blob: a7fe2f852c6eef5bc35b51f6d7a39912a79ee40f [file] [log] [blame]
jeffhaoacf5aa72012-09-12 17:25:30 -07001/*
2 * Copyright (C) 2012 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#include <gtest/gtest.h>
18
19#include <dlfcn.h>
Elliott Hughes8e15b082012-09-26 11:44:01 -070020#include <libgen.h>
21#include <limits.h>
22#include <stdio.h>
23#include <stdint.h>
24
Dmitriy Ivanov8de1dde2014-09-04 18:23:00 -070025#include "private/ScopeGuard.h"
26
Elliott Hughes8e15b082012-09-26 11:44:01 -070027#include <string>
jeffhaoacf5aa72012-09-12 17:25:30 -070028
Elliott Hughes3b297c42012-10-11 16:08:51 -070029#define ASSERT_SUBSTR(needle, haystack) \
30 ASSERT_PRED_FORMAT2(::testing::IsSubstring, needle, haystack)
31
Elliott Hughes1728b232014-05-14 10:02:03 -070032static bool g_called = false;
jeffhaoacf5aa72012-09-12 17:25:30 -070033extern "C" void DlSymTestFunction() {
Elliott Hughes1728b232014-05-14 10:02:03 -070034 g_called = true;
jeffhaoacf5aa72012-09-12 17:25:30 -070035}
36
Dmitriy Ivanovf8846a42014-07-08 21:21:34 -070037static int g_ctor_function_called = 0;
38
39extern "C" void ctor_function() __attribute__ ((constructor));
40
41extern "C" void ctor_function() {
42 g_ctor_function_called = 17;
43}
44
45TEST(dlfcn, ctor_function_call) {
46 ASSERT_EQ(17, g_ctor_function_called);
47}
48
Elliott Hughese66190d2012-12-18 15:57:55 -080049TEST(dlfcn, dlsym_in_self) {
Elliott Hughes3b297c42012-10-11 16:08:51 -070050 dlerror(); // Clear any pending errors.
jeffhaoacf5aa72012-09-12 17:25:30 -070051 void* self = dlopen(NULL, RTLD_NOW);
52 ASSERT_TRUE(self != NULL);
Elliott Hughes3b297c42012-10-11 16:08:51 -070053 ASSERT_TRUE(dlerror() == NULL);
jeffhaoacf5aa72012-09-12 17:25:30 -070054
55 void* sym = dlsym(self, "DlSymTestFunction");
56 ASSERT_TRUE(sym != NULL);
57
58 void (*function)() = reinterpret_cast<void(*)()>(sym);
59
Elliott Hughes1728b232014-05-14 10:02:03 -070060 g_called = false;
jeffhaoacf5aa72012-09-12 17:25:30 -070061 function();
Elliott Hughes1728b232014-05-14 10:02:03 -070062 ASSERT_TRUE(g_called);
Elliott Hughes1a696162012-11-01 13:49:32 -070063
64 ASSERT_EQ(0, dlclose(self));
jeffhaoacf5aa72012-09-12 17:25:30 -070065}
Elliott Hughes8e15b082012-09-26 11:44:01 -070066
Dmitriy Ivanovdb7a17d2014-08-04 23:39:22 +000067TEST(dlfcn, dlsym_with_dependencies) {
68 void* handle = dlopen("libtest_with_dependency.so", RTLD_NOW);
69 ASSERT_TRUE(handle != NULL);
70 dlerror();
71 // This symbol is in DT_NEEDED library.
72 void* sym = dlsym(handle, "getRandomNumber");
73 ASSERT_TRUE(sym != NULL);
74 int (*fn)(void);
75 fn = reinterpret_cast<int (*)(void)>(sym);
76 EXPECT_EQ(4, fn());
77 dlclose(handle);
78}
79
Dmitriy Ivanovb648a8a2014-05-19 15:06:58 -070080TEST(dlfcn, dlopen_noload) {
81 void* handle = dlopen("libtest_simple.so", RTLD_NOW | RTLD_NOLOAD);
82 ASSERT_TRUE(handle == NULL);
83 handle = dlopen("libtest_simple.so", RTLD_NOW);
84 void* handle2 = dlopen("libtest_simple.so", RTLD_NOW | RTLD_NOLOAD);
85 ASSERT_TRUE(handle != NULL);
86 ASSERT_TRUE(handle2 != NULL);
87 ASSERT_TRUE(handle == handle2);
88 ASSERT_EQ(0, dlclose(handle));
89 ASSERT_EQ(0, dlclose(handle2));
90}
91
Dmitriy Ivanovf4cb6312014-09-11 15:16:03 -070092// ifuncs are only supported on intel and arm64 for now
Dmitriy Ivanov1cd0c672014-10-01 16:26:49 -070093#if defined(__i386__) || defined(__x86_64__)
Brigid Smith31b88da2014-07-23 11:22:25 -070094TEST(dlfcn, ifunc) {
Dmitriy Ivanovbd321c12014-08-21 13:54:03 -070095 typedef const char* (*fn_ptr)();
Brigid Smith31b88da2014-07-23 11:22:25 -070096
97 // ifunc's choice depends on whether IFUNC_CHOICE has a value
98 // first check the set case
99 setenv("IFUNC_CHOICE", "set", 1);
100 void* handle = dlopen("libtest_ifunc.so", RTLD_NOW);
