Public bug reported: Calling printf functions from an rtld-audit wrapped function - not even the wrapper itself - results in a segfault from apparently ld-linux.so.
[A complete example will be attached to this bugreport.] When the following function is called via a rtld-audit rebound wrapper, a segfault will occur on the last printf-call (the one with the %f format.) This segfault apparently happens on return from the dynamic linker itself, which seems to break its stack. ,----- | int fourtytwo(void) { | printf("42.%s\n", __func__); | printf("42.%s The current float is %a\n", __func__, 42.1618); | printf("42.%s The current float is %f\n", __func__, 42.1618); | return 42; | } `----- Ubuntu Version: Description: Ubuntu 19.10 Release: 19.10 Package Version: libc6: Installed: 2.30-0ubuntu2.1 Candidate: 2.30-0ubuntu2.1 Version table: *** 2.30-0ubuntu2.1 500 500 http://de.archive.ubuntu.com/ubuntu eoan-updates/main amd64 Packages 100 /var/lib/dpkg/status 2.30-0ubuntu2 500 500 http://de.archive.ubuntu.com/ubuntu eoan/main amd64 Packages ** Affects: glibc (Ubuntu) Importance: Undecided Status: New ** Attachment added: "Example reproducing the observed behavior." https://bugs.launchpad.net/bugs/1871762/+attachment/5350090/+files/rtld-audit-repro.tar.xz -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1871762 Title: Calling printf with %f format from rtld-audit bound functions results in a segfault. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/glibc/+bug/1871762/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs