JDK-8254790 : SIGSEGV in string_indexof_char and stringL_indexof_char intrinsics
  • Type: Bug
  • Component: hotspot
  • Sub-Component: compiler
  • Affected Version: 11,16
  • Priority: P1
  • Status: Closed
  • Resolution: Fixed
  • CPU: x86_64
  • Submitted: 2020-10-14
  • Updated: 2023-12-25
  • Resolved: 2020-10-21
The Version table provides details related to the release that this issue/RFE will be addressed.

Unresolved : Release in which this issue/RFE will be addressed.
Resolved: Release in which this issue/RFE has been resolved.
Fixed : Release in which this issue/RFE has been fixed. The release containing this fix may be available for download as an Early Access Release or a General Availability Release.

To download the current JDK release, click here.
JDK 11 JDK 13 JDK 15 JDK 16
11.0.10-oracleFixed 13.0.8Fixed 15.0.2Fixed 16 b21Fixed
Related Reports
Duplicate :  
Relates :  
Relates :  
Relates :  
Sub Tasks
JDK-8254792 :  
Description
The following test failed in the JDK16 CI:

javax/xml/crypto/dsig/GenerationTests.java

Here's a snippet from the log file:

unknown Transform
-S
no source document
-S#
# A fatal error has been detected by the Java Runtime Environment:
#
#  SIGSEGV (0xb) at pc=0x000000011a317e29, pid=67294, tid=23555
#
# JRE version: Java(TM) SE Runtime Environment (16.0+20) (build 16-ea+20-1090)
# Java VM: Java HotSpot(TM) 64-Bit Server VM (16-ea+20-1090, mixed mode, sharing, tiered, compressed oops, g1 gc, bsd-amd64)
# Problematic frame:
# J 7618 c2 sun.net.www.http.HttpClient.parseHTTPHeader(Lsun/net/www/MessageHeader;Lsun/net/ProgressSource;Lsun/net/www/protocol/http/HttpURLConnection;)Z java.base@16-ea (1173 bytes) @ 0x000000011a317e29 [0x000000011a317680+0x00000000000007a9]
#
# Core dump will be written. Default location: core.67294
#
# An error report file with more information is saved as:
# /System/Volumes/Data/mesos/work_dir/slaves/4076d11c-c6ed-4d07-84c1-4ab8d55cd975-S421566/frameworks/1735e8a2-a1db-478c-8104-60c8b0af87dd-0196/executors/79afc7f6-a6d8-4412-bf80-079c818d0f2a/runs/6cb77053-6c69-4c1c-ac33-ab8254ea4714/testoutput/test-support/jtreg_open_test_jdk_tier2_part1/scratch/4/hs_err_pid67294.log
#
# If you would like to submit a bug report, please visit:
#   https://bugreport.java.com/bugreport/crash.jsp
#
----------System.err:(0/0)----------


Here's the crashing thread's stack:

---------------  T H R E A D  ---------------

Current thread (0x00007fbc74009600):  JavaThread "MainThread" [_thread_in_Java, id=23555, stack(0x000070000c913000,0x000070000ca13000)]

