Public bug reported:

Calling printf functions from an rtld-audit wrapped function - not even
the wrapper itself - results in a segfault from apparently ld-linux.so.

[A complete example will be attached to this bugreport.]

When the following function is called via a rtld-audit rebound wrapper,
a segfault will occur on the last printf-call (the one with the %f
format.) This segfault apparently happens on return from the dynamic
linker itself, which seems to break its stack.

 ,-----
 | int fourtytwo(void) {
 |     printf("42.%s\n", __func__);
 |     printf("42.%s The current float is %a\n", __func__, 42.1618);
 |     printf("42.%s The current float is %f\n", __func__, 42.1618);
 |     return 42;
 | }
 `-----

Ubuntu Version:
Description:    Ubuntu 19.10
Release:        19.10

Package Version:
libc6:
  Installed: 2.30-0ubuntu2.1
  Candidate: 2.30-0ubuntu2.1
  Version table:
 *** 2.30-0ubuntu2.1 500
        500 http://de.archive.ubuntu.com/ubuntu eoan-updates/main amd64 Packages
        100 /var/lib/dpkg/status
     2.30-0ubuntu2 500
        500 http://de.archive.ubuntu.com/ubuntu eoan/main amd64 Packages

** Affects: glibc (Ubuntu)
     Importance: Undecided
         Status: New

** Attachment added: "Example reproducing the observed behavior."
   
https://bugs.launchpad.net/bugs/1871762/+attachment/5350090/+files/rtld-audit-repro.tar.xz

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1871762

Title:
  Calling printf with %f format from rtld-audit bound functions results
  in a segfault.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/glibc/+bug/1871762/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to