1 | // Check that unloading a module doesn't break coverage dumping for remaining |
2 | // modules. |
3 | // RUN: %clangxx_asan -fsanitize-coverage=func,trace-pc-guard -DSHARED %s -shared -o %dynamiclib1 -fPIC |
4 | // RUN: %clangxx_asan -fsanitize-coverage=func,trace-pc-guard -DSHARED %s -shared -o %dynamiclib2 -fPIC |
5 | // RUN: %clangxx_asan -fsanitize-coverage=func,trace-pc-guard %s %libdl -o %t.exe |
6 | // RUN: mkdir -p %t.tmp/coverage-module-unloaded && cd %t.tmp/coverage-module-unloaded |
7 | // RUN: %env_asan_opts=coverage=1:verbosity=1 %run %t.exe %dynamiclib1 %dynamiclib2 2>&1 | FileCheck %s |
8 | // RUN: %env_asan_opts=coverage=1:verbosity=1 %run %t.exe %dynamiclib1 %dynamiclib2 foo 2>&1 | FileCheck %s |
9 | // |
10 | // https://code.google.com/p/address-sanitizer/issues/detail?id=263 |
11 | // XFAIL: android |
12 | // UNSUPPORTED: ios |
13 | |
14 | #include <assert.h> |
15 | #include <dlfcn.h> |
16 | #include <stdint.h> |
17 | #include <stdio.h> |
18 | #include <unistd.h> |
19 | |
20 | #ifdef SHARED |
21 | extern "C" { |
22 | void bar() { printf("bar\n" ); } |
23 | } |
24 | #else |
25 | |
26 | int main(int argc, char **argv) { |
27 | fprintf(stderr, format: "PID: %d\n" , getpid()); |
28 | assert(argc