On Mon, 24 Jun 2024 13:45:38 GMT, Jan Kratochvil <jkratoch...@openjdk.org> wrote:
>> fastdebug: >> >> >> # A fatal error has been detected by the Java Runtime Environment: >> # >> # Internal Error >> (/home/azul/azul/openjdk-git/src/hotspot/share/runtime/handles.inline.hpp:77), >> pid=878152, tid=878158 >> # assert(_thread->is_in_live_stack((address)this)) failed: not on stack? >> # >> # JRE version: (24.0) (fastdebug build ) >> # Java VM: OpenJDK 64-Bit Server VM (fastdebug >> 24-internal-adhoc.azul.openjdk-git, mixed mode, tiered, compressed oops, >> compressed class ptrs, g1 gc, linux-amd64) >> # Problematic frame: >> # V [libjvm.so+0x1d20658] constantPoolHandle::constantPoolHandle(Thread*, >> ConstantPool*)+0x268 > > Jan Kratochvil has updated the pull request incrementally with one additional > commit since the last revision: > > Revert "Implement address-use-after-return" > > This reverts commit 7e089829f1ebf3d4e5aafe0934bd18db0234136b. make/autoconf/jdk-options.m4 line 441: > 439: ASAN_CFLAGS="-fsanitize=address -Wno-stringop-truncation > -fno-omit-frame-pointer -fno-common -DADDRESS_SANITIZER" > 440: ASAN_LDFLAGS="-fsanitize=address" > 441: # detect_stack_use_after_return is using a fake stack and thus > JDK would crashe: typo (crashe) make/autoconf/jdk-options.m4 line 448: > 446: if test "x$TOOLCHAIN_TYPE" = "xclang"; then > 447: ASAN_CFLAGS="$ASAN_CFLAGS > -fsanitize-address-use-after-return=never" > 448: fi Curious, the other ASAN options work across clang and GCC? Only use-after-return requires different flags for GCC and clang? ------------- PR Review Comment: https://git.openjdk.org/jdk/pull/19843#discussion_r1651097224 PR Review Comment: https://git.openjdk.org/jdk/pull/19843#discussion_r1651100474