blob: ea20869d01a10f026b7f96ab9734926c61d9f19b [file] [log] [blame]
jeffhaoacf5aa72012-09-12 17:25:30 -07001/*
2 * Copyright (C) 2012 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#include <gtest/gtest.h>
18
19#include <dlfcn.h>
Elliott Hughes8e15b082012-09-26 11:44:01 -070020#include <libgen.h>
21#include <limits.h>
22#include <stdio.h>
23#include <stdint.h>
24
Dmitriy Ivanovb2a30ee2014-09-04 18:23:00 -070025#include "private/ScopeGuard.h"
26
Elliott Hughes8e15b082012-09-26 11:44:01 -070027#include <string>
jeffhaoacf5aa72012-09-12 17:25:30 -070028
Elliott Hughes3b297c42012-10-11 16:08:51 -070029#define ASSERT_SUBSTR(needle, haystack) \
30 ASSERT_PRED_FORMAT2(::testing::IsSubstring, needle, haystack)
31
Elliott Hughes1728b232014-05-14 10:02:03 -070032static bool g_called = false;
jeffhaoacf5aa72012-09-12 17:25:30 -070033extern "C" void DlSymTestFunction() {
Elliott Hughes1728b232014-05-14 10:02:03 -070034 g_called = true;
jeffhaoacf5aa72012-09-12 17:25:30 -070035}
36
Dmitriy Ivanovf8846a42014-07-08 21:21:34 -070037static int g_ctor_function_called = 0;
38
39extern "C" void ctor_function() __attribute__ ((constructor));
40
41extern "C" void ctor_function() {
42 g_ctor_function_called = 17;
43}
44
45TEST(dlfcn, ctor_function_call) {
46 ASSERT_EQ(17, g_ctor_function_called);
47}
48
Elliott Hughese66190d2012-12-18 15:57:55 -080049TEST(dlfcn, dlsym_in_self) {
Elliott Hughes3b297c42012-10-11 16:08:51 -070050 dlerror(); // Clear any pending errors.
jeffhaoacf5aa72012-09-12 17:25:30 -070051 void* self = dlopen(NULL, RTLD_NOW);
52 ASSERT_TRUE(self != NULL);
Elliott Hughes3b297c42012-10-11 16:08:51 -070053 ASSERT_TRUE(dlerror() == NULL);
jeffhaoacf5aa72012-09-12 17:25:30 -070054
55 void* sym = dlsym(self, "DlSymTestFunction");
56 ASSERT_TRUE(sym != NULL);
57
58 void (*function)() = reinterpret_cast<void(*)()>(sym);
59
Elliott Hughes1728b232014-05-14 10:02:03 -070060 g_called = false;
jeffhaoacf5aa72012-09-12 17:25:30 -070061 function();
Elliott Hughes1728b232014-05-14 10:02:03 -070062 ASSERT_TRUE(g_called);
Elliott Hughes1a696162012-11-01 13:49:32 -070063
64 ASSERT_EQ(0, dlclose(self));
jeffhaoacf5aa72012-09-12 17:25:30 -070065}
Elliott Hughes8e15b082012-09-26 11:44:01 -070066
Dmitriy Ivanovaa0f2bd2014-07-28 17:32:20 -070067TEST(dlfcn, dlsym_with_dependencies) {
68 void* handle = dlopen("libtest_with_dependency.so", RTLD_NOW);
69 ASSERT_TRUE(handle != NULL);
70 dlerror();
71 // This symbol is in DT_NEEDED library.
72 void* sym = dlsym(handle, "getRandomNumber");
73 ASSERT_TRUE(sym != NULL);
74 int (*fn)(void);
75 fn = reinterpret_cast<int (*)(void)>(sym);
76 EXPECT_EQ(4, fn());
77 dlclose(handle);
78}
79
Dmitriy Ivanovb648a8a2014-05-19 15:06:58 -070080TEST(dlfcn, dlopen_noload) {
81 void* handle = dlopen("libtest_simple.so", RTLD_NOW | RTLD_NOLOAD);
82 ASSERT_TRUE(handle == NULL);
83 handle = dlopen("libtest_simple.so", RTLD_NOW);
84 void* handle2 = dlopen("libtest_simple.so", RTLD_NOW | RTLD_NOLOAD);
85 ASSERT_TRUE(handle != NULL);
86 ASSERT_TRUE(handle2 != NULL);
87 ASSERT_TRUE(handle == handle2);
88 ASSERT_EQ(0, dlclose(handle));
89 ASSERT_EQ(0, dlclose(handle2));
90}
91
Dmitriy Ivanov9aea1642014-09-11 15:16:03 -070092// ifuncs are only supported on intel and arm64 for now
93#if defined (__aarch64__) || defined(__i386__) || defined(__x86_64__)
Brigid Smithc5a13ef2014-07-23 11:22:25 -070094TEST(dlfcn, ifunc) {
Dmitriy Ivanov9598b8c2014-08-21 13:54:03 -070095 typedef const char* (*fn_ptr)();
Brigid Smithc5a13ef2014-07-23 11:22:25 -070096
97 // ifunc's choice depends on whether IFUNC_CHOICE has a value
98 // first check the set case
99 setenv("IFUNC_CHOICE", "set", 1);
100 void* handle = dlopen("libtest_ifunc.so", RTLD_NOW);
101 ASSERT_TRUE(handle != NULL);
Dmitriy Ivanov9598b8c2014-08-21 13:54:03 -0700102 fn_ptr foo_ptr = reinterpret_cast<fn_ptr>(dlsym(handle, "foo"));
103 fn_ptr foo_library_ptr = reinterpret_cast<fn_ptr>(dlsym(handle, "foo_library"));
Brigid Smithc5a13ef2014-07-23 11:22:25 -0700104 ASSERT_TRUE(foo_ptr != NULL);
105 ASSERT_TRUE(foo_library_ptr != NULL);
Dmitriy Ivanov9598b8c2014-08-21 13:54:03 -0700106 ASSERT_EQ(strncmp("set", foo_ptr(), 3), 0);
107 ASSERT_EQ(strncmp("set", foo_library_ptr(), 3), 0);
Brigid Smithc5a13ef2014-07-23 11:22:25 -0700108 dlclose(handle);
109
110 // then check the unset case
111 unsetenv("IFUNC_CHOICE");
112 handle = dlopen("libtest_ifunc.so", RTLD_NOW);
113 ASSERT_TRUE(handle != NULL);
Dmitriy Ivanov9598b8c2014-08-21 13:54:03 -0700114 foo_ptr = reinterpret_cast<fn_ptr>(dlsym(handle, "foo"));
115 foo_library_ptr = reinterpret_cast<fn_ptr>(dlsym(handle, "foo_library"));
Brigid Smithc5a13ef2014-07-23 11:22:25 -0700116 ASSERT_TRUE(foo_ptr != NULL);
117 ASSERT_TRUE(foo_library_ptr != NULL);
Dmitriy Ivanov9598b8c2014-08-21 13:54:03 -0700118 ASSERT_EQ(strncmp("unset", foo_ptr(), 5), 0);
