Conversation

The call stack in basically every programming environment is a virtual memory system with overcommit and allocation that never returns errors.
5
68
Replying to and
Linux kernel will also lazily map in the main thread stack even with overcommit disabled. Runtime has to do something about that during initialization if it wants to guarantee that a certain amount can be used later. An error can occur simply when you reach deepest stack usage.
2
i.e. read a byte from each page just past the desired limit and install an actual guard page/region rather than relying on the magical automatically growing guard region it usually provides. Only thing I have seen doing this is ART for reliably throwing stack overflow exception.
1
1
-fstack-clash-protection just prevents you from jumping over a guard page/region. It doesn't map in the whole stack before you start using it. It doesn't prevent dying because of memory allocation failure with overcommit disabled when you call a function because mapping fails.
1
1
Look back at mobile.twitter.com/DanielMicay/st. Linux has support for disabling overcommit but a lot of programs will still have a form of dynamic memory allocation failure they aren't able to handle unless they reserve the main thread stack space they need up front and handle an error.
Quote Tweet
Replying to @RichFelker and @pcwalton
Linux kernel will also lazily map in the main thread stack even with overcommit disabled. Runtime has to do something about that during initialization if it wants to guarantee that a certain amount can be used later. An error can occur simply when you reach deepest stack usage.