Take 2: RFR: 8197429: Increased stack guard causes segfaults on x86-32
David Holmes
david.holmes at oracle.com
Wed Feb 14 02:10:39 UTC 2018
On 14/02/2018 12:51 AM, Andrew Haley wrote:
> Webrev amended.
>
> http://cr.openjdk.java.net/~aph/8197429-2/
My question still stands:
How does this interact with the use of DisablePrimordialThreadGuardPages?
Thanks,
David
-----
> Copyrights fixed.
>
> Test case changed to be built with the rest of the native code.
>
> We now only bang down the stack to its maximum size if we're going to
> run Java code on the primordial stack. This only happens with the
> JNI invocation interface.
>
> The new logic is:
>
> if we're on the primordial stack
> bang down the stack to its maximum size
>
> try to map the codebuf just below the primordial stack
>
> if that didn't work
> try to map again, but 1 megabyte lower
>
> OK?
>
More information about the hotspot-runtime-dev
mailing list