]> git.ipfire.org Git - thirdparty/glibc.git/commit
elf: Add elf/tst-dlopenfail-2 [BZ #25396]
authorFlorian Weimer <fweimer@redhat.com>
Thu, 16 Jan 2020 15:53:58 +0000 (16:53 +0100)
committerFlorian Weimer <fweimer@redhat.com>
Thu, 16 Jan 2020 15:53:58 +0000 (16:53 +0100)
commita332bd1518af518c984fad73eba6f46dc5b2b2d4
tree598117449c3beb3a1bf831265073af20e9280f46
parent5177d85b0c050a2333a0c4165c938dd422013d05
elf: Add elf/tst-dlopenfail-2 [BZ #25396]

Without CET, a jump into a newly loaded object through an overwritten
link map often does not crash, it just executes some random code.
CET detects this in some cases because the function pointer does not
point to the start of a function in the replacement shared object,
so there is no ENDBR instruction.

The new test uses a small shared object and the existing dangling
link map to trigger the bug.

Reviewed-by: Siddhesh Poyarekar <siddhesh@sourceware.org>
elf/Makefile
elf/tst-dlopenfail-2.c [new file with mode: 0644]
elf/tst-dlopenfailmod3.c [new file with mode: 0644]