Stack: [0x000070000c913000,0x000070000ca13000],  sp=0x000070000ca11d00,  free space=1019k
Native frames: (J=compiled Java code, A=aot compiled Java code, j=interpreted, Vv=VM code, C=native code)
J 7618 c2 sun.net.www.http.HttpClient.parseHTTPHeader(Lsun/net/www/MessageHeader;Lsun/net/ProgressSource;Lsun/net/www/protocol/http/HttpURLConnection;)Z java.base@16-ea (1173 bytes) @ 0x000000011a317e29 [0x000000011a317680+0x00000000000007a9]
J 7440 c2 sun.net.www.http.HttpClient.parseHTTP(Lsun/net/www/MessageHeader;Lsun/net/ProgressSource;Lsun/net/www/protocol/http/HttpURLConnection;)Z java.base@16-ea (183 bytes) @ 0x000000011a28054c [0x000000011a280140+0x000000000000040c]
J 6066 c2 sun.net.www.protocol.http.HttpURLConnection.getInputStream0()Ljava/io/InputStream; java.base@16-ea (2059 bytes) @ 0x0000000119fa7f4c [0x0000000119fa7740+0x000000000000080c]
J 7821 c2 com.sun.org.apache.xml.internal.security.utils.resolver.implementations.ResolverDirectHTTP.engineResolveURI(Lcom/sun/org/apache/xml/internal/security/utils/resolver/ResourceResolverContext;)Lcom/sun/org/apache/xml/internal/security/signature/XMLSignatureInput; java.xml.crypto@16-ea (413 bytes) @ 0x000000011a3ae8b8 [0x000000011a3ae460+0x0000000000000458]
J 7611 c2 org.jcp.xml.dsig.internal.dom.DOMURIDereferencer.dereference(Ljavax/xml/crypto/URIReference;Ljavax/xml/crypto/XMLCryptoContext;)Ljavax/xml/crypto/Data; java.xml.crypto@16-ea (433 bytes) @ 0x000000011a30e264 [0x000000011a30d840+0x0000000000000a24]
J 8243 c2 org.jcp.xml.dsig.internal.dom.DOMXMLSignature.digestReference(Lorg/jcp/xml/dsig/internal/dom/DOMReference;Ljavax/xml/crypto/dsig/XMLSignContext;)V java.xml.crypto@16-ea (231 bytes) @ 0x000000011a52b1a0 [0x000000011a52b0a0+0x0000000000000100]
J 8215 c1 org.jcp.xml.dsig.internal.dom.DOMXMLSignature.sign(Ljavax/xml/crypto/dsig/XMLSignContext;)V java.xml.crypto@16-ea (609 bytes) @ 0x0000000112e797fc [0x0000000112e76e60+0x000000000000299c]
J 8224 c1 GenerationTests.test_create_detached_signature0(Ljava/lang/String;Ljava/lang/String;Ljava/lang/String;Ljava/lang/String;LGenerationTests$KeyInfoType;LGenerationTests$Content;I)Z (887 bytes) @ 0x00000001132ad8fc [0x00000001132a9c40+0x0000000000003cbc]
j  GenerationTests.test_create_detached_signature(Ljava/lang/String;Ljava/lang/String;Ljava/lang/String;Ljava/lang/String;LGenerationTests$KeyInfoType;LGenerationTests$Content;IZLjava/lang/Class;)V+55
j  GenerationTests.main([Ljava/lang/String;)V+421
v  ~StubRoutines::call_stub
V  [libjvm.dylib+0x4b50a2]  JavaCalls::call_helper(JavaValue*, methodHandle const&, JavaCallArguments*, Thread*)+0x2d2
V  [libjvm.dylib+0x89fb65]  invoke(InstanceKlass*, methodHandle const&, Handle, bool, objArrayHandle, BasicType, objArrayHandle, bool, Thread*)+0xa65
V  [libjvm.dylib+0x89f098]  Reflection::invoke_method(oopDesc*, Handle, objArrayHandle, Thread*)+0x158
V  [libjvm.dylib+0x564337]  JVM_InvokeMethod+0x337
j  jdk.internal.reflect.NativeMethodAccessorImpl.invoke0(Ljava/lang/reflect/Method;Ljava/lang/Object;[Ljava/lang/Object;)Ljava/lang/Object;+0 java.base@16-ea
j  jdk.internal.reflect.NativeMethodAccessorImpl.invoke(Ljava/lang/Object;[Ljava/lang/Object;)Ljava/lang/Object;+113 java.base@16-ea
j  jdk.internal.reflect.DelegatingMethodAccessorImpl.invoke(Ljava/lang/Object;[Ljava/lang/Object;)Ljava/lang/Object;+6 java.base@16-ea
j  java.lang.reflect.Method.invoke(Ljava/lang/Object;[Ljava/lang/Object;)Ljava/lang/Object;+59 java.base@16-ea
j  com.sun.javatest.regtest.agent.MainWrapper$MainThread.run()V+172
j  java.lang.Thread.run()V+11 java.base@16-ea
v  ~StubRoutines::call_stub
V  [libjvm.dylib+0x4b50a2]  JavaCalls::call_helper(JavaValue*, methodHandle const&, JavaCallArguments*, Thread*)+0x2d2
V  [libjvm.dylib+0x4b40e7]  JavaCalls::call_virtual(JavaValue*, Klass*, Symbol*, Symbol*, JavaCallArguments*, Thread*)+0x147
V  [libjvm.dylib+0x4b41b3]  JavaCalls::call_virtual(JavaValue*, Handle, Klass*, Symbol*, Symbol*, Thread*)+0x63
V  [libjvm.dylib+0x5600e4]  thread_entry(JavaThread*, Thread*)+0xb4
V  [libjvm.dylib+0x99febd]  JavaThread::thread_main_inner()+0xcd
V  [libjvm.dylib+0x99d461]  Thread::call_run()+0x71
V  [libjvm.dylib+0x82bd57]  thread_native_entry(Thread*)+0x157
C  [libsystem_pthread.dylib+0x6109]  _pthread_start+0x94
C  [libsystem_pthread.dylib+0x1b8b]  thread_start+0xf


