*BSD News Article 13833


Return to BSD News archive

Path: sserve!newshost.anu.edu.au!munnari.oz.au!news.Hawaii.Edu!ames!agate!agate.berkeley.edu!cgd
From: cgd@eden.CS.Berkeley.EDU (Chris G. Demetriou)
Newsgroups: comp.os.386bsd.bugs
Subject: Re: kmem_map overflow with 0.2.2 kernel
Date: 31 Mar 93 21:54:36
Organization: Kernel Hackers 'r' Us
Lines: 16
Message-ID: <CGD.93Mar31215436@eden.CS.Berkeley.EDU>
References: <C4Kw3q.C6M@sugar.neosoft.com> <ARNEJ.93Apr1012743@chanur.imf.unit.no>
NNTP-Posting-Host: eden.cs.berkeley.edu
In-reply-to: arnej@imf.unit.no's message of 1 Apr 93 01:27:43

In article <ARNEJ.93Apr1012743@chanur.imf.unit.no> arnej@imf.unit.no (Arne Henrik Juul) writes:
> since it may be any of *three*
>distinct maps that was too small.

actually, kmem_malloc is *never* called with buffer_map
as its map argument; i changed this in my tree so that a
call to it with buffer_map panics...



chris
--
Chris G. Demetriou                                    cgd@cs.berkeley.edu

   "386bsd as depth first search: whenever you go to fix something you
       find that 3 more things are actually broken." -- Adam Glass