summaryrefslogtreecommitdiff
path: root/libc/inet/rpc/auth_none.c
diff options
context:
space:
mode:
authorMike Frysinger <vapier@gentoo.org>2005-12-27 09:03:53 +0000
committerMike Frysinger <vapier@gentoo.org>2005-12-27 09:03:53 +0000
commit766709000aca35c4851cdb9b84e78db52ed8290d (patch)
treeb38a6e4b8a4c1ca551ae6e08f167c91fc9c922f8 /libc/inet/rpc/auth_none.c
parentb000e6fce32974a2c6936f94b0e9795de63b10ae (diff)
2005-12-15 Aubrey.Li <aubreylee@gmail.com> writes:
When I mounted nfs on my target, the kernel crashed. And I found it was caused by stack overflow. When I digged into it. I found the following issue. In the file "./uClibc/libc/inet/rpc/auth_unix.c" int max_nr_groups = sysconf (_SC_NGROUPS_MAX); gid_t gids[max_nr_groups]; And, NGROUPS_MAX is defined in the file "./linux-2.6.x/include/linux/limits.h" #define NGROUPS_MAX 65536 /* supplemental group IDs are available */ OK, here we can know max_nr_groups is assigned to 65536, that means a huge matrix "gids[65536] is in the function **authunix_create_default**. My method is doing it by malloc, the patch as follows.
Diffstat (limited to 'libc/inet/rpc/auth_none.c')
0 files changed, 0 insertions, 0 deletions