Skip to content

printf interception on 32-bit Linux/sparc64 doesn't work #108392

Open
@rorth

Description

@rorth

With PR #107405, a couple of ASan tests that depend on printf interception FAIL on 32-bit Linux/sparc64:

  AddressSanitizer-sparc-linux :: TestCases/printf-2.c
  AddressSanitizer-sparc-linux :: TestCases/printf-3.c
  AddressSanitizer-sparc-linux :: TestCases/printf-4.c
  AddressSanitizer-sparc-linux :: TestCases/printf-5.c

  AddressSanitizer-sparc-linux-dynamic :: TestCases/printf-2.c
  AddressSanitizer-sparc-linux-dynamic :: TestCases/printf-3.c
  AddressSanitizer-sparc-linux-dynamic :: TestCases/printf-4.c
  AddressSanitizer-sparc-linux-dynamic :: TestCases/printf-5.c

  SanitizerCommon-asan-sparc-Linux :: Linux/unexpected_format_specifier_test.cpp

The issue is always the same: the interceptor doesn't run, which is no wonder given that the executables contains calls to __nldbl_print (no long double) instead of the expected __interceptor_printf.

Metadata

Metadata

Assignees

No one assigned

    Labels

    Type

    No type

    Projects

    No projects

    Milestone

    No milestone

    Relationships

    None yet

    Development

    No branches or pull requests

    Issue actions