diff options
author | Florian Weimer <fweimer@redhat.com> | 2019-10-17 08:51:21 +0200 |
---|---|---|
committer | Florian Weimer <fweimer@redhat.com> | 2019-10-17 08:51:21 +0200 |
commit | 7d3db434f910c23591f748a6d0ac3548af1048bb (patch) | |
tree | cd81091a7bde637d730cbba69fa68543bc4372c6 /elf/tst-dlopen-tlsmodid.h | |
parent | eb77a1fccc7e60cea32245c11288c7f1d92545fa (diff) | |
download | glibc-7d3db434f910c23591f748a6d0ac3548af1048bb.tar.gz glibc-7d3db434f910c23591f748a6d0ac3548af1048bb.tar.xz glibc-7d3db434f910c23591f748a6d0ac3548af1048bb.zip |
Rename and split elf/tst-dlopen-aout collection of tests
From the beginning, elf/tst-dlopen-aout has exercised two different bugs: (a) failure to report errors for a dlopen of the executable itself in some cases (bug 24900) and (b) incorrect rollback of the TLS modid allocation in case of a dlopen failure (bug 16634). This commit replaces the test with elf/tst-dlopen-self for (a) and elf/tst-dlopen-tlsmodid for (b). The latter tests use the elf/tst-dlopen-self binaries (or iconv) with dlopen, so they are no longer self-dlopen tests. Tested on x86_64-linux-gnu and i686-linux-gnu, with a toolchain that does not default to PIE.
Diffstat (limited to 'elf/tst-dlopen-tlsmodid.h')
-rw-r--r-- | elf/tst-dlopen-tlsmodid.h | 87 |
1 files changed, 87 insertions, 0 deletions
diff --git a/elf/tst-dlopen-tlsmodid.h b/elf/tst-dlopen-tlsmodid.h new file mode 100644 index 0000000000..c747cb1491 --- /dev/null +++ b/elf/tst-dlopen-tlsmodid.h @@ -0,0 +1,87 @@ +/* Common code for tst-dlopen-tlsmodid, tst-dlopen-tlsmodid-pie, + tst-dlopen-tlsmodid-container. + + Verify that incorrectly dlopen()ing an executable without + __RTLD_OPENEXEC does not cause assertion in ld.so, and that it + actually results in an error. + + Copyright (C) 2014-2019 Free Software Foundation, Inc. + This file is part of the GNU C Library. + + The GNU C Library is free software; you can redistribute it and/or + modify it under the terms of the GNU Lesser General Public + License as published by the Free Software Foundation; either + version 2.1 of the License, or (at your option) any later version. + + The GNU C Library is distributed in the hope that it will be useful, + but WITHOUT ANY WARRANTY; without even the implied warranty of + MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU + Lesser General Public License for more details. + + You should have received a copy of the GNU Lesser General Public + License along with the GNU C Library; if not, see + <https://www.gnu.org/licenses/>. */ + +/* Before including this file, the macro TST_DLOPEN_TLSMODID_PATH must + be defined, to specify the path used for the open operation. */ + +#include <dlfcn.h> +#include <pthread.h> +#include <stdio.h> +#include <stdlib.h> +#include <string.h> +#include <support/check.h> +#include <support/support.h> +#include <support/xthread.h> + +__thread int x; + +void * +fn (void *p) +{ + return p; +} + +/* Call dlopen and check that fails with an error message indicating + an attempt to open an ET_EXEC or PIE object. */ +static void +check_dlopen_failure (void) +{ + void *handle = dlopen (TST_DLOPEN_TLSMODID_PATH, RTLD_LAZY); + if (handle != NULL) + FAIL_EXIT1 ("dlopen succeeded unexpectedly: %s", TST_DLOPEN_TLSMODID_PATH); + + const char *message = dlerror (); + TEST_VERIFY_EXIT (message != NULL); + if ((strstr (message, + "cannot dynamically load position-independent executable") + == NULL) + && strstr (message, "cannot dynamically load executable") == NULL) + FAIL_EXIT1 ("invalid dlopen error message: \"%s\"", message); +} + +static int +do_test (int argc, char *argv[]) +{ + int j; + + for (j = 0; j < 100; ++j) + { + pthread_t thr; + + check_dlopen_failure (); + + /* We create threads to force TLS allocation, which triggers + the original bug i.e. running out of surplus slotinfo entries + for TLS. */ + thr = xpthread_create (NULL, fn, NULL); + xpthread_join (thr); + } + + check_dlopen_failure (); + + return 0; +} + +#define TEST_FUNCTION_ARGV do_test +#include <support/test-driver.c> |