46f657]
C  [libjli.so+0x3727]
C  [libjli.so+0x1d83]
C  [libpthread.so.0+0x545b]


---------------  P R O C E S S  ---------------

Java Threads: ( => current thread )
  0x09d0bc00 JavaThread "Low Memory Detector" daemon [_thread_blocked, id=15421, stack(0xad610000,0xad661000)]
  0x09d08000 JavaThread "CompilerThread0" daemon [_thread_in_native, id=15420, stack(0xad661000,0xad6e2000)]
  0x09d06000 JavaThread "Signal Dispatcher" daemon [_thread_blocked, id=15419, stack(0xad6e2000,0xad733000)]
  0x09cee800 JavaThread "Finalizer" daemon [_thread_blocked, id=15418, stack(0xad933000,0xad984000)]
  0x09ce9c00 JavaThread "Reference Handler" daemon [_thread_blocked, id=15417, stack(0xad984000,0xad9d5000)]
=>0x09c98800 JavaThread "main" [_thread_in_vm, id=15415, stack(0xb7db9000,0xb7e0a000)]

Other Threads:
  0x09ce4800 VMThread [stack: 0xad9d5000,0xada56000] [id=15416]
  0x09d23000 WatcherThread [stack: 0xad58f000,0xad610000] [id=15422]

VM state:not at safepoint (normal execution)

VM Mutex/Monitor currently owned by a thread:  ([mutex/lock_event])
[0x09c95aa8] UNKNOWN - owner thread: 0x09c98800

Heap
 def new generation   total 960K, used 182K [0xadcb0000, 0xaddb0000, 0xae190000)
  eden space 896K,  20% used [0xadcb0000, 0xadcdd938, 0xadd90000)
  from space 64K,   0% used [0xadd90000, 0xadd90000, 0xadda0000)
  to   space 64K,   0% used [0xadda0000, 0xadda0000, 0xaddb0000)
 tenured generation   total 4096K, used 0K [0xae190000, 0xae590000, 0xb1cb0000)
   the space 4096K,   0% used [0xae190000, 0xae190000, 0xae190200, 0xae590000)
 compacting perm gen  total 12288K, used 1507K [0xb1cb0000, 0xb28b0000, 0xb5cb0000)
   the space 12288K,  12% used [0xb1cb0000, 0xb1e28dd8, 0xb1e28e00, 0xb28b0000)
No shared spaces configured.

