RFR: 8235654: JFR leak profiler should not trace through the StringTable
Erik Österlund
erik.osterlund at oracle.com
Tue Dec 10 20:10:56 UTC 2019
Hi Erik,
Thanks for the review!
/Erik
> On 10 Dec 2019, at 20:17, Erik Gahlin <erik.gahlin at oracle.com> wrote:
>
>
> Thanks for fixing this.
>
> When we implemented the feature we were not able figure out what roots we really needed to walk (and in what order).
>
> Looks good.
>
> Erik
>
> On 2019-12-10 17:22, erik.osterlund at oracle.com wrote:
>> Hi,
>>
>> The JFR leak profiler finds strong reference chains to object samples. Weirdly enough, it walks the StringTable roots. But these oops are phantomly reachable. So they should arguably be excluded from the root snapshot. This incorrect use of StringTable::oops_do is the only use of StringTable::oops_do, so I'm removing that function.
>>
>> Bug:
>> https://bugs.openjdk.java.net/browse/JDK-8235654
>>
>> Webrev:
>> http://cr.openjdk.java.net/~eosterlund/8235654/webrev.00/
>>
>> Thanks,
>> /Erik
More information about the hotspot-runtime-dev
mailing list