101 ASSERT_TRUE(handle != NULL);
Dmitriy Ivanovbd321c12014-08-21 13:54:03 -0700102 fn_ptr foo_ptr = reinterpret_cast<fn_ptr>(dlsym(handle, "foo"));
103 fn_ptr foo_library_ptr = reinterpret_cast<fn_ptr>(dlsym(handle, "foo_library"));
Brigid Smith31b88da2014-07-23 11:22:25 -0700104 ASSERT_TRUE(foo_ptr != NULL);
105 ASSERT_TRUE(foo_library_ptr != NULL);
Dmitriy Ivanovbd321c12014-08-21 13:54:03 -0700106 ASSERT_EQ(strncmp("set", foo_ptr(), 3), 0);
107 ASSERT_EQ(strncmp("set", foo_library_ptr(), 3), 0);
Brigid Smith31b88da2014-07-23 11:22:25 -0700108 dlclose(handle);
109
110 // then check the unset case
111 unsetenv("IFUNC_CHOICE");
112 handle = dlopen("libtest_ifunc.so", RTLD_NOW);
113 ASSERT_TRUE(handle != NULL);
Dmitriy Ivanovbd321c12014-08-21 13:54:03 -0700114 foo_ptr = reinterpret_cast<fn_ptr>(dlsym(handle, "foo"));
115 foo_library_ptr = reinterpret_cast<fn_ptr>(dlsym(handle, "foo_library"));
Brigid Smith31b88da2014-07-23 11:22:25 -0700116 ASSERT_TRUE(foo_ptr != NULL);
117 ASSERT_TRUE(foo_library_ptr != NULL);
Dmitriy Ivanovbd321c12014-08-21 13:54:03 -0700118 ASSERT_EQ(strncmp("unset", foo_ptr(), 5), 0);
119 ASSERT_EQ(strncmp("unset", foo_library_ptr(), 3), 0);
120 dlclose(handle);
121}
122
123TEST(dlfcn, ifunc_ctor_call) {
124 typedef const char* (*fn_ptr)();
125
126 void* handle = dlopen("libtest_ifunc.so", RTLD_NOW);
Dmitriy Ivanovf4cb6312014-09-11 15:16:03 -0700127 ASSERT_TRUE(handle != nullptr) << dlerror();
128 fn_ptr is_ctor_called = reinterpret_cast<fn_ptr>(dlsym(handle, "is_ctor_called_irelative"));
129 ASSERT_TRUE(is_ctor_called != nullptr) << dlerror();
130 ASSERT_STREQ("false", is_ctor_called());
131
132 is_ctor_called = reinterpret_cast<fn_ptr>(dlsym(handle, "is_ctor_called_jump_slot"));
133 ASSERT_TRUE(is_ctor_called != nullptr) << dlerror();
Dmitriy Ivanovbd321c12014-08-21 13:54:03 -0700134 ASSERT_STREQ("true", is_ctor_called());
Brigid Smith31b88da2014-07-23 11:22:25 -0700135 dlclose(handle);
136}
137#endif
138
Dmitriy Ivanov8de1dde2014-09-04 18:23:00 -0700139TEST(dlfcn, dlopen_check_relocation_dt_needed_order) {
140 // This is the structure of the test library and
141 // its dt_needed libraries
142 // libtest_relo_check_dt_needed_order.so
143 // |
144 // +-> libtest_relo_check_dt_needed_order_1.so
145 // |
146 // +-> libtest_relo_check_dt_needed_order_2.so
147 //
148 // The root library references relo_test_get_answer_lib - which is defined
149 // in both dt_needed libraries, the correct relocation should
150 // use the function defined in libtest_relo_check_dt_needed_order_1.so
151 void* handle = nullptr;
Dmitriy Ivanovef1306d2014-09-08 16:22:22 -0700152 auto guard = make_scope_guard([&]() {
Dmitriy Ivanov8de1dde2014-09-04 18:23:00 -0700153 dlclose(handle);
154 });
155
156 handle = dlopen("libtest_relo_check_dt_needed_order.so", RTLD_NOW);
157 ASSERT_TRUE(handle != nullptr) << dlerror();
158
159 typedef int (*fn_t) (void);
160 fn_t fn = reinterpret_cast<fn_t>(dlsym(handle, "relo_test_get_answer"));
161 ASSERT_TRUE(fn != nullptr) << dlerror();
162 ASSERT_EQ(1, fn());
163}
164
Dmitriy Ivanovfd2747b2014-10-21 09:23:18 -0700165TEST(dlfcn, dlopen_check_order_dlsym) {
Dmitriy Ivanovae69a952014-09-05 16:42:53 -0700166 // Here is how the test library and its dt_needed
167 // libraries are arranged
168 //
Dmitriy Ivanovfd2747b2014-10-21 09:23:18 -0700169 // libtest_check_order_children.so
Dmitriy Ivanovae69a952014-09-05 16:42:53 -0700170 // |
Dmitriy Ivanovfd2747b2014-10-21 09:23:18 -0700171 // +-> ..._1_left.so
Dmitriy Ivanovae69a952014-09-05 16:42:53 -0700172 // | |
Dmitriy Ivanovfd2747b2014-10-21 09:23:18 -0700173 // | +-> ..._a.so
Dmitriy Ivanovae69a952014-09-05 16:42:53 -0700174 // | |
