Dear EspressIf,
Reporting bootrom memory access bugs.
Environment:
String and binary literals loaded into flash above 0x40210000.
Use os_memcpy or os_printf with the binary or string literals as the source and RAM address as the destination.
Calling will crash the esp8266. The exception will occur because these functions use l8ui rather than doing something like:
aligned = addr&0xFFFFFFFC;
l32i.n r3, aligned
Shift some of the bytes in the r3 into the destination according to 1-3 bytes being unaligned.
Process rest of buffers.
Memory Address Access Bugs
Who is online
Users browsing this forum: No registered users and 4 guests
Login
Newbies Start Here
Are you new to ESP8266?
Unsure what to do?
Dunno where to start?
Start right here!
Latest SDK
Documentation
Complete listing of the official ESP8266 related documentation release by ESPRESSIF!
Must read here!
- All times are UTC+08:00
- Top
- Delete all board cookies
About Us
Espressif Systems is a fabless semiconductor company providing cutting-edge low power WiFi SoCs and wireless solutions for wireless communications and Internet of Things applications. We are the manufacturer of ESP8266EX.