diff options
author | Florian Weimer <fweimer@redhat.com> | 2020-01-16 16:53:58 +0100 |
---|---|---|
committer | Florian Weimer <fweimer@redhat.com> | 2020-01-16 16:53:58 +0100 |
commit | a332bd1518af518c984fad73eba6f46dc5b2b2d4 (patch) | |
tree | 598117449c3beb3a1bf831265073af20e9280f46 /nptl/tst-robustpi9.c | |
parent | 5177d85b0c050a2333a0c4165c938dd422013d05 (diff) | |
download | glibc-a332bd1518af518c984fad73eba6f46dc5b2b2d4.tar.gz glibc-a332bd1518af518c984fad73eba6f46dc5b2b2d4.tar.xz glibc-a332bd1518af518c984fad73eba6f46dc5b2b2d4.zip |
elf: Add elf/tst-dlopenfail-2 [BZ #25396]
Without CET, a jump into a newly loaded object through an overwritten link map often does not crash, it just executes some random code. CET detects this in some cases because the function pointer does not point to the start of a function in the replacement shared object, so there is no ENDBR instruction. The new test uses a small shared object and the existing dangling link map to trigger the bug. Reviewed-by: Siddhesh Poyarekar <siddhesh@sourceware.org>
Diffstat (limited to 'nptl/tst-robustpi9.c')
0 files changed, 0 insertions, 0 deletions