Page 1 of 1

Memory Address Access Bugs

Posted: Wed Nov 08, 2017 3:52 am
by smbgaiden
Dear EspressIf,

Reporting bootrom memory access bugs.

String and binary literals loaded into flash above 0x40210000.
Use os_memcpy or os_printf with the binary or string literals as the source and RAM address as the destination.

Calling will crash the esp8266. The exception will occur because these functions use l8ui rather than doing something like:
aligned = addr&0xFFFFFFFC;
l32i.n r3, aligned
Shift some of the bytes in the r3 into the destination according to 1-3 bytes being unaligned.
Process rest of buffers.