From: Jim Meyering Date: Wed, 19 Feb 2003 08:39:55 +0000 (+0000) Subject: (AC_SYS_XSI_STACK_OVERFLOW_HEURISTIC): Limit stack size X-Git-Tag: v4.5.8~73 X-Git-Url: http://git.ipfire.org/?a=commitdiff_plain;h=3ef0832f7a8cb8fe2ab688c09f740f6564ae9617;p=thirdparty%2Fcoreutils.git (AC_SYS_XSI_STACK_OVERFLOW_HEURISTIC): Limit stack size to 1MB, so as not to render systems with no stack size limit (e.g., linux-2.2.x) unusable. Suggestion and code from Bruno Haible. --- diff --git a/m4/c-stack.m4 b/m4/c-stack.m4 index a58cde0091..666a8ee06e 100644 --- a/m4/c-stack.m4 +++ b/m4/c-stack.m4 @@ -22,6 +22,7 @@ AC_DEFUN([AC_SYS_XSI_STACK_OVERFLOW_HEURISTIC], [# for STACK_DIRECTION AC_REQUIRE([AC_FUNC_ALLOCA]) + AC_CHECK_FUNCS(setrlimit) AC_CACHE_CHECK([for working C stack overflow detection], ac_cv_sys_xsi_stack_overflow_heuristic, @@ -30,6 +31,11 @@ AC_DEFUN([AC_SYS_XSI_STACK_OVERFLOW_HEURISTIC], #include #include #include + #if HAVE_SETRLIMIT + # include + # include + # include + #endif static union { @@ -102,6 +108,16 @@ AC_DEFUN([AC_SYS_XSI_STACK_OVERFLOW_HEURISTIC], int main (void) { + #if HAVE_SETRLIMIT && defined RLIMIT_STACK + /* Before starting the endless recursion, try to be friendly + to the user's machine. On some Linux 2.2.x systems, there + is no stack limit for user processes at all. We don't want + to kill such systems. */ + struct rlimit rl; + rl.rlim_cur = rl.rlim_max = 0x100000; /* 1 MB */ + setrlimit (RLIMIT_STACK, &rl); + #endif + c_stack_action (); return recurse ("\1"); }