https://bugs.exim.org/show_bug.cgi?id=2445
--- Comment #5 from Zoltan Herczeg <hzmes...@freemail.hu> --- Normally if jit cannot allocate executable memory, it just falls back to interpreter. But if you know the target system is hardened, it is better to disabling JIT since disallowing dynamic code generation is part of hardening. I would be curious whether pcre jit was used to attack systems. -- You are receiving this mail because: You are on the CC list for the bug. -- ## List details at https://lists.exim.org/mailman/listinfo/pcre-dev