]>
Commit | Line | Data |
---|---|---|
10e48e39 | 1 | /* Implement __enable_execute_stack using mprotect(2). |
5d5bf775 | 2 | Copyright (C) 2011-2013 Free Software Foundation, Inc. |
10e48e39 RO |
3 | |
4 | This file is part of GCC. | |
5 | ||
6 | GCC is free software; you can redistribute it and/or modify it under | |
7 | the terms of the GNU General Public License as published by the Free | |
8 | Software Foundation; either version 3, or (at your option) any later | |
9 | version. | |
10 | ||
11 | GCC is distributed in the hope that it will be useful, but WITHOUT ANY | |
12 | WARRANTY; without even the implied warranty of MERCHANTABILITY or | |
13 | FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License | |
14 | for more details. | |
15 | ||
16 | Under Section 7 of GPL version 3, you are granted additional | |
17 | permissions described in the GCC Runtime Library Exception, version | |
18 | 3.1, as published by the Free Software Foundation. | |
19 | ||
20 | You should have received a copy of the GNU General Public License and | |
21 | a copy of the GCC Runtime Library Exception along with this program; | |
22 | see the files COPYING3 and COPYING.RUNTIME respectively. If not, see | |
23 | <http://www.gnu.org/licenses/>. */ | |
24 | ||
25 | #include <sys/mman.h> | |
26 | #include <unistd.h> | |
27 | #include <stdlib.h> | |
28 | ||
29 | #define STACK_PROT_RWX (PROT_READ | PROT_WRITE | PROT_EXEC) | |
30 | ||
31 | static int need_enable_exec_stack; | |
32 | ||
33 | static void check_enabling (void) __attribute__ ((unused)); | |
34 | extern void __enable_execute_stack (void *); | |
35 | ||
36 | #if defined __FreeBSD__ | |
37 | #include <sys/sysctl.h> | |
38 | ||
39 | static void __attribute__ ((constructor)) | |
40 | check_enabling (void) | |
41 | { | |
42 | int prot = 0; | |
43 | size_t len = sizeof (prot); | |
44 | ||
45 | sysctlbyname ("kern.stackprot", &prot, &len, NULL, 0); | |
46 | if (prot != STACK_PROT_RWX) | |
47 | need_enable_exec_stack = 1; | |
48 | } | |
49 | #elif defined __sun__ && defined __svr4__ | |
50 | static void __attribute__ ((constructor)) | |
51 | check_enabling (void) | |
52 | { | |
53 | int prot = (int) sysconf (_SC_STACK_PROT); | |
54 | ||
55 | if (prot != STACK_PROT_RWX) | |
56 | need_enable_exec_stack = 1; | |
57 | } | |
58 | #else | |
59 | /* There is no way to query the execute permission of the stack, so | |
60 | we always issue the mprotect() call. */ | |
61 | ||
62 | static int need_enable_exec_stack = 1; | |
63 | #endif | |
64 | ||
10e48e39 RO |
65 | /* Attempt to turn on access permissions for the stack. Unfortunately it |
66 | is not possible to make this namespace-clean.*/ | |
67 | ||
68 | void | |
69 | __enable_execute_stack (void *addr) | |
70 | { | |
71 | if (!need_enable_exec_stack) | |
72 | return; | |
73 | else | |
74 | { | |
75 | static long size, mask; | |
76 | ||
77 | if (size == 0) { | |
78 | size = getpagesize (); | |
79 | mask = ~(size - 1); | |
80 | } | |
81 | ||
82 | char *page = (char *) (((long) addr) & mask); | |
83 | char *end = (char *) | |
84 | ((((long) (addr + __LIBGCC_TRAMPOLINE_SIZE__)) & mask) + size); | |
85 | ||
86 | if (mprotect (page, end - page, STACK_PROT_RWX) < 0) | |
87 | /* Note that no errors should be emitted by this code; it is | |
88 | considered dangerous for library calls to send messages to | |
89 | stdout/stderr. */ | |
90 | abort (); | |
91 | } | |
92 | } |