siginfo: si_signo: 11 (SIGSEGV), si_code: 1 (SEGV_MAPERR), si_addr: 0x00000000e41d2718

Starting this bug as a P2 since it has happened in two Tier2
job sets in a row.
Comments
Fix Request(13u) Fix for P1 bug is required to be back ported. Applies cleanly. Pass tier1 set.
18-05-2021

Fix Request (11u). Low risk, fixes zeroing out the upper half of a pointer in an intrinsic. Review approval: https://mail.openjdk.java.net/pipermail/jdk-updates-dev/2020-October/004017.html.
22-10-2020

JDK 15u webrev: http://cr.openjdk.java.net/~sviswanathan/8254790/webrev_15.00/
21-10-2020

JDK 11u webrev: http://cr.openjdk.java.net/~sviswanathan/8254790/webrev.00/ https://mail.openjdk.java.net/pipermail/jdk-updates-dev/2020-October/004013.html https://mail.openjdk.java.net/pipermail/hotspot-compiler-dev/2020-October/040942.html
21-10-2020

Yes, that is why string_indexof_char was also fixed.
21-10-2020

This seems to have been a pre-existing issue (to JDK-8173585) that showed up due to that patch using the existing string_indexof_char method as a template for stringL_indexof_char.
21-10-2020

Changeset: 365f19c8 Author: Sandhya Viswanathan <sviswanathan@openjdk.org> Date: 2020-10-21 16:24:30 +0000 URL: https://git.openjdk.java.net/jdk/commit/365f19c8
21-10-2020

I just finished running dsig/GenerationTests.java test multiply runs (to besure) on our systems and confirmed Sandhya's proposed fix: bsfl(ch, tmp); + addptr(result, ch); - addl(result, ch); It always fails with addl() and always passed with addptr().
20-10-2020

This issue was filed as a result of JDK-8173585, but JDK-8173585 was disabled by JDK-8254792, so nominally the segv should have gone away.
20-10-2020

Raising priority because this also shows up with other tests (JDK-8255039).
20-10-2020

If you look on si_addr: 0x00000000e41d2718 which case memory map it looks like R8 =0x00000007e41d2700 is an oop: [B with upper 32-bits zeroed. It looks like the code cut uppers 32-bits.
15-10-2020