119 ASSERT_EQ(strncmp("unset", foo_library_ptr(), 3), 0);
120 dlclose(handle);
121}
122
123TEST(dlfcn, ifunc_ctor_call) {
124 typedef const char* (*fn_ptr)();
125
126 void* handle = dlopen("libtest_ifunc.so", RTLD_NOW);
Dmitriy Ivanov9aea1642014-09-11 15:16:03 -0700127 ASSERT_TRUE(handle != nullptr) << dlerror();
128 fn_ptr is_ctor_called = reinterpret_cast<fn_ptr>(dlsym(handle, "is_ctor_called_irelative"));
129 ASSERT_TRUE(is_ctor_called != nullptr) << dlerror();
130 ASSERT_STREQ("false", is_ctor_called());
131
132 is_ctor_called = reinterpret_cast<fn_ptr>(dlsym(handle, "is_ctor_called_jump_slot"));
133 ASSERT_TRUE(is_ctor_called != nullptr) << dlerror();
Dmitriy Ivanov9598b8c2014-08-21 13:54:03 -0700134 ASSERT_STREQ("true", is_ctor_called());
Brigid Smithc5a13ef2014-07-23 11:22:25 -0700135 dlclose(handle);
136}
137#endif
138
Dmitriy Ivanovb2a30ee2014-09-04 18:23:00 -0700139TEST(dlfcn, dlopen_check_relocation_dt_needed_order) {
140 // This is the structure of the test library and
141 // its dt_needed libraries
142 // libtest_relo_check_dt_needed_order.so
143 // |
144 // +-> libtest_relo_check_dt_needed_order_1.so
145 // |
146 // +-> libtest_relo_check_dt_needed_order_2.so
147 //
148 // The root library references relo_test_get_answer_lib - which is defined
149 // in both dt_needed libraries, the correct relocation should
150 // use the function defined in libtest_relo_check_dt_needed_order_1.so
151 void* handle = nullptr;
Dmitriy Ivanovd9ff7222014-09-08 16:22:22 -0700152 auto guard = make_scope_guard([&]() {
Dmitriy Ivanovb2a30ee2014-09-04 18:23:00 -0700153 dlclose(handle);
154 });
155
156 handle = dlopen("libtest_relo_check_dt_needed_order.so", RTLD_NOW);
157 ASSERT_TRUE(handle != nullptr) << dlerror();
158
159 typedef int (*fn_t) (void);
160 fn_t fn = reinterpret_cast<fn_t>(dlsym(handle, "relo_test_get_answer"));
161 ASSERT_TRUE(fn != nullptr) << dlerror();
162 ASSERT_EQ(1, fn());
163}
164
Dmitriy Ivanovcfa97f12014-10-21 09:23:18 -0700165TEST(dlfcn, dlopen_check_order_dlsym) {
Dmitriy Ivanov14669a92014-09-05 16:42:53 -0700166 // Here is how the test library and its dt_needed
167 // libraries are arranged
168 //
Dmitriy Ivanovcfa97f12014-10-21 09:23:18 -0700169 // libtest_check_order_children.so
Dmitriy Ivanov14669a92014-09-05 16:42:53 -0700170 // |
Dmitriy Ivanovcfa97f12014-10-21 09:23:18 -0700171 // +-> ..._1_left.so
Dmitriy Ivanov14669a92014-09-05 16:42:53 -0700172 // | |
Dmitriy Ivanovcfa97f12014-10-21 09:23:18 -0700173 // | +-> ..._a.so
Dmitriy Ivanov14669a92014-09-05 16:42:53 -0700174 // | |
Dmitriy Ivanovcfa97f12014-10-21 09:23:18 -0700175 // | +-> ...r_b.so
Dmitriy Ivanov14669a92014-09-05 16:42:53 -0700176 // |
Dmitriy Ivanovcfa97f12014-10-21 09:23:18 -0700177 // +-> ..._2_right.so
Dmitriy Ivanov14669a92014-09-05 16:42:53 -0700178 // | |
Dmitriy Ivanovcfa97f12014-10-21 09:23:18 -0700179 // | +-> ..._d.so
Dmitriy Ivanov14669a92014-09-05 16:42:53 -0700180 // | |
Dmitriy Ivanovcfa97f12014-10-21 09:23:18 -0700181 // | +-> ..._b.so
Dmitriy Ivanov14669a92014-09-05 16:42:53 -0700182 // |
Dmitriy Ivanovcfa97f12014-10-21 09:23:18 -0700183 // +-> ..._3_c.so
Dmitriy Ivanov14669a92014-09-05 16:42:53 -0700184 //
185 // load order should be (1, 2, 3, a, b, d)
186 //
187 // get_answer() is defined in (2, 3, a, b, c)
188 // get_answer2() is defined in (b, d)
Dmitriy Ivanovcfa97f12014-10-21 09:23:18 -0700189 void* sym = dlsym(RTLD_DEFAULT, "check_order_dlsym_get_answer");
Dmitriy Ivanov14669a92014-09-05 16:42:53 -0700190 ASSERT_TRUE(sym == nullptr);
Dmitriy Ivanovcfa97f12014-10-21 09:23:18 -0700191 void* handle = dlopen("libtest_check_order_dlsym.so", RTLD_NOW | RTLD_GLOBAL);
192 ASSERT_TRUE(handle != nullptr) << dlerror();
Dmitriy Ivanov14669a92014-09-05 16:42:53 -0700193 typedef int (*fn_t) (void);
194 fn_t fn, fn2;
Dmitriy Ivanovcfa97f12014-10-21 09:23:18 -0700195 fn = reinterpret_cast<fn_t>(dlsym(RTLD_DEFAULT, "check_order_dlsym_get_answer"));
Dmitriy Ivanoveb27bba2014-09-15 14:13:24 -0700196 ASSERT_TRUE(fn != NULL) << dlerror();
Dmitriy Ivanovcfa97f12014-10-21 09:23:18 -0700197 fn2 = reinterpret_cast<fn_t>(dlsym(RTLD_DEFAULT, "check_order_dlsym_get_answer2"));
Dmitriy Ivanoveb27bba2014-09-15 14:13:24 -0700198 ASSERT_TRUE(fn2 != NULL) << dlerror();
Dmitriy Ivanov14669a92014-09-05 16:42:53 -0700199
200 ASSERT_EQ(42, fn());
201 ASSERT_EQ(43, fn2());
202 dlclose(handle);
203}
204
Dmitriy Ivanovcfa97f12014-10-21 09:23:18 -0700205TEST(dlfcn, dlopen_check_order_reloc_siblings) {
206 // This is how this one works:
207 // we lookup and call get_answer which is defined in '_2.so'
208 // and in turn calls external get_answer_impl() defined in _1.so and in '_[a-f].so'
209 // the correct _impl() is implemented by '_a.so';
210 //
211 // Note that this is test for RTLD_LOCAL (TODO: test for GLOBAL?)
