Take 2: RFR: 8197429: Increased stack guard causes segfaults on x86-32

David Holmes david.holmes at oracle.com
Wed Feb 14 02:10:39 UTC 2018


On 14/02/2018 12:51 AM, Andrew Haley wrote:
> Webrev amended.
> 
> http://cr.openjdk.java.net/~aph/8197429-2/

My question still stands:

How does this interact with the use of DisablePrimordialThreadGuardPages?

Thanks,
David
-----


> Copyrights fixed.
> 
> Test case changed to be built with the rest of the native code.
> 
> We now only bang down the stack to its maximum size if we're going to
> run Java code on the primordial stack.  This only happens with the
> JNI invocation interface.
> 
> The new logic is:
> 
>    if we're on the primordial stack
>      bang down the stack to its maximum size
> 
>    try to map the codebuf just below the primordial stack
> 
>    if that didn't work
>      try to map again, but 1 megabyte lower
> 
> OK?
> 


More information about the hotspot-runtime-dev mailing list