Github user holdenk commented on a diff in the pull request:
https://github.com/apache/spark/pull/3725#discussion_r22125664
--- Diff:
core/src/test/scala/org/apache/spark/executor/ExecutorURLClassLoaderSuite.scala
---
@@ -37,6 +37,8 @@ class ExecutorURLClassLoaderSuite extends FunSuite {
val fakeClass = classLoader.loadClass("FakeClass2").newInstance()
val fakeClassVersion = fakeClass.toString
assert(fakeClassVersion === "1")
+ val fakeClass2 = classLoader.loadClass("FakeClass2").newInstance()
--- End diff --
Good catch :) Out of interest, did someone observe this in production or
was the classloader protected from this unsafe access pattern through how set
the classloader?
---
If your project is set up for it, you can reply to this email and have your
reply appear on GitHub as well. If your project does not have this feature
enabled and wishes so, or if the feature is enabled but not working, please
contact infrastructure at [email protected] or file a JIRA ticket
with INFRA.
---
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]