RTEMS | libmisc/stackchk: Add stack smashing protection (!277)

Mohamed Hassan (@Hamzi) gitlab at rtems.org
Sat Dec 28 17:58:04 UTC 2024




Mohamed Hassan commented on a discussion on testsuites/libtests/stackchk06/config.c: https://gitlab.rtems.org/rtems/rtos/rtems/-/merge_requests/277#note_117340

 > + */
 > +
 > +#ifdef HAVE_CONFIG_H
 > +#include "config.h"
 > +#endif
 > +
 > +#include <rtems.h>
 > +#include <rtems/score/thread.h>
 > +#include <rtems/bspIo.h>
 > +
 > +const char rtems_test_name[] = "STACKCHK06";
 > +
 > +RTEMS_NO_RETURN void __stack_chk_fail(void);
 > +
 > +/* configuration information */
 > +#define CONFIGURE_STACK_CHECKER_ENABLED

The current design of `__stack_chk_fail` relies on the RTEMS stack checker for handling stack overflow detection, which requires `CONFIGURE_STACK_CHECKER_ENABLED`. This was the intention. And I will update the fatal error handling

-- 
View it on GitLab: https://gitlab.rtems.org/rtems/rtos/rtems/-/merge_requests/277#note_117340
You're receiving this email because of your account on gitlab.rtems.org.


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.rtems.org/pipermail/bugs/attachments/20241228/a16d1c84/attachment-0001.htm>


More information about the bugs mailing list