[PATCH] shell: Avoid potential stack corruption

Sebastian Huber sebastian.huber at embedded-brains.de
Sat Mar 19 09:29:45 UTC 2022


On 19/03/2022 08:31, Chris Johns wrote:
>> On 15 Mar 2022, at 5:27 pm, Sebastian Huber<sebastian.huber at embedded-brains.de>  wrote:
>>
>> The rtems_shell_init() passed the address of a stack variable
>> (exit_code) to rtems_shell_run().  If wait == false, then the stack
>> variable goes out of scope but may be accessed by the created shell
>> thread.
>>
>> The rtems_shell_script() was affected by the same problem.
>>
>> Close #4629.
> Does this change remove the exit code?

No, the exit code member is still in the shell environment.

-- 
embedded brains GmbH
Herr Sebastian HUBER
Dornierstr. 4
82178 Puchheim
Germany
email: sebastian.huber at embedded-brains.de
phone: +49-89-18 94 741 - 16
fax:   +49-89-18 94 741 - 08

Registergericht: Amtsgericht München
Registernummer: HRB 157899
Vertretungsberechtigte Geschäftsführer: Peter Rasmussen, Thomas Dörfler
Unsere Datenschutzerklärung finden Sie hier:
https://embedded-brains.de/datenschutzerklaerung/


More information about the devel mailing list