From 9733c016f581556175106734b0eb4e49226e7752 Mon Sep 17 00:00:00 2001 From: Greg Lewis Date: Mon, 13 Jun 2016 04:57:28 +0000 Subject: . Handle unsafe operations that access invalid memory more gracefully. . Bump PORTREVISION for this fix. PR: 209599 Submitted by: Andrew Smith --- .../patch-hotspot-src-os_cpu-bsd_x86-vm-os_bsd_x86.cpp | 14 ++++++++++++++ 1 file changed, 14 insertions(+) create mode 100644 java/openjdk7/files/patch-hotspot-src-os_cpu-bsd_x86-vm-os_bsd_x86.cpp (limited to 'java/openjdk7/files') diff --git a/java/openjdk7/files/patch-hotspot-src-os_cpu-bsd_x86-vm-os_bsd_x86.cpp b/java/openjdk7/files/patch-hotspot-src-os_cpu-bsd_x86-vm-os_bsd_x86.cpp new file mode 100644 index 000000000000..4bb8dca265b5 --- /dev/null +++ b/java/openjdk7/files/patch-hotspot-src-os_cpu-bsd_x86-vm-os_bsd_x86.cpp @@ -0,0 +1,14 @@ +--- hotspot/src/os_cpu/bsd_x86/vm/os_bsd_x86.cpp.prev 2016-05-20 14:03:24.511067000 +0000 ++++ hotspot/src/os_cpu/bsd_x86/vm/os_bsd_x86.cpp 2016-05-20 14:12:29.670620000 +0000 +@@ -609,7 +609,11 @@ + stub = SharedRuntime::continuation_for_implicit_exception(thread, pc, SharedRuntime::IMPLICIT_NULL); + } + } else if (thread->thread_state() == _thread_in_vm && ++#ifdef __FreeBSD__ ++ (sig == SIGBUS || sig == SIGSEGV) && ++#else + sig == SIGBUS && /* info->si_code == BUS_OBJERR && */ ++#endif + thread->doing_unsafe_access()) { + stub = StubRoutines::handler_for_unsafe_access(); + } -- cgit v1.2.3