From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 10722 invoked by alias); 5 Feb 2010 20:27:17 -0000 Received: (qmail 10710 invoked by uid 22791); 5 Feb 2010 20:27:16 -0000 X-SWARE-Spam-Status: No, hits=-2.4 required=5.0 tests=AWL,BAYES_00 X-Spam-Check-By: sourceware.org Received: from mail-out.m-online.net (HELO mail-out.m-online.net) (212.18.0.10) by sourceware.org (qpsmtpd/0.43rc1) with ESMTP; Fri, 05 Feb 2010 20:27:12 +0000 Received: from mail01.m-online.net (mail.m-online.net [192.168.3.149]) by mail-out.m-online.net (Postfix) with ESMTP id E691F1C0011C; Fri, 5 Feb 2010 21:27:09 +0100 (CET) Received: from localhost (dynscan2.mnet-online.de [192.168.6.166]) by mail.m-online.net (Postfix) with ESMTP id E267E90216; Fri, 5 Feb 2010 21:27:09 +0100 (CET) Received: from mail.mnet-online.de ([192.168.3.149]) by localhost (dynscan2.mnet-online.de [192.168.6.166]) (amavisd-new, port 10024) with ESMTP id 7UKnA7T7VlrS; Fri, 5 Feb 2010 21:27:08 +0100 (CET) Received: from igel.home (DSL01.83.171.186.147.ip-pool.NEFkom.net [83.171.186.147]) by mail.mnet-online.de (Postfix) with ESMTP; Fri, 5 Feb 2010 21:27:08 +0100 (CET) Received: by igel.home (Postfix, from userid 501) id A0E10CA297; Fri, 5 Feb 2010 21:27:08 +0100 (CET) From: Andreas Schwab To: Cristian Zamfir Cc: Subject: Re: backtrace when corrupt stack References: <33F51508-83E5-4791-ADA3-DA8591582C49@epfl.ch> <251102A0-163B-4484-AEFF-D13133F6F1D8@epfl.ch> X-Yow: Yow! Those people look exactly like Donnie and Marie Osmond!! Date: Fri, 05 Feb 2010 20:27:00 -0000 In-Reply-To: <251102A0-163B-4484-AEFF-D13133F6F1D8@epfl.ch> (Cristian Zamfir's message of "Fri, 5 Feb 2010 20:58:03 +0100") Message-ID: User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/23.1.92 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Mailing-List: contact gdb-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Subscribe: List-Archive: List-Post: List-Help: , Sender: gdb-owner@sourceware.org X-SW-Source: 2010-02/txt/msg00038.txt.bz2 Cristian Zamfir writes: > I am pretty sure that the function in frame #5 should be vsprintf() which is passed a buffer with insufficiently allocated space. But on the stack I see __stack_chk_fail () instead of vsprintf (). vsprintf is expanded inline. The real vsprintf is not called when the fortify check fails. Andreas. -- Andreas Schwab, schwab@linux-m68k.org GPG Key fingerprint = 58CA 54C7 6D53 942B 1756 01D3 44D5 214B 8276 4ED5 "And now for something completely different."