changeset 1411:db849cee5777

Pre-allocate some stack space to work around a problem with DLL alloca() code on a linux kernel.
author jkeil
date Sun, 29 Jul 2001 10:17:53 +0000
parents eda16e490ae7
children bec93c250168
files loader/pe_image.c
diffstat 1 files changed, 12 insertions(+), 10 deletions(-) [+]
line wrap: on
line diff
--- a/loader/pe_image.c	Sun Jul 29 02:08:27 2001 +0000
+++ b/loader/pe_image.c	Sun Jul 29 10:17:53 2001 +0000
@@ -884,19 +884,23 @@
  * due to the PROCESS_Create stuff.
  */
 
-#if	0
 /*
- * so this is a dirty hack.
- * Why do we need it?
- *
- * Disable it for now, let's see if it breaks something
+ * This is a dirty hack.
+ * The win32 DLLs contain an alloca routine, that first probes the soon
+ * to be allocated new memory *below* the current stack pointer in 4KByte
+ * increments.  After the mem probing below the current %esp,  the stack
+ * pointer is finally decremented to make room for the "alloca"ed memory.
+ * Maybe the probing code is intended to extend the stack on a windows box.
+ * Anyway, the linux kernel does *not* extend the stack by simply accessing
+ * memory below %esp;  it segfaults.
+ * The extend_stack_for_dll_alloca() routine just preallocates a big chunk
+ * of memory on the stack, for use by the DLLs alloca routine.
  */
-static void This_Is_Dirty_Hack(void)
+static void extend_stack_for_dll_alloca(void)
 {
     void* mem=alloca(0x20000);
     *(int*)mem=0x1234;
 }
-#endif
 
 
 /* Called if the library is loaded or freed.
@@ -939,9 +943,7 @@
 		break;
 	}	
 	TRACE("for %s\n", wm->filename);
-#if 0
-	This_Is_Dirty_Hack();
-#endif
+	extend_stack_for_dll_alloca();
         retv = entry( wm->module, type, lpReserved );
     }