[flang-commits] [flang] [flang][docs] Add an FAQ about an executable stack (PR #171241)
David Spickett via flang-commits
flang-commits at lists.llvm.org
Wed Dec 10 07:53:28 PST 2025
================
@@ -0,0 +1,53 @@
+<!--===- docs/FAQ.md
+
+ Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
+ See https://llvm.org/LICENSE.txt for license information.
+ SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
+
+-->
+
+<!-- TODO: remove this after adding this page to ToC -->
+```{eval-rst}
+:orphan:
+```
+
+# Frequently Asked Questions (FAQ)
+
+```{contents}
+---
+local:
+---
+```
+
+## Driver
+
+### Why do I get a warning or error about an executable stack?
+
+This occurs because Flang's implementation of pointers to internal procedures requires an executable stack.
+
+When an internal procedure is referenced from outside its host scope (e.g., via a procedure pointer), the implementation must ensure that it can still access its host-associated variables.
+To achieve this, the current implementation of Flang generates a small piece of code, called a "trampoline", on the stack dynamically.
+Since this trampoline code must be executed, the stack needs to be executable.
+For a more detailed explanation of trampolines, please refer to the [design document](InternalProcedureTrampolines.md).
+
+However, an executable stack can introduce security vulnerabilities (e.g., by enabling [buffer overflow attacks](https://en.wikipedia.org/wiki/Buffer_overflow#Stack-based_exploitation)).
----------------
DavidSpickett wrote:
e.g. -> for example
Also I know you're just giving an example, so this is a pedantic comment, but stacks already have buffer overflow problems. So are you suggesting that a buffer overflow on an executable stack is even worse?
Which makes sense to me, so if so you could say:
(for example, by increasing the impact of stack buffer overflow attacks)
https://github.com/llvm/llvm-project/pull/171241
More information about the flang-commits
mailing list