diff options
author | Kartik Agaram <vc@akkartik.com> | 2019-05-11 19:11:13 -0700 |
---|---|---|
committer | Kartik Agaram <vc@akkartik.com> | 2019-05-11 19:11:13 -0700 |
commit | 6362c51d11ef27335875469e0ff06347357f46b1 (patch) | |
tree | f7efb1941266b97f2a21166a83b1c5b9e5f734f1 /subx/012elf.cc | |
parent | ff167ad77a615ef0506dce1e21c973533ca83088 (diff) | |
download | mu-6362c51d11ef27335875469e0ff06347357f46b1.tar.gz |
5155 - check for overflow in mmap segments
Diffstat (limited to 'subx/012elf.cc')
-rw-r--r-- | subx/012elf.cc | 8 |
1 files changed, 7 insertions, 1 deletions
diff --git a/subx/012elf.cc b/subx/012elf.cc index a77c6056..2fea60db 100644 --- a/subx/012elf.cc +++ b/subx/012elf.cc @@ -90,7 +90,13 @@ void load_elf_contents(uint8_t* elf_contents, size_t size, int argc, char* argv[ void push(uint32_t val) { Reg[ESP].u -= 4; - assert(Reg[ESP].u >= STACK_SEGMENT); + if (Reg[ESP].u < STACK_SEGMENT) { + raise << "The stack overflowed its segment. " + << "Maybe SPACE_FOR_SEGMENT should be larger? " + << "Or you need to carve out an exception for the stack segment " + << "to be larger.\n" << end(); + exit(1); + } trace(Callstack_depth+1, "run") << "decrementing ESP to 0x" << HEXWORD << Reg[ESP].u << end(); trace(Callstack_depth+1, "run") << "pushing value 0x" << HEXWORD << val << end(); write_mem_u32(Reg[ESP].u, val); |