[PATCH] shell: Avoid potential stack corruption

Chris Johns chrisj at rtems.org
Sat Mar 19 07:31:28 UTC 2022


> On 15 Mar 2022, at 5:27 pm, Sebastian Huber <sebastian.huber at embedded-brains.de> wrote:
> 
> The rtems_shell_init() passed the address of a stack variable
> (exit_code) to rtems_shell_run().  If wait == false, then the stack
> variable goes out of scope but may be accessed by the created shell
> thread.
> 
> The rtems_shell_script() was affected by the same problem.
> 
> Close #4629.

Does this change remove the exit code?

Chris


More information about the devel mailing list