https://sourceware.org/bugzilla/show_bug.cgi?id=27973
--- Comment #4 from H.J. Lu <hjl.tools at gmail dot com> --- In executable, without PIE, there is 0000000000401040 <protected_func_1a@plt>: 401040: ff 25 da 2f 00 00 jmp *0x2fda(%rip) # 404020 <pr otected_func_1a@Base> 401046: 68 01 00 00 00 push $0x1 40104b: e9 d0 ff ff ff jmp 401020 <_init+0x20> which is used as function pointer value. -- You are receiving this mail because: You are on the CC list for the bug.