I know that you will rap me over the knuckles but.
Why does it make Segmentation fault
char* cmd;
strcpy(cmd, argv[0]);
when this d
When you do:
char * cmd;
You're allocating a pointer on the stack. This pointer is not initialized to any meaningful value.
Then, when you do this:
strcpy(cmd, argv[0]);
You copy the string contained in argv[0]
to the address pointed to cmd
, which is... something meaningless. Since you're lucky, it simply segfaults.
When you do this:
cmd = "plop";
You assign to cmd
the address to a statically allocated string constant. Since such strings are read only, writing on them is undefined behavior.
So, how to solve this? Allocate memory for the runtime to write to. There's two ways:
The first one is to allocate data on the stack, like this:
char cmd[100]; // for instance
This allocates an array of 100 char
s on the stack. However, it's not necessarily robust, because you must know in advance how much memory you'll need. The stack is also smaller than the heap. Which leads us to option number 2:
char *cmd = malloc(whatever_you_need); // no need to cast, by the way, unless you're in C++
This allocates whatever_you_need
char
s on the heap. Don't forget to release the memory with free
once you're done with it.