Your TLS Stack Is Lying to You About Zero-Copy
The article discusses how traditional TLS implementations like Java's SSLEngine conflict with strict performance and memory management requirements in high-performance runtimes. Despite claims of zero-copy efficiency, SSLEngine maintains heap-based memory contracts that undermine off-heap ownership and deterministic cleanup. The author argues that for systems requiring precise control over memory and execution, such TLS stacks introduce an architectural mismatch.
- ▪Java's SSLEngine uses ByteBuffer and JVM-managed objects, which conflict with off-heap memory ownership models.
- ▪The Exeris Kernel enforces strict memory control, requiring deterministic cleanup and zero-allocation on hot paths.
- ▪SSLEngine's delayed cleanup and heap-visible state transitions can leave native TLS resources alive longer than necessary.
- ▪Netty's OpenSslEngine was considered as an alternative before pursuing a foreign function & memory (FFM) approach.
Opening excerpt (first ~120 words) tap to expand
try { if(localStorage) { let currentUser = localStorage.getItem('current_user'); if (currentUser) { currentUser = JSON.parse(currentUser); if (currentUser.id === 2387123) { document.getElementById('article-show-container').classList.add('current-user-is-article-author'); } } } } catch (e) { console.error(e); } Arkadiusz Przychocki Posted on May 1 • Originally published at blog.arkstack.dev Your TLS Stack Is Lying to You About Zero-Copy #java #architecture #exeris #jvmperformance Exeris Kernel (4 Part Series) 1 Why I Banned ThreadLocal from the Exeris Kernel (And What Replaced It) 2 Reevaluating 1990s OOP in Java: DOP, Scoped Values, and Loom in 2026 3 StructuredTaskScope beyond toy examples: dependency-aware kernel bootstrap in modern Java 4 Your TLS Stack Is Lying to You About Zero-Copy…
Excerpt limited to ~120 words for fair-use compliance. The full article is at DEV.to (Top).