mirror of
https://github.com/RGBCube/serenity
synced 2025-07-25 04:17:35 +00:00
Kernel: Make syscalls that take a buffer size use ssize_t instead of size_t.
Dealing with the unsigned overflow propagation here just seems unreasonably error prone. Let's limit ourselves to 2GB buffer sizes instead.
This commit is contained in:
parent
5af4e622b9
commit
beda478821
40 changed files with 144 additions and 136 deletions
|
@ -25,13 +25,13 @@ String SlavePTY::tty_name() const
|
|||
return String::format("/dev/pts/%u", m_index);
|
||||
}
|
||||
|
||||
void SlavePTY::on_master_write(const byte* buffer, size_t size)
|
||||
void SlavePTY::on_master_write(const byte* buffer, ssize_t size)
|
||||
{
|
||||
for (size_t i = 0; i < size; ++i)
|
||||
for (ssize_t i = 0; i < size; ++i)
|
||||
emit(buffer[i]);
|
||||
}
|
||||
|
||||
ssize_t SlavePTY::on_tty_write(const byte* data, size_t size)
|
||||
ssize_t SlavePTY::on_tty_write(const byte* data, ssize_t size)
|
||||
{
|
||||
return m_master->on_slave_write(data, size);
|
||||
}
|
||||
|
@ -48,7 +48,7 @@ bool SlavePTY::can_read(Process& process) const
|
|||
return TTY::can_read(process);
|
||||
}
|
||||
|
||||
ssize_t SlavePTY::read(Process& process, byte* buffer, size_t size)
|
||||
ssize_t SlavePTY::read(Process& process, byte* buffer, ssize_t size)
|
||||
{
|
||||
if (m_master->is_closed())
|
||||
return 0;
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue