mirror of
https://github.com/chromium/crashpad.git
synced 2024-12-31 01:43:03 +08:00
5e8e72f91c
OS X 10.11 introduces System Integrity Protection. One facet of that forbids code injection into system executables. A Crashpad test checks that information can be recovered from dyld in early-launch crashes by requesting dyld load a nonexistent library with DYLD_INSERT_LIBRARIES. The executable was meaningless but a system-provided executable, /usr/bin/true, was used for convenience. This test hung on OS X 10.11 because DYLD_INSERT_LIBRARIES was ignored for the system executable, and no crash occurred. The test waited for a crash that would never come. A custom no-op executable, crashpad_snapshot_test_no_op, is provided as an executable that does work with DYLD_INSERT_LIBRARIES. BUG=crashpad:41 TEST=crashpad_snapshot_test MachOImageAnnotationsReader.CrashDyld R=rsesek@chromium.org Review URL: https://codereview.chromium.org/1276553005 .