Your message dated Fri, 13 Dec 2024 11:49:51 +0000
with message-id <e1tm4b5-002piz...@fasolo.debian.org>
and subject line Bug#1088290: fixed in nbdkit 1.40.4-6
has caused the Debian Bug report #1088290,
regarding libc6: On mips64el, nbdkit --help segfaults in printf()
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
1088290: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1088290
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: libc6
Version: 2.40-4
Severity: serious
Control: notfound -1 2.39-7

Dear Maintainer,

in investigating the root cause for #1082751 I found that current nbdkit
built on unstable/mips64el segfaults in printf() with libc6/2.40-4 – but
not with 2.39.

,----
| nbdkit [-4|--ipv4-only] [-6|--ipv6-only]
|        [-D|--debug PLUGIN|FILTER|nbdkit.FLAG=N]
|        [--exit-with-parent] [-e|--exportname EXPORTNAME]
|        [--filter=FILTER ...] [-f|--foreground]
|        [-g|--group GROUP] [-i|--ipaddr IPADDR]
|        [--log=stderr|syslog|null] [--mask-handshake=MASK]
|        [-n|--newstyle] [--no-mc|--no-meta-contexts]
|        [--no-sr|--no-structured-replies] [-o|--oldstyle]
|        [-P|--pidfile PIDFILE] [-p|--port PORT] [--print-uri]
|        [-r|--readonly] [--run 'COMMAND ARGS ...']
|        [--selinux-label=LABEL] [-s|--single] [--swap]
|        [-t|--threads THREADS] [--tls=off|on|require]
|        [--tls-certificates=/path/to/certificates]
|        [--tls-psk=/path/to/pskfile] [--tls-verify-peer]
|        [-U|--unix SOCKET|-] [-u|--user USER]
|        [-v|--verbose] [--vsock]
|        PLUGIN [[KEY=]VALUE [KEY=VALUE [...]]]
| 
| nbdkit --dump-config
| 
| nbdkit PLUGIN --dump-plugin
| 
| nbdkit --help
| 
| nbdkit [-V|--version]
| 
| Program received signal SIGSEGV, Segmentation fault.
`----

The stacktrace suggests to me that the crash happens within glibc's I/O
buffer handling; main's argc has apparently be overwritten with a
nonsensical value.

,----
| (gdb) bt
| #0  0x000000fff7c08208 in _IO_old_file_overflow (f=0xfff7c61748 
<_IO_stdout_>, ch=10)
|     at oldfileops.c:395
| #1  0x000000fff7af623c in __GI__IO_puts (
|     str=0xaaaaac23f8 "nbdkit [-4|--ipv4-only] [-6|--ipv6-only]\n       
[-D|--debug PLUGIN|FILTER|nbdkit.FLAG=N]\n       [--exit-with-parent] 
[-e|--exportname EXPORTNAME]\n       [--filter=FILTER ...] [-f|--foreground]\n  
     "...) at ioputs.c:41
| #2  0x000000aaaaab29d0 in printf (__fmt=<synthetic pointer>)
|     at /usr/include/mips64el-linux-gnuabi64/bits/stdio2.h:118
| #3  usage () at main.c:152
| #4  0x000000aaaaaa7560 in main (argc=-138012856, argv=0xffffffcbc8) at 
main.c:556
`----

Running nbdkit from stable in an unstable chroot on eberlin leads to a
segfault in the same location, IIRC with a stacktrace that looks the
same.

I tried downgrading libc6 and related packages to 2.39-7 which had been
used in the last good build of the nbdkit package. That got rid of the
segfault. (I had to do this using qemu full-system emulation, since I'm
not aware of a way to downgrade packages in porterbox chroots.)

I tried, so far unsuccessfully, to replicate the issue with a
hello-world-style program. However, patching some printf statements to
the top of nbdkit's main function (before any explicit initialization)
also leads to a crash in those statements.

(Running under Valgrind in the porterbox chroot has so far not been
helpful – it aborts with SIGILL, this doesn't seem to have anything to
do with the issue at hand.)

If I can try anything else to help track this down, please let me know!

Cheers,
-Hilko

--- End Message ---
--- Begin Message ---
Source: nbdkit
Source-Version: 1.40.4-6
Done: Hilko Bengen <ben...@debian.org>

We believe that the bug you reported is fixed in the latest version of
nbdkit, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 1088...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Hilko Bengen <ben...@debian.org> (supplier of updated nbdkit package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Format: 1.8
Date: Fri, 13 Dec 2024 01:18:28 +0100
Source: nbdkit
Architecture: source
Version: 1.40.4-6
Distribution: unstable
Urgency: medium
Maintainer: Hilko Bengen <ben...@debian.org>
Changed-By: Hilko Bengen <ben...@debian.org>
Closes: 1088290
Changes:
 nbdkit (1.40.4-6) unstable; urgency=medium
 .
   * Add patch to fix glibc 2.40 crash on mips64el.
     Thanks to Aurelien Jarno (Closes: #1088290)
   * Revert change preventing tests from being run on mips64el
Checksums-Sha1:
 736e7f8c59ed6a117e5ea8cb272d04a8b4d9ab97 3464 nbdkit_1.40.4-6.dsc
 384013f2c317877068e3d6eae05faff83e0f85ee 12684 nbdkit_1.40.4-6.debian.tar.xz
 5730761ae4140237430f8190a47b3c9228a56179 17407 nbdkit_1.40.4-6_source.buildinfo
Checksums-Sha256:
 b53a7adf6ec8413612b0dfd94e666cdfc5baa87d6d316c00687da20ee0f4ad5c 3464 
nbdkit_1.40.4-6.dsc
 a8fc3b1c3b04b370a29607294805b5501a0210ca06ca65978b1e0e133aefb9e2 12684 
nbdkit_1.40.4-6.debian.tar.xz
 40ef4f0a3eb1525d56c3d05e81ca429294fe7d5a77b151d3efa390da0e2efe05 17407 
nbdkit_1.40.4-6_source.buildinfo
Files:
 6dc23cde94d5aa5d694967154f06cda3 3464 admin optional nbdkit_1.40.4-6.dsc
 d677590236fbd83cf53394aca18334f5 12684 admin optional 
nbdkit_1.40.4-6.debian.tar.xz
 c47723848b783e3d6fb7aeae6feb9dc3 17407 admin optional 
nbdkit_1.40.4-6_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=hSRk
-----END PGP SIGNATURE-----

Attachment: pgpyE5SZn4gdo.pgp
Description: PGP signature


--- End Message ---

Reply via email to