RFR: 8235654: JFR leak profiler should not trace through the StringTable
erik.osterlund at oracle.com
erik.osterlund at oracle.com
Tue Dec 10 16:31:44 UTC 2019
Hi Stefan,
Thanks for the review!
/Erik
On 12/10/19 5:31 PM, Stefan Karlsson wrote:
> Looks good.
>
> StefanK
>
> On 2019-12-10 17:22, erik.osterlund at oracle.com wrote:
>> Hi,
>>
>> The JFR leak profiler finds strong reference chains to object
>> samples. Weirdly enough, it walks the StringTable roots. But these
>> oops are phantomly reachable. So they should arguably be excluded
>> from the root snapshot.This incorrect use of StringTable::oops_do is
>> the only use of StringTable::oops_do, so I'm removing that function.
>>
>> Bug:
>> https://bugs.openjdk.java.net/browse/JDK-8235654
>>
>> Webrev:
>> http://cr.openjdk.java.net/~eosterlund/8235654/webrev.00/
>>
>> Thanks,
>> /Erik
More information about the hotspot-runtime-dev
mailing list