Sponsored Content
Full Discussion: stack smashing detected
Top Forums Programming stack smashing detected Post 302404827 by jim mcnamara on Wednesday 17th of March 2010 10:05:04 AM
Old 03-17-2010
Stack smashing means that, for example, one of the strcat, strcpy, etc. operations tried to place data beyond the end of a string variable, and the memory is allocated on stack space. You overwrote a stack canary, in other words.

The most common cause is strcpy, strcat. Array bounds overflow operations cause this to happen. Do you have valgrind or electric fence? There are a lot of tools for this kind of problem.
 

8 More Discussions You Might Find Interesting

1. Debian

HDD not detected by RHL 9 (or 7.2)

Hi, I have got myself a new hard disk- a 80 GB SATA IDE from Seagate. When I try installing Red Hat Linux 9(and RHL 7.2 too), it displays an error message saying that it fails to detect any hard drive. In the BIOS, I tried changing the drive configuration to "Legacy Drive", but that didnt help... (5 Replies)
Discussion started by: Abhishek Ghose
5 Replies

2. UNIX for Dummies Questions & Answers

Softlockup detected on cpu#0

hi everybody, I am working on Linuxdevicedrivers in kernel 2.6.My driver is for a HDLC transceiver chip. The problem is driver is not getting initialized properly.It is throwing one bug saying BUG:softlockup detected on cpu#0 which we see in /var/log/messages This is the first i am... (0 Replies)
Discussion started by: sriram.ec
0 Replies

3. Programming

what is stack winding and stack unwinding

helo can u tell me what do you mean by stack winding and stack unwinding Regards, Amit (2 Replies)
Discussion started by: amitpansuria
2 Replies

4. Solaris

dmfe0: TX stall detected

I just starting recieving in /var/adm/messages this kind of notice: dmfe: NOTICE: dmfe0: TX stall detected after 2 ticks in state 3; automatic recovery initiated does any one have any idea why this notice is generated ? thanks in advance. (1 Reply)
Discussion started by: pasalagua
1 Replies

5. Red Hat

glic detected on free

Hello, I have built a shared object on SuSe using gcc. I then copied this shared object to a RedHat machine and built a test application using gcc 3.4.6 which linked the shared object built on SuSe. When running the test application on RedHat, I get a glic detected on free message and the... (0 Replies)
Discussion started by: sbaratam
0 Replies

6. Hardware

iPhone Not being detected

I'm New to the linux world I'm running OpenSuse and as soon as I installed everything was wokring like a charm. and i said to myself I'm so keeping this OpSys! everytime i would plug in my iPhone it would read it as anything else as a filesystem and i was able to go through the device files an etc,... (9 Replies)
Discussion started by: JuankyKong
9 Replies

7. UNIX for Dummies Questions & Answers

Kernel Stack vs User Mode Stack

Hi, I am new to the linux kernel development area. I want to know what is the difference between kernel mode stack and user mode stack? Does each process has a user mode stack and a kernel mode stack?? Or Each process has a user mode stack and there is only one kernel mode stack that is shared by... (4 Replies)
Discussion started by: saurabhkoar
4 Replies

8. Programming

Sleep function not detected

Hello Im using geany to write my c codes. Below is my code to make the internal LED of beaglebone flashing. But i cant seem to use the sleep or delay to make the program wait for a couple of miliseconds. I've included all include files that i can find but none of it solve the problem. Any help is... (1 Reply)
Discussion started by: HellRyder
1 Replies
STRCAT(3)						   BSD Library Functions Manual 						 STRCAT(3)

NAME
strcat, strncat -- concatenate strings LIBRARY
Standard C Library (libc, -lc) SYNOPSIS
#include <string.h> char * strcat(char * restrict s, const char * restrict append); char * strncat(char * restrict s, const char * restrict append, size_t count); DESCRIPTION
The strcat() and strncat() functions append a copy of the null-terminated string append to the end of the null-terminated string s, then add a terminating ''. The string s must have sufficient space to hold the result. The strncat() function appends not more than count characters from append, and then adds a terminating ''. RETURN VALUES
The strcat() and strncat() functions return the pointer s. SEE ALSO
bcopy(3), memccpy(3), memcpy(3), memmove(3), strcpy(3), strlcat(3), strlcpy(3), wcscat(3) STANDARDS
The strcat() and strncat() functions conform to ISO/IEC 9899:1990 (``ISO C90''). SECURITY CONSIDERATIONS
The strcat() function is easily misused in a manner which enables malicious users to arbitrarily change a running program's functionality through a buffer overflow attack. Avoid using strcat(). Instead, use strncat() or strlcat() and ensure that no more characters are copied to the destination buffer than it can hold. Note that strncat() can also be problematic. It may be a security concern for a string to be truncated at all. Since the truncated string will not be as long as the original, it may refer to a completely different resource and usage of the truncated resource could result in very incorrect behavior. Example: void foo(const char *arbitrary_string) { char onstack[8]; #if defined(BAD) /* * This first strcat is bad behavior. Do not use strcat! */ (void)strcat(onstack, arbitrary_string); /* BAD! */ #elif defined(BETTER) /* * The following two lines demonstrate better use of * strncat(). */ (void)strncat(onstack, arbitrary_string, sizeof(onstack) - strlen(onstack) - 1); #elif defined(BEST) /* * These lines are even more robust due to testing for * truncation. */ if (strlen(arbitrary_string) + 1 > sizeof(onstack) - strlen(onstack)) err(1, "onstack would be truncated"); (void)strncat(onstack, arbitrary_string, sizeof(onstack) - strlen(onstack) - 1); #endif } BSD
December 1, 2009 BSD
All times are GMT -4. The time now is 02:31 AM.
Unix & Linux Forums Content Copyright 1993-2022. All Rights Reserved.
Privacy Policy