X-Git-Url: https://git.proxmox.com/?p=mirror_edk2.git;a=blobdiff_plain;f=MdePkg%2FLibrary%2FBaseStackCheckLib%2FBaseStackCheckGcc.c;fp=MdePkg%2FLibrary%2FBaseStackCheckLib%2FBaseStackCheckGcc.c;h=0d2918668e238b07556e000af2491895b3fc4a31;hp=d3efb8e4622c14ddda1196fcb28d248e82c9ede4;hb=2f88bd3a1296c522317f1c21377876de63de5be7;hpb=1436aea4d5707e672672a11bda72be2c63c936c3 diff --git a/MdePkg/Library/BaseStackCheckLib/BaseStackCheckGcc.c b/MdePkg/Library/BaseStackCheckLib/BaseStackCheckGcc.c index d3efb8e462..0d2918668e 100644 --- a/MdePkg/Library/BaseStackCheckLib/BaseStackCheckGcc.c +++ b/MdePkg/Library/BaseStackCheckLib/BaseStackCheckGcc.c @@ -17,10 +17,10 @@ #include /// "canary" value that is inserted by the compiler into the stack frame. -VOID *__stack_chk_guard = (VOID*)0x0AFF; +VOID *__stack_chk_guard = (VOID *)0x0AFF; // If ASLR was enabled we could use -//void (*__stack_chk_guard)(void) = __stack_chk_fail; +// void (*__stack_chk_guard)(void) = __stack_chk_fail; /** Error path for compiler generated stack "canary" value check code. If the @@ -29,12 +29,12 @@ VOID *__stack_chk_guard = (VOID*)0x0AFF; **/ VOID __stack_chk_fail ( - VOID - ) + VOID + ) { - UINT8 DebugPropertyMask; + UINT8 DebugPropertyMask; - DEBUG ((DEBUG_ERROR, "STACK FAULT: Buffer Overflow in function %a.\n", __builtin_return_address(0))); + DEBUG ((DEBUG_ERROR, "STACK FAULT: Buffer Overflow in function %a.\n", __builtin_return_address (0))); // // Generate a Breakpoint, DeadLoop, or NOP based on PCD settings even if @@ -44,6 +44,6 @@ __stack_chk_fail ( if ((DebugPropertyMask & DEBUG_PROPERTY_ASSERT_BREAKPOINT_ENABLED) != 0) { CpuBreakpoint (); } else if ((DebugPropertyMask & DEBUG_PROPERTY_ASSERT_DEADLOOP_ENABLED) != 0) { - CpuDeadLoop (); + CpuDeadLoop (); } }