This is the mail archive of the
gdb@sourceware.org
mailing list for the GDB project.
Re: backtrace when corrupt stack
Cristian Zamfir <cristian.zamfir@epfl.ch> writes:
> I am pretty sure that the function in frame #5 should be vsprintf() which is passed a buffer with insufficiently allocated space. But on the stack I see __stack_chk_fail () instead of vsprintf ().
vsprintf is expanded inline. The real vsprintf is not called when the
fortify check fails.
Andreas.
--
Andreas Schwab, schwab@linux-m68k.org
GPG Key fingerprint = 58CA 54C7 6D53 942B 1756 01D3 44D5 214B 8276 4ED5
"And now for something completely different."