212 //
213 // Here is the picture:
214 //
215 // libtest_check_order_reloc_siblings.so
216 // |
217 // +-> ..._1.so <- empty
218 // | |
219 // | +-> ..._a.so <- exports correct answer_impl()
220 // | |
221 // | +-> ..._b.so <- every other letter exporting incorrect one.
222 // |
223 // +-> ..._2.so <- empty
224 // | |
225 // | +-> ..._c.so
226 // | |
227 // | +-> ..._d.so
228 // |
229 // +-> ..._3.so <- empty
230 // |
231 // +-> ..._e.so
232 // |
233 // +-> ..._f.so <- exports get_answer() that calls get_anser_impl();
234 // implements incorrect get_answer_impl()
235
236 void* handle = dlopen("libtest_check_order_reloc_siblings.so", RTLD_NOW | RTLD_NOLOAD);
237 ASSERT_TRUE(handle == nullptr);
238#ifdef __BIONIC__
239 // TODO: glibc returns nullptr on dlerror() here. Is it bug?
240 ASSERT_STREQ("dlopen failed: library \"libtest_check_order_reloc_siblings.so\" wasn't loaded and RTLD_NOLOAD prevented it", dlerror());
241#endif
242
243 handle = dlopen("libtest_check_order_reloc_siblings.so", RTLD_NOW | RTLD_LOCAL);
244 ASSERT_TRUE(handle != nullptr) << dlerror();
245
246 typedef int (*fn_t) (void);
247 fn_t fn = reinterpret_cast<fn_t>(dlsym(handle, "check_order_reloc_get_answer"));
248 ASSERT_TRUE(fn != nullptr) << dlerror();
249 ASSERT_EQ(42, fn());
250
251 ASSERT_EQ(0, dlclose(handle));
252}
253
254TEST(dlfcn, dlopen_check_order_reloc_siblings_with_preload) {
255 // This test uses the same library as dlopen_check_order_reloc_siblings.
256 // Unlike dlopen_check_order_reloc_siblings it preloads
257 // libtest_check_order_reloc_siblings_1.so (first dependency) prior to
258 // dlopen(libtest_check_order_reloc_siblings.so)
259
260 void* handle = dlopen("libtest_check_order_reloc_siblings.so", RTLD_NOW | RTLD_NOLOAD);
261 ASSERT_TRUE(handle == nullptr);
262 handle = dlopen("libtest_check_order_reloc_siblings_1.so", RTLD_NOW | RTLD_NOLOAD);
263 ASSERT_TRUE(handle == nullptr);
264
265 void* handle_for_1 = dlopen("libtest_check_order_reloc_siblings_1.so", RTLD_NOW | RTLD_LOCAL);
266 ASSERT_TRUE(handle_for_1 != nullptr) << dlerror();
267
268 handle = dlopen("libtest_check_order_reloc_siblings.so", RTLD_NOW | RTLD_LOCAL);
269 ASSERT_TRUE(handle != nullptr) << dlerror();
270
271 ASSERT_EQ(0, dlclose(handle_for_1));
272
273 typedef int (*fn_t) (void);
274 fn_t fn = reinterpret_cast<fn_t>(dlsym(handle, "check_order_reloc_get_answer"));
275 ASSERT_TRUE(fn != nullptr) << dlerror();
276 ASSERT_EQ(42, fn());
277
278 ASSERT_EQ(0, dlclose(handle));
279}
280
Dmitriy Ivanov7699d132014-11-18 17:26:31 -0800281TEST(dlfcn, dlopen_check_order_reloc_grandchild) {
282 // This is how this one works:
283 // we lookup and call grandchild_get_answer which is defined in '_2.so'
284 // and in turn calls external get_answer_impl() defined in '_c_1.so and _c_2.so'
285 // the correct _impl() is implemented by '_c_1.so';
286 //
287 // Here is the picture of subtree:
288 //
289 // libtest_check_order_reloc_siblings.so
290 // |
291 // +-> ..._2.so <- grandchild_get_answer()
292 // |
293 // +-> ..._c.so <- empty
294 // | |
295 // | +-> _c_1.so <- exports correct answer_impl()
296 // | |
297 // | +-> _c_2.so <- exports incorrect answer_impl()
298 // |
299 // +-> ..._d.so <- empty
300
301 void* handle = dlopen("libtest_check_order_reloc_siblings.so", RTLD_NOW | RTLD_NOLOAD);
302 ASSERT_TRUE(handle == nullptr);
303#ifdef __BIONIC__
304 // TODO: glibc returns nullptr on dlerror() here. Is it bug?
305 ASSERT_STREQ("dlopen failed: library \"libtest_check_order_reloc_siblings.so\" wasn't loaded and RTLD_NOLOAD prevented it", dlerror());
306#endif
307
308 handle = dlopen("libtest_check_order_reloc_siblings.so", RTLD_NOW | RTLD_LOCAL);
309 ASSERT_TRUE(handle != nullptr) << dlerror();
310
311 typedef int (*fn_t) (void);
312 fn_t fn = reinterpret_cast<fn_t>(dlsym(handle, "check_order_reloc_grandchild_get_answer"));
313 ASSERT_TRUE(fn != nullptr) << dlerror();
314 ASSERT_EQ(42, fn());
315
316 ASSERT_EQ(0, dlclose(handle));
317}
318
Dmitriy Ivanovcfa97f12014-10-21 09:23:18 -0700319TEST(dlfcn, dlopen_check_order_reloc_nephew) {
320 // This is how this one works:
321 // we lookup and call nephew_get_answer which is defined in '_2.so'
322 // and in turn calls external get_answer_impl() defined in '_[a-f].so'
323 // the correct _impl() is implemented by '_a.so';
324 //
325 // Here is the picture:
326 //
327 // libtest_check_order_reloc_siblings.so
328 // |
329 // +-> ..._1.so <- empty
330 // | |
331 // | +-> ..._a.so <- exports correct answer_impl()
332 // | |
333 // | +-> ..._b.so <- every other letter exporting incorrect one.
334 // |
335 // +-> ..._2.so <- empty
336 // | |
337 // | +-> ..._c.so
338 // | |
339 // | +-> ..._d.so
340 // |
341 // +-> ..._3.so <- nephew_get_answer() that calls get_answer_impl();
342 // |
343 // +-> ..._e.so
344 // |
345 // +-> ..._f.so
346
347 void* handle = dlopen("libtest_check_order_reloc_siblings.so", RTLD_NOW | RTLD_NOLOAD);
348 ASSERT_TRUE(handle == nullptr);
349#ifdef __BIONIC__
350 // TODO: glibc returns nullptr on dlerror() here. Is it bug?
351 ASSERT_STREQ("dlopen failed: library \"libtest_check_order_reloc_siblings.so\" wasn't loaded and RTLD_NOLOAD prevented it", dlerror());
352#endif
353
354 handle = dlopen("libtest_check_order_reloc_siblings.so", RTLD_NOW | RTLD_LOCAL);
355 ASSERT_TRUE(handle != nullptr) << dlerror();
356
357 typedef int (*fn_t) (void);
358 fn_t fn = reinterpret_cast<fn_t>(dlsym(handle, "check_order_reloc_nephew_get_answer"));
359 ASSERT_TRUE(fn != nullptr) << dlerror();
360 ASSERT_EQ(42, fn());
361
362 ASSERT_EQ(0, dlclose(handle));
363}
364
365extern "C" int check_order_reloc_root_get_answer_impl() {
366 return 42;
367}
368
369TEST(dlfcn, dlopen_check_order_reloc_main_executable) {
370 // This is how this one works:
371 // we lookup and call get_answer3 which is defined in 'root.so'
372 // and in turn calls external root_get_answer_impl() defined in _2.so and
373 // above the correct _impl() is one in the executable.
374 //
375 // libtest_check_order_reloc_root.so
376 // |
377 // +-> ..._1.so <- empty
378 // |
379 // +-> ..._2.so <- gives incorrect answer for answer_main_impl()
380 //
381
382 void* handle = dlopen("libtest_check_order_reloc_root.so", RTLD_NOW | RTLD_NOLOAD);
383 ASSERT_TRUE(handle == nullptr);
384#ifdef __BIONIC__
385 // TODO: glibc returns nullptr on dlerror() here. Is it bug?
386 ASSERT_STREQ("dlopen failed: library \"libtest_check_order_reloc_root.so\" wasn't loaded and RTLD_NOLOAD prevented it", dlerror());
387#endif
388
389 handle = dlopen("libtest_check_order_reloc_root.so", RTLD_NOW | RTLD_LOCAL);
390 ASSERT_TRUE(handle != nullptr) << dlerror();
391
392 typedef int (*fn_t) (void);
393 fn_t fn = reinterpret_cast<fn_t>(dlsym(handle, "check_order_reloc_root_get_answer"));
394 ASSERT_TRUE(fn != nullptr) << dlerror();
395 ASSERT_EQ(42, fn());
396
397 ASSERT_EQ(0, dlclose(handle));
398}
399
Dmitriy Ivanove8ba50f2014-09-15 17:00:10 -0700400TEST(dlfcn, dlopen_check_rtld_local) {
401 void* sym = dlsym(RTLD_DEFAULT, "dlopen_testlib_simple_func");
402 ASSERT_TRUE(sym == nullptr);
403
404 // implicit RTLD_LOCAL
405 void* handle = dlopen("libtest_simple.so", RTLD_NOW);
406 sym = dlsym(RTLD_DEFAULT, "dlopen_testlib_simple_func");
407 ASSERT_TRUE(sym == nullptr);
408 ASSERT_SUBSTR("undefined symbol: dlopen_testlib_simple_func", dlerror());
409 sym = dlsym(handle, "dlopen_testlib_simple_func");
410 ASSERT_TRUE(sym != nullptr);
411 ASSERT_TRUE(reinterpret_cast<bool (*)(void)>(sym)());
412 dlclose(handle);
413
414 // explicit RTLD_LOCAL
415 handle = dlopen("libtest_simple.so", RTLD_NOW | RTLD_LOCAL);
416 sym = dlsym(RTLD_DEFAULT, "dlopen_testlib_simple_func");
417 ASSERT_TRUE(sym == nullptr);
418 ASSERT_SUBSTR("undefined symbol: dlopen_testlib_simple_func", dlerror());
419 sym = dlsym(handle, "dlopen_testlib_simple_func");
420 ASSERT_TRUE(sym != nullptr);
421 ASSERT_TRUE(reinterpret_cast<bool (*)(void)>(sym)());
422 dlclose(handle);
423}
424
425TEST(dlfcn, dlopen_check_rtld_global) {
426 void* sym = dlsym(RTLD_DEFAULT, "dlopen_testlib_simple_func");
427 ASSERT_TRUE(sym == nullptr);
428
429 void* handle = dlopen("libtest_simple.so", RTLD_NOW | RTLD_GLOBAL);
Dmitriy Ivanov1b20daf2014-05-19 15:06:58 -0700430 ASSERT_TRUE(handle != nullptr) << dlerror();
Dmitriy Ivanove8ba50f2014-09-15 17:00:10 -0700431 sym = dlsym(RTLD_DEFAULT, "dlopen_testlib_simple_func");
432 ASSERT_TRUE(sym != nullptr) << dlerror();
433 ASSERT_TRUE(reinterpret_cast<bool (*)(void)>(sym)());
434 dlclose(handle);
Dmitriy Ivanov1b20daf2014-05-19 15:06:58 -0700435
436 // RTLD_GLOBAL implies RTLD_NODELETE, let's check that
437 void* sym_after_dlclose = dlsym(RTLD_DEFAULT, "dlopen_testlib_simple_func");
438 ASSERT_EQ(sym, sym_after_dlclose);
Dmitriy Ivanove8ba50f2014-09-15 17:00:10 -0700439}
440
Dmitriy Ivanov14669a92014-09-05 16:42:53 -0700441// libtest_with_dependency_loop.so -> libtest_with_dependency_loop_a.so ->
442// libtest_with_dependency_loop_b.so -> libtest_with_dependency_loop_c.so ->
443// libtest_with_dependency_loop_a.so
444TEST(dlfcn, dlopen_check_loop) {
445 void* handle = dlopen("libtest_with_dependency_loop.so", RTLD_NOW);
Dmitriy Ivanoveb27bba2014-09-15 14:13:24 -0700446#if defined(__BIONIC__)
Dmitriy Ivanova6ac54a2014-09-09 10:21:42 -0700447 ASSERT_TRUE(handle == nullptr);
Dmitriy Ivanov14669a92014-09-05 16:42:53 -0700448 ASSERT_STREQ("dlopen failed: recursive link to \"libtest_with_dependency_loop_a.so\"", dlerror());
Dmitriy Ivanova6ac54a2014-09-09 10:21:42 -0700449 // This symbol should never be exposed
450 void* f = dlsym(RTLD_DEFAULT, "dlopen_test_invalid_function");
451 ASSERT_TRUE(f == nullptr);
452 ASSERT_SUBSTR("undefined symbol: dlopen_test_invalid_function", dlerror());
453
454 // dlopen second time to make sure that the library wasn't loaded even though dlopen returned null.
455 // This may happen if during cleanup the root library or one of the depended libs were not removed
456 // from soinfo list.
457 handle = dlopen("libtest_with_dependency_loop.so", RTLD_NOW | RTLD_NOLOAD);
458 ASSERT_TRUE(handle == nullptr);
459 ASSERT_STREQ("dlopen failed: library \"libtest_with_dependency_loop.so\" wasn't loaded and RTLD_NOLOAD prevented it", dlerror());
Dmitriy Ivanoveb27bba2014-09-15 14:13:24 -0700460#else // glibc allows recursive links
461 ASSERT_TRUE(handle != nullptr);
462 dlclose(handle);
463#endif
Dmitriy Ivanov14669a92014-09-05 16:42:53 -0700464}
465
Dmitriy Ivanov1b20daf2014-05-19 15:06:58 -0700466TEST(dlfcn, dlopen_nodelete) {
467 static bool is_unloaded = false;
468
469 void* handle = dlopen("libtest_nodelete_1.so", RTLD_NOW | RTLD_NODELETE);
470 ASSERT_TRUE(handle != nullptr) << dlerror();
471 void (*set_unload_flag_ptr)(bool*);
472 set_unload_flag_ptr = reinterpret_cast<void (*)(bool*)>(dlsym(handle, "dlopen_nodelete_1_set_unload_flag_ptr"));
473 ASSERT_TRUE(set_unload_flag_ptr != nullptr) << dlerror();
474 set_unload_flag_ptr(&is_unloaded);
475
476 uint32_t* taxicab_number = reinterpret_cast<uint32_t*>(dlsym(handle, "dlopen_nodelete_1_taxicab_number"));
477 ASSERT_TRUE(taxicab_number != nullptr) << dlerror();
478 ASSERT_EQ(1729U, *taxicab_number);
479 *taxicab_number = 2;
480
481 dlclose(handle);
482 ASSERT_TRUE(!is_unloaded);
483
484 uint32_t* taxicab_number_after_dlclose = reinterpret_cast<uint32_t*>(dlsym(handle, "dlopen_nodelete_1_taxicab_number"));
485 ASSERT_EQ(taxicab_number_after_dlclose, taxicab_number);
486 ASSERT_EQ(2U, *taxicab_number_after_dlclose);
487
488
489 handle = dlopen("libtest_nodelete_1.so", RTLD_NOW);
490 uint32_t* taxicab_number2 = reinterpret_cast<uint32_t*>(dlsym(handle, "dlopen_nodelete_1_taxicab_number"));
491 ASSERT_EQ(taxicab_number2, taxicab_number);
492
493 ASSERT_EQ(2U, *taxicab_number2);
494
495 dlclose(handle);
496 ASSERT_TRUE(!is_unloaded);
497}
498
499TEST(dlfcn, dlopen_nodelete_on_second_dlopen) {
500 static bool is_unloaded = false;
501
502 void* handle = dlopen("libtest_nodelete_2.so", RTLD_NOW);
503 ASSERT_TRUE(handle != nullptr) << dlerror();
504 void (*set_unload_flag_ptr)(bool*);
505 set_unload_flag_ptr = reinterpret_cast<void (*)(bool*)>(dlsym(handle, "dlopen_nodelete_2_set_unload_flag_ptr"));
506 ASSERT_TRUE(set_unload_flag_ptr != nullptr) << dlerror();
507 set_unload_flag_ptr(&is_unloaded);
508
509 uint32_t* taxicab_number = reinterpret_cast<uint32_t*>(dlsym(handle, "dlopen_nodelete_2_taxicab_number"));
510 ASSERT_TRUE(taxicab_number != nullptr) << dlerror();
511
512 ASSERT_EQ(1729U, *taxicab_number);
513 *taxicab_number = 2;
514
515 // This RTLD_NODELETE should be ignored
516 void* handle1 = dlopen("libtest_nodelete_2.so", RTLD_NOW | RTLD_NODELETE);
517 ASSERT_TRUE(handle1 != nullptr) << dlerror();
518 ASSERT_EQ(handle, handle1);
519
520 dlclose(handle1);
521 dlclose(handle);
522
523 ASSERT_TRUE(is_unloaded);
524}
525
526TEST(dlfcn, dlopen_nodelete_dt_flags_1) {
527 static bool is_unloaded = false;
528
529 void* handle = dlopen("libtest_nodelete_dt_flags_1.so", RTLD_NOW);
530 ASSERT_TRUE(handle != nullptr) << dlerror();
531 void (*set_unload_flag_ptr)(bool*);
532 set_unload_flag_ptr = reinterpret_cast<void (*)(bool*)>(dlsym(handle, "dlopen_nodelete_dt_flags_1_set_unload_flag_ptr"));
533 ASSERT_TRUE(set_unload_flag_ptr != nullptr) << dlerror();
534 set_unload_flag_ptr(&is_unloaded);
535
536 dlclose(handle);
537 ASSERT_TRUE(!is_unloaded);
538}
539
Dmitriy Ivanovd225a5e2014-08-28 14:12:12 -0700540TEST(dlfcn, dlsym_df_1_global) {
Dmitriy Ivanov4e446b12014-10-31 17:27:02 -0700541#if !defined(__arm__) && !defined(__aarch64__)
Dmitriy Ivanovd225a5e2014-08-28 14:12:12 -0700542 void* handle = dlopen("libtest_dlsym_df_1_global.so", RTLD_NOW);
543 ASSERT_TRUE(handle != nullptr) << dlerror();
544 int (*get_answer)();
545 get_answer = reinterpret_cast<int (*)()>(dlsym(handle, "dl_df_1_global_get_answer"));
546 ASSERT_TRUE(get_answer != nullptr) << dlerror();
547 ASSERT_EQ(42, get_answer());
548 ASSERT_EQ(0, dlclose(handle));
549#else
Dmitriy Ivanov4e446b12014-10-31 17:27:02 -0700550 GTEST_LOG_(INFO) << "This test does nothing on arm/arm64 (to be reenabled once b/18137520 or b/18130452 are fixed).\n";
Dmitriy Ivanovd225a5e2014-08-28 14:12:12 -0700551#endif
552}
553
Elliott Hughese66190d2012-12-18 15:57:55 -0800554TEST(dlfcn, dlopen_failure) {
Elliott Hughes3b297c42012-10-11 16:08:51 -0700555 void* self = dlopen("/does/not/exist", RTLD_NOW);
556 ASSERT_TRUE(self == NULL);
Elliott Hughes063525c2014-05-13 11:19:57 -0700557#if defined(__BIONIC__)
Elliott Hughes3b297c42012-10-11 16:08:51 -0700558 ASSERT_STREQ("dlopen failed: library \"/does/not/exist\" not found", dlerror());
559#else
560 ASSERT_STREQ("/does/not/exist: cannot open shared object file: No such file or directory", dlerror());
561#endif
562}
563
Elliott Hughesad88a082012-10-24 18:37:21 -0700564static void* ConcurrentDlErrorFn(void*) {
Elliott Hughes5419b942012-10-16 15:54:46 -0700565 dlopen("/child/thread", RTLD_NOW);
566 return reinterpret_cast<void*>(strdup(dlerror()));
567}
568
Elliott Hughese66190d2012-12-18 15:57:55 -0800569TEST(dlfcn, dlerror_concurrent) {
Elliott Hughes5419b942012-10-16 15:54:46 -0700570 dlopen("/main/thread", RTLD_NOW);
571 const char* main_thread_error = dlerror();
572 ASSERT_SUBSTR("/main/thread", main_thread_error);
573
574 pthread_t t;
575 ASSERT_EQ(0, pthread_create(&t, NULL, ConcurrentDlErrorFn, NULL));
576 void* result;
577 ASSERT_EQ(0, pthread_join(t, &result));
578 char* child_thread_error = static_cast<char*>(result);
579 ASSERT_SUBSTR("/child/thread", child_thread_error);
580 free(child_thread_error);
581
582 ASSERT_SUBSTR("/main/thread", main_thread_error);
583}
584
Elliott Hughese66190d2012-12-18 15:57:55 -0800585TEST(dlfcn, dlsym_failures) {
Elliott Hughes3b297c42012-10-11 16:08:51 -0700586 dlerror(); // Clear any pending errors.
Elliott Hughes8e15b082012-09-26 11:44:01 -0700587 void* self = dlopen(NULL, RTLD_NOW);
588 ASSERT_TRUE(self != NULL);
Elliott Hughes3b297c42012-10-11 16:08:51 -0700589 ASSERT_TRUE(dlerror() == NULL);
590
591 void* sym;
592
Dmitriy Ivanov44adf932014-05-22 09:49:24 -0700593#if defined(__BIONIC__) && !defined(__LP64__)
594 // RTLD_DEFAULT in lp32 bionic is not (void*)0
595 // so it can be distinguished from the NULL handle.
Elliott Hughes3b297c42012-10-11 16:08:51 -0700596 sym = dlsym(NULL, "test");
597 ASSERT_TRUE(sym == NULL);
Elliott Hughes3b297c42012-10-11 16:08:51 -0700598 ASSERT_SUBSTR("dlsym library handle is null", dlerror());
Elliott Hughes3b297c42012-10-11 16:08:51 -0700599#endif
600
601 // NULL symbol name.
Elliott Hughes063525c2014-05-13 11:19:57 -0700602#if defined(__BIONIC__)
Elliott Hughes3b297c42012-10-11 16:08:51 -0700603 // glibc marks this parameter non-null and SEGVs if you cheat.
