summaryrefslogtreecommitdiff
path: root/src/southbridge/amd
diff options
context:
space:
mode:
authorRonald G. Minnich <rminnich@gmail.com>2012-07-12 11:21:51 -0700
committerSven Schnelle <svens@stackframe.org>2012-07-15 11:01:01 +0200
commitf8878845f9cb9d30663a8bb3a3edeb1413a42388 (patch)
tree97ba821c0a5cd1551a407e3cc9eac6ce14b8623f /src/southbridge/amd
parent2d0d83c3dd41a95f5c27a2c7ecf0a3a8cdd5d0be (diff)
Poison the stack to uncover programming errors
Code can easily make the mistake of using uninitialized values or, in assembly, mistakenly dereferencing stack pointers when an address is desired. Set the stack to a non-zero value which is also (by testing) a pointer which will crash coreboot if used. This poisoning has uncovered at least one bug. Change-Id: I4affb9a14b96611e8bf83cb82636e47913025a5d Signed-off-by: Ronald G. Minnich <rminnich@gmail.com> Reviewed-on: http://review.coreboot.org/1221 Reviewed-by: Marc Jones <marcj303@gmail.com> Tested-by: build bot (Jenkins) Reviewed-by: Sven Schnelle <svens@stackframe.org>
Diffstat (limited to 'src/southbridge/amd')
0 files changed, 0 insertions, 0 deletions