Hi Phil,
On 9/22/2019 1:25 PM, Philip Race wrote:
+ @SuppressWarnings("serial") // Not statically typed as Serializable
So is the comment being used to distinguish this overloading of what
"serial" means ? Why not introduce a new warning category ?
The -Xlint:serial check in javac has had an operational meaning of "does
a serializable type define a serialVersionUID?" The work-in-progress is
aiming to expand this to cover other aspect of declaring serializable
(and externalizable) types.
It would be possible to put the new checks in their own category, but
that would limit their use and some of new checks find what are most
likely semantic errors, such as declaring a serialVersionUID in an enum
type, which gets silently ignored.
Randomly looking at
====
src/java.desktop/share/classes/java/awt/Container.java
@@ -3849,10 +3849,11 @@
/**
* The handler to fire {@code PropertyChange}
* when children are added or removed
*/
+ @SuppressWarnings("serial") // Not statically typed as
Serializable
protected ContainerListener accessibleContainerHandler = null;
===
I see that Container has a writeObject method which doesn't write this
field, so it is effectively transient.
I recognise that it is difficult for the compiler to figure this out,
so perhaps there should just be a policy
not to check classes that have writeObject methods ?
Yes, it is not feasible for this level of analysis to decode the
semantics of writeObject and related methods. The analysis does skip
over classes using serialPersistentFields, which is an alternative
mechanism to indicate which fields are used for serialization.
In terms of possible false positives, I think it is acceptable to keep
doing the checks in the presence of a writeObject method since a
writeObject can be used to make alterations to serialization process
other than changing the set of fields written out.
Also in such a case, would it be an effectively compatible change to
add transient to the field, so that
it presumably would no longer need this warning.
And the class does define a serialVersionUID so adding transient to the
field should preserve serial compatibility.
I haven't looked but presumably there could be other such cases.
Will you be filing bugs for all the fixable cases ?
Someone should ;-)
To make sure my intentions are clear, nothing in this overall cleanup
effort should be construed as seeking to assume ownership of all the
serialization in the JDK. The primary ownership will remain with the
component team in question. The new checks are meant to the an aid,
especially to writing new serializable types, while also prompting some
examination of the existing types in an effort to allow the warning to
enabled by default in the build.
Thanks,
-Joe
-phil
On 9/21/19, 12:48 PM, Joe Darcy wrote:
Hello,
Quick background, I'm working on expanding the compile-time
serialization checks of javac's -Xlint:serial option. Ahead of that
work going back, I'm analyzing the JDK sources and plan to
pre-suppress the coming-soon new warnings, fixing or at least filing
follow-up bugs for any problems that are found. Corresponding
suppression bugs are already out for review against core libs
(JDK-8231202) and security libs (JDK-8231262).
The new check in development is if a serializable class has an
instance field that is not declared to be a serializable type. This
might actually be fine in practice, such as if the field in question
always points to a serializable object at runtime, but it is arguably
worth noting as an item of potential concern. This check is skipped
if the class using the serialPersistentFields mechanism.
For the client libs, the webrev with the new @SuppressedWarnings
annotations is:
JDK-8231334: Suppress warnings on non-serializable instance
fields in client libs serializable classes
http://cr.openjdk.java.net/~darcy/8231334.0/
The changes are mostly in awt, but also some in beans, a few in
printing, and one in sound.
As discussed with Phil off-line, the new checks also found an
existing known issue, the auxiliary class java.awt.ImageMediaEntry
declared in MediaTracker.java is not serializable/deserializable in
practice (JDK-4397681).
Thanks,
-Joe