From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mailman by lists.gnu.org with tmda-scanned (Exim 4.43) id 1O9k32-0000aK-0Q for qemu-devel@nongnu.org; Wed, 05 May 2010 15:14:20 -0400 Received: from [140.186.70.92] (port=47026 helo=eggs.gnu.org) by lists.gnu.org with esmtp (Exim 4.43) id 1O9j2P-000545-Qk for qemu-devel@nongnu.org; Wed, 05 May 2010 14:11:53 -0400 Received: from Debian-exim by eggs.gnu.org with spam-scanned (Exim 4.69) (envelope-from ) id 1O9j0s-0007GD-LL for qemu-devel@nongnu.org; Wed, 05 May 2010 14:08:25 -0400 Received: from are.twiddle.net ([75.149.56.221]:47582) by eggs.gnu.org with esmtp (Exim 4.69) (envelope-from ) id 1O9j0r-0007Fa-7H for qemu-devel@nongnu.org; Wed, 05 May 2010 14:08:02 -0400 From: Richard Henderson Date: Wed, 5 May 2010 11:07:45 -0700 Message-Id: <1273082868-13675-10-git-send-email-rth@twiddle.net> In-Reply-To: References: Subject: [Qemu-devel] [PATCH 09/12] linux-user: Put the stack guard page at the top. List-Id: qemu-devel.nongnu.org List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , To: qemu-devel@nongnu.org Cc: paul@codesourcery.com There are no supported stack-grows-up targets. We were putting the guard page at the highest address, i.e. the bottom of the stack. Use the maximum of host and guest page size for the guard size. Signed-off-by: Richard Henderson --- linux-user/elfload.c | 29 ++++++++++++++++------------- 1 files changed, 16 insertions(+), 13 deletions(-) diff --git a/linux-user/elfload.c b/linux-user/elfload.c index fb03687..bd4b8fc 100644 --- a/linux-user/elfload.c +++ b/linux-user/elfload.c @@ -984,28 +984,31 @@ static abi_ulong copy_elf_strings(int argc,char ** argv, void **page, static abi_ulong setup_arg_pages(abi_ulong p, struct linux_binprm *bprm, struct image_info *info) { - abi_ulong stack_base, size, error; + abi_ulong stack_base, size, error, guard; int i; /* Create enough stack to hold everything. If we don't use - * it for args, we'll use it for something else... - */ + it for args, we'll use it for something else. */ size = guest_stack_size; - if (size < MAX_ARG_PAGES*TARGET_PAGE_SIZE) + if (size < MAX_ARG_PAGES*TARGET_PAGE_SIZE) { size = MAX_ARG_PAGES*TARGET_PAGE_SIZE; - error = target_mmap(0, - size + qemu_host_page_size, - PROT_READ | PROT_WRITE, - MAP_PRIVATE | MAP_ANONYMOUS, - -1, 0); + } + guard = TARGET_PAGE_SIZE; + if (guard < qemu_real_host_page_size) { + guard = qemu_real_host_page_size; + } + + error = target_mmap(0, size + guard, PROT_READ | PROT_WRITE, + MAP_PRIVATE | MAP_ANONYMOUS, -1, 0); if (error == -1) { - perror("stk mmap"); + perror("mmap stack"); exit(-1); } - /* we reserve one extra page at the top of the stack as guard */ - target_mprotect(error + size, qemu_host_page_size, PROT_NONE); - stack_base = error + size - MAX_ARG_PAGES*TARGET_PAGE_SIZE; + /* We reserve one extra page at the top of the stack as guard. */ + target_mprotect(error, guard, PROT_NONE); + + stack_base = error + guard + size - MAX_ARG_PAGES*TARGET_PAGE_SIZE; p += stack_base; for (i = 0 ; i < MAX_ARG_PAGES ; i++) { -- 1.7.0.1