patch from Stefan Kratochwil <entwicklung@inovel.de> : canfestival-3-fm3_698.patch
Bug:
If an object dictionary entry was requested whose size exceeds
SDO_MAX_LENGTH_TRANSFERT, the memcpy() call at line 139 of objacces.c overwrites
the memory after *pDestData which causes stack corruption.
-> Bugfix:
The bug was corrected by size checking the requested data. An 'Out of
memory' error message will be generated if the requested data exceeds
SDO_MAX_LENGTH_TRANSFERT.
Additional changes:
Added dynamic buffer allocation for the SDO transfer. This feature can be used
if SDO_DYNAMIC_BUFFER_ALLOCATION is defined in config.h. The size of the
dynamically allocated buffer is controlled with
SDO_DYNAMIC_BUFFER_ALLOCATION_SIZE.
-> Note:
This change removes the detection of OD_LENGTH_DATA_INVALID errors!
/* File generated by gen_cfile.py. Should not be modified. */
#ifndef SILLYSLAVE_H
#define SILLYSLAVE_H
#include "data.h"
/* Prototypes of function provided by object dictionnary */
UNS32 SillySlave_valueRangeTest (UNS8 typeValue, void * value);
const indextable * SillySlave_scanIndexOD (UNS16 wIndex, UNS32 * errorCode, ODCallback_t **callbacks);
/* Master node data struct */
extern CO_Data SillySlave_Data;
extern ODCallback_t Server_SDO_Parameter_callbacks[]; /* Callbacks of index0x1200 */
extern ODCallback_t Transmit_PDO_1_Parameter_callbacks[]; /* Callbacks of index0x1800 */
extern UNS8 LifeSignal; /* Mapped at index 0x2001, subindex 0x00*/
#endif // SILLYSLAVE_H