604 sym = dlsym(self, NULL);
605 ASSERT_TRUE(sym == NULL);
606 ASSERT_SUBSTR("", dlerror());
607#endif
608
609 // Symbol that doesn't exist.
610 sym = dlsym(self, "ThisSymbolDoesNotExist");
611 ASSERT_TRUE(sym == NULL);
612 ASSERT_SUBSTR("undefined symbol: ThisSymbolDoesNotExist", dlerror());
Elliott Hughes1a696162012-11-01 13:49:32 -0700613
614 ASSERT_EQ(0, dlclose(self));
Elliott Hughes3b297c42012-10-11 16:08:51 -0700615}
616
Elliott Hughese66190d2012-12-18 15:57:55 -0800617TEST(dlfcn, dladdr) {
Elliott Hughes3b297c42012-10-11 16:08:51 -0700618 dlerror(); // Clear any pending errors.
619 void* self = dlopen(NULL, RTLD_NOW);
620 ASSERT_TRUE(self != NULL);
621 ASSERT_TRUE(dlerror() == NULL);
Elliott Hughes8e15b082012-09-26 11:44:01 -0700622
623 void* sym = dlsym(self, "DlSymTestFunction");
624 ASSERT_TRUE(sym != NULL);
625
626 // Deliberately ask dladdr for an address inside a symbol, rather than the symbol base address.
627 void* addr = reinterpret_cast<void*>(reinterpret_cast<uintptr_t>(sym) + 2);
628
629 Dl_info info;
630 int rc = dladdr(addr, &info);
631 ASSERT_NE(rc, 0); // Zero on error, non-zero on success.
632
633 // Get the name of this executable.
634 char executable_path[PATH_MAX];
635 rc = readlink("/proc/self/exe", executable_path, sizeof(executable_path));
636 ASSERT_NE(rc, -1);
637 executable_path[rc] = '\0';
638 std::string executable_name(basename(executable_path));
639
640 // The filename should be that of this executable.
641 // Note that we don't know whether or not we have the full path, so we want an "ends_with" test.
642 std::string dli_fname(info.dli_fname);
643 dli_fname = basename(&dli_fname[0]);
644 ASSERT_EQ(dli_fname, executable_name);
645
646 // The symbol name should be the symbol we looked up.
647 ASSERT_STREQ(info.dli_sname, "DlSymTestFunction");
648
649 // The address should be the exact address of the symbol.
650 ASSERT_EQ(info.dli_saddr, sym);
651
652 // Look in /proc/pid/maps to find out what address we were loaded at.
653 // TODO: factor /proc/pid/maps parsing out into a class and reuse all over bionic.
654 void* base_address = NULL;
Elliott Hughes8e15b082012-09-26 11:44:01 -0700655 char line[BUFSIZ];
Elliott Hughes57b7a612014-08-25 17:26:50 -0700656 FILE* fp = fopen("/proc/self/maps", "r");
Elliott Hughes8e15b082012-09-26 11:44:01 -0700657 ASSERT_TRUE(fp != NULL);
658 while (fgets(line, sizeof(line), fp) != NULL) {
659 uintptr_t start = strtoul(line, 0, 16);
660 line[strlen(line) - 1] = '\0'; // Chomp the '\n'.
661 char* path = strchr(line, '/');
Elliott Hughes156da962012-10-09 17:14:56 -0700662 if (path != NULL && strcmp(executable_path, path) == 0) {
Elliott Hughes8e15b082012-09-26 11:44:01 -0700663 base_address = reinterpret_cast<void*>(start);
664 break;
665 }
666 }
667 fclose(fp);
668
669 // The base address should be the address we were loaded at.
670 ASSERT_EQ(info.dli_fbase, base_address);
Elliott Hughes1a696162012-11-01 13:49:32 -0700671
672 ASSERT_EQ(0, dlclose(self));
Elliott Hughes8e15b082012-09-26 11:44:01 -0700673}
674
Elliott Hughese66190d2012-12-18 15:57:55 -0800675TEST(dlfcn, dladdr_invalid) {
Elliott Hughes8e15b082012-09-26 11:44:01 -0700676 Dl_info info;
677
Elliott Hughes3b297c42012-10-11 16:08:51 -0700678 dlerror(); // Clear any pending errors.
679
Elliott Hughes8e15b082012-09-26 11:44:01 -0700680 // No symbol corresponding to NULL.
681 ASSERT_EQ(dladdr(NULL, &info), 0); // Zero on error, non-zero on success.
Elliott Hughes3b297c42012-10-11 16:08:51 -0700682 ASSERT_TRUE(dlerror() == NULL); // dladdr(3) doesn't set dlerror(3).
Elliott Hughes8e15b082012-09-26 11:44:01 -0700683
684 // No symbol corresponding to a stack address.
685 ASSERT_EQ(dladdr(&info, &info), 0); // Zero on error, non-zero on success.
Elliott Hughes3b297c42012-10-11 16:08:51 -0700686 ASSERT_TRUE(dlerror() == NULL); // dladdr(3) doesn't set dlerror(3).
Elliott Hughes8e15b082012-09-26 11:44:01 -0700687}
Elliott Hughes124fae92012-10-31 14:20:03 -0700688
Elliott Hughesa43e9062013-01-07 14:18:22 -0800689// GNU-style ELF hash tables are incompatible with the MIPS ABI.
690// MIPS requires .dynsym to be sorted to match the GOT but GNU-style requires sorting by hash code.
Elliott Hughese66190d2012-12-18 15:57:55 -0800691TEST(dlfcn, dlopen_library_with_only_gnu_hash) {
Dmitriy Ivanovec18ce02014-11-09 19:27:20 -0800692#if !defined(__mips__)
Elliott Hughes124fae92012-10-31 14:20:03 -0700693 dlerror(); // Clear any pending errors.
