[PATCH] shell: Avoid potential stack corruption
Chris Johns
chrisj at rtems.org
Sat Mar 19 07:31:28 UTC 2022
> On 15 Mar 2022, at 5:27 pm, Sebastian Huber <sebastian.huber at embedded-brains.de> wrote:
>
> The rtems_shell_init() passed the address of a stack variable
> (exit_code) to rtems_shell_run(). If wait == false, then the stack
> variable goes out of scope but may be accessed by the created shell
> thread.
>
> The rtems_shell_script() was affected by the same problem.
>
> Close #4629.
Does this change remove the exit code?
Chris
More information about the devel
mailing list