kopia lustrzana https://github.com/espressif/esp-idf
esp_common: move stack check
rodzic
5a56f794ec
commit
883aba20be
|
@ -11,8 +11,7 @@ else()
|
|||
# Regular app build
|
||||
list(APPEND srcs "src/esp_err.c"
|
||||
"src/esp_err_to_name.c"
|
||||
"src/freertos_hooks.c"
|
||||
"src/stack_check.c")
|
||||
"src/freertos_hooks.c")
|
||||
|
||||
# Note: esp_ipc, esp_pm added as a public requirement to keep compatibility as to be located here.
|
||||
idf_component_register(SRCS "${srcs}"
|
||||
|
@ -21,11 +20,6 @@ else()
|
|||
PRIV_REQUIRES soc
|
||||
LDFRAGMENTS "linker.lf")
|
||||
|
||||
set_source_files_properties(
|
||||
"src/stack_check.c"
|
||||
PROPERTIES COMPILE_FLAGS
|
||||
-fno-stack-protector)
|
||||
|
||||
set_property(TARGET ${COMPONENT_LIB} APPEND PROPERTY LINK_LIBRARIES "-Wl,--gc-sections")
|
||||
set_property(TARGET ${COMPONENT_LIB} APPEND PROPERTY INTERFACE_LINK_LIBRARIES "-Wl,--gc-sections")
|
||||
set_property(TARGET ${COMPONENT_LIB} APPEND PROPERTY LINK_INTERFACE_MULTIPLICITY 4)
|
||||
|
|
|
@ -4,10 +4,6 @@
|
|||
|
||||
COMPONENT_ADD_INCLUDEDIRS := include
|
||||
COMPONENT_SRCDIRS := src
|
||||
|
||||
ifndef CONFIG_IDF_ENV_FPGA
|
||||
COMPONENT_OBJEXCLUDE += src/fpga_overrides.o
|
||||
endif
|
||||
|
||||
# disable stack protection in files which are involved in initialization of that feature
|
||||
src/stack_check.o: CFLAGS := $(filter-out -fstack-protector%, $(CFLAGS))
|
||||
endif
|
|
@ -14,7 +14,8 @@ set(srcs "intr_alloc.c"
|
|||
"system_time.c"
|
||||
"sleep_modes.c"
|
||||
"task_wdt.c"
|
||||
"int_wdt.c")
|
||||
"int_wdt.c"
|
||||
"stack_check.c")
|
||||
|
||||
if(NOT (${target} STREQUAL "esp32c3") )
|
||||
list(APPEND srcs "dbg_stubs.c")
|
||||
|
@ -43,7 +44,7 @@ endif()
|
|||
|
||||
# Disable stack protection in files which are involved in initialization of that feature
|
||||
set_source_files_properties(
|
||||
startup.c
|
||||
"startup.c" "stack_check.c"
|
||||
PROPERTIES COMPILE_FLAGS
|
||||
-fno-stack-protector)
|
||||
|
||||
|
|
|
@ -0,0 +1,40 @@
|
|||
// Copyright 2017 Espressif Systems (Shanghai) PTE LTD
|
||||
//
|
||||
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||
// you may not use this file except in compliance with the License.
|
||||
// You may obtain a copy of the License at
|
||||
//
|
||||
// http://www.apache.org/licenses/LICENSE-2.0
|
||||
//
|
||||
// Unless required by applicable law or agreed to in writing, software
|
||||
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
// See the License for the specific language governing permissions and
|
||||
// limitations under the License.
|
||||
|
||||
#include "sdkconfig.h"
|
||||
#include "esp_system.h"
|
||||
#include "esp_rom_sys.h"
|
||||
|
||||
#if CONFIG_COMPILER_STACK_CHECK
|
||||
|
||||
#define LOG_LOCAL_LEVEL CONFIG_LOG_DEFAULT_LEVEL
|
||||
#include "esp_log.h"
|
||||
const static char *TAG = "stack_chk";
|
||||
|
||||
void *__stack_chk_guard = NULL;
|
||||
|
||||
static void __attribute__ ((constructor))
|
||||
__esp_stack_guard_setup (void)
|
||||
{
|
||||
ESP_LOGD(TAG, "Intialize random stack guard");
|
||||
__stack_chk_guard = (void *)esp_random();
|
||||
}
|
||||
|
||||
void __stack_chk_fail (void)
|
||||
{
|
||||
esp_rom_printf("\r\nStack smashing protect failure!\r\n\r\n");
|
||||
abort();
|
||||
}
|
||||
|
||||
#endif
|
Ładowanie…
Reference in New Issue