SoC common: optimize bl30 size - common printf [2/3]
PD#SWPL-194170
Problem:
bl30 size overflow, too much printf.
Solution:
Optimize bl30 common printf.
Verify:
t5m
Change-Id: Ic40309d31293940668777a6376ded57464319ba3
Signed-off-by: bangzheng.liu <bangzheng.liu@amlogic.com>
diff --git a/main.c b/main.c
index b770e44..f13afa3 100644
--- a/main.c
+++ b/main.c
@@ -74,25 +74,24 @@
void vApplicationStackOverflowHook(TaskHandle_t xTask, char *pcTaskName)
{
- ( void ) pcTaskName;
- ( void ) xTask;
+ (void)xTask;
- /* Run time stack overflow checking is performed if
- configconfigCHECK_FOR_STACK_OVERFLOW is defined to 1 or 2. This hook
- function is called if a stack overflow is detected. pxCurrentTCB can be
- inspected in the debugger if the task name passed into this function is
- corrupt. */
- //write(1, "Stack Overflow\n", 15);
- printf("vApplicationStackOverflowHook, current task is %s\n", pcTaskName);
+ /* Run time stack overflow checking is performed if
+ * configconfigCHECK_FOR_STACK_OVERFLOW is defined to 1 or 2. This hook
+ * function is called if a stack overflow is detected. pxCurrentTCB can be
+ * inspected in the debugger if the task name passed into this function is
+ * corrupt.
+ */
+ printf("bl30 task %s stack overflow\n", pcTaskName);
vTaskDumpStack(NULL);
- for ( ;; );
+ for ( ;; )
+ ;
}
/*-----------------------------------------------------------*/
#ifdef CONFIG_STACK_PROTECTOR_STRONG
void additional_message_hook(void *address)
{
- printf("bl30 stack smashing detected, stop here!\n");
- printf("The last addr of smashing function: 0x%x\n", address);
+ printf("bl30 stack smashing func last addr: 0x%x, stop!\n", address);
}
#endif