diff options
author | phk <phk@FreeBSD.org> | 2002-01-24 20:57:56 +0000 |
---|---|---|
committer | phk <phk@FreeBSD.org> | 2002-01-24 20:57:56 +0000 |
commit | cb8828be3dbc5a6cc5423f629d8abbd5d567c3ea (patch) | |
tree | 6a5d37f0e4ad5ea64bbc40615bd6028058b17d1b /sys/kern/subr_sbuf.c | |
parent | 7b05c48325a61a7e2cb2ef23502790d6e6ea0947 (diff) | |
download | FreeBSD-src-cb8828be3dbc5a6cc5423f629d8abbd5d567c3ea.zip FreeBSD-src-cb8828be3dbc5a6cc5423f629d8abbd5d567c3ea.tar.gz |
Yet a bug with extensible sbufs being marked as OVERFLOWED. This time
because of a signed/unsigned problem.
Approved by: DES
Diffstat (limited to 'sys/kern/subr_sbuf.c')
-rw-r--r-- | sys/kern/subr_sbuf.c | 2 |
1 files changed, 1 insertions, 1 deletions
diff --git a/sys/kern/subr_sbuf.c b/sys/kern/subr_sbuf.c index 96d5078..4553fcb 100644 --- a/sys/kern/subr_sbuf.c +++ b/sys/kern/subr_sbuf.c @@ -268,7 +268,7 @@ sbuf_bcat(struct sbuf *s, const char *str, size_t len) if (SBUF_HASOVERFLOWED(s)) return (-1); - while (len--) { + for (; len; len--) { if (!SBUF_HASROOM(s) && sbuf_extend(s, len) < 0) break; s->s_buf[s->s_len++] = *str++; |