Dmitriy Ivanovfd2747b2014-10-21 09:23:18 -0700175 // | +-> ...r_b.so
Dmitriy Ivanovae69a952014-09-05 16:42:53 -0700176 // |
Dmitriy Ivanovfd2747b2014-10-21 09:23:18 -0700177 // +-> ..._2_right.so
Dmitriy Ivanovae69a952014-09-05 16:42:53 -0700178 // | |
Dmitriy Ivanovfd2747b2014-10-21 09:23:18 -0700179 // | +-> ..._d.so
Dmitriy Ivanovae69a952014-09-05 16:42:53 -0700180 // | |
Dmitriy Ivanovfd2747b2014-10-21 09:23:18 -0700181 // | +-> ..._b.so
Dmitriy Ivanovae69a952014-09-05 16:42:53 -0700182 // |
Dmitriy Ivanovfd2747b2014-10-21 09:23:18 -0700183 // +-> ..._3_c.so
Dmitriy Ivanovae69a952014-09-05 16:42:53 -0700184 //
185 // load order should be (1, 2, 3, a, b, d)
186 //
187 // get_answer() is defined in (2, 3, a, b, c)
188 // get_answer2() is defined in (b, d)
Dmitriy Ivanovfd2747b2014-10-21 09:23:18 -0700189 void* sym = dlsym(RTLD_DEFAULT, "check_order_dlsym_get_answer");
Dmitriy Ivanovae69a952014-09-05 16:42:53 -0700190 ASSERT_TRUE(sym == nullptr);
Dmitriy Ivanovfd2747b2014-10-21 09:23:18 -0700191 void* handle = dlopen("libtest_check_order_dlsym.so", RTLD_NOW | RTLD_GLOBAL);
192 ASSERT_TRUE(handle != nullptr) << dlerror();
Dmitriy Ivanovae69a952014-09-05 16:42:53 -0700193 typedef int (*fn_t) (void);
194 fn_t fn, fn2;
Dmitriy Ivanovfd2747b2014-10-21 09:23:18 -0700195 fn = reinterpret_cast<fn_t>(dlsym(RTLD_DEFAULT, "check_order_dlsym_get_answer"));
Dmitriy Ivanov382e06c2014-10-30 23:42:45 -0700196 ASSERT_TRUE(fn != NULL) << dlerror();
Dmitriy Ivanovfd2747b2014-10-21 09:23:18 -0700197 fn2 = reinterpret_cast<fn_t>(dlsym(RTLD_DEFAULT, "check_order_dlsym_get_answer2"));
Dmitriy Ivanov382e06c2014-10-30 23:42:45 -0700198 ASSERT_TRUE(fn2 != NULL) << dlerror();
Dmitriy Ivanovae69a952014-09-05 16:42:53 -0700199
200 ASSERT_EQ(42, fn());
201 ASSERT_EQ(43, fn2());
202 dlclose(handle);
203}
204
Dmitriy Ivanovfd2747b2014-10-21 09:23:18 -0700205TEST(dlfcn, dlopen_check_order_reloc_siblings) {
206 // This is how this one works:
207 // we lookup and call get_answer which is defined in '_2.so'
208 // and in turn calls external get_answer_impl() defined in _1.so and in '_[a-f].so'
209 // the correct _impl() is implemented by '_a.so';
210 //
211 // Note that this is test for RTLD_LOCAL (TODO: test for GLOBAL?)
212 //
213 // Here is the picture:
214 //
215 // libtest_check_order_reloc_siblings.so
216 // |
217 // +-> ..._1.so <- empty
218 // | |
219 // | +-> ..._a.so <- exports correct answer_impl()
220 // | |
221 // | +-> ..._b.so <- every other letter exporting incorrect one.
222 // |
223 // +-> ..._2.so <- empty
224 // | |
225 // | +-> ..._c.so
226 // | |
227 // | +-> ..._d.so
228 // |
229 // +-> ..._3.so <- empty
230 // |
231 // +-> ..._e.so
232 // |
233 // +-> ..._f.so <- exports get_answer() that calls get_anser_impl();
234 // implements incorrect get_answer_impl()
235
236 void* handle = dlopen("libtest_check_order_reloc_siblings.so", RTLD_NOW | RTLD_NOLOAD);
237 ASSERT_TRUE(handle == nullptr);
238#ifdef __BIONIC__
239 // TODO: glibc returns nullptr on dlerror() here. Is it bug?
240 ASSERT_STREQ("dlopen failed: library \"libtest_check_order_reloc_siblings.so\" wasn't loaded and RTLD_NOLOAD prevented it", dlerror());
241#endif
242
243 handle = dlopen("libtest_check_order_reloc_siblings.so", RTLD_NOW | RTLD_LOCAL);
244 ASSERT_TRUE(handle != nullptr) << dlerror();
245
246 typedef int (*fn_t) (void);
247 fn_t fn = reinterpret_cast<fn_t>(dlsym(handle, "check_order_reloc_get_answer"));
248 ASSERT_TRUE(fn != nullptr) << dlerror();
249 ASSERT_EQ(42, fn());
250
251 ASSERT_EQ(0, dlclose(handle));
252}
253
254TEST(dlfcn, dlopen_check_order_reloc_siblings_with_preload) {
255 // This test uses the same library as dlopen_check_order_reloc_siblings.