Dmitriy Ivanovec18ce02014-11-09 19:27:20 -0800694 void* handle = dlopen("libgnu-hash-table-library.so", RTLD_NOW);
695 ASSERT_TRUE(handle != nullptr) << dlerror();
696 auto guard = make_scope_guard([&]() {
697 dlclose(handle);
698 });
699 void* sym = dlsym(handle, "getRandomNumber");
700 ASSERT_TRUE(sym != nullptr) << dlerror();
701 int (*fn)(void);
702 fn = reinterpret_cast<int (*)(void)>(sym);
703 EXPECT_EQ(4, fn());
704
705 Dl_info dlinfo;
706 ASSERT_TRUE(0 != dladdr(reinterpret_cast<void*>(fn), &dlinfo));
707
708 ASSERT_TRUE(fn == dlinfo.dli_saddr);
709 ASSERT_STREQ("getRandomNumber", dlinfo.dli_sname);
Dmitriy Ivanovb3356772014-11-14 11:19:22 -0800710 ASSERT_SUBSTR("libgnu-hash-table-library.so", dlinfo.dli_fname);
Dmitriy Ivanovec18ce02014-11-09 19:27:20 -0800711#else
712 GTEST_LOG_(INFO) << "This test does nothing for mips/mips64; mips toolchain does not support '--hash-style=gnu'\n";
713#endif
Elliott Hughes124fae92012-10-31 14:20:03 -0700714}
Elliott Hughese66190d2012-12-18 15:57:55 -0800715
Dmitriy Ivanovb3356772014-11-14 11:19:22 -0800716TEST(dlfcn, dlopen_library_with_only_sysv_hash) {
717 void* handle = dlopen("libsysv-hash-table-library.so", RTLD_NOW);
718 ASSERT_TRUE(handle != nullptr) << dlerror();
719 auto guard = make_scope_guard([&]() {
720 dlclose(handle);
721 });
722 void* sym = dlsym(handle, "getRandomNumber");
723 ASSERT_TRUE(sym != nullptr) << dlerror();
724 int (*fn)(void);
725 fn = reinterpret_cast<int (*)(void)>(sym);
726 EXPECT_EQ(4, fn());
727
728 Dl_info dlinfo;
729 ASSERT_TRUE(0 != dladdr(reinterpret_cast<void*>(fn), &dlinfo));
730
731 ASSERT_TRUE(fn == dlinfo.dli_saddr);
732 ASSERT_STREQ("getRandomNumber", dlinfo.dli_sname);
733 ASSERT_SUBSTR("libsysv-hash-table-library.so", dlinfo.dli_fname);
734}
735
Elliott Hughese66190d2012-12-18 15:57:55 -0800736TEST(dlfcn, dlopen_bad_flags) {
737 dlerror(); // Clear any pending errors.
738 void* handle;
739
Elliott Hughes063525c2014-05-13 11:19:57 -0700740#if defined(__GLIBC__)
Elliott Hughese66190d2012-12-18 15:57:55 -0800741 // glibc was smart enough not to define RTLD_NOW as 0, so it can detect missing flags.
742 handle = dlopen(NULL, 0);
743 ASSERT_TRUE(handle == NULL);
744 ASSERT_SUBSTR("invalid", dlerror());
745#endif
746
747 handle = dlopen(NULL, 0xffffffff);
748 ASSERT_TRUE(handle == NULL);
749 ASSERT_SUBSTR("invalid", dlerror());
750
751 // glibc actually allows you to choose both RTLD_NOW and RTLD_LAZY at the same time, and so do we.
752 handle = dlopen(NULL, RTLD_NOW|RTLD_LAZY);
753 ASSERT_TRUE(handle != NULL);
754 ASSERT_SUBSTR(NULL, dlerror());
755}
Sergey Melnikovebd506c2013-10-31 18:02:12 +0400756
757TEST(dlfcn, rtld_default_unknown_symbol) {
Elliott Hughes2ed71092013-11-11 15:48:06 -0800758 void* addr = dlsym(RTLD_DEFAULT, "ANY_UNKNOWN_SYMBOL_NAME");
Sergey Melnikovebd506c2013-10-31 18:02:12 +0400759 ASSERT_TRUE(addr == NULL);
760}
761
762TEST(dlfcn, rtld_default_known_symbol) {
Elliott Hughes2ed71092013-11-11 15:48:06 -0800763 void* addr = dlsym(RTLD_DEFAULT, "fopen");
764 ASSERT_TRUE(addr != NULL);
765}
766
767TEST(dlfcn, rtld_next_unknown_symbol) {
768 void* addr = dlsym(RTLD_NEXT, "ANY_UNKNOWN_SYMBOL_NAME");
769 ASSERT_TRUE(addr == NULL);
770}
771
772TEST(dlfcn, rtld_next_known_symbol) {
773 void* addr = dlsym(RTLD_NEXT, "fopen");
Sergey Melnikovebd506c2013-10-31 18:02:12 +0400774 ASSERT_TRUE(addr != NULL);
775}
Dmitriy Ivanov7db18092014-05-08 12:27:25 -0700776
Dmitriy Ivanovce441662014-06-17 15:56:38 -0700777TEST(dlfcn, dlsym_weak_func) {
778 dlerror();
779 void* handle = dlopen("libtest_dlsym_weak_func.so",RTLD_NOW);
780 ASSERT_TRUE(handle != NULL);
781
782 int (*weak_func)();
783 weak_func = reinterpret_cast<int (*)()>(dlsym(handle, "weak_func"));
784 ASSERT_TRUE(weak_func != NULL) << "dlerror: " << dlerror();
785 EXPECT_EQ(42, weak_func());
786 dlclose(handle);
787}
788
Dmitriy Ivanov7db18092014-05-08 12:27:25 -0700789TEST(dlfcn, dlopen_symlink) {
790 void* handle1 = dlopen("libdlext_test.so", RTLD_NOW);
791 void* handle2 = dlopen("libdlext_test_v2.so", RTLD_NOW);
792 ASSERT_TRUE(handle1 != NULL);
793 ASSERT_TRUE(handle2 != NULL);
794 ASSERT_EQ(handle1, handle2);
Dmitriy Ivanov319356e2014-09-02 17:31:44 -0700795 dlclose(handle1);
796 dlclose(handle2);
Dmitriy Ivanov7db18092014-05-08 12:27:25 -0700797}