RTEMS | libmisc/stackchk: Add stack smashing protection (!277)
Mohamed Hassan (@Hamzi)
gitlab at rtems.org
Sat Dec 28 17:58:04 UTC 2024
Mohamed Hassan commented on a discussion on testsuites/libtests/stackchk06/config.c: https://gitlab.rtems.org/rtems/rtos/rtems/-/merge_requests/277#note_117340
> + */
> +
> +#ifdef HAVE_CONFIG_H
> +#include "config.h"
> +#endif
> +
> +#include <rtems.h>
> +#include <rtems/score/thread.h>
> +#include <rtems/bspIo.h>
> +
> +const char rtems_test_name[] = "STACKCHK06";
> +
> +RTEMS_NO_RETURN void __stack_chk_fail(void);
> +
> +/* configuration information */
> +#define CONFIGURE_STACK_CHECKER_ENABLED
The current design of `__stack_chk_fail` relies on the RTEMS stack checker for handling stack overflow detection, which requires `CONFIGURE_STACK_CHECKER_ENABLED`. This was the intention. And I will update the fatal error handling
--
View it on GitLab: https://gitlab.rtems.org/rtems/rtos/rtems/-/merge_requests/277#note_117340
You're receiving this email because of your account on gitlab.rtems.org.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.rtems.org/pipermail/bugs/attachments/20241228/a16d1c84/attachment-0001.htm>
More information about the bugs
mailing list