[Bug 1871762] Re: Calling printf with %f format from rtld-audit bound functions results in a segfault.

Marcus Borkenhagen 1871762 at bugs.launchpad.net
Thu Jul 30 12:40:48 UTC 2020


Further testing showed that the attached rtld-audit-repro.tar.xz did not
reproduce the described behavior.

An updated and much simpler repro in audit.c wich does actually
reproduce the described issue.

-- 
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to glibc in Ubuntu.
https://bugs.launchpad.net/bugs/1871762

Title:
  Calling printf with %f format from rtld-audit bound functions results
  in a segfault.

Status in glibc package in Ubuntu:
  New

Bug description:
  Calling printf functions from an rtld-audit wrapped function - not
  even the wrapper itself - results in a segfault from apparently ld-
  linux.so.

  [A complete example will be attached to this bugreport.]

  When the following function is called via a rtld-audit rebound
  wrapper, a segfault will occur on the last printf-call (the one with
  the %f format.) This segfault apparently happens on return from the
  dynamic linker itself, which seems to break its stack.

   ,-----
   | int fourtytwo(void) {
   |     printf("42.%s\n", __func__);
   |     printf("42.%s The current float is %a\n", __func__, 42.1618);
   |     printf("42.%s The current float is %f\n", __func__, 42.1618);
   |     return 42;
   | }
   `-----

  Ubuntu Version:
  Description:	Ubuntu 19.10
  Release:	19.10

  Package Version:
  libc6:
    Installed: 2.30-0ubuntu2.1
    Candidate: 2.30-0ubuntu2.1
    Version table:
   *** 2.30-0ubuntu2.1 500
          500 http://de.archive.ubuntu.com/ubuntu eoan-updates/main amd64 Packages
          100 /var/lib/dpkg/status
       2.30-0ubuntu2 500
          500 http://de.archive.ubuntu.com/ubuntu eoan/main amd64 Packages

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/glibc/+bug/1871762/+subscriptions



More information about the foundations-bugs mailing list