> This change instruments Metaspace for ASan. Metaspace allocates memory using > `mmap`/`munmap` which ASan is not aware of. Fortunately ASan supports > applications [manually poisoning/unpoisoning > memory](https://github.com/google/sanitizers/wiki/AddressSanitizerManualPoisoning). > ASan is able to detect poisoned memory, similar to `use-after-free`, and > will raise an error similarly called `use-after-poison`. This provides and > extra layer of defense and confidence. > > The header `sanitizers/address.h` defines macros for poisoning/unpoisoning > memory regions. These macros can be used regardless of build mode. When ASan > is not available, they are implemented using a NOOP approach which still > compiles the arguments but does so such that they will be stripped out by the > compiler due to being unreachable. This helps with maintenance. > > This also has the added benefit of making > [LSan](https://bugs.openjdk.org/browse/JDK-8298445) more accurate and > deterministic, as LSan will not look for pointers to malloc memory in > poisoned memory regions. > > IMO the benefit of doing this greatly outweighs the cost.
Justin King has updated the pull request incrementally with one additional commit since the last revision: Update sanitizers/address.h based on review Signed-off-by: Justin King <jck...@google.com> ------------- Changes: - all: https://git.openjdk.org/jdk/pull/11702/files - new: https://git.openjdk.org/jdk/pull/11702/files/31ce84f7..e3b9bb09 Webrevs: - full: https://webrevs.openjdk.org/?repo=jdk&pr=11702&range=11 - incr: https://webrevs.openjdk.org/?repo=jdk&pr=11702&range=10-11 Stats: 34 lines in 1 file changed: 1 ins; 28 del; 5 mod Patch: https://git.openjdk.org/jdk/pull/11702.diff Fetch: git fetch https://git.openjdk.org/jdk pull/11702/head:pull/11702 PR: https://git.openjdk.org/jdk/pull/11702