2022-05-23 17:15:53 +00:00
|
|
|
/*-*- mode:c;indent-tabs-mode:nil;c-basic-offset:2;tab-width:8;coding:utf-8 -*-│
|
|
|
|
│vi: set net ft=c ts=2 sts=2 sw=2 fenc=utf-8 :vi│
|
|
|
|
╞══════════════════════════════════════════════════════════════════════════════╡
|
|
|
|
│ Copyright 2022 Justine Alexandra Roberts Tunney │
|
|
|
|
│ │
|
|
|
|
│ Permission to use, copy, modify, and/or distribute this software for │
|
|
|
|
│ any purpose with or without fee is hereby granted, provided that the │
|
|
|
|
│ above copyright notice and this permission notice appear in all copies. │
|
|
|
|
│ │
|
|
|
|
│ THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL │
|
|
|
|
│ WARRANTIES WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED │
|
|
|
|
│ WARRANTIES OF MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE │
|
|
|
|
│ AUTHOR BE LIABLE FOR ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL │
|
|
|
|
│ DAMAGES OR ANY DAMAGES WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR │
|
|
|
|
│ PROFITS, WHETHER IN AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER │
|
|
|
|
│ TORTIOUS ACTION, ARISING OUT OF OR IN CONNECTION WITH THE USE OR │
|
|
|
|
│ PERFORMANCE OF THIS SOFTWARE. │
|
|
|
|
╚─────────────────────────────────────────────────────────────────────────────*/
|
2022-07-11 12:55:17 +00:00
|
|
|
#include "libc/calls/calls.h"
|
|
|
|
#include "libc/dce.h"
|
|
|
|
#include "libc/intrin/asan.internal.h"
|
|
|
|
#include "libc/intrin/asancodes.h"
|
|
|
|
#include "libc/runtime/memtrack.internal.h"
|
2022-07-10 11:01:17 +00:00
|
|
|
#include "libc/runtime/runtime.h"
|
|
|
|
#include "libc/runtime/stack.h"
|
|
|
|
#include "libc/sysv/consts/map.h"
|
|
|
|
#include "libc/sysv/consts/prot.h"
|
2022-05-23 17:15:53 +00:00
|
|
|
|
2022-07-10 11:01:17 +00:00
|
|
|
/**
|
|
|
|
* Allocates stack.
|
|
|
|
*
|
2022-07-11 12:55:17 +00:00
|
|
|
* The size of your returned stack is always GetStackSize().
|
|
|
|
*
|
|
|
|
* The bottom 4096 bytes of your stack can't be used, since it's always
|
|
|
|
* reserved for a read-only guard page. With ASAN it'll be poisoned too.
|
|
|
|
*
|
|
|
|
* The top 16 bytes of a stack can't be used due to openbsd:stackbound
|
|
|
|
* and those bytes are also poisoned under ASAN build modes.
|
|
|
|
*
|
2022-09-08 01:59:00 +00:00
|
|
|
* @return stack bottom address on success, or null w/ errno
|
2022-07-10 11:01:17 +00:00
|
|
|
*/
|
|
|
|
void *_mapstack(void) {
|
2022-07-11 12:55:17 +00:00
|
|
|
char *p;
|
2022-07-16 03:47:20 +00:00
|
|
|
if ((p = mmap(0, GetStackSize(), PROT_READ | PROT_WRITE,
|
|
|
|
MAP_STACK | MAP_ANONYMOUS, -1, 0)) != MAP_FAILED) {
|
2022-07-11 12:55:17 +00:00
|
|
|
if (IsAsan()) {
|
|
|
|
__asan_poison(p + GetStackSize() - 16, 16, kAsanStackOverflow);
|
|
|
|
__asan_poison(p, 4096, kAsanStackOverflow);
|
|
|
|
}
|
|
|
|
return p;
|
|
|
|
} else {
|
|
|
|
return 0;
|
|
|
|
}
|
2022-05-23 17:15:53 +00:00
|
|
|
}
|
|
|
|
|
2022-07-10 11:01:17 +00:00
|
|
|
/**
|
|
|
|
* Frees stack.
|
|
|
|
*
|
|
|
|
* @param stk was allocated by _mapstack()
|
|
|
|
*/
|
|
|
|
int _freestack(void *stk) {
|
|
|
|
return munmap(stk, GetStackSize());
|
2022-05-23 17:15:53 +00:00
|
|
|
}
|