backtrace when corrupt stack

Andreas Schwab schwab@linux-m68k.org
Fri Feb 5 20:27:00 GMT 2010


Cristian Zamfir <cristian.zamfir@epfl.ch> writes:

> I am pretty sure that the function in frame #5 should be vsprintf() which is passed a buffer with insufficiently allocated space. But on the stack I see __stack_chk_fail () instead of vsprintf (). 

vsprintf is expanded inline.  The real vsprintf is not called when the
fortify check fails.

Andreas.

-- 
Andreas Schwab, schwab@linux-m68k.org
GPG Key fingerprint = 58CA 54C7 6D53 942B 1756  01D3 44D5 214B 8276 4ED5
"And now for something completely different."



More information about the Gdb mailing list