Information from hs_err file: # SIGSEGV (0xb) at pc=0x000000011a317e29, pid=67294, tid=23555 # Stack: [0x000070000c913000,0x000070000ca13000], sp=0x000070000ca11d00, free space=1019k Native frames: (J=compiled Java code, A=aot compiled Java code, j=interpreted, Vv=VM code, C=native code) J 7618 c2 sun.net.www.http.HttpClient.parseHTTPHeader(Lsun/net/www/MessageHeader;Lsun/net/ProgressSource;Lsun/net/www/protocol/http/HttpURLConnection;)Z java.base@16-ea (1173 bytes) @ 0x000000011a317e29 [0x000000011a317680+0x00000000000007a9] J 7440 c2 sun.net.www.http.HttpClient.parseHTTP(Lsun/net/www/MessageHeader;Lsun/net/ProgressSource;Lsun/net/www/protocol/http/HttpURLConnection;)Z java.base@16-ea (183 bytes) @ 0x000000011a28054c [0x000000011a280140+0x000000000000040c] J 6066 c2 sun.net.www.protocol.http.HttpURLConnection.getInputStream0()Ljava/io/InputStream; java.base@16-ea (2059 bytes) @ 0x0000000119fa7f4c [0x0000000119fa7740+0x000000000000080c] J 7821 c2 com.sun.org.apache.xml.internal.security.utils.resolver.implementations.ResolverDirectHTTP.engineResolveURI(Lcom/sun/org/apache/xml/internal/security/utils/resolver/ResourceResolverContext;)Lcom/sun/org/apache/xml/internal/security/signature/XMLSignatureInput; java.xml.crypto@16-ea (413 bytes) @ 0x000000011a3ae8b8 [0x000000011a3ae460+0x0000000000000458] J 7611 c2 org.jcp.xml.dsig.internal.dom.DOMURIDereferencer.dereference(Ljavax/xml/crypto/URIReference;Ljavax/xml/crypto/XMLCryptoContext;)Ljavax/xml/crypto/Data; java.xml.crypto@16-ea (433 bytes) @ 0x000000011a30e264 [0x000000011a30d840+0x0000000000000a24] J 8243 c2 org.jcp.xml.dsig.internal.dom.DOMXMLSignature.digestReference(Lorg/jcp/xml/dsig/internal/dom/DOMReference;Ljavax/xml/crypto/dsig/XMLSignContext;)V java.xml.crypto@16-ea (231 bytes) @ 0x000000011a52b1a0 [0x000000011a52b0a0+0x0000000000000100] J 8215 c1 org.jcp.xml.dsig.internal.dom.DOMXMLSignature.sign(Ljavax/xml/crypto/dsig/XMLSignContext;)V java.xml.crypto@16-ea (609 bytes) @ 0x0000000112e797fc [0x0000000112e76e60+0x000000000000299c] J 8224 c1 GenerationTests.test_create_detached_signature0(Ljava/lang/String;Ljava/lang/String;Ljava/lang/String;Ljava/lang/String;LGenerationTests$KeyInfoType;LGenerationTests$Content;I)Z (887 bytes) @ 0x00000001132ad8fc [0x00000001132a9c40+0x0000000000003cbc] j GenerationTests.test_create_detached_signature(Ljava/lang/String;Ljava/lang/String;Ljava/lang/String;Ljava/lang/String;LGenerationTests$KeyInfoType;LGenerationTests$Content;IZLjava/lang/Class;)V+55 j GenerationTests.main([Ljava/lang/String;)V+421 siginfo: si_signo: 11 (SIGSEGV), si_code: 1 (SEGV_MAPERR), si_addr: 0x00000000e41d2718 Register to memory mapping: RAX=0x0000000000000008 is an unknown value RBX=0xfffffff900000008 is an unknown value RCX=0x0000000000001100 is an unknown value RDX=0x0000000000000006 is an unknown value RSP=0x000070000ca11d00 is pointing into the stack for thread: 0x00007fbc74009600 RBP=4236484243 is a compressed pointer to object: [Ljava.lang.String; {0x00000007e41cf498} - klass: 