Search found 5 matches
Search found 5 matches • Page 1 of 1
- Wed Nov 08, 2017 3:52 am
- Forum: Report Bugs
- Topic: Memory Address Access Bugs
- Replies: 0
- Views: 1432
Dear EspressIf, Reporting bootrom memory access bugs. Environment: String and binary literals loaded into flash above 0x40210000. Use os_memcpy or os_printf with the binary or string literals as the source and RAM address as the destination. Calling will crash the esp8266. The exception will occur b...
Oh correction... the p was actually int pointers. Seems you can't use l8 functions with SPI Flash addresses. When I recast the int * to char * and try to printf with %c p and etc it will crash.
Hi All, I've written some strings into spi flash and then try to access using the virtual memory addressing and have a weird behavior that I can't figure out how to cope with. Flashed my equal sized strings with esptool.py to 0x80000. Verified they're there via two ways: A. char* p = (char *)0x40280...
Does anyone have advice on how to replicate this functionality? I have nonOS SDK 2.1 with the xtensa includes from https://github.com/esp8266/esp8266-wiki/raw/master/include.tgz and using the crosstool-NG from jcmvbkbc. None of these produces a stdarg.h file to define va_list, va_start, va_arg, or v...