256 // Unlike dlopen_check_order_reloc_siblings it preloads
257 // libtest_check_order_reloc_siblings_1.so (first dependency) prior to
258 // dlopen(libtest_check_order_reloc_siblings.so)
259
260 void* handle = dlopen("libtest_check_order_reloc_siblings.so", RTLD_NOW | RTLD_NOLOAD);
261 ASSERT_TRUE(handle == nullptr);
262 handle = dlopen("libtest_check_order_reloc_siblings_1.so", RTLD_NOW | RTLD_NOLOAD);
263 ASSERT_TRUE(handle == nullptr);
264
265 void* handle_for_1 = dlopen("libtest_check_order_reloc_siblings_1.so", RTLD_NOW | RTLD_LOCAL);
266 ASSERT_TRUE(handle_for_1 != nullptr) << dlerror();
267
268 handle = dlopen("libtest_check_order_reloc_siblings.so", RTLD_NOW | RTLD_LOCAL);
269 ASSERT_TRUE(handle != nullptr) << dlerror();
270
271 ASSERT_EQ(0, dlclose(handle_for_1));
272
273 typedef int (*fn_t) (void);
274 fn_t fn = reinterpret_cast<fn_t>(dlsym(handle, "check_order_reloc_get_answer"));
275 ASSERT_TRUE(fn != nullptr) << dlerror();
276 ASSERT_EQ(42, fn());
277
278 ASSERT_EQ(0, dlclose(handle));
279}
280
281TEST(dlfcn, dlopen_check_order_reloc_nephew) {
282 // This is how this one works:
283 // we lookup and call nephew_get_answer which is defined in '_2.so'
284 // and in turn calls external get_answer_impl() defined in '_[a-f].so'
285 // the correct _impl() is implemented by '_a.so';
286 //
287 // Here is the picture:
288 //
289 // libtest_check_order_reloc_siblings.so
290 // |
291 // +-> ..._1.so <- empty
292 // | |
293 // | +-> ..._a.so <- exports correct answer_impl()
294 // | |
295 // | +-> ..._b.so <- every other letter exporting incorrect one.
296 // |
297 // +-> ..._2.so <- empty
298 // | |
299 // | +-> ..._c.so
300 // | |
301 // | +-> ..._d.so
302 // |
303 // +-> ..._3.so <- nephew_get_answer() that calls get_answer_impl();
304 // |
305 // +-> ..._e.so
306 // |
307 // +-> ..._f.so
308
309 void* handle = dlopen("libtest_check_order_reloc_siblings.so", RTLD_NOW | RTLD_NOLOAD);
310 ASSERT_TRUE(handle == nullptr);
311#ifdef __BIONIC__
312 // TODO: glibc returns nullptr on dlerror() here. Is it bug?
313 ASSERT_STREQ("dlopen failed: library \"libtest_check_order_reloc_siblings.so\" wasn't loaded and RTLD_NOLOAD prevented it", dlerror());
314#endif
315
316 handle = dlopen("libtest_check_order_reloc_siblings.so", RTLD_NOW | RTLD_LOCAL);
317 ASSERT_TRUE(handle != nullptr) << dlerror();
318
319 typedef int (*fn_t) (void);
320 fn_t fn = reinterpret_cast<fn_t>(dlsym(handle, "check_order_reloc_nephew_get_answer"));
321 ASSERT_TRUE(fn != nullptr) << dlerror();
322 ASSERT_EQ(42, fn());
323
324 ASSERT_EQ(0, dlclose(handle));
325}
326
327extern "C" int check_order_reloc_root_get_answer_impl() {
328 return 42;
329}
330
331TEST(dlfcn, dlopen_check_order_reloc_main_executable) {
332 // This is how this one works:
333 // we lookup and call get_answer3 which is defined in 'root.so'
334 // and in turn calls external root_get_answer_impl() defined in _2.so and
335 // above the correct _impl() is one in the executable.
336 //
337 // libtest_check_order_reloc_root.so
338 // |
339 // +-> ..._1.so <- empty
340 // |
341 // +-> ..._2.so <- gives incorrect answer for answer_main_impl()
342 //
343
344 void* handle = dlopen("libtest_check_order_reloc_root.so", RTLD_NOW | RTLD_NOLOAD);
345 ASSERT_TRUE(handle == nullptr);
346#ifdef __BIONIC__
347 // TODO: glibc returns nullptr on dlerror() here. Is it bug?
348 ASSERT_STREQ("dlopen failed: library \"libtest_check_order_reloc_root.so\" wasn't loaded and RTLD_NOLOAD prevented it", dlerror());
349#endif
350
351 handle = dlopen("libtest_check_order_reloc_root.so", RTLD_NOW | RTLD_LOCAL);
352 ASSERT_TRUE(handle != nullptr) << dlerror();
353
354 typedef int (*fn_t) (void);
355 fn_t fn = reinterpret_cast<fn_t>(dlsym(handle, "check_order_reloc_root_get_answer"));
356 ASSERT_TRUE(fn != nullptr) << dlerror();
357 ASSERT_EQ(42, fn());
358
359 ASSERT_EQ(0, dlclose(handle));
360}
361
Dmitriy Ivanovc85e82d2014-09-15 17:00:10 -0700362TEST(dlfcn, dlopen_check_rtld_local) {
363 void* sym = dlsym(RTLD_DEFAULT, "dlopen_testlib_simple_func");
364 ASSERT_TRUE(sym == nullptr);
365
366 // implicit RTLD_LOCAL
367 void* handle = dlopen("libtest_simple.so", RTLD_NOW);
368 sym = dlsym(RTLD_DEFAULT, "dlopen_testlib_simple_func");