'java/lang/String'[] - length: 4 RSI=0x0000000000000010 is an unknown value RDI=0x00000007e41d2710 points into unknown readable memory: 0x312e312f50545448 | 48 54 54 50 2f 31 2e 31 R8 =0x00000007e41d2700 is an oop: [B {0x00000007e41d2700} - klass: {type array byte} - length: 22 R9 =0x00000000ffffffff is an unknown value R10=4236485856 is a compressed pointer to object: [B {0x00000007e41d2700} - klass: {type array byte} - length: 22 R11=0x0000000000000016 is an unknown value R12=0x0 is NULL R13=0x0000000000000004 is an unknown value R14=4236485853 is a compressed pointer to object: java.lang.String {0x00000007e41d26e8} - klass: 'java/lang/String' R15=0x00007fbc74009600 is a thread Registers: RAX=0x0000000000000008, RBX=0xfffffff900000008, RCX=0x0000000000001100, RDX=0x0000000000000006 RSP=0x000070000ca11d00, RBP=0x00000000fc839e93, RSI=0x0000000000000010, RDI=0x00000007e41d2710 R8 =0x00000007e41d2700, R9 =0x00000000ffffffff, R10=0x00000000fc83a4e0, R11=0x0000000000000016 R12=0x0000000000000000, R13=0x0000000000000004, R14=0x00000000fc83a4dd, R15=0x00007fbc74009600 RIP=0x000000011a317e29, EFLAGS=0x0000000000010283, ERR=0x0000000000000004 TRAPNO=0x000000000000000e Top of Stack: (sp=0x000070000ca11d00) 0x000070000ca11d00: 0000000000000000 00000007e41cf460 0x000070000ca11d10: 0000000000000000 00000007e41cf460 0x000070000ca11d20: 0000000000000000 00000007e41cf158 0x000070000ca11d30: 00000007e1a44668 00000007e1a44558 0x000070000ca11d40: 00000007e41d2610 00000007fc839e08 0x000070000ca11d50: 00000007e41cff00 00000007fff56138 0x000070000ca11d60: 0000000000000001 00000007e41cfe38 0x000070000ca11d70: 00000007e41d05d8 000000011a28054c 0x000070000ca11d80: 00000001fc3488c8 00000007e41cf460 0x000070000ca11d90: 0000000000000000 00000007e41cf158 0x000070000ca11da0: 00000007e1a44558 00000007e1a445b8 0x000070000ca11db0: 000000010c9e7000 00007fbc74009600 0x000070000ca11dc0: 0000000000000021 0000000000000021 0x000070000ca11dd0: 0000000000000021 0000000119fceed0 0x000070000ca11de0: 00000000fc839e8c 0000000119fa7f4c 0x000070000ca11df0: 00000007e41cf158 00000000fc000000 0x000070000ca11e00: 00000007ffe02950 00000007e0000000 0x000070000ca11e10: 0000000000000000 000000011a367334 0x000070000ca11e20: 00000007e41cf158 0000000000000000 0x000070000ca11e30: 0000000700000000 0000000700000000 0x000070000ca11e40: 000000010c9e7000 0000000700000005 0x000070000ca11e50: 00000007e0066128 0000000ffc028e1d 0x000070000ca11e60: 000000010c9e7000 00000007e41ca620 0x000070000ca11e70: 00000031abc3de21 00000000fc004559 0x000070000ca11e80: 00000007e41cf158 000000011a3ae8b8 0x000070000ca11e90: 00000007e01afa98 00000007e41ceed8 0x000070000ca11ea0: 00000007e41ceef8 00000007e41cf040 0x000070000ca11eb0: 00000007e0000000 00000001fc000000 0x000070000ca11ec0: 00000007e0000000 0000000000000029 0x000070000ca11ed0: 0000000000000001 0000000000000000 0x000070000ca11ee0: 0000000000000001 00007fbc74009600 0x000070000ca11ef0: 000070000ca11f80 000000011219d12d Instructions: (pc=0x000000011a317e29) 0x000000011a317d29: 0f b1 13 0f 85 0a 25 