David van Moolenbroek 59f1f7ecdd Kernel: apply x86 copy overflow check to ARM
Apply the x86 overflow check from git-d09f72c to ARM code as well.
Not just stack traces, but also system services can trigger this
case, possibly as a result of being handed bad pointers by userland,
ending in a kernel panic.

Change-Id: Ib817e8b682fafec8edb486a094319ad11eda7081
2016-01-16 14:04:19 +01:00
..
2016-01-16 14:04:17 +01:00
2014-07-31 16:00:30 +02:00
2014-07-31 16:00:30 +02:00
2014-07-31 16:00:30 +02:00
2014-07-31 16:00:30 +02:00
2014-07-31 16:00:30 +02:00
2014-07-31 16:00:30 +02:00
2014-07-31 16:00:30 +02:00
2014-07-31 16:00:30 +02:00
2014-07-31 16:00:30 +02:00
2015-09-16 11:06:17 +00:00
2014-07-31 16:00:30 +02:00
2014-07-31 16:00:30 +02:00
2014-07-31 16:00:30 +02:00