369 ASSERT_TRUE(sym == nullptr);
370 ASSERT_SUBSTR("undefined symbol: dlopen_testlib_simple_func", dlerror());
371 sym = dlsym(handle, "dlopen_testlib_simple_func");
372 ASSERT_TRUE(sym != nullptr);
373 ASSERT_TRUE(reinterpret_cast<bool (*)(void)>(sym)());
374 dlclose(handle);
375
376 // explicit RTLD_LOCAL
377 handle = dlopen("libtest_simple.so", RTLD_NOW | RTLD_LOCAL);
378 sym = dlsym(RTLD_DEFAULT, "dlopen_testlib_simple_func");
379 ASSERT_TRUE(sym == nullptr);
380 ASSERT_SUBSTR("undefined symbol: dlopen_testlib_simple_func", dlerror());
381 sym = dlsym(handle, "dlopen_testlib_simple_func");
382 ASSERT_TRUE(sym != nullptr);
383 ASSERT_TRUE(reinterpret_cast<bool (*)(void)>(sym)());
384 dlclose(handle);
385}
386
387TEST(dlfcn, dlopen_check_rtld_global) {
388 void* sym = dlsym(RTLD_DEFAULT, "dlopen_testlib_simple_func");
389 ASSERT_TRUE(sym == nullptr);
390
391 void* handle = dlopen("libtest_simple.so", RTLD_NOW | RTLD_GLOBAL);
Dmitriy Ivanovc87f65d2014-05-19 15:06:58 -0700392 ASSERT_TRUE(handle != nullptr) << dlerror();
Dmitriy Ivanovc85e82d2014-09-15 17:00:10 -0700393 sym = dlsym(RTLD_DEFAULT, "dlopen_testlib_simple_func");
394 ASSERT_TRUE(sym != nullptr) << dlerror();
395 ASSERT_TRUE(reinterpret_cast<bool (*)(void)>(sym)());
396 dlclose(handle);
Dmitriy Ivanovc87f65d2014-05-19 15:06:58 -0700397
398 // RTLD_GLOBAL implies RTLD_NODELETE, let's check that
399 void* sym_after_dlclose = dlsym(RTLD_DEFAULT, "dlopen_testlib_simple_func");
400 ASSERT_EQ(sym, sym_after_dlclose);
Dmitriy Ivanovc85e82d2014-09-15 17:00:10 -0700401}
402
Dmitriy Ivanovae69a952014-09-05 16:42:53 -0700403// libtest_with_dependency_loop.so -> libtest_with_dependency_loop_a.so ->
404// libtest_with_dependency_loop_b.so -> libtest_with_dependency_loop_c.so ->
405// libtest_with_dependency_loop_a.so
406TEST(dlfcn, dlopen_check_loop) {
407 void* handle = dlopen("libtest_with_dependency_loop.so", RTLD_NOW);
Dmitriy Ivanov382e06c2014-10-30 23:42:45 -0700408#if defined(__BIONIC__)
Dmitriy Ivanov7d971ec2014-09-09 10:21:42 -0700409 ASSERT_TRUE(handle == nullptr);
Dmitriy Ivanovae69a952014-09-05 16:42:53 -0700410 ASSERT_STREQ("dlopen failed: recursive link to \"libtest_with_dependency_loop_a.so\"", dlerror());
Dmitriy Ivanov7d971ec2014-09-09 10:21:42 -0700411 // This symbol should never be exposed
412 void* f = dlsym(RTLD_DEFAULT, "dlopen_test_invalid_function");
413 ASSERT_TRUE(f == nullptr);
414 ASSERT_SUBSTR("undefined symbol: dlopen_test_invalid_function", dlerror());
415
416 // dlopen second time to make sure that the library wasn't loaded even though dlopen returned null.
417 // This may happen if during cleanup the root library or one of the depended libs were not removed
418 // from soinfo list.
419 handle = dlopen("libtest_with_dependency_loop.so", RTLD_NOW | RTLD_NOLOAD);
420 ASSERT_TRUE(handle == nullptr);
421 ASSERT_STREQ("dlopen failed: library \"libtest_with_dependency_loop.so\" wasn't loaded and RTLD_NOLOAD prevented it", dlerror());
Dmitriy Ivanov382e06c2014-10-30 23:42:45 -0700422#else // glibc allows recursive links
423 ASSERT_TRUE(handle != nullptr);
424 dlclose(handle);
425#endif
Dmitriy Ivanovae69a952014-09-05 16:42:53 -0700426}
427
Dmitriy Ivanovc87f65d2014-05-19 15:06:58 -0700428TEST(dlfcn, dlopen_nodelete) {
429 static bool is_unloaded = false;
430
431 void* handle = dlopen("libtest_nodelete_1.so", RTLD_NOW | RTLD_NODELETE);
432 ASSERT_TRUE(handle != nullptr) << dlerror();
433 void (*set_unload_flag_ptr)(bool*);
434 set_unload_flag_ptr = reinterpret_cast<void (*)(bool*)>(dlsym(handle, "dlopen_nodelete_1_set_unload_flag_ptr"));
435 ASSERT_TRUE(set_unload_flag_ptr != nullptr) << dlerror();
436 set_unload_flag_ptr(&is_unloaded);
437
438 uint32_t* taxicab_number = reinterpret_cast<uint32_t*>(dlsym(handle, "dlopen_nodelete_1_taxicab_number"));
439 ASSERT_TRUE(taxicab_number != nullptr) << dlerror();
440 ASSERT_EQ(1729U, *taxicab_number);
441 *taxicab_number = 2;
442
443 dlclose(handle);
444 ASSERT_TRUE(!is_unloaded);
445
446 uint32_t* taxicab_number_after_dlclose = reinterpret_cast<uint32_t*>(dlsym(handle, "dlopen_nodelete_1_taxicab_number"));
447 ASSERT_EQ(taxicab_number_after_dlclose, taxicab_number);
448 ASSERT_EQ(2U, *taxicab_number_after_dlclose);
449
450