00 00 47 0f be 5c f4 10 45 0x000000011a317d39: 85 db 0f 1f 44 00 00 0f 85 6a 28 00 00 47 8b 54 0x000000011a317d49: f4 14 47 8b 5c d4 0c 4f 8d 04 d4 45 85 db 0f 86 0x000000011a317d59: b4 15 00 00 4b 8d 7c d4 10 b8 20 00 00 00 41 8b 0x000000011a317d69: d3 48 8b df 83 fa 10 0f 8c 79 00 00 00 83 fa 20 0x000000011a317d79: 0f 8c 36 00 00 00 c5 f9 6e c8 c4 e2 7d 78 c9 c5 0x000000011a317d89: fd ef c0 8b ca 83 e1 e0 83 e2 1f c5 fe 6f 13 c5 0x000000011a317d99: ed 74 d1 c4 e2 7d 17 c2 0f 83 69 00 00 00 48 83 0x000000011a317da9: c3 20 83 e9 20 75 e4 e9 0d 00 00 00 c5 f9 6e c8 0x000000011a317db9: c5 f9 ef c0 c4 e2 71 00 c8 83 fa 10 0f 8c 24 00 0x000000011a317dc9: 00 00 8b ca 83 e1 f0 83 e2 0f c5 fa 6f 13 c5 e9 0x000000011a317dd9: 74 d1 c4 e2 79 17 c2 0f 83 2a 00 00 00 48 83 c3 0x000000011a317de9: 10 83 e9 10 75 e4 85 d2 0f 84 12 00 00 00 0f b6 0x000000011a317df9: 0b 3b c1 74 1b 48 83 c3 01 83 ea 01 74 02 eb ee 0x000000011a317e09: bb ff ff ff ff eb 0c c5 fd d7 ca 0f bc c1 03 d8 0x000000011a317e19: 48 2b df 0f 1f 40 00 41 3b db 0f 83 df 29 00 00 0x000000011a317e29: 45 0f b6 4c 18 10 4b 8d 34 f4 41 83 f9 20 0f 85 0x000000011a317e39: be 00 00 00 44 8b cb 41 ff c1 45 3b cb 0f 8d a3 0x000000011a317e49: 2c 00 00 45 3b cb 0f 83 93 2c 00 00 43 0f b6 4c 0x000000011a317e59: 08 10 0f 1f 44 00 00 83 f9 20 0f 85 8a 00 00 00 0x000000011a317e69: 8b cb 83 c1 02 3b 0c 24 8b 2c 24 0f 4c cd 41 3b 0x000000011a317e79: cb 41 0f 4f cb 41 ff c1 44 3b c9 7c c6 45 3b cb 0x000000011a317e89: 0f 8d b5 2d 00 00 41 8b d1 66 66 0f 1f 84 00 00 0x000000011a317e99: 00 00 00 66 66 66 90 41 0f b6 5c 10 10 83 fb 20 0x000000011a317ea9: 0f 85 51 00 00 00 41 8b db 41 2b d9 45 3b d9 0f 0x000000011a317eb9: 4c dd 81 fb e8 03 00 00 b9 e8 03 00 00 0f 47 d9 0x000000011a317ec9: 41 03 d9 ff c2 3b d3 7c ce 49 8b bf 20 01 00 00 0x000000011a317ed9: 48 8b 4c 24 18 48 8b 5c 24 28 85 07 41 3b d3 0f 0x000000011a317ee9: 8d 59 2d 00 00 44 8b ca eb 9c 41 8b d1 8b 2c 24 0x000000011a317ef9: eb 05 8b d3 8b 2c 24 8b ca 83 c1 03 41 b8 0a 00 0x000000011a317f09: 00 00 90 c5 f8 77 e8 4c e5 c1 ff 83 f8 64 0f 84 0x000000011a317f19: 27 29 00 00 89 44 24 20 89 2c 24 48 ba a0 82 9f Stack slot to memory mapping: stack at sp + 0 slots: 0x0 is NULL stack at sp + 1 slots: 0x00000007e41cf460 is an oop: sun.net.www.MessageHeader {0x00000007e41cf460} - klass: 'sun/net/www/MessageHeader' stack at sp + 2 slots: 0x0 is NULL stack at sp + 3 slots: 0x00000007e41cf460 is an oop: sun.net.www.MessageHeader {0x00000007e41cf460} - klass: 'sun/net/www/MessageHeader' stack at sp + 4 slots: 0x0 is NULL stack at sp + 5 slots: 0x00000007e41cf158 is an oop: sun.net.www.protocol.http.HttpURLConnection {0x00000007e41cf158} - klass: 'sun/net/www/protocol/http/HttpURLConnection' stack at sp + 6 slots: 0x00000007e1a44668 is an oop: java.io.BufferedOutputStream {0x00000007e1a44668} - klass: 'java/io/BufferedOutputStream' stack at sp + 7 slots: 0x00000007e1a44558 is an oop: sun.net.www.http.HttpClient {0x00000007e1a44558} - klass: 'sun/net/www/http/HttpClient'
15-10-2020

