From 9e520fd0d698acf10767a2e76ea2754990f7ffca Mon Sep 17 00:00:00 2001 From: Liav A Date: Mon, 24 Feb 2020 17:34:38 +0200 Subject: [PATCH] Syscall: Use dbg() instead of dbgprintf() --- Kernel/Syscall.cpp | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/Kernel/Syscall.cpp b/Kernel/Syscall.cpp index e40af90bdc..ed8cb39aa3 100644 --- a/Kernel/Syscall.cpp +++ b/Kernel/Syscall.cpp @@ -144,20 +144,20 @@ void syscall_handler(RegisterState& regs) auto& process = *Process::current; if (!MM.validate_user_stack(process, VirtualAddress(regs.userspace_esp))) { - dbgprintf("Invalid stack pointer: %p\n", regs.userspace_esp); + dbg() << "Invalid stack pointer: " << String::format("%p", regs.userspace_esp); handle_crash(regs, "Bad stack on syscall entry", SIGSTKFLT); ASSERT_NOT_REACHED(); } auto* calling_region = MM.region_from_vaddr(process, VirtualAddress(regs.eip)); if (!calling_region) { - dbgprintf("Syscall from %p which has no region\n", regs.eip); + dbg() << "Syscall from " << String::format("%p", regs.eip) << " which has no region"; handle_crash(regs, "Syscall from unknown region", SIGSEGV); ASSERT_NOT_REACHED(); } if (calling_region->is_writable()) { - dbgprintf("Syscall from writable memory at %p\n", regs.eip); + dbg() << "Syscall from writable memory at " << String::format("%p", regs.eip); handle_crash(regs, "Syscall from writable memory", SIGSEGV); ASSERT_NOT_REACHED(); }