the following patch was just integrated into master: commit 4715d6b4706fb78e9073295b878b69a6cf37ab6f Author: Ronald G. Minnich rminnich@gmail.com Date: Thu Jul 12 11:21:51 2012 -0700
Poison the stack to uncover programming errors
Code can easily make the mistake of using uninitialized values or, in assembly, mistakenly dereferencing stack pointers when an address is desired.
Set the stack to a non-zero value which is also (by testing) a pointer which will crash coreboot if used. This poisoning has uncovered at least one bug.
Change-Id: I4affb9a14b96611e8bf83cb82636e47913025a5d Signed-off-by: Ronald G. Minnich rminnich@gmail.com
Build-Tested: build bot (Jenkins) at Thu Jul 12 21:15:45 2012, giving +1 Reviewed-By: Sven Schnelle svens@stackframe.org at Thu Jul 12 21:22:58 2012, giving +2 See http://review.coreboot.org/1221 for details.
-gerrit