451 handle = dlopen("libtest_nodelete_1.so", RTLD_NOW);
452 uint32_t* taxicab_number2 = reinterpret_cast<uint32_t*>(dlsym(handle, "dlopen_nodelete_1_taxicab_number"));
453 ASSERT_EQ(taxicab_number2, taxicab_number);
454
455 ASSERT_EQ(2U, *taxicab_number2);
456
457 dlclose(handle);
458 ASSERT_TRUE(!is_unloaded);
459}
460
461TEST(dlfcn, dlopen_nodelete_on_second_dlopen) {
462 static bool is_unloaded = false;
463
464 void* handle = dlopen("libtest_nodelete_2.so", RTLD_NOW);
465 ASSERT_TRUE(handle != nullptr) << dlerror();
466 void (*set_unload_flag_ptr)(bool*);
467 set_unload_flag_ptr = reinterpret_cast<void (*)(bool*)>(dlsym(handle, "dlopen_nodelete_2_set_unload_flag_ptr"));
468 ASSERT_TRUE(set_unload_flag_ptr != nullptr) << dlerror();
469 set_unload_flag_ptr(&is_unloaded);
470
471 uint32_t* taxicab_number = reinterpret_cast<uint32_t*>(dlsym(handle, "dlopen_nodelete_2_taxicab_number"));
472 ASSERT_TRUE(taxicab_number != nullptr) << dlerror();
473
474 ASSERT_EQ(1729U, *taxicab_number);
475 *taxicab_number = 2;
476
477 // This RTLD_NODELETE should be ignored
478 void* handle1 = dlopen("libtest_nodelete_2.so", RTLD_NOW | RTLD_NODELETE);
479 ASSERT_TRUE(handle1 != nullptr) << dlerror();
480 ASSERT_EQ(handle, handle1);
481
482 dlclose(handle1);
483 dlclose(handle);
484
485 ASSERT_TRUE(is_unloaded);
486}
487
488TEST(dlfcn, dlopen_nodelete_dt_flags_1) {
489 static bool is_unloaded = false;
490
491 void* handle = dlopen("libtest_nodelete_dt_flags_1.so", RTLD_NOW);
492 ASSERT_TRUE(handle != nullptr) << dlerror();
493 void (*set_unload_flag_ptr)(bool*);
494 set_unload_flag_ptr = reinterpret_cast<void (*)(bool*)>(dlsym(handle, "dlopen_nodelete_dt_flags_1_set_unload_flag_ptr"));
495 ASSERT_TRUE(set_unload_flag_ptr != nullptr) << dlerror();
496 set_unload_flag_ptr(&is_unloaded);
497
498 dlclose(handle);
499 ASSERT_TRUE(!is_unloaded);
500}
501
Dmitriy Ivanov976402c2014-08-28 14:12:12 -0700502TEST(dlfcn, dlsym_df_1_global) {
Dmitriy Ivanov494bee72014-11-03 21:13:55 -0800503#if !defined(__arm__)
Dmitriy Ivanov976402c2014-08-28 14:12:12 -0700504 void* handle = dlopen("libtest_dlsym_df_1_global.so", RTLD_NOW);
505 ASSERT_TRUE(handle != nullptr) << dlerror();
506 int (*get_answer)();
507 get_answer = reinterpret_cast<int (*)()>(dlsym(handle, "dl_df_1_global_get_answer"));
508 ASSERT_TRUE(get_answer != nullptr) << dlerror();
509 ASSERT_EQ(42, get_answer());
510 ASSERT_EQ(0, dlclose(handle));
511#else
Dmitriy Ivanov494bee72014-11-03 21:13:55 -0800512 GTEST_LOG_(INFO) << "This test does nothing on arm (to be reenabled once b/18137520 or b/18130452 are fixed).\n";
Dmitriy Ivanov976402c2014-08-28 14:12:12 -0700513#endif
514}
515
Elliott Hughese66190d2012-12-18 15:57:55 -0800516TEST(dlfcn, dlopen_failure) {
Elliott Hughes3b297c42012-10-11 16:08:51 -0700517 void* self = dlopen("/does/not/exist", RTLD_NOW);
518 ASSERT_TRUE(self == NULL);
Elliott Hughes063525c2014-05-13 11:19:57 -0700519#if defined(__BIONIC__)
Elliott Hughes3b297c42012-10-11 16:08:51 -0700520 ASSERT_STREQ("dlopen failed: library \"/does/not/exist\" not found", dlerror());
521#else
522 ASSERT_STREQ("/does/not/exist: cannot open shared object file: No such file or directory", dlerror());
523#endif
524}
525
Elliott Hughesad88a082012-10-24 18:37:21 -0700526static void* ConcurrentDlErrorFn(void*) {
Elliott Hughes5419b942012-10-16 15:54:46 -0700527 dlopen("/child/thread", RTLD_NOW);
528 return reinterpret_cast<void*>(strdup(dlerror()));
529}
530
Elliott Hughese66190d2012-12-18 15:57:55 -0800531TEST(dlfcn, dlerror_concurrent) {
Elliott Hughes5419b942012-10-16 15:54:46 -0700532 dlopen("/main/thread", RTLD_NOW);
533 const char* main_thread_error = dlerror();
534 ASSERT_SUBSTR("/main/thread", main_thread_error);
535
536 pthread_t t;
537 ASSERT_EQ(0, pthread_create(&t, NULL, ConcurrentDlErrorFn, NULL));
538 void* result;
539 ASSERT_EQ(0, pthread_join(t, &result));
540 char* child_thread_error = static_cast<char*>(result);
541 ASSERT_SUBSTR("/child/thread", child_thread_error);
542 free(child_thread_error);
543
544 ASSERT_SUBSTR("/main/thread", main_thread_error);
545}
546
Elliott Hughese66190d2012-12-18 15:57:55 -0800547TEST(dlfcn, dlsym_failures) {
Elliott Hughes3b297c42012-10-11 16:08:51 -0700548 dlerror(); // Clear any pending errors.
