From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from EUR01-HE1-obe.outbound.protection.outlook.com (mail-oln040092065061.outbound.protection.outlook.com [40.92.65.61]) by sourceware.org (Postfix) with ESMTPS id 4310A385843B for ; Tue, 22 Feb 2022 21:01:51 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.1 sourceware.org 4310A385843B ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=XkzZcKV4jysuN5cSbrYRq22IZ4nVwSaf92FJIcDN+pa2Bk7GoStqkygougq4XlDG0WrNP1qdule+XiR1TyVgI915FI06cm4uCJ/fbyakolp6Tn9M5v0cGKIXpldhqJfm79p+bN4r8WbZ7iIYKDgdcGV2ir3XMuOPJNCwXHNdI03ycC9oYcT6yG30SZO41OEvRG89kIW2iRfcP7kEXaHBvaimAGcirMHkUiHpAhZLAUjRIZ8n2OiLgh8+8n3ynkTXcvknJUBghENZ/rp9PSEsBjGIuYlQaL/0xuzUC0tQ3fUAa3Ns3AZKfumY/heIuorF2OF4ombIl+xQ75RllRepCg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=ZzLDwaNYYl3o4mgySbIl1Kg+7gRsEHINrdan9r7Uw5o=; b=UCjj9Saq4Zb0+aD7k6u890KGNo2qWMqsQ871UGL2TyaVR8YycFHzQ84GjgAXgfCCBaT19yWN2j+2pas3XZCYKl36KT5WKwDLP6FGlXjRRyuP6fTA6zbyx1EvlvKtrDWTtQU2iGJ28uRf/iKgCY6+C43vFC4YjZ7pLPMI/LJZgBQRgPW9okCXKDkkgNwkgvVhln6hhMnveCoFkuKwM01/QaziGjB+A2xt2+LUwDwNCxLKFNLlGUTj88qdMgjDwMWZgtq/mfj3bJ6BasA3pXefbfW26KkWiFDl6SFMrXbgIbsmCBsHo2+aATDGHENa6blFdz4O/izQx1FhZmxB7M4ycg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=none; dmarc=none; dkim=none; arc=none Received: from AM6P194MB0263.EURP194.PROD.OUTLOOK.COM (2603:10a6:209:42::11) by DBBP194MB1100.EURP194.PROD.OUTLOOK.COM (2603:10a6:10:1e1::10) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4995.16; Tue, 22 Feb 2022 21:01:49 +0000 Received: from AM6P194MB0263.EURP194.PROD.OUTLOOK.COM ([fe80::48a7:8257:8c92:cdd6]) by AM6P194MB0263.EURP194.PROD.OUTLOOK.COM ([fe80::48a7:8257:8c92:cdd6%4]) with mapi id 15.20.5017.022; Tue, 22 Feb 2022 21:01:49 +0000 From: Emile Michel Hobo Subject: strcpy and strcat seem to lead to a stack overflow Message-ID: Date: Tue, 22 Feb 2022 22:01:47 +0100 To: gcc@gcc.gnu.org X-Mailer: Apple Mail (2.3693.60.0.1.1) X-TMN: [W4Vl+zryBNvwfKcMxR9vZd7RqFlqHaR3l69chS9i/9FLeyybeYnVY8NLLX7f3eD6] X-ClientProxiedBy: AM3PR04CA0148.eurprd04.prod.outlook.com (2603:10a6:207::32) To AM6P194MB0263.EURP194.PROD.OUTLOOK.COM (2603:10a6:209:42::11) X-Microsoft-Original-Message-ID: <801595F7-D248-4EC9-8040-7805B60E614B@hotmail.nl> MIME-Version: 1.0 X-MS-Exchange-MessageSentRepresentingType: 1 X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id: 20b24e56-16f0-42c1-147f-08d9f6468acd X-MS-TrafficTypeDiagnostic: DBBP194MB1100:EE_ X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-MS-Exchange-AntiSpam-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-MessageData-0: =?utf-8?B?elpLdUJsNm9MZG5UZFBLUFJMVDhRRlFvNXNtT3g2MTNuaDBhYU1ibmhZMTVX?= =?utf-8?B?VStmb2l5Zy9FM1FsYzBUSzA5aWVGQ0hPeGRFekZWYUFlNlpwaFRPMS9CQlBo?= =?utf-8?B?VE5hSE1vbm1sSG1tenc5aTRMejdoV2ttTFMwaHl0ZmpzTGhzaDhhdjNIL0Y1?= =?utf-8?B?WFo5UVJ6NEhod1NTMGFoVFNSZkRxci9oTjBSL3RMeXlKdDhhbFNPV21nRkxQ?= =?utf-8?B?THhIM3JGRTZjUXlacUNRNEVNTUdCelNvUlR6TFRnbzJSOWFvekd3clhETWIv?= =?utf-8?B?cmd3a1RudnRyUTV1SE9LNjVCa1E4ZlVKTkxrR1J1d3h4cExrUHJ5c1owZitw?= =?utf-8?B?ZGRzMVk3NWJmSkh4WnBPallDazB2T21ZMVdVRWw0c01mUUVHL1YxYXlLSGZi?= =?utf-8?B?TmV3R3p5bUpKY2NXMWxkODhMV3NhV3JRVmxJamdDS0dqT3lTSkhyZTlmWU40?= =?utf-8?B?NjQ3K0N1RlZlUXVlN3JsZlVqcitEWElvaTVleC9nTU8wNGdUUFMrN3dxQTNi?