Print this page


Split Close
Expand all
Collapse all
          --- old/src/share/vm/runtime/thread.cpp
          +++ new/src/share/vm/runtime/thread.cpp
↓ open down ↓ 3221 lines elided ↑ open up ↑
3222 3222        initialize_class(vmSymbols::java_lang_StackOverflowError(), CHECK_0);
3223 3223        initialize_class(vmSymbols::java_lang_IllegalMonitorStateException(), CHECK_0);
3224 3224      } else {
3225 3225        warning("java.lang.OutOfMemoryError has not been initialized");
3226 3226        warning("java.lang.NullPointerException has not been initialized");
3227 3227        warning("java.lang.ClassCastException has not been initialized");
3228 3228        warning("java.lang.ArrayStoreException has not been initialized");
3229 3229        warning("java.lang.ArithmeticException has not been initialized");
3230 3230        warning("java.lang.StackOverflowError has not been initialized");
3231 3231      }
3232      -    }
     3232 +  }
3233 3233  
3234 3234    // See        : bugid 4211085.
3235 3235    // Background : the static initializer of java.lang.Compiler tries to read
3236 3236    //              property"java.compiler" and read & write property "java.vm.info".
3237 3237    //              When a security manager is installed through the command line
3238 3238    //              option "-Djava.security.manager", the above properties are not
3239 3239    //              readable and the static initializer for java.lang.Compiler fails
3240 3240    //              resulting in a NoClassDefFoundError.  This can happen in any
3241 3241    //              user code which calls methods in java.lang.Compiler.
3242 3242    // Hack :       the hack is to pre-load and initialize this class, so that only
↓ open down ↓ 1068 lines elided ↑ open up ↑
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX