about summary refs log tree commit diff
path: root/elf/tst-tls16.c
blob: 347b2f5184e531e9d5037a9884378bbfb93ef670 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
#include <dlfcn.h>
#include <stdlib.h>
#include <stdio.h>

static int
do_test (void)
{
  void *h = dlopen ("tst-tlsmod16a.so", RTLD_LAZY | RTLD_GLOBAL);
  if (h == NULL)
    {
      puts ("unexpectedly failed to open tst-tlsmod16a.so");
      exit (1);
    }

  void *p = dlsym (h, "tlsvar");

  /* This dlopen should indeed fail, because tlsvar was assigned to
     dynamic TLS, and the new module requests it to be in static TLS.
     However, there's a possibility that dlopen succeeds if the
     variable is, for whatever reason, assigned to static TLS, or if
     the module fails to require static TLS, or even if TLS is not
     supported.  */
  h = dlopen ("tst-tlsmod16b.so", RTLD_NOW | RTLD_GLOBAL);
  if (h == NULL)
    {
      return 0;
    }

  puts ("unexpectedly succeeded to open tst-tlsmod16b.so");


  void *(*fp) (void) = (void *(*) (void)) dlsym (h, "in_dso");
  if (fp == NULL)
    {
      puts ("cannot find in_dso");
      exit (1);
    }

  /* If the dlopen passes, at least make sure the address returned by
     dlsym is the same as that returned by the initial-exec access.
     If the variable was assigned to dynamic TLS during dlsym, this
     portion will fail.  */
  if (fp () != p)
    {
      puts ("returned values do not match");
      exit (1);
    }

  return 0;
}

#define TEST_FUNCTION do_test ()
#include "../test-skeleton.c"