glibc/elf/tst-protected1a.c

235 lines
6.1 KiB
C
Raw Permalink Normal View History

/* Test the protected visibility when main is linked with moda and modb
in that order:
1. Protected symbols, protected1, protected2 and protected3, defined
in moda, are used in moda.
2. Protected symbol, protected3, defined in modb, are used in modb.
3. Symbol, protected1, defined in moda, is also used in main and modb.
4. Symbol, protected2, defined in main, is used in main.
5. Symbol, protected3, defined in moda, is also used in main.
Copyright (C) 2015-2021 Free Software Foundation, Inc.
This file is part of the GNU C Library.
The GNU C Library is free software; you can redistribute it and/or
modify it under the terms of the GNU Lesser General Public
License as published by the Free Software Foundation; either
version 2.1 of the License, or (at your option) any later version.
The GNU C Library is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
Lesser General Public License for more details.
You should have received a copy of the GNU Lesser General Public
License along with the GNU C Library; if not, see
Prefer https to http for gnu.org and fsf.org URLs Also, change sources.redhat.com to sourceware.org. This patch was automatically generated by running the following shell script, which uses GNU sed, and which avoids modifying files imported from upstream: sed -ri ' s,(http|ftp)(://(.*\.)?(gnu|fsf|sourceware)\.org($|[^.]|\.[^a-z])),https\2,g s,(http|ftp)(://(.*\.)?)sources\.redhat\.com($|[^.]|\.[^a-z]),https\2sourceware.org\4,g ' \ $(find $(git ls-files) -prune -type f \ ! -name '*.po' \ ! -name 'ChangeLog*' \ ! -path COPYING ! -path COPYING.LIB \ ! -path manual/fdl-1.3.texi ! -path manual/lgpl-2.1.texi \ ! -path manual/texinfo.tex ! -path scripts/config.guess \ ! -path scripts/config.sub ! -path scripts/install-sh \ ! -path scripts/mkinstalldirs ! -path scripts/move-if-change \ ! -path INSTALL ! -path locale/programs/charmap-kw.h \ ! -path po/libc.pot ! -path sysdeps/gnu/errlist.c \ ! '(' -name configure \ -execdir test -f configure.ac -o -f configure.in ';' ')' \ ! '(' -name preconfigure \ -execdir test -f preconfigure.ac ';' ')' \ -print) and then by running 'make dist-prepare' to regenerate files built from the altered files, and then executing the following to cleanup: chmod a+x sysdeps/unix/sysv/linux/riscv/configure # Omit irrelevant whitespace and comment-only changes, # perhaps from a slightly-different Autoconf version. git checkout -f \ sysdeps/csky/configure \ sysdeps/hppa/configure \ sysdeps/riscv/configure \ sysdeps/unix/sysv/linux/csky/configure # Omit changes that caused a pre-commit check to fail like this: # remote: *** error: sysdeps/powerpc/powerpc64/ppc-mcount.S: trailing lines git checkout -f \ sysdeps/powerpc/powerpc64/ppc-mcount.S \ sysdeps/unix/sysv/linux/s390/s390-64/syscall.S # Omit change that caused a pre-commit check to fail like this: # remote: *** error: sysdeps/sparc/sparc64/multiarch/memcpy-ultra3.S: last line does not end in newline git checkout -f sysdeps/sparc/sparc64/multiarch/memcpy-ultra3.S
2019-09-07 05:40:42 +00:00
<https://www.gnu.org/licenses/>. */
/* This file must be compiled as PIE to avoid copy relocation when
