1
0
mirror of https://github.com/esp8266/Arduino.git synced 2025-04-19 23:22:16 +03:00

Fix eboot crash with exception 28. ets_printf() should take pointer argument. (#7666)

* Fix eboot crash with exception 28. ets_printf takes pointer argument, not 32bit literal.

* add missing eboot.elf for 32b load fix

* Corrected pointer use for uint32_t arrays.

* removed accidental change from uitn32_t to int32_t
This commit is contained in:
Dirk Niggemann 2020-10-21 23:35:59 +01:00 committed by GitHub
parent e920564b8d
commit ace5e98bf6
No known key found for this signature in database
GPG Key ID: 4AEE18F83AFDEB23
2 changed files with 3 additions and 3 deletions

View File

@ -235,14 +235,14 @@ int main()
if (cmd.action == ACTION_COPY_RAW) { if (cmd.action == ACTION_COPY_RAW) {
uint32_t cp = S('c', 'p', ':', 0); uint32_t cp = S('c', 'p', ':', 0);
ets_printf((const char *)cp); ets_printf((const char *)&cp);
ets_wdt_disable(); ets_wdt_disable();
res = copy_raw(cmd.args[0], cmd.args[1], cmd.args[2], false); res = copy_raw(cmd.args[0], cmd.args[1], cmd.args[2], false);
ets_wdt_enable(); ets_wdt_enable();
cp = S('0' + res, '\n', 0, 0 ); cp = S('0' + res, '\n', 0, 0 );
ets_printf((const char *)cp); ets_printf((const char *)&cp);
#if 0 #if 0
//devyte: this verify step below (cmp:) only works when the end of copy operation above does not overwrite the //devyte: this verify step below (cmp:) only works when the end of copy operation above does not overwrite the
//beginning of the image in the empty area, see #7458. Disabling for now. //beginning of the image in the empty area, see #7458. Disabling for now.
@ -259,7 +259,7 @@ int main()
} }
cp = S('0' + res, '\n', 0, 0 ); cp = S('0' + res, '\n', 0, 0 );
ets_printf((const char *)cp); ets_printf((const char *)&cp);
#endif #endif
if (res == 0) { if (res == 0) {
cmd.action = ACTION_LOAD_APP; cmd.action = ACTION_LOAD_APP;

Binary file not shown.