David van Moolenbroek 59f1f7ecdd Kernel: apply x86 copy overflow check to ARM
Apply the x86 overflow check from git-d09f72c to ARM code as well.
Not just stack traces, but also system services can trigger this
case, possibly as a result of being handed bad pointers by userland,
ending in a kernel panic.

Change-Id: Ib817e8b682fafec8edb486a094319ad11eda7081
2016-01-16 14:04:19 +01:00
2016-01-13 20:32:52 +01:00
2016-01-13 20:32:50 +01:00
2016-01-16 14:04:14 +01:00
2016-01-13 20:32:23 +01:00
2016-01-13 20:32:51 +01:00
2016-01-13 20:32:48 +01:00
2016-01-16 14:04:14 +01:00
2016-01-13 20:32:51 +01:00
2010-01-21 10:16:05 +00:00
Description
A fun microkernel meant to match modern usecases
GPL-3.0 148 MiB
Languages
C 78.2%
Roff 10.2%
Assembly 4.6%
Shell 3.7%
Makefile 1.6%
Other 1.2%