accessing protected symbols defined in shared libaries since copy
relocation doesn't work with protected symbols and linker in
binutils 2.26 enforces this rule. */
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include "tst-protected1mod.h"
/* Prototype for our test function. */
extern int do_test (void);
int protected2 = -1;
/* This defines the `main' function and some more. */
Update elf tests to use the support test driver. Replaced test-skeleton.c with support/test-driver.c and adjusted the tests accordinly. Checked on x86_64. * elf/next.c: Import support/test-driver.c instead of test-skeleton.c and delete TEST_FUNCTION macro definition. * elf/nodelete.c: Likewise. * elf/order2.c: Likewise. * elf/tst-_dl_addr_inside_object.c: Likewise. * elf/tst-addr1.c: Likewise. * elf/tst-align.c: Likewise. * elf/tst-align2.c: Likewise. * elf/tst-audit11.c: Likewise. * elf/tst-audit12.c: Likewise. * elf/tst-audit2.c: Likewise. * elf/tst-audit9.c: Likewise. * elf/tst-auxv.c: Likewise and define TEST_FUNCTION_ARGV macro. * elf/tst-deep1.c: Likewise. * elf/tst-dl-iter-static.c: Likewise. * elf/tst-dlmodcount.c: Likewise. * elf/tst-dlmopen1.c: Likewise. * elf/tst-dlmopen2.c: Likewise. * elf/tst-dlmopen3.c: Likewise. * elf/tst-dlopen-aout.c: Likewise. * elf/tst-dlopenrpath.c: Likewise. * elf/tst-dlsym-error.c: Likewise. * elf/tst-execstack-needed.c: Likewise. * elf/tst-execstack-prog.c: Likewise. * elf/tst-execstack.c: Likewise. * elf/tst-global1.c: Likewise. * elf/tst-gnu2-tls1.c: Likewise. * elf/tst-latepthread.c: Likewise. * elf/tst-leaks1.c: Likewise. * elf/tst-linkall-static.c: Likewise. (do_test): New function. * elf/tst-nodelete-opened.c: Likewise. * elf/tst-nodelete.cc: Likewise. * elf/tst-nodelete2.c: Likewise. * elf/tst-noload.c: Likewise. * elf/tst-null-argv.c: Likewise and define TEST_FUNCTION_ARGV marcro. * elf/tst-order-main.c: Likewise. * elf/tst-pathopt.c: Likewise. * elf/tst-pie2.c: Likewise. * elf/tst-piemod1.c: Likewise. * elf/tst-prelink.c: Likewise. * elf/tst-protected1a.c: Likewise. * elf/tst-protected1b.c: Likewise. * elf/tst-ptrguard1.c: Likewise, import getopt.h, and define _GNU_SOURCE macro. (cmdline_process_function): New function. * elf/tst-relsort1.c: Likewise. * elf/tst-stackguard1.c: Likewise, import getopt.h, and define _GNU_SOURCE macro. (cmdline_process_function): New function. * elf/tst-thrlock.c: Likewise. * elf/tst-tls-dlinfo.c: Likewise. * elf/tst-tls-manydynamic.c: Likewise and import support/xthread.h. * elf/tst-tls1.c: Likewise. * elf/tst-tls10.c: Likewise. * elf/tst-tls11.c: Likewise. * elf/tst-tls12.c: Likewise. * elf/tst-tls13.c: Likewise. * elf/tst-tls14.c: Likewise. * elf/tst-tls15.c: Likewise. * elf/tst-tls16.c: Likewise. * elf/tst-tls17.c: Likewise. * elf/tst-tls18.c: Likewise. * elf/tst-tls19.c: Likewise. * elf/tst-tls2.c: Likewise. * elf/tst-tls3.c: Likewise. * elf/tst-tls4.c: Likewise. * elf/tst-tls5.c: Likewise. * elf/tst-tls6.c: Likewise. * elf/tst-tls7.c: Likewise. * elf/tst-tls8.c: Likewise. * elf/tst-tls9.c: Likewise. * elf/tst-tlsalign-extern.c: Likewise. * elf/tst-tlsalign.c: Likewise. * elf/tst-unique1.c: Likewise. * elf/tst-unique2.c: Likewise. * elf/vismain.c: Likewise.
