1
我目前正在利用LD_PRELOAD
技巧,並且正在使用鏈接器版本腳本as detailed in an article on another website。我的MCVE代碼包含在下面。通過鏈接器腳本插入庫函數:其他函數導致段錯誤
#define _GNU_SOURCE
#include <dlfcn.h>
#include <stdio.h>
#include <stdarg.h>
#include <string.h>
#include <unistd.h>
#define BUFFER_SIZE (1024)
int __printf__(const char *fmt, ...)
{
char buf[BUFFER_SIZE] = { 0 };
int ret;
int len;
va_list args;
va_start(args, fmt);
vsnprintf(buf, BUFFER_SIZE - 1, fmt, args);
#if 1
//typeof(vsnprintf) *real_func = dlsym(RTLD_NEXT, "vsnprintf");
//(*real_func)(buf, BUFFER_SIZE - 1, fmt, args);
#endif
len = strlen(buf);
ret = write(STDOUT_FILENO, buf, len);
va_end(args);
return ret;
}
asm(".symver __printf__, [email protected]_2.3.4");
如果我修改我的自定義功能printf
簡單地寫一個靜態的字符串,沒有任何問題。但是,我想修改通過printf
發送到控制檯的數據(添加前綴,後綴,並將大寫字母設置爲大寫等)。似乎每當我嘗試使用任何其他printf
家族函數來生成用戶提供的字符串的副本時,我都會遇到段錯誤,如下所示。
Program received signal SIGSEGV, Segmentation fault.
strchrnul() at ../sysdeps/x86_64/strchr.S:32
32 ../sysdeps/x86_64/strchr.S: No such file or directory.
(gdb) bt
#0 strchrnul() at ../sysdeps/x86_64/strchr.S:32
#1 0x00007ffff78591c8 in __find_specmb (format=0x1 <error: Cannot access memory at address 0x1>) at printf-parse.h:108
#2 _IO_vfprintf_internal ([email protected]=0x7fffffffc380, [email protected]=0x1 <error: Cannot access memory at address 0x1>, [email protected]=0x7fffffffc4f8) at vfprintf.c:1312
#3 0x00007ffff7882989 in _IO_vsnprintf (string=0x7fffffffc510 "", maxlen=<optimized out>, format=0x1 <error: Cannot access memory at address 0x1>, args=0x7fffffffc4f8)
at vsnprintf.c:114
#4 0x00007ffff7bd58a1 in __printf__ (fmt=0x1 <error: Cannot access memory at address 0x1>) at libfakeprintf.c:19
#5 0x00000000004004aa in printf (__fmt=0x400644 "%s received %d args\n") at /usr/include/x86_64-linux-gnu/bits/stdio2.h:104
#6 main (argc=<optimized out>, argv=<optimized out>) at print_args.c:5
(gdb) quit
什麼是造成這次事故的原因?
謝謝。