= =?utf-8?B?THFJRjJJZlVHcUtRNEhvN0tqaHdnaUtUUlVPeFQ3ZzRhWkhNTTNGZU1wZUJs?= =?utf-8?B?V055QVlJZkozTkRHenZsS3JOWGswUVhob1p6Wno4RWdOb0xFQXZJUjdWSUdU?= =?utf-8?B?QktjWk5UYzlMWGsweWVaMGhITHNSdU4zbEdoM25rTWMrS29TVHV0MWRYWWZn?= =?utf-8?B?WWwxUlNQaTVMcitxQjU1alRUc0RoKzFBUUFaM0YrRWRXcjErNTlMcldHWDBR?= =?utf-8?B?bSs4TDh5aC9ORUJXVk1oOXM3UW51ZGUwSERZR3RsZVozTXI2UEZ5dDlpWFhv?= =?utf-8?B?ajZ3REJNb09zUWhGRzZlczgrRFdTc2NhWlZxTnprOFVmYzcrUmZUKysxMjE0?= =?utf-8?B?TWxlQm1JZkRwQnFrS1A1Ni8yd3M1dmVDSFFqYzJhY1ZVSUdEWlFRV29JQXFm?= =?utf-8?B?WjlEWG9XaGdBYldjTjRvUytTYy9qVS8ybkJ4ZVVBb2dYVEdvdTIzNGVXaW5t?= =?utf-8?B?Y3pKYlBjK1dSWHMrK0JMMjRaK0UzZkFIWit0RStNS2hBRE5OTHdZQmR4T1pI?= =?utf-8?B?R3hTR09DZTY0ODQ4d2d2R0p0Z21SM2xIZ3ByZDZNR2ZIcHdTQlQ1OEs3MUJy?= =?utf-8?B?VXYrWXlxbmtlYmxmc3M4VFJVNEFydU80TXFvSUlTMUxTaWQ4elYyWHFmZnNL?= =?utf-8?B?V2h3cmsxenlZSXg5VkxHQThBRWhMb3hFcy85ZFFtenNyVHoxSjF1WDZDeUYz?= =?utf-8?B?U3E3SXJ6ZTA0Ky9mZU56RVV3c1F2Qkt5dURHZWRRZXc5VjBkZjFIZ0dtL21D?= =?utf-8?B?Vlg5S3dXeXdiRHYwSWdDTE5FTTBPVUhIemZvTS96ZVM4Nkk2enIyQ2x1dnlX?= =?utf-8?B?OGRrakVud2RCSnc9PQ==?= X-OriginatorOrg: sct-15-20-4755-11-msonline-outlook-84264.templateTenant X-MS-Exchange-CrossTenant-Network-Message-Id: 20b24e56-16f0-42c1-147f-08d9f6468acd X-MS-Exchange-CrossTenant-AuthSource: AM6P194MB0263.EURP194.PROD.OUTLOOK.COM X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-OriginalArrivalTime: 22 Feb 2022 21:01:49.1162 (UTC) X-MS-Exchange-CrossTenant-FromEntityHeader: Hosted X-MS-Exchange-CrossTenant-Id: 84df9e7f-e9f6-40af-b435-aaaaaaaaaaaa X-MS-Exchange-CrossTenant-RMS-PersistedConsumerOrg: 00000000-0000-0000-0000-000000000000 X-MS-Exchange-Transport-CrossTenantHeadersStamped: DBBP194MB1100 X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00, FREEMAIL_FROM, HTML_MESSAGE, KAM_DMARC_STATUS, RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H2, SPF_HELO_PASS, SPF_PASS, TXREP, T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.4 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on server2.sourceware.org Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable X-Content-Filtered-By: Mailman/MimeDel 2.1.29 X-BeenThere: gcc@gcc.gnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Gcc mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 22 Feb 2022 21:01:55 -0000 Dear developers: I find it counterintuitive that if I repeatedly reset a variable by = using strcpy with an empty string "" to that variable and then us strcat = to add characters to that variable that that seems to lead to a stack = overflow. I would expect strcpy to first free the variable, then malloc, then copy = the string value into the variable. I think that would be a better = interpretation, because it can keep running for quite some time before = it overflows and doesn=E2=80=99t really call it. Instead, I got "Illegal instruction: 4". I ended up reimplementing the reset function, implementing it with free = and malloc myself, but the way strings have been implemented in C is = highly counter-intuitive. In general pointers tend to be bug-prone, but = here you would expect this not to happen. I hope you can fix this. Personally, I=E2=80=99m looking into switching = to Ada. All the best, Emile M. Hobo - Au fin! Et encore en plus. -