bug-glibc
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: NIS+ groups, segfaults


From: Ulrich Drepper
Subject: Re: NIS+ groups, segfaults
Date: 09 Mar 2001 22:48:57 -0800
User-agent: Gnus/5.0807 (Gnus v5.8.7) XEmacs/21.1 (Capitol Reef)

Dirk Wetter <address@hidden> writes:

> - increase NSS_BUFLEN_GROUP in /usr/include/grp.h
>   and      NSS_BUFLEN_PASSWD in /usr/include/pwd.h
>   at least to 4096, better 8192.

As Thorsten already said, this is completely unacceptable.  The buffer
size increment code works fine.  It can only be the code called in the
loop (the NIS/NIS+ code) which is causing problems.  This must not
simply be hidden.

On a x86 machine it should be fairly simple to find to bug.  Simply
find out which memory address gets corrupted (it's somewhere on the
stack), execute the program until you reach the loop, set a hardware
watch point for the address which gets incorrectly changed, and
continue the program.

-- 
---------------.                          ,-.   1325 Chesapeake Terrace
Ulrich Drepper  \    ,-------------------'   \  Sunnyvale, CA 94089 USA
Red Hat          `--' drepper at redhat.com   `------------------------



reply via email to

[Prev in Thread] Current Thread [Next in Thread]