gabriel diaz saw a cs crash in pool with a user mem overflow error. take some speculative evasive action, since it's not reproducable, and not easily debuggable in situ. Reference: /n/atom/patch/applied2013/csstrdup Date: Sun Oct 13 18:52:05 CES 2013 Signed-off-by: quanstro@quanstro.net --- /sys/src/cmd/ndb/cs.c Sun Oct 13 18:49:59 2013 +++ /sys/src/cmd/ndb/cs.c Sun Oct 13 18:49:59 2013 @@ -1367,7 +1367,7 @@ /* '*' means any service */ if(strcmp(name, "*")==0){ - strcpy(buf, name); + nstrcpy(buf, name, blen); return buf; } @@ -1645,7 +1645,7 @@ /* '*' means any service */ if(strcmp(name, "*")==0){ - strcpy(buf, name); + nstrcpy(buf, name, blen); return buf; } @@ -2031,7 +2031,8 @@ ndbfree(nt); continue; } - strcpy(nt->attr, attr); + free(nt->attr); + attr = strdup(attr); l = &nt->entry; } return t;