ILW = Crash in C2 compiled code, with crypto test (regression in JDK 16), disable _indexOfL_char intrinsic = HMM = P2
15-10-2020

The failure caused by new intrinsic JDK-8173585. Test passed when it is disabled: --jvm-args "-XX:+UnlockDiagnosticVMOptions -XX:DisableIntrinsic=_indexOfL_char"
14-10-2020

Fastdebug VM crashed too: # SIGSEGV (0xb) at pc=0x00000001224ffd7a, pid=43164, tid=24835 # # JRE version: Java(TM) SE Runtime Environment (16.0+20) (fastdebug build 16-ea+20-1091) # Java VM: Java HotSpot(TM) 64-Bit Server VM (fastdebug 16-ea+20-1091, mixed mode, sharing, tiered, compressed oops, g1 gc, bsd-amd64) # Problematic frame: # J 8165 c2 sun.net.www.http.HttpClient.parseHTTPHeader(Lsun/net/www/MessageHeader;Lsun/net/ProgressSource;Lsun/net/www/protocol/http/HttpURLConnection;)Z java.base@16-ea (1173 bytes) @ 0x00000001224ffd7a [0x00000001224ff1a0+0x0000000000000bda]
14-10-2020

Would be nice if we hit it with fastdebug build.
14-10-2020

Here's a snippet from the jdk-16+20-1091-tier2 failure's log file: no source document -S# # A fatal error has been detected by the Java Runtime Environment: # # SIGSEGV (0xb) at pc=0x000000011f8fda15, pid=20864, tid=23811 # # JRE version: Java(TM) SE Runtime Environment (16.0+20) (build 16-ea+20-1091) # Java VM: Java HotSpot(TM) 64-Bit Server VM (16-ea+20-1091, mixed mode, sharing, tiered, compressed oops, g1 gc, bsd-amd64) # Problematic frame: # J 7536 c2 sun.net.www.http.HttpClient.parseHTTPHeader(Lsun/net/www/MessageHeader;Lsun/net/ProgressSource;Lsun/net/www/protocol/http/HttpURLConnection;)Z java.base@16-ea (1173 bytes) @ 0x000000011f8fda15 [0x000000011f8fd300+0x0000000000000715] # # Core dump will be written. Default location: core.20864 # # An error report file with more information is saved as: # /scratch/mesos/slaves/4076d11c-c6ed-4d07-84c1-4ab8d55cd975-S330845/frameworks/1735e8a2-a1db-478c-8104-60c8b0af87dd-0196/executors/a16ed4f4-4015-4867-accc-99f6d0b1b32b/runs/b891ecbb-1a8f-4db6-9599-42c8d008d057/testoutput/test-support/jtreg_open_test_jdk_tier2_part1/scratch/2/hs_err_pid20864.log # # If you would like to submit a bug report, please visit: # https://bugreport.java.com/bugreport/crash.jsp # ----------System.err:(0/0)---------- ----------rerun:(43/5983)*---------- Looks like the same frame, but this failure is on Mac_OS_X_10.13.6 so this isn't likely related to the recent Mac_OS_X_10.15.X patch problems.
14-10-2020