(no title)
meinersbur | 5 months ago
1. BusyBox is a single executable that executes different commands based on which symlink was used to call it
2. Bash puts itself into compatibility mode if invoked as "sh"
3. "ping" can be invoked as "ping4" or "ping6"
4. Some of git's subcommands are symlinks back to the main executable
5. Clang switches to C++ mode if invoked as "clang++"
6. AppArmor profiles activate on file paths
LelouBil|5 months ago
In your list these are executables that change their own behaviour based on how they are called, whereas in the OP it's the OS changing code based on the name of an application.
saati|5 months ago
db48x|5 months ago
This is entirely different than when DirectX behaves differently for a program named foo.exe and another one called bar.exe.
AppArmor (and for that matter SELinux) are a different thing yet again. Here the goal is not to fix bugs or incompatibilities, but to add extra security. Similar perhaps, but not nearly as intrusive. Neither involve runtime patching, which is the most salient feature of this crash report.