Return to BSD News archive
Path: sserve!newshost.anu.edu.au!munnari.oz.au!news.Hawaii.Edu!ames!agate!agate.berkeley.edu!cgd From: cgd@eden.CS.Berkeley.EDU (Chris G. Demetriou) Newsgroups: comp.os.386bsd.bugs Subject: Re: kmem_map overflow with 0.2.2 kernel Date: 31 Mar 93 21:54:36 Organization: Kernel Hackers 'r' Us Lines: 16 Message-ID: <CGD.93Mar31215436@eden.CS.Berkeley.EDU> References: <C4Kw3q.C6M@sugar.neosoft.com> <ARNEJ.93Apr1012743@chanur.imf.unit.no> NNTP-Posting-Host: eden.cs.berkeley.edu In-reply-to: arnej@imf.unit.no's message of 1 Apr 93 01:27:43 In article <ARNEJ.93Apr1012743@chanur.imf.unit.no> arnej@imf.unit.no (Arne Henrik Juul) writes: > since it may be any of *three* >distinct maps that was too small. actually, kmem_malloc is *never* called with buffer_map as its map argument; i changed this in my tree so that a call to it with buffer_map panics... chris -- Chris G. Demetriou cgd@cs.berkeley.edu "386bsd as depth first search: whenever you go to fix something you find that 3 more things are actually broken." -- Adam Glass