This is the mail archive of the
mailing list for the GDB project.
Re: backtrace when corrupt stack
Cristian Zamfir <email@example.com> writes:
> I am pretty sure that the function in frame #5 should be vsprintf() which is passed a buffer with insufficiently allocated space. But on the stack I see __stack_chk_fail () instead of vsprintf ().
vsprintf is expanded inline. The real vsprintf is not called when the
fortify check fails.
Andreas Schwab, firstname.lastname@example.org
GPG Key fingerprint = 58CA 54C7 6D53 942B 1756 01D3 44D5 214B 8276 4ED5
"And now for something completely different."