diff options
author | Semun Lee <sm79.lee@samsung.com> | 2016-09-08 13:03:23 +0900 |
---|---|---|
committer | Semun Lee <sm79.lee@samsung.com> | 2016-09-08 13:03:23 +0900 |
commit | e40a70a28697005e1e34edab14bf7f8e091d2a79 (patch) | |
tree | f091804ca804f71a95e9a22d100fa25b99e3b9b9 | |
parent | a58b4b3c5ca848c2d064591e579e830408f607e4 (diff) | |
download | launchpad-e40a70a28697005e1e34edab14bf7f8e091d2a79.tar.gz launchpad-e40a70a28697005e1e34edab14bf7f8e091d2a79.tar.bz2 launchpad-e40a70a28697005e1e34edab14bf7f8e091d2a79.zip |
Remove RTLD_DEEPBINDsubmit/tizen_3.0_wearable/20161015.000003submit/tizen_3.0_tv/20161015.000002submit/tizen_3.0_mobile/20161015.000003submit/tizen_3.0_ivi/20161010.000003submit/tizen_3.0_common/20161104.104000submit/tizen/20160908.041324accepted/tizen/wearable/20160909.001654accepted/tizen/tv/20160909.001639accepted/tizen/mobile/20160909.001621accepted/tizen/ivi/20160909.001716accepted/tizen/common/20160908.134607accepted/tizen/3.0/wearable/20161015.083301accepted/tizen/3.0/tv/20161016.004746accepted/tizen/3.0/mobile/20161015.033540accepted/tizen/3.0/ivi/20161011.044336
I found many Tizen Store applications have potential
problem of symbol conflict as they include some glib symbols
in its executable.
We cannot deal this issue in general way.
For workaround, they can be launched by removing
RTLD_DEEPBIND flag from dlopen of executable file.
Change-Id: I6635b7e14fb7e79d2895476c705f4f97eaecfcb9
Signed-off-by: Semun Lee <sm79.lee@samsung.com>
-rw-r--r-- | src/launchpad_loader.c | 3 |
1 files changed, 1 insertions, 2 deletions
diff --git a/src/launchpad_loader.c b/src/launchpad_loader.c index 0b7c3a6..8559b73 100644 --- a/src/launchpad_loader.c +++ b/src/launchpad_loader.c @@ -298,8 +298,7 @@ static int __loader_terminate_cb(int argc, char **argv, void *user_data) do_dlopen: handle = dlopen(argv[LOADER_ARG_PATH], - RTLD_LAZY | RTLD_GLOBAL - | RTLD_DEEPBIND | RTLD_NODELETE); + RTLD_LAZY | RTLD_GLOBAL | RTLD_NODELETE); if (handle == NULL) { _E("dlopen failed(%s). Please complile with -fPIE and " \ "link with -pie flag", dlerror()); |