Elliott Hughes8e15b082012-09-26 11:44:01 -0700549 void* self = dlopen(NULL, RTLD_NOW);
550 ASSERT_TRUE(self != NULL);
Elliott Hughes3b297c42012-10-11 16:08:51 -0700551 ASSERT_TRUE(dlerror() == NULL);
552
553 void* sym;
554
Dmitriy Ivanov44adf932014-05-22 09:49:24 -0700555#if defined(__BIONIC__) && !defined(__LP64__)
556 // RTLD_DEFAULT in lp32 bionic is not (void*)0
557 // so it can be distinguished from the NULL handle.
Elliott Hughes3b297c42012-10-11 16:08:51 -0700558 sym = dlsym(NULL, "test");
559 ASSERT_TRUE(sym == NULL);
Elliott Hughes3b297c42012-10-11 16:08:51 -0700560 ASSERT_SUBSTR("dlsym library handle is null", dlerror());
Elliott Hughes3b297c42012-10-11 16:08:51 -0700561#endif
562
563 // NULL symbol name.
Elliott Hughes063525c2014-05-13 11:19:57 -0700564#if defined(__BIONIC__)
Elliott Hughes3b297c42012-10-11 16:08:51 -0700565 // glibc marks this parameter non-null and SEGVs if you cheat.
566 sym = dlsym(self, NULL);
567 ASSERT_TRUE(sym == NULL);
568 ASSERT_SUBSTR("", dlerror());
569#endif
570
571 // Symbol that doesn't exist.
572 sym = dlsym(self, "ThisSymbolDoesNotExist");
573 ASSERT_TRUE(sym == NULL);
574 ASSERT_SUBSTR("undefined symbol: ThisSymbolDoesNotExist", dlerror());
Elliott Hughes1a696162012-11-01 13:49:32 -0700575
576 ASSERT_EQ(0, dlclose(self));
Elliott Hughes3b297c42012-10-11 16:08:51 -0700577}
578
Elliott Hughese66190d2012-12-18 15:57:55 -0800579TEST(dlfcn, dladdr) {
Elliott Hughes3b297c42012-10-11 16:08:51 -0700580 dlerror(); // Clear any pending errors.
581 void* self = dlopen(NULL, RTLD_NOW);
582 ASSERT_TRUE(self != NULL);
583 ASSERT_TRUE(dlerror() == NULL);
Elliott Hughes8e15b082012-09-26 11:44:01 -0700584
585 void* sym = dlsym(self, "DlSymTestFunction");
586 ASSERT_TRUE(sym != NULL);
587
588 // Deliberately ask dladdr for an address inside a symbol, rather than the symbol base address.
589 void* addr = reinterpret_cast<void*>(reinterpret_cast<uintptr_t>(sym) + 2);
590
591 Dl_info info;
592 int rc = dladdr(addr, &info);
593 ASSERT_NE(rc, 0); // Zero on error, non-zero on success.
594
595 // Get the name of this executable.
596 char executable_path[PATH_MAX];
597 rc = readlink("/proc/self/exe", executable_path, sizeof(executable_path));
598 ASSERT_NE(rc, -1);
599 executable_path[rc] = '\0';
600 std::string executable_name(basename(executable_path));
601
602 // The filename should be that of this executable.
603 // Note that we don't know whether or not we have the full path, so we want an "ends_with" test.
604 std::string dli_fname(info.dli_fname);
605 dli_fname = basename(&dli_fname[0]);
606 ASSERT_EQ(dli_fname, executable_name);
607
608 // The symbol name should be the symbol we looked up.
609 ASSERT_STREQ(info.dli_sname, "DlSymTestFunction");
610
611 // The address should be the exact address of the symbol.
612 ASSERT_EQ(info.dli_saddr, sym);
613
614 // Look in /proc/pid/maps to find out what address we were loaded at.
615 // TODO: factor /proc/pid/maps parsing out into a class and reuse all over bionic.
616 void* base_address = NULL;
Elliott Hughes8e15b082012-09-26 11:44:01 -0700617 char line[BUFSIZ];
Elliott Hughes64218232014-08-25 17:26:50 -0700618 FILE* fp = fopen("/proc/self/maps", "r");
Elliott Hughes8e15b082012-09-26 11:44:01 -0700619 ASSERT_TRUE(fp != NULL);
620 while (fgets(line, sizeof(line), fp) != NULL) {
621 uintptr_t start = strtoul(line, 0, 16);
622 line[strlen(line) - 1] = '\0'; // Chomp the '\n'.
623 char* path = strchr(line, '/');
Elliott Hughes156da962012-10-09 17:14:56 -0700624 if (path != NULL && strcmp(executable_path, path) == 0) {
Elliott Hughes8e15b082012-09-26 11:44:01 -0700625 base_address = reinterpret_cast<void*>(start);
626 break;
627 }
628 }
629 fclose(fp);
630
631 // The base address should be the address we were loaded at.
632 ASSERT_EQ(info.dli_fbase, base_address);
Elliott Hughes1a696162012-11-01 13:49:32 -0700633
634 ASSERT_EQ(0, dlclose(self));
Elliott Hughes8e15b082012-09-26 11:44:01 -0700635}
636
Elliott Hughese66190d2012-12-18 15:57:55 -0800637TEST(dlfcn, dladdr_invalid) {
Elliott Hughes8e15b082012-09-26 11:44:01 -0700638 Dl_info info;
639
Elliott Hughes3b297c42012-10-11 16:08:51 -0700640 dlerror(); // Clear any pending errors.
641
Elliott Hughes8e15b082012-09-26 11:44:01 -0700642 // No symbol corresponding to NULL.
643 ASSERT_EQ(dladdr(NULL, &info), 0); // Zero on error, non-zero on success.
Elliott Hughes3b297c42012-10-11 16:08:51 -0700644 ASSERT_TRUE(dlerror() == NULL); // dladdr(3) doesn't set dlerror(3).
Elliott Hughes8e15b082012-09-26 11:44:01 -0700645
646 // No symbol corresponding to a stack address.
647 ASSERT_EQ(dladdr(&info, &info), 0); // Zero on error, non-zero on success.
Elliott Hughes3b297c42012-10-11 16:08:51 -0700648 ASSERT_TRUE(dlerror() == NULL); // dladdr(3) doesn't set dlerror(3).
Elliott Hughes8e15b082012-09-26 11:44:01 -0700649}
Elliott Hughes124fae92012-10-31 14:20:03 -0700650
Elliott Hughes124fae92012-10-31 14:20:03 -0700651// Our dynamic linker doesn't support GNU hash tables.
Elliott Hughesa43e9062013-01-07 14:18:22 -0800652#if defined(__BIONIC__)
653// GNU-style ELF hash tables are incompatible with the MIPS ABI.
654// MIPS requires .dynsym to be sorted to match the GOT but GNU-style requires sorting by hash code.
655#if !defined(__mips__)
Elliott Hughese66190d2012-12-18 15:57:55 -0800656TEST(dlfcn, dlopen_library_with_only_gnu_hash) {
Elliott Hughes124fae92012-10-31 14:20:03 -0700657 dlerror(); // Clear any pending errors.
Elliott Hughes6e33b022012-11-07 18:16:02 -0800658 void* handle = dlopen("no-elf-hash-table-library.so", RTLD_NOW);
Elliott Hughes124fae92012-10-31 14:20:03 -0700659 ASSERT_TRUE(handle == NULL);
Elliott Hughes6e33b022012-11-07 18:16:02 -0800660 ASSERT_STREQ("dlopen failed: empty/missing DT_HASH in \"no-elf-hash-table-library.so\" (built with --hash-style=gnu?)", dlerror());
Elliott Hughes124fae92012-10-31 14:20:03 -0700661}
662#endif
Elliott Hughesa43e9062013-01-07 14:18:22 -0800663#endif
Elliott Hughese66190d2012-12-18 15:57:55 -0800664
665TEST(dlfcn, dlopen_bad_flags) {
666 dlerror(); // Clear any pending errors.
667 void* handle;
668
Elliott Hughes063525c2014-05-13 11:19:57 -0700669#if defined(__GLIBC__)
Elliott Hughese66190d2012-12-18 15:57:55 -0800670 // glibc was smart enough not to define RTLD_NOW as 0, so it can detect missing flags.
671 handle = dlopen(NULL, 0);
672 ASSERT_TRUE(handle == NULL);
673 ASSERT_SUBSTR("invalid", dlerror());
674#endif
675
676 handle = dlopen(NULL, 0xffffffff);
677 ASSERT_TRUE(handle == NULL);
678 ASSERT_SUBSTR("invalid", dlerror());
679
680 // glibc actually allows you to choose both RTLD_NOW and RTLD_LAZY at the same time, and so do we.
681 handle = dlopen(NULL, RTLD_NOW|RTLD_LAZY);
682 ASSERT_TRUE(handle != NULL);
683 ASSERT_SUBSTR(NULL, dlerror());
684}
Sergey Melnikovebd506c2013-10-31 18:02:12 +0400685
686TEST(dlfcn, rtld_default_unknown_symbol) {
Elliott Hughes2ed71092013-11-11 15:48:06 -0800687 void* addr = dlsym(RTLD_DEFAULT, "ANY_UNKNOWN_SYMBOL_NAME");
Sergey Melnikovebd506c2013-10-31 18:02:12 +0400688 ASSERT_TRUE(addr == NULL);
689}
690
691TEST(dlfcn, rtld_default_known_symbol) {
Elliott Hughes2ed71092013-11-11 15:48:06 -0800692 void* addr = dlsym(RTLD_DEFAULT, "fopen");
693 ASSERT_TRUE(addr != NULL);
694}
695
696TEST(dlfcn, rtld_next_unknown_symbol) {
697 void* addr = dlsym(RTLD_NEXT, "ANY_UNKNOWN_SYMBOL_NAME");
698 ASSERT_TRUE(addr == NULL);
699}
700
701TEST(dlfcn, rtld_next_known_symbol) {
702 void* addr = dlsym(RTLD_NEXT, "fopen");
Sergey Melnikovebd506c2013-10-31 18:02:12 +0400703 ASSERT_TRUE(addr != NULL);
704}
Dmitriy Ivanov7db18092014-05-08 12:27:25 -0700705
Dmitriy Ivanovce441662014-06-17 15:56:38 -0700706TEST(dlfcn, dlsym_weak_func) {
707 dlerror();
708 void* handle = dlopen("libtest_dlsym_weak_func.so",RTLD_NOW);
709 ASSERT_TRUE(handle != NULL);
710
711 int (*weak_func)();
712 weak_func = reinterpret_cast<int (*)()>(dlsym(handle, "weak_func"));
713 ASSERT_TRUE(weak_func != NULL) << "dlerror: " << dlerror();
714 EXPECT_EQ(42, weak_func());
715 dlclose(handle);
716}
717
Dmitriy Ivanov7db18092014-05-08 12:27:25 -0700718TEST(dlfcn, dlopen_symlink) {
719 void* handle1 = dlopen("libdlext_test.so", RTLD_NOW);
720 void* handle2 = dlopen("libdlext_test_v2.so", RTLD_NOW);
721 ASSERT_TRUE(handle1 != NULL);
722 ASSERT_TRUE(handle2 != NULL);
723 ASSERT_EQ(handle1, handle2);
724}