Date: Tue, 20 Aug 2019 17:23:24 +0000 From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 239894] security.bsd.stack_guard_page default causes Java to crash Message-ID: <bug-239894-227-b2kAJe4a69@https.bugs.freebsd.org/bugzilla/> In-Reply-To: <bug-239894-227@https.bugs.freebsd.org/bugzilla/> References: <bug-239894-227@https.bugs.freebsd.org/bugzilla/>
next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D239894 --- Comment #3 from Greg Lewis <glewis@FreeBSD.org> --- Thanks for the response Konstantin! I can see a couple of problems with that approach. The biggest problem is that not all SIGSEGV should be interpreted as a stack overflow. With the possibility of whatever homegrown JNI code the user may have running and the internal native code in JDK itself, a SIGSEGV does not necessarily mean that a stack overflow is occurring, and interpreting it th= at way will lead to other incorrect behaviour. The second problem is that it seems like that still leaves the JVM unable to allow access to the reserved pages at the top of the guard zone for critical sections to complete. See the reference I posted earlier to JEP 270 for why that is important (there is another internal test that checks for that). Kurt may have other concerns, but those would be mine. --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-239894-227-b2kAJe4a69>