2017-04-05 13:34:39 +00:00
#include <support/test-driver.c>
int
do_test (void)
{
int res = 0;
/* Check if we get the same address for the protected data symbol. */
if (&protected1 != protected1a_p ())
{
puts ("`protected1' in main and moda doesn't have same address");
res = 1;
}
if (&protected1 != protected1b_p ())
{
puts ("`protected1' in main and modb doesn't have same address");
res = 1;
}
/* Check if we get the right value for the protected data symbol. */
if (protected1 != 3)
{
puts ("`protected1' in main and moda doesn't have same value");
res = 1;
}
/* Check if we get the right value for data defined in executable. */
if (protected2 != -1)
{
puts ("`protected2' in main has the wrong value");
res = 1;
}
/* Check `protected1' in moda. */
if (!check_protected1 ())
{
puts ("`protected1' in moda has the wrong value");
res = 1;
}
/* Check `protected2' in moda. */
if (!check_protected2 ())
{
puts ("`protected2' in moda has the wrong value");
res = 1;
}
/* Check if we get the same address for the protected data symbol. */
if (&protected3 != protected3a_p ())
{
puts ("`protected3' in main and moda doesn't have same address");
res = 1;
}
if (&protected3 == protected3b_p ())
{
puts ("`protected3' in main and modb has same address");
res = 1;
}
/* Check if we get the right value for the protected data symbol. */
if (protected3 != 5)
{
puts ("`protected3' in main and moda doesn't have same value");
res = 1;
}
/* Check `protected3' in moda. */
if (!check_protected3a ())
{
puts ("`protected3' in moda has the wrong value");
res = 1;
}
/* Check `protected3' in modb. */
if (!check_protected3b ())
{
puts ("`protected3' in modb has the wrong value");
res = 1;
}
/* Set `protected2' in moda to 30. */
set_protected2 (300);
/* Check `protected2' in moda. */
if (!check_protected2 ())
{
puts ("`protected2' in moda has the wrong value");
res = 1;
}
/* Set `protected1' in moda to 30. */
set_protected1a (30);
/* Check `protected1' in moda. */
if (!check_protected1 ())
{
puts ("`protected1' in moda has the wrong value");
res = 1;
}
/* Check if we get the updated value for the protected data symbol. */
if (protected1 != 30)
{
puts ("`protected1' in main doesn't have the updated value");
res = 1;
}
protected2 = -300;
/* Check `protected2' in moda. */
if (!check_protected2 ())
{
puts ("`protected2' in moda has the wrong value");
res = 1;
}
/* Check if data defined in executable is changed. */
if (protected2 != -300)
{
puts ("`protected2' in main is changed");
res = 1;
}
/* Set `protected1' in modb to 40. */
set_protected1b (40);
set_expected_protected1 (40);
/* Check `protected1' in moda. */
if (!check_protected1 ())
{
puts ("`protected1' in moda has the wrong value");
res = 1;
}
/* Check if we get the updated value for the protected data symbol. */
if (protected1 != 40)
{
puts ("`protected1' in main doesn't have the updated value");
res = 1;
}
/* Set `protected3' in moda to 80. */
set_protected3a (80);
/* Check `protected3' in moda. */
if (!check_protected3a ())
{
puts ("`protected3' in moda has the wrong value");
res = 1;
}
/* Check if we get the updated value for the protected data symbol. */
if (protected3 != 80)
{
puts ("`protected3' in main doesn't have the updated value");
res = 1;
}
/* Check `protected3' in modb. */
if (!check_protected3b ())
{
puts ("`protected3' in modb has the wrong value");
res = 1;
}
/* Set `protected3' in modb to 100. */
set_protected3b (100);
/* Check `protected3' in moda. */
if (!check_protected3a ())
{
puts ("`protected3' in moda has the wrong value");
res = 1;
}
/* Check if we get the updated value for the protected data symbol. */
if (protected3 != 80)
{
puts ("`protected3' in main doesn't have the updated value");
res = 1;
}
/* Check `protected3' in modb. */
if (!check_protected3b ())
{
puts ("`protected3' in modb has the wrong value");
res = 1;
}
return res;
}