From 0373934a871aeb241ad6055a2296f122ae06d311 Mon Sep 17 00:00:00 2001 From: darcy Date: Tue, 22 Oct 2013 12:04:30 -0700 Subject: [PATCH] 8027062: Fix lint and doclint issues in java.lang.{ClassLoader, ClassValue, SecurityManager} Reviewed-by: chegar, forax, alanb, mduigou --- src/share/classes/java/lang/ClassLoader.java | 4 ++-- src/share/classes/java/lang/ClassValue.java | 2 +- src/share/classes/java/lang/SecurityManager.java | 11 +++++------ 3 files changed, 8 insertions(+), 9 deletions(-) diff --git a/src/share/classes/java/lang/ClassLoader.java b/src/share/classes/java/lang/ClassLoader.java index 7aa5087ad..875f5ec8e 100644 --- a/src/share/classes/java/lang/ClassLoader.java +++ b/src/share/classes/java/lang/ClassLoader.java @@ -362,7 +362,7 @@ public abstract class ClassLoader { * default implementation of this method searches for classes in the * following order: * - *

    + *
      * *
    1. Invoke {@link #findLoadedClass(String)} to check if the class * has already been loaded.

    2. @@ -488,7 +488,7 @@ public abstract class ClassLoader { final SecurityManager sm = System.getSecurityManager(); if (sm != null) { if (ReflectUtil.isNonPublicProxyClass(cls)) { - for (Class intf: cls.getInterfaces()) { + for (Class intf: cls.getInterfaces()) { checkPackageAccess(intf, pd); } return; diff --git a/src/share/classes/java/lang/ClassValue.java b/src/share/classes/java/lang/ClassValue.java index be190c0d4..676c2eccb 100644 --- a/src/share/classes/java/lang/ClassValue.java +++ b/src/share/classes/java/lang/ClassValue.java @@ -692,7 +692,7 @@ public abstract class ClassValue { /** Remove all stale entries, everywhere. */ private void removeStaleEntries() { - Entry[] cache = getCache(); + Entry[] cache = getCache(); removeStaleEntries(cache, 0, cache.length + PROBE_LIMIT - 1); } diff --git a/src/share/classes/java/lang/SecurityManager.java b/src/share/classes/java/lang/SecurityManager.java index 356508203..635f6db09 100644 --- a/src/share/classes/java/lang/SecurityManager.java +++ b/src/share/classes/java/lang/SecurityManager.java @@ -56,7 +56,7 @@ import sun.security.util.SecurityConstants; * are called by various methods in the Java libraries before those * methods perform certain potentially sensitive operations. The * invocation of such a check method typically looks like this: - *

      + * 
        *     SecurityManager security = System.getSecurityManager();
        *     if (security != null) {
        *         security.checkXXX(argument,  . . . );
      @@ -323,7 +323,7 @@ class SecurityManager {
            * by {@link ClassLoader#getSystemClassLoader}) or one of its ancestors.
            * 

      * This method will return - * null in the following three cases:

      + * null in the following three cases: *

        *
      1. All methods on the execution stack are from classes * defined using the system class loader or one of its ancestors. @@ -370,7 +370,7 @@ class SecurityManager { * by {@link ClassLoader#getSystemClassLoader}) or one of its ancestors. *

        * This method will return - * null in the following three cases:

        + * null in the following three cases: *

          *
        1. All methods on the execution stack are from classes * defined using the system class loader or one of its ancestors. @@ -429,7 +429,7 @@ class SecurityManager { * by {@link ClassLoader#getSystemClassLoader}) or one of its ancestors. *

          * This method will return - * -1 in the following three cases:

          + * -1 in the following three cases: *

            *
          1. All methods on the execution stack are from classes * defined using the system class loader or one of its ancestors. @@ -1281,7 +1281,6 @@ class SecurityManager { * This method calls checkPermission with the * PropertyPermission(key, "read") permission. *

            - *

            * If you override this method, then you should make a call to * super.checkPropertyAccess * at the point the overridden method would normally throw an @@ -1714,7 +1713,7 @@ class SecurityManager { throw new NullPointerException("class can't be null"); } if (which != Member.PUBLIC) { - Class stack[] = getClassContext(); + Class stack[] = getClassContext(); /* * stack depth of 4 should be the caller of one of the * methods in java.lang.Class that invoke checkMember -- GitLab