mirror of
				https://github.com/espressif/esp-idf.git
				synced 2025-10-31 13:09:38 +00:00 
			
		
		
		
	 4d16f46a88
			
		
	
	4d16f46a88
	
	
	
		
			
			When stack check is enabled, certain functions (sometimes placed in RAM) are being decorated with stack guards and a call to __stask_chk_fail() in case ofr stack corruption. For this reason, __stack_chk_fail() must be placed in RAM too. Add stack check config in heap tests on all targets to find eventual flash to RAM calls due to stack checks when running callgraph_check.py
		
			
				
	
	
		
			32 lines
		
	
	
		
			639 B
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			32 lines
		
	
	
		
			639 B
		
	
	
	
		
			C
		
	
	
	
	
	
| /*
 | |
|  * SPDX-FileCopyrightText: 2017-2022 Espressif Systems (Shanghai) CO LTD
 | |
|  *
 | |
|  * SPDX-License-Identifier: Apache-2.0
 | |
|  */
 | |
| 
 | |
| #include "sdkconfig.h"
 | |
| #include "esp_system.h"
 | |
| #include "esp_random.h"
 | |
| #include "esp_rom_sys.h"
 | |
| 
 | |
| #if CONFIG_COMPILER_STACK_CHECK
 | |
| 
 | |
| #include "esp_log.h"
 | |
| const static char *TAG = "stack_chk";
 | |
| 
 | |
| void *__stack_chk_guard = NULL;
 | |
| 
 | |
| static void __attribute__ ((constructor))
 | |
| __esp_stack_guard_setup (void)
 | |
| {
 | |
|     ESP_LOGD(TAG, "Intialize random stack guard");
 | |
|     __stack_chk_guard = (void *)esp_random();
 | |
| }
 | |
| 
 | |
| IRAM_ATTR void __stack_chk_fail (void)
 | |
| {
 | |
|     esp_system_abort(DRAM_STR("Stack smashing protect failure!"));
 | |
| }
 | |
| 
 | |
| #endif
 |