• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 // Check that unloading a module doesn't break coverage dumping for remaining
2 // modules.
3 // RUN: %clangxx_asan -fsanitize-coverage=func,trace-pc-guard -DSHARED %s -shared -o %dynamiclib1 -fPIC
4 // RUN: %clangxx_asan -fsanitize-coverage=func,trace-pc-guard -DSHARED %s -shared -o %dynamiclib2 -fPIC
5 // RUN: %clangxx_asan -fsanitize-coverage=func,trace-pc-guard %s %libdl -o %t.exe
6 // RUN: mkdir -p %t.tmp/coverage-module-unloaded && cd %t.tmp/coverage-module-unloaded
7 // RUN: %env_asan_opts=coverage=1:verbosity=1 %run %t.exe %dynamiclib1 %dynamiclib2 2>&1        | FileCheck %s
8 // RUN: %env_asan_opts=coverage=1:verbosity=1 %run %t.exe %dynamiclib1 %dynamiclib2 foo 2>&1    | FileCheck %s
9 //
10 // https://code.google.com/p/address-sanitizer/issues/detail?id=263
11 // XFAIL: android
12 // UNSUPPORTED: ios
13 
14 #include <assert.h>
15 #include <dlfcn.h>
16 #include <stdio.h>
17 #include <unistd.h>
18 
19 #ifdef SHARED
20 extern "C" {
bar()21 void bar() { printf("bar\n"); }
22 }
23 #else
24 
main(int argc,char ** argv)25 int main(int argc, char **argv) {
26   fprintf(stderr, "PID: %d\n", getpid());
27   assert(argc > 2);
28   void *handle1 = dlopen(argv[1], RTLD_LAZY);  // %dynamiclib1
29   assert(handle1);
30   void (*bar1)() = (void (*)())dlsym(handle1, "bar");
31   assert(bar1);
32   bar1();
33   void *handle2 = dlopen(argv[2], RTLD_LAZY);  // %dynamiclib2
34   assert(handle2);
35   void (*bar2)() = (void (*)())dlsym(handle2, "bar");
36   assert(bar2);
37   bar2();
38 
39   // It matters whether the unloaded module has a higher or lower address range
40   // than the remaining one. Make sure to test both cases.
41   if (argc < 2)
42     dlclose(bar1 < bar2 ? handle1 : handle2);
43   else
44     dlclose(bar1 < bar2 ? handle2 : handle1);
45   return 0;
46 }
47 #endif
48 
49 // CHECK: PID: [[PID:[0-9]+]]
50 // CHECK-DAG: exe{{.*}}[[PID]].sancov: {{.*}}PCs written
51 // CHECK-DAG: dynamic{{.*}}[[PID]].sancov: {{.*}}PCs written
52