Date: Tue, 20 Aug 2019 18:04:46 +0000 From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 239894] security.bsd.stack_guard_page default causes Java to crash Message-ID: <bug-239894-227-irfzDitzzM@https.bugs.freebsd.org/bugzilla/> In-Reply-To: <bug-239894-227@https.bugs.freebsd.org/bugzilla/> References: <bug-239894-227@https.bugs.freebsd.org/bugzilla/>
next in thread | previous in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D239894 --- Comment #5 from Konstantin Belousov <kib@FreeBSD.org> --- (In reply to Greg Lewis from comment #3) I am not proposing to interpret any SIGSEGV as a stack overflow. I propose= to consider a SIGSEGV as the stack overflow if it occured in the range of [guard_start; stack_end) for the given stack, instead of the current implementation which considers the range [guard_start; guard_end) (at least this is how I understand what is going on by your explanation). I can also add e.g. procctl(PROC_STACKGUARD) but to convince me to do that = you would need to explain why the above approach is not sufficient. --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-239894-227-irfzDitzzM>