1 // Check that unloading a module doesn't break coverage dumping for remaining
2 // modules.
3 // RUN: %clangxx_asan -fsanitize-coverage=func,trace-pc-guard -DSHARED %s -shared -o %dynamiclib1 -fPIC
4 // RUN: %clangxx_asan -fsanitize-coverage=func,trace-pc-guard -DSHARED %s -shared -o %dynamiclib2 -fPIC
5 // RUN: %clangxx_asan -fsanitize-coverage=func,trace-pc-guard %s %libdl -o %t.exe
6 // RUN: mkdir -p %t.tmp/coverage-module-unloaded && cd %t.tmp/coverage-module-unloaded
7 // RUN: %env_asan_opts=coverage=1:verbosity=1 %run %t.exe %dynamiclib1 %dynamiclib2 2>&1 | FileCheck %s
8 // RUN: %env_asan_opts=coverage=1:verbosity=1 %run %t.exe %dynamiclib1 %dynamiclib2 foo 2>&1 | FileCheck %s
9 //
10 // https://code.google.com/p/address-sanitizer/issues/detail?id=263
11 // XFAIL: android
12 // UNSUPPORTED: ios
13
14 #include <assert.h>
15 #include <dlfcn.h>
16 #include <stdio.h>
17 #include <unistd.h>
18
19 #ifdef SHARED
20 extern "C" {
bar()21 void bar() { printf("bar\n"); }
22 }
23 #else
24
main(int argc,char ** argv)25 int main(int argc, char **argv) {
26 fprintf(stderr, "PID: %d\n", getpid());
27 assert(argc > 2);
28 void *handle1 = dlopen(argv[1], RTLD_LAZY); // %dynamiclib1
29 assert(handle1);
30 void (*bar1)() = (void (*)())dlsym(handle1, "bar");
31 assert(bar1);
32 bar1();
33 void *handle2 = dlopen(argv[2], RTLD_LAZY); // %dynamiclib2
34 assert(handle2);
35 void (*bar2)() = (void (*)())dlsym(handle2, "bar");
36 assert(bar2);
37 bar2();
38
39 // It matters whether the unloaded module has a higher or lower address range
40 // than the remaining one. Make sure to test both cases.
41 if (argc < 2)
42 dlclose(bar1 < bar2 ? handle1 : handle2);
43 else
44 dlclose(bar1 < bar2 ? handle2 : handle1);
45 return 0;
46 }
47 #endif
48
49 // CHECK: PID: [[PID:[0-9]+]]
50 // CHECK-DAG: exe{{.*}}[[PID]].sancov: {{.*}}PCs written
51 // CHECK-DAG: dynamic{{.*}}[[PID]].sancov: {{.*}}PCs written
52