1 // Check that unloading a module doesn't break coverage dumping for remaining 2 // modules. 3 // RUN: %clangxx_asan -fsanitize-coverage=func -DSHARED %s -shared -o %dynamiclib1 -fPIC 4 // RUN: %clangxx_asan -fsanitize-coverage=func -DSHARED %s -shared -o %dynamiclib2 -fPIC 5 // RUN: %clangxx_asan -fsanitize-coverage=func %s %libdl -o %t 6 // RUN: mkdir -p %T/coverage-module-unloaded && cd %T/coverage-module-unloaded 7 // RUN: %env_asan_opts=coverage=1:verbosity=1 %run %t %dynamiclib1 %dynamiclib2 2>&1 | FileCheck %s 8 // RUN: %env_asan_opts=coverage=1:verbosity=1 %run %t %dynamiclib1 %dynamiclib2 foo 2>&1 | FileCheck %s 9 // RUN: rm -r %T/coverage-module-unloaded 10 // 11 // https://code.google.com/p/address-sanitizer/issues/detail?id=263 12 // XFAIL: android 13 14 #include <assert.h> 15 #include <dlfcn.h> 16 #include <stdio.h> 17 #include <unistd.h> 18 19 #ifdef SHARED 20 extern "C" { bar()21void bar() { printf("bar\n"); } 22 } 23 #else 24 main(int argc,char ** argv)25int main(int argc, char **argv) { 26 fprintf(stderr, "PID: %d\n", getpid()); 27 assert(argc > 2); 28 void *handle1 = dlopen(argv[1], RTLD_LAZY); // %dynamiclib1 29 assert(handle1); 30 void (*bar1)() = (void (*)())dlsym(handle1, "bar"); 31 assert(bar1); 32 bar1(); 33 void *handle2 = dlopen(argv[2], RTLD_LAZY); // %dynamiclib2 34 assert(handle2); 35 void (*bar2)() = (void (*)())dlsym(handle2, "bar"); 36 assert(bar2); 37 bar2(); 38 39 // It matters whether the unloaded module has a higher or lower address range 40 // than the remaining one. Make sure to test both cases. 41 if (argc < 2) 42 dlclose(bar1 < bar2 ? handle1 : handle2); 43 else 44 dlclose(bar1 < bar2 ? handle2 : handle1); 45 return 0; 46 } 47 #endif 48 49 // CHECK: PID: [[PID:[0-9]+]] 50 // CHECK: [[PID]].sancov: 1 PCs written 51 // CHECK: coverage-module-unloaded{{.*}}1.[[PID]] 52 // CHECK: coverage-module-unloaded{{.*}}2.[[PID]] 53 // Even though we've unloaded one of the libs we still dump the coverage file 54 // for that lib (although the data will be inaccurate, if at all useful) 55