Bug#216849: [sparc] Re: Bug#216849: relocation overflow error
This is a bug in the code. Too much allocation on the stack:
int read_infos (int socket_data, char **infos) {
int nb;
char datas[SSIZE_MAX];
/* SSIZE_MAX = 2147483647 */
That's 2 gigs of stack allocation...not likely to happen :) It produces
this overflow of stack in assembly:
read_infos:
.LLFB46:
.loc 1 197 0
!#PROLOGUE# 0
save %sp, --2147483544, %sp
Notice the double negative, produces by overflowing the stack pointer,
which only uses, internally, a signed int. That is plenty enough to hold
a normal, legal stack, but not really enough for your needs.
If you need that much (I can't see that you would), then malloc it.
--
Debian - http://www.debian.org/
Linux 1394 - http://www.linux1394.org/
Subversion - http://subversion.tigris.org/
WatchGuard - http://www.watchguard.com/
Reply to: