summaryrefslogtreecommitdiff
path: root/lib/enable_execute_stack.c
blob: 15ab03fd73bfdf8f53221985026215b1da42d26d (plain)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
//===-- enable_execute_stack.c - Implement __enable_execute_stack ---------===//
//
//                     The LLVM Compiler Infrastructure
//
// This file is distributed under the University of Illinois Open Source
// License. See LICENSE.TXT for details.
//
//===----------------------------------------------------------------------===//

#include <stdint.h>
#include <sys/mman.h>
#ifndef __APPLE__
#include <unistd.h>
#endif


//
// The compiler generates calls to __enable_execute_stack() when creating 
// trampoline functions on the stack for use with nested functions.
// It is expected to mark the page(s) containing the address 
// and the next 48 bytes as executable.  Since the stack is normally rw-
// that means changing the protection on those page(s) to rwx. 
//
void __enable_execute_stack(void* addr)
{
#if __APPLE__
	// On Darwin, pagesize is always 4096 bytes
	const uintptr_t pageSize = 4096;
#else
        // FIXME: We should have a configure check for this.
        const uintptr_t pageSize = getpagesize();
#endif
	const uintptr_t pageAlignMask = ~(pageSize-1);
	uintptr_t p = (uintptr_t)addr;
	unsigned char* startPage = (unsigned char*)(p & pageAlignMask);
	unsigned char* endPage = (unsigned char*)((p+48+pageSize) & pageAlignMask);
	mprotect(startPage, endPage-startPage, PROT_READ | PROT_WRITE | PROT_EXEC);
}