From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from ZXBJCAS.zhaoxin.com (ZXBJCAS.zhaoxin.com [124.127.214.139]) by mx.groups.io with SMTP id smtpd.web09.4854.1663203028738193830 for ; Wed, 14 Sep 2022 17:50:30 -0700 Authentication-Results: mx.groups.io; dkim=missing; spf=pass (domain: zhaoxin.com, ip: 124.127.214.139, mailfrom: tigerliu@zhaoxin.com) Received: from ZXBJMBX02.zhaoxin.com (10.29.252.6) by ZXBJCAS.zhaoxin.com (10.29.252.3) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.9; Thu, 15 Sep 2022 08:50:13 +0800 Received: from ZXBJMBX02.zhaoxin.com (10.29.252.6) by ZXBJMBX02.zhaoxin.com (10.29.252.6) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.9; Thu, 15 Sep 2022 08:50:12 +0800 Received: from ZXBJMBX02.zhaoxin.com ([fe80::14e8:c422:7500:9f09]) by ZXBJMBX02.zhaoxin.com ([fe80::14e8:c422:7500:9f09%8]) with mapi id 15.01.2507.009; Thu, 15 Sep 2022 08:50:12 +0800 From: "Tiger Liu(BJ-RD)" To: "devel@edk2.groups.io" Subject: [edk2-devel] How to guard CAR's stack overflow Thread-Topic: [edk2-devel] How to guard CAR's stack overflow Thread-Index: AdjInJLrWHhabucuTDqYMrtNY8mPNw== Date: Thu, 15 Sep 2022 00:50:12 +0000 Message-ID: Accept-Language: zh-CN, en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [10.29.8.33] MIME-Version: 1.0 Return-Path: TigerLiu@zhaoxin.com Content-Language: zh-CN Content-Type: multipart/alternative; boundary="_000_ed332235a81b46a196cc568b8b2bada2zhaoxincom_" --_000_ed332235a81b46a196cc568b8b2bada2zhaoxincom_ Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable Hi, Experts: Usually, we use Cache As Ram to setup stack and heap for C language running= environment before permanent memory has been initialized. So, is there a method to guard this phase's stack overflow? Note: I find udk has introduced a method to guard stack overflow after memory has= been initialized and discovered. Thanks ????? ????????????????????????????????????????????????????? CONFIDENTIAL NOTE: This email contains confidential or legally privileged information and is f= or the sole use of its intended recipient. Any unauthorized review, use, co= pying or forwarding of this email or the content of this email is strictly = prohibited. --_000_ed332235a81b46a196cc568b8b2bada2zhaoxincom_ Content-Type: text/html; charset="us-ascii" Content-Transfer-Encoding: quoted-printable

Hi, Experts:<= /p>

Usually, we use Cache As Ram to= setup stack and heap for C language running environment before permanent m= emory has been initialized.

 

So, is there a method to guard = this phase’s stack overflow?

 

Note:

I find udk has introduced a met= hod to guard stack overflow after memory has been initialized and discovere= d.

 

Thanks



保密声明:
本邮件含有保भ= 4;或专有信息,仅供指&= #23450;收件人使用。严禁= 545;本邮件或其内容做任= ;何未经授权的查阅、&#= 20351;用、复制或转发。
CONFIDENTIAL NOTE:
This email contains confidential or legally privileged information and i= s for the sole use of its intended recipient. Any unauthorized review, use,= copying or forwarding of this email or the content of this email is strict= ly prohibited.
--_000_ed332235a81b46a196cc568b8b2bada2zhaoxincom_--