glibc/dlfcn/tst-rec-dlopen.c

179 lines
4.8 KiB
C
Raw Normal View History

/* Test recursive dlopen using malloc hooks.
Copyright (C) 2015-2020 Free Software Foundation, Inc.
This file is part of the GNU C Library.
The GNU C Library is free software; you can redistribute it and/or
modify it under the terms of the GNU Lesser General Public
License as published by the Free Software Foundation; either
version 2.1 of the License, or (at your option) any later version.
The GNU C Library is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
Lesser General Public License for more details.
You should have received a copy of the GNU Lesser General Public
License along with the GNU C Library; if not, see
Prefer https to http for gnu.org and fsf.org URLs Also, change sources.redhat.com to sourceware.org. This patch was automatically generated by running the following shell script, which uses GNU sed, and which avoids modifying files imported from upstream: sed -ri ' s,(http|ftp)(://(.*\.)?(gnu|fsf|sourceware)\.org($|[^.]|\.[^a-z])),https\2,g s,(http|ftp)(://(.*\.)?)sources\.redhat\.com($|[^.]|\.[^a-z]),https\2sourceware.org\4,g ' \ $(find $(git ls-files) -prune -type f \ ! -name '*.po' \ ! -name 'ChangeLog*' \ ! -path COPYING ! -path COPYING.LIB \ ! -path manual/fdl-1.3.texi ! -path manual/lgpl-2.1.texi \ ! -path manual/texinfo.tex ! -path scripts/config.guess \ ! -path scripts/config.sub ! -path scripts/install-sh \ ! -path scripts/mkinstalldirs ! -path scripts/move-if-change \ ! -path INSTALL ! -path locale/programs/charmap-kw.h \ ! -path po/libc.pot ! -path sysdeps/gnu/errlist.c \ ! '(' -name configure \ -execdir test -f configure.ac -o -f configure.in ';' ')' \ ! '(' -name preconfigure \ -execdir test -f preconfigure.ac ';' ')' \ -print) and then by running 'make dist-prepare' to regenerate files built from the altered files, and then executing the following to cleanup: chmod a+x sysdeps/unix/sysv/linux/riscv/configure # Omit irrelevant whitespace and comment-only changes, # perhaps from a slightly-different Autoconf version. git checkout -f \ sysdeps/csky/configure \ sysdeps/hppa/configure \ sysdeps/riscv/configure \ sysdeps/unix/sysv/linux/csky/configure # Omit changes that caused a pre-commit check to fail like this: # remote: *** error: sysdeps/powerpc/powerpc64/ppc-mcount.S: trailing lines git checkout -f \ sysdeps/powerpc/powerpc64/ppc-mcount.S \ sysdeps/unix/sysv/linux/s390/s390-64/syscall.S # Omit change that caused a pre-commit check to fail like this: # remote: *** error: sysdeps/sparc/sparc64/multiarch/memcpy-ultra3.S: last line does not end in newline git checkout -f sysdeps/sparc/sparc64/multiarch/memcpy-ultra3.S
2019-09-07 05:40:42 +00:00
<https://www.gnu.org/licenses/>. */
#include <stdio.h>
#include <stdlib.h>
#include <dlfcn.h>
#include <stdbool.h>
#include <stdalign.h>
#include <sys/mman.h>
#include <unistd.h>
#include <string.h>
#define DSO "moddummy1.so"
#define FUNC "dummy1"
#define DSO1 "moddummy2.so"
#define FUNC1 "dummy2"
/* Result of the called function. */
int func_result;
/* Call function func_name in DSO dso_name via dlopen. */
void
call_func (const char *dso_name, const char *func_name)
{
int ret;
void *dso;
int (*func) (void);
char *err;
/* Open the DSO. */
dso = dlopen (dso_name, RTLD_NOW|RTLD_GLOBAL);
if (dso == NULL)
{
err = dlerror ();
fprintf (stderr, "%s\n", err);
exit (1);
}
/* Clear any errors. */
dlerror ();
/* Lookup func. */
func = (int (*) (void)) dlsym (dso, func_name);
if (func == NULL)
{
err = dlerror ();
if (err != NULL)
{
fprintf (stderr, "%s\n", err);
exit (1);
}
}
/* Call func. */
func_result = (*func) ();
/* Close the library and look for errors too. */
ret = dlclose (dso);
if (ret != 0)
{
err = dlerror ();
fprintf (stderr, "%s\n", err);
exit (1);
}
}
/* If true, call another function from malloc. */
static bool call_function;
/* Set to true to indicate that the interposed malloc was called. */
static bool interposed_malloc_called;
/* Interposed malloc which optionally calls another function. */
void *
malloc (size_t size)
{
interposed_malloc_called = true;
static void *(*original_malloc) (size_t);
if (original_malloc == NULL)
{
static bool in_initialization;
if (in_initialization)
{
const char *message
= "error: malloc called recursively during initialization\n";
(void) write (STDOUT_FILENO, message, strlen (message));
_exit (2);
}
in_initialization = true;
original_malloc
= (__typeof (original_malloc)) dlsym (RTLD_NEXT, "malloc");
if (original_malloc == NULL)
{
const char *message
= "error: dlsym for malloc failed\n";
(void) write (STDOUT_FILENO, message, strlen (message));
_exit (2);
}
}
if (call_function)
{
call_function = false;
call_func (DSO1, FUNC1);
call_function = true;
}
return original_malloc (size);
}
static int
do_test (void)
{
/* Ensure initialization. */
{
void *volatile ptr = malloc (1);
free (ptr);
}
if (!interposed_malloc_called)
{
printf ("error: interposed malloc not called during initialization\n");
return 1;
}
call_function = true;
/* Bug 17702 fixes two things:
* A recursive dlopen unmapping the ld.so.cache.
* An assertion that _r_debug is RT_CONSISTENT at entry to dlopen.
We can only test the latter. Testing the former requires modifying
ld.so.conf to cache the dummy libraries, then running ldconfig,
then run the test. If you do all of that (and glibc's test
infrastructure doesn't support that yet) then the test will
SEGFAULT without the fix. If you don't do that, then the test
will abort because of the assert described in detail below. */
call_func (DSO, FUNC);
call_function = false;
/* The function dummy2() is called by the malloc hook. Check to
see that it was called. This ensures the second recursive
dlopen happened and we called the function in that library.
Before the fix you either get a SIGSEGV when accessing mmap'd
ld.so.cache data or an assertion failure about _r_debug not
beint RT_CONSISTENT. We don't test for the SIGSEGV since it
would require finding moddummy1 or moddummy2 in the cache and
we don't have any infrastructure to test that, but the _r_debug
assertion triggers. */
printf ("Returned result is %d\n", func_result);
if (func_result <= 0)
{
printf ("FAIL: Function call_func() not called.\n");
exit (1);
}
printf ("PASS: Function call_func() called more than once.\n");
return 0;
}
#define TEST_FUNCTION do_test ()
#include "../test-skeleton.c"