- corrupt stack traces could trigger a kernel panic;
- output consistency and spelling.
Change-Id: I04c9ac7db77593d6e837a28c83f1734adc8d9da7
}
printf("0x%lx ", (unsigned long) v_pc);
if(v_hbp != 0 && v_hbp <= v_bp) {
- printf("(hbp %lx ?)", v_hbp);
+ printf("(hbp 0x%lx ?)", v_hbp);
break;
}
v_bp = v_hbp;
u32_t use_bp;
if(whichproc->p_seg.p_kern_trap_style == KTS_NONE) {
- printf("WARNING: stacktrace of running proecss\n");
+ printf("WARNING: stacktrace of running process\n");
}
switch(whichproc->p_seg.p_kern_trap_style) {
if(changed)
reload_cr3();
+ /* Check for overflow. */
+ if (srcptr + chunk < srcptr) return EFAULT_SRC;
+ if (dstptr + chunk < dstptr) return EFAULT_DST;
+
/* Copy pages. */
PHYS_COPY_CATCH(srcptr, dstptr, chunk, addr);