Dynamic libraries:
06000000-0684a000 r-xp 00000000 fd:00 8978733    /usr/local/jdk/jdk1.7.0/jre/lib/i386/davinci/libjvm.so
0684a000-06859000 rwxp 00849000 fd:00 8978733    /usr/local/jdk/jdk1.7.0/jre/lib/i386/davinci/libjvm.so
06859000-06cc9000 rwxp 06859000 00:00 0 
08048000-08049000 r-xp 00000000 fd:00 11731792   /usr/local/jdk/jdk1.7.0/bin/java
08049000-0804a000 rwxp 00000000 fd:00 11731792   /usr/local/jdk/jdk1.7.0/bin/java
09c80000-09dbe000 rwxp 09c80000 00:00 0 
ad58f000-ad590000 --xp ad58f000 00:00 0 
ad590000-ad610000 rwxp ad590000 00:00 0 
ad610000-ad613000 --xp ad610000 00:00 0 
ad613000-ad661000 rwxp ad613000 00:00 0 
ad661000-ad664000 --xp ad661000 00:00 0 
ad664000-ad6e2000 rwxp ad664000 00:00 0 
ad6e2000-ad6e5000 --xp ad6e2000 00:00 0 
ad6e5000-ad733000 rwxp ad6e5000 00:00 0 
ad733000-ad933000 r-xp 00000000 fd:00 16947102   /usr/lib/locale/locale-archive
ad933000-ad936000 --xp ad933000 00:00 0 
ad936000-ad984000 rwxp ad936000 00:00 0 
ad984000-ad987000 --xp ad984000 00:00 0 
ad987000-ad9d5000 rwxp ad987000 00:00 0 
ad9d5000-ad9d6000 --xp ad9d5000 00:00 0 
ad9d6000-ada87000 rwxp ad9d6000 00:00 0 
ada87000-adc08000 r-xs 02d67000 fd:00 11641744   /usr/local/jdk/jdk1.7.0/jre/lib/rt.jar
adc08000-adc37000 rwxp adc08000 00:00 0 
adc37000-adc51000 rwxp adc37000 00:00 0 
adc51000-adc54000 rwxp adc51000 00:00 0 
adc54000-adc6f000 rwxp adc54000 00:00 0 
adc6f000-adc70000 rwxp adc6f000 00:00 0 
adc70000-adc71000 rwxp adc70000 00:00 0 
adc71000-adc74000 rwxp adc71000 00:00 0 
adc74000-adc8f000 rwxp adc74000 00:00 0 
adc8f000-adc95000 rwxp adc8f000 00:00 0 
adc95000-adcaf000 rwxp adc95000 00:00 0 
adcaf000-addb0000 rwxp adcaf000 00:00 0 
addb0000-ae190000 rwxp addb0000 00:00 0 
ae190000-ae590000 rwxp ae190000 00:00 0 
ae590000-b1cb0000 rwxp ae590000 00:00 0 
b1cb0000-b28b0000 rwxp b1cb0000 00:00 0 
b28b0000-b5cb0000 rwxp b28b0000 00:00 0 
b5cbe000-b5cc2000 rwxp b5cbe000 00:00 0 
b5cc2000-b5d3e000 rwxp b5cc2000 00:00 0 
b5d3e000-b5e36000 rwxp b5d3e000 00:00 0 
b5e36000-b7d3e000 rwxp b5e36000 00:00 0 
b7d3e000-b7d4d000 r-xp 00000000 fd:00 11641672   /usr/local/jdk/jdk1.7.0/jre/lib/i386/libzip.so
b7d4d000-b7d4f000 rwxp 0000e000 fd:00 11641672   /usr/local/jdk/jdk1.7.0/jre/lib/i386/libzip.so
b7d4f000-b7d72000 r-xp 00000000 fd:00 11641670   /usr/local/jdk/jdk1.7.0/jre/lib/i386/libjava.so
b7d72000-b7d74000 rwxp 00023000 fd:00 11641670   /usr/local/jdk/jdk1.7.0/jre/lib/i386/libjava.so
b7d74000-b7d7f000 r-xp 00000000 fd:00 11641669   /usr/local/jdk/jdk1.7.0/jre/lib/i386/libverify.so
b7d7f000-b7d80000 rwxp 0000b000 fd:00 11641669   /usr/local/jdk/jdk1.7.0/jre/lib/i386/libverify.so
b7d80000-b7d89000 r-xp 00000000 fd:00 2130102    /lib/libnss_files-2.5.so
b7d89000-b7d8a000 r-xp 00008000 fd:00 2130102    /lib/libnss_files-2.5.so
b7d8a000-b7d8b000 rwxp 00009000 fd:00 2130102    /lib/libnss_files-2.5.so
b7d8b000-b7d9e000 r-xp 00000000 fd:00 2129993    /lib/libnsl-2.5.so
b7d9e000-b7d9f000 r-xp 00012000 fd:00 2129993    /lib/libnsl-2.5.so
b7d9f000-b7da0000 rwxp 00013000 fd:00 2129993    /lib/libnsl-2.5.so
b7da0000-b7da2000 rwxp b7da0000 00:00 0 
b7da8000-b7db0000 rwxs 00000000 fd:00 11609818   /tmp/hsperfdata_forax/15414
b7db0000-b7db7000 r-xp 00000000 fd:00 2130128    /lib/librt-2.5.so
b7db7000-b7db8000 r-xp 00006000 fd:00 2130128    /lib/librt-2.5.so
b7db8000-b7db9000 rwxp 00007000 fd:00 2130128    /lib/librt-2.5.so
b7db9000-b7dbc000 --xp b7db9000 00:00 0 
b7dbc000-b7e0a000 rwxp b7dbc000 00:00 0 
b7e0a000-b7e2f000 r-xp 00000000 fd:00 2129989    /lib/libm-2.5.so
b7e2f000-b7e30000 r-xp 00024000 fd:00 2129989    /lib/libm-2.5.so
b7e30000-b7e31000 rwxp 00025000 fd:00 2129989    /lib/libm-2.5.so
b7e31000-b7e33000 rwxp b7e31000 00:00 0 
b7e33000-b7f6d000 r-xp 00000000 fd:00 2129942    /lib/libc-2.5.so
b7f6d000-b7f6f000 r-xp 0013a000 fd:00 2129942    /lib/libc-2.5.so
b7f6f000-b7f70000 rwxp 0013c000 fd:00 2129942    /lib/libc-2.5.so
b7f70000-b7f73000 rwxp b7f70000 00:00 0 
b7f73000-b7f75000 r-xp 00000000 fd:00 2129977    /lib/libdl-2.5.so
b7f75000-b7f76000 r-xp 00001000 fd:00 2129977    /lib/libdl-2.5.so
b7f76000-b7f77000 rwxp 00002000 fd:00 2129977    /lib/libdl-2.5.so
b7f77000-b7f87000 r-xp 00000000 fd:00 11707075   /usr/local/jdk/jdk1.7.0/jre/lib/i386/jli/libjli.so
b7f87000-b7f89000 rwxp 0000f000 fd:00 11707075   /usr/local/jdk/jdk1.7.0/jre/lib/i386/jli/libjli.so
b7f89000-b7f9c000 r-xp 00000000 fd:00 2129967    /lib/libpthread-2.5.so
b7f9c000-b7f9d000 r-xp 00012000 fd:00 2129967    /lib/libpthread-2.5.so
b7f9d000-b7f9e000 rwxp 00013000 fd:00 2129967    /lib/libpthread-2.5.so
b7f9e000-b7fa0000 rwxp b7f9e000 00:00 0 
b7fa4000-b7fa5000 rwxp b7fa4000 00:00 0 
b7fa5000-b7fab000 r-xp 00000000 fd:00 11641662   /usr/local/jdk/jdk1.7.0/jre/lib/i386/native_threads/libhpi.so
b7fab000-b7fac000 rwxp 00006000 fd:00 11641662   /usr/local/jdk/jdk1.7.0/jre/lib/i386/native_threads/libhpi.so
b7fac000-b7fad000 rwxp b7fac000 00:00 0 
b7fad000-b7fae000 r-xp b7fad000 00:00 0 
b7fae000-b7faf000 rwxp b7fae000 00:00 0 
b7faf000-b7fb0000 r-xp b7faf000 00:00 0          [vdso]
b7fb0000-b7fc9000 r-xp 00000000 fd:00 2129934    /lib/ld-2.5.so
b7fc9000-b7fca000 r-xp 00019000 fd:00 2129934    /lib/ld-2.5.so
b7fca000-b7fcb000 rwxp 0001a000 fd:00 2129934    /lib/ld-2.5.so
bf9d2000-bf9e8000 rwxp bf9d2000 00:00 0          [stack]

VM Arguments:
jvm_args: -Xbootclasspath/p:classes 
java_command: AllAnonymousLauncher SwingSet2
Launcher Type: SUN_STANDARD

Environment Variables:
JAVA_HOME=/usr/local/java/
PATH=/usr/local/java//bin:/usr/kerberos/bin:/usr/local/bin:/usr/bin:/bin:/usr/X11R6/bin:/usr/local/java//bin:/home/forax/java/apache-ant-1.7.0/bin:/home/forax/bin:/usr/local/java//bin:/home/forax/java/apache-ant-1.7.0/bin
USERNAME=forax
LD_LIBRARY_PATH=/usr/local/jdk/jdk1.7.0/jre/lib/i386/davinci:/usr/local/jdk/jdk1.7.0/jre/lib/i386:/usr/local/jdk/jdk1.7.0/jre/../lib/i386
SHELL=/bin/bash
DISPLAY=:0.0

Signal Handlers:
SIGSEGV: [libjvm.so+0x71fed0], sa_mask[0]=0x7ffbfeff, sa_flags=0x10000004
SIGBUS: [libjvm.so+0x71fed0], sa_mask[0]=0x7ffbfeff, sa_flags=0x10000004
SIGFPE: [libjvm.so+0x5f00f0], sa_mask[0]=0x7ffbfeff, sa_flags=0x10000004
SIGPIPE: [libjvm.so+0x5f00f0], sa_mask[0]=0x7ffbfeff, sa_flags=0x10000004
SIGXFSZ: [libjvm.so+0x5f00f0], sa_mask[0]=0x7ffbfeff, sa_flags=0x10000004
SIGILL: [libjvm.so+0x5f00f0], sa_mask[0]=0x7ffbfeff, sa_flags=0x10000004
SIGUSR1: SIG_DFL, sa_mask[0]=0x00000000, sa_flags=0x00000000
SIGUSR2: [libjvm.so+0x5f1e70], sa_mask[0]=0x00000000, sa_flags=0x10000004
SIGHUP: [libjvm.so+0x5f26c0], sa_mask[0]=0x7ffbfeff, sa_flags=0x10000004
SIGINT: [libjvm.so+0x5f26c0], sa_mask[0]=0x7ffbfeff, sa_flags=0x10000004
SIGTERM: [libjvm.so+0x5f26c0], sa_mask[0]=0x7ffbfeff, sa_flags=0x10000004
SIGQUIT: [libjvm.so+0x5f26c0], sa_mask[0]=0x7ffbfeff, sa_flags=0x10000004


---------------  S Y S T E M  ---------------

OS:Fedora Core release 6 (Zod)

uname:Linux 2.6.22.14-72.fc6 #1 SMP Wed Nov 21 15:12:59 EST 2007 i686
libc:glibc 2.5 NPTL 2.5 
rlimit: STACK 10240k, CORE 0k, NPROC 16253, NOFILE 1024, AS infinity
load average:0.83 0.62 0.68

CPU:total 1 (1 cores per cpu, 1 threads per core) family 6 model 13 stepping 8, cmov, cx8, fxsr, mmx, sse, sse2

Memory: 4k page, physical 1026520k(41228k free), swap 2031608k(1650916k free)

vm_info: OpenJDK Client VM (12.0-b01-internal-fastdebug) for linux-x86 JRE (1.7.0), built on Apr 17 2008 09:21:08 by "forax" with gcc 4.1.2 20070626 (Red Hat 4.1.2-13)

time: Fri Apr 25 17:21:43 2008
elapsed time: 0 seconds

_______________________________________________
mlvm-dev mailing list
[email protected]
http://mail.openjdk.java.net/mailman/listinfo/mlvm-dev

Reply via email to