From owner-freebsd-hackers Fri Dec 3 13:30:18 1999 Delivered-To: freebsd-hackers@freebsd.org Received: from mail.enteract.com (mail.enteract.com [207.229.143.33]) by hub.freebsd.org (Postfix) with ESMTP id 8B0AE14D25 for ; Fri, 3 Dec 1999 13:30:15 -0800 (PST) (envelope-from dscheidt@enteract.com) Received: from shell-3.enteract.com (dscheidt@shell-3.enteract.com [207.229.143.42]) by mail.enteract.com (8.9.3/8.9.3) with SMTP id PAA30168; Fri, 3 Dec 1999 15:29:28 -0600 (CST) (envelope-from dscheidt@enteract.com) Date: Fri, 3 Dec 1999 15:29:28 -0600 (CST) From: David Scheidt To: Warner Losh Cc: hackers@FreeBSD.ORG Subject: Re: tty level buffer overflows In-Reply-To: <199912031814.LAA11849@harmony.village.org> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-freebsd-hackers@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG On Fri, 3 Dec 1999, Warner Losh wrote: > What I was wondering is if there is a way to, say, double the buffer > size. Also, what is the number of overflows mean? Is that bytes? > clists? 16byte chunks? The overflow seems to happen just once and it It's the return from b_to_q, so it is the number of characters that it failed to be copied from the linear buffer to clist chain. It should be possible to increase the size of the buffer a bit, but I haven't figured it out yet. sio.c has changed a lot since the last time I hacked at it. david scheidt To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message