CSR :
|
|
Relates :
|
|
Relates :
|
|
Relates :
|
|
Relates :
|
|
Relates :
|
JDK-8227417 :
|
There is a well-known glibc issue [1] that causes program with large TLS segments fail. This issue has been observed and reported for Java/JVM [2]. The original bug id is JDK-8130425, which is manifested as a StackOverflowError in the reported failure instance. The issue can cause other symptoms that may be difficult to diagnose. Please see more details in the related CSR, JDK-8225498. Based on the glibc discussion thread [2], Rust implemented a fix by taking into account of the TLS size. This bug is created with the intent to address the TLS issue with a similar solution (comparing to the -Djdk.lang.processReaperUseDefaultStackSize workaround introduced by JDK-8130425) in Java/JVM layer. [1] glibc discussion archive: http://sourceware.org/bugzilla/show_bug.cgi?id=11787 [2] OpenJDK discussion archive: http://mail.openjdk.java.net/pipermail/core-libs-dev/2015-December/037558.html [3] http://cr.openjdk.java.net/~jiangli/tls_size/webrev/ (contributed by Jeremy Manson)
|