diff options
author | Florian Weimer <fweimer@redhat.com> | 2023-05-30 13:25:50 +0200 |
---|---|---|
committer | Florian Weimer <fweimer@redhat.com> | 2023-05-30 13:25:50 +0200 |
commit | d0f07f7df8d9758c838674b70144ac73bcbd1634 (patch) | |
tree | bf73fe79a9c8491aa6646a5b194c57e20b6a0871 /elf/tst-dlclose-lazy.c | |
parent | 3eed5f3a1ee356969afb403a1cf18d06f8d2d98a (diff) | |
download | glibc-d0f07f7df8d9758c838674b70144ac73bcbd1634.tar.gz glibc-d0f07f7df8d9758c838674b70144ac73bcbd1634.tar.xz glibc-d0f07f7df8d9758c838674b70144ac73bcbd1634.zip |
elf: Make more functions available for binding during dlclose (bug 30425)
Previously, after destructors for a DSO have been invoked, ld.so refused to bind against that DSO in all cases. Relax this restriction somewhat if the referencing object is itself a DSO that is being unloaded. This assumes that the symbol reference is not going to be stored anywhere. The situation in the test case can arise fairly easily with C++ and objects that are built with different optimization levels and therefore define different functions with vague linkage. Reviewed-by: Carlos O'Donell <carlos@redhat.com>
Diffstat (limited to 'elf/tst-dlclose-lazy.c')
-rw-r--r-- | elf/tst-dlclose-lazy.c | 47 |
1 files changed, 47 insertions, 0 deletions
diff --git a/elf/tst-dlclose-lazy.c b/elf/tst-dlclose-lazy.c new file mode 100644 index 0000000000..976a6bb6f6 --- /dev/null +++ b/elf/tst-dlclose-lazy.c @@ -0,0 +1,47 @@ +/* Test lazy binding during dlclose (bug 30425). + Copyright (C) 2023 Free Software Foundation, Inc. + This file is part of the GNU C Library. + + The GNU C Library is free software; you can redistribute it and/or + modify it under the terms of the GNU Lesser General Public + License as published by the Free Software Foundation; either + version 2.1 of the License, or (at your option) any later version. + + The GNU C Library is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU + Lesser General Public License for more details. + + You should have received a copy of the GNU Lesser General Public + License along with the GNU C Library; if not, see + <https://www.gnu.org/licenses/>. */ + +/* This test re-creates a situation that can arise naturally for C++ + applications due to the use of vague linkage and differences in the + set of compiler-emitted functions. A function in + tst-dlclose-lazy-mod1.so (exported_function) interposes a function + in tst-dlclose-lazy-mod2.so. This function is called from the + destructor in tst-dlclose-lazy-mod2.so, after the destructor for + tst-dlclose-lazy-mod1.so has already completed. Prior to the fix + for bug 30425, this would lead to a lazy binding failure in + tst-dlclose-lazy-mod1.so because dlclose had already marked the DSO + as unavailable for binding (by setting l_removed). */ + +#include <dlfcn.h> +#include <support/xdlfcn.h> +#include <support/check.h> + +int +main (void) +{ + /* Load tst-dlclose-lazy-mod1.so, indirectly loading + tst-dlclose-lazy-mod2.so. */ + void *handle = xdlopen ("tst-dlclose-lazy-mod1.so", RTLD_GLOBAL | RTLD_LAZY); + + /* Invoke the destructor of tst-dlclose-lazy-mod2.so, which calls + into tst-dlclose-lazy-mod1.so after its destructor has been + called. */ + xdlclose (handle); + + return 0; +} |