comparison src/os/linux/vm/os_linux.hpp @ 8710:9058789475af

7107135: Stack guard pages are no more protected after loading a shared library with executable stack Summary: Detect the execstack attribute of the loaded library and attempt to fix the stack guard using Safepoint op. Reviewed-by: dholmes, zgu Contributed-by: ioi.lam@oracle.com
author iklam
date Tue, 05 Mar 2013 13:55:56 -0800
parents 63e54c37ac64
children 14509df4cd63
comparison
equal deleted inserted replaced
8709:255c0a4cb4eb 8710:9058789475af
92 static void print_full_memory_info(outputStream* st); 92 static void print_full_memory_info(outputStream* st);
93 static void print_distro_info(outputStream* st); 93 static void print_distro_info(outputStream* st);
94 static void print_libversion_info(outputStream* st); 94 static void print_libversion_info(outputStream* st);
95 95
96 public: 96 public:
97 static bool _stack_is_executable;
98 static void *dll_load_inner(const char *name);
99
97 static void init_thread_fpu_state(); 100 static void init_thread_fpu_state();
98 static int get_fpu_control_word(); 101 static int get_fpu_control_word();
99 static void set_fpu_control_word(int fpu_control); 102 static void set_fpu_control_word(int fpu_control);
100 static pthread_t main_thread(void) { return _main_thread; } 103 static pthread_t main_thread(void) { return _main_thread; }
101 // returns kernel thread id (similar to LWP id on Solaris), which can be 104 // returns kernel thread id (similar to LWP id on Solaris), which can be