1 // RUN: %clangxx_asan -fsanitize-coverage=1 -DSHARED %s -shared -o %dynamiclib -fPIC %ld_flags_rpath_so
2 // RUN: %clangxx_asan -fsanitize-coverage=1 %s %ld_flags_rpath_exe -o %t
3 // RUN: export ASAN_OPTIONS=coverage=1:verbosity=1
4 // RUN: rm -rf %T/coverage && mkdir -p %T/coverage && cd %T/coverage
5 // RUN: %run %t 2>&1 | FileCheck %s --check-prefix=CHECK-main
6 // RUN: %sancov print `ls coverage.*sancov | grep -v '.so'` 2>&1 | FileCheck %s --check-prefix=CHECK-SANCOV1
7 // RUN: %run %t foo 2>&1 | FileCheck %s --check-prefix=CHECK-foo
8 // RUN: %sancov print `ls coverage.*sancov | grep -v '.so'` 2>&1 | FileCheck %s --check-prefix=CHECK-SANCOV2
9 // RUN: %run %t bar 2>&1 | FileCheck %s --check-prefix=CHECK-bar
10 // RUN: %sancov print `ls *coverage.*sancov | grep -v '.so'` 2>&1 | FileCheck %s --check-prefix=CHECK-SANCOV2
11 // RUN: %run %t foo bar 2>&1 | FileCheck %s --check-prefix=CHECK-foo-bar
12 // RUN: %sancov print `ls *coverage.*sancov | grep -v '.so'` 2>&1 | FileCheck %s --check-prefix=CHECK-SANCOV2
13 // RUN: %sancov print `ls *coverage.*sancov | grep '.so'` 2>&1 | FileCheck %s --check-prefix=CHECK-SANCOV1
14 // RUN: %sancov merge `ls *coverage.*sancov | grep -v '.so'` > merged-cov
15 // RUN: %sancov print merged-cov 2>&1 | FileCheck %s --check-prefix=CHECK-SANCOV2
16 // RUN: not %run %t foo bar 4 2>&1 | FileCheck %s --check-prefix=CHECK-report
17 // RUN: not %run %t foo bar 4 5 2>&1 | FileCheck %s --check-prefix=CHECK-segv
18 // RUN: rm -r %T/coverage
19 //
20 // https://code.google.com/p/address-sanitizer/issues/detail?id=263
21 // XFAIL: android
22
23 #include <sanitizer/coverage_interface.h>
24 #include <assert.h>
25 #include <stdio.h>
26 #include <string.h>
27 #include <unistd.h>
28
29 #ifdef SHARED
bar()30 void bar() { printf("bar\n"); }
31 #else
32 __attribute__((noinline))
foo()33 void foo() { printf("foo\n"); }
34 extern void bar();
35
36 int G[4];
37
main(int argc,char ** argv)38 int main(int argc, char **argv) {
39 fprintf(stderr, "PID: %d\n", getpid());
40 for (int i = 1; i < argc; i++) {
41 if (!strcmp(argv[i], "foo")) {
42 uintptr_t old_coverage = __sanitizer_get_total_unique_coverage();
43 foo();
44 uintptr_t new_coverage = __sanitizer_get_total_unique_coverage();
45 assert(new_coverage > old_coverage);
46 }
47 if (!strcmp(argv[i], "bar"))
48 bar();
49 }
50 if (argc == 5) {
51 static volatile char *zero = 0;
52 *zero = 0; // SEGV if argc == 5.
53 }
54 return G[argc]; // Buffer overflow if argc >= 4.
55 }
56 #endif
57
58 // CHECK-main: PID: [[PID:[0-9]+]]
59 // CHECK-main: [[PID]].sancov: 1 PCs written
60 // CHECK-main-NOT: .so.[[PID]]
61 //
62 // CHECK-foo: PID: [[PID:[0-9]+]]
63 // CHECK-foo: [[PID]].sancov: 2 PCs written
64 // CHECK-foo-NOT: .so.[[PID]]
65 //
66 // CHECK-bar: PID: [[PID:[0-9]+]]
67 // CHECK-bar: .so.[[PID]].sancov: 1 PCs written
68 // CHECK-bar: [[PID]].sancov: 1 PCs written
69 //
70 // CHECK-foo-bar: PID: [[PID:[0-9]+]]
71 // CHECK-foo-bar: so.[[PID]].sancov: 1 PCs written
72 // CHECK-foo-bar: [[PID]].sancov: 2 PCs written
73 //
74 // CHECK-report: AddressSanitizer: global-buffer-overflow
75 // CHECK-report: PCs written
76 //
77 // CHECK-segv: AddressSanitizer: SEGV
78 // CHECK-segv: PCs written
79 //
80 // CHECK-SANCOV1: 1 PCs total
81 // CHECK-SANCOV2: 2 PCs total
82