This is the mail archive of the
glibc-bugs@sourceware.org
mailing list for the glibc project.
[Bug dynamic-link/14511] dlclose DSO unloading fundamentally unsafe
- From: "jakub at redhat dot com" <sourceware-bugzilla at sourceware dot org>
- To: glibc-bugs at sources dot redhat dot com
- Date: Thu, 23 Aug 2012 12:04:00 +0000
- Subject: [Bug dynamic-link/14511] dlclose DSO unloading fundamentally unsafe
- Auto-submitted: auto-generated
- References: <bug-14511-131@http.sourceware.org/bugzilla/>
http://sourceware.org/bugzilla/show_bug.cgi?id=14511
Jakub Jelinek <jakub at redhat dot com> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|REOPENED |RESOLVED
Resolution| |INVALID
--- Comment #7 from Jakub Jelinek <jakub at redhat dot com> 2012-08-23 12:04:00 UTC ---
Doesn't matter what levels of libraries you have. It is users responsibility
to ensure pointers to library code aren't accessed after library is unloaded.
The default is correct, and has been that way since the beginning.
--
Configure bugmail: http://sourceware.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are on the CC list for the bug.