+
+void Proc_PrintBacktrace(void)
+{
+ Uint32 ebp;
+ __asm__ __volatile__ ("mov %%ebp, %0" : "=r" (ebp));
+ Error_Backtrace( *(Uint32*)(ebp+4), *(Uint32*)ebp );
+}
+
+/**
+ * \fn void Error_Backtrace(Uint eip, Uint ebp)
+ * \brief Unrolls the stack to trace execution
+ * \param eip Current Instruction Pointer
+ * \param ebp Current Base Pointer (Stack Frame)
+ */
+void Error_Backtrace(Uint eip, Uint ebp)
+{
+ int i = 0;
+ Uint delta = 0;
+ char *str = NULL;
+
+ //if(eip < 0xC0000000 && eip > 0x1000)
+ //{
+ // LogF("Backtrace: User - 0x%x\n", eip);
+ // return;
+ //}
+
+ if(eip > 0xE0000000)
+ {
+ LogF("Backtrace: Data Area - 0x%x\n", eip);
+ return;
+ }
+
+ if(eip > 0xC8000000)
+ {
+ LogF("Backtrace: Kernel Module - 0x%x\n", eip);
+ return;
+ }
+
+ //str = Debug_GetSymbol(eip, &delta);
+ if(str == NULL)
+ LogF("Backtrace: 0x%x", eip);
+ else
+ LogF("Backtrace: %s+0x%x", str, delta);
+ if(!MM_GetPhysAddr(ebp))
+ {
+ LogF("\nBacktrace: Invalid EBP, stopping\n");
+ return;
+ }
+
+
+ while( MM_GetPhysAddr(ebp) && i < MAX_BACKTRACE )
+ {
+ //str = Debug_GetSymbol(*(Uint*)(ebp+4), &delta);
+ if(str == NULL)
+ LogF(" >> 0x%x", *(Uint*)(ebp+4));
+ else
+ LogF(" >> %s+0x%x", str, delta);
+ ebp = *(Uint*)ebp;
+ i++;
+ }
+ LogF("\n");
+}
+
+/**
+ * \fn void StartupPrint(char *Str)
+ * \brief Str String to print
+ * \note WHY IS THIS HERE?!?!
+ */
+void StartupPrint(char *Str)
+{
+ Uint16 *buf = (void*)0xC00B8000;
+ int i = 0;
+ static int line = 0;
+ while(*Str)
+ {
+ buf[line*80 + i++] = *Str | 0x0700;
+ Str ++;
+ }
+
+ // Clear the rest of the line
+ while(i < 80)
+ buf[line*80 + i++] = 0x0720;
+
+ line ++;
+ if(line == 25)
+ {
+ line --;
+ memcpy(buf, &buf[80], 80*24*2);
+ memset(&buf[80*24], 0, 80*2);
+ }
+}
+
+// === EXPORTS ===
+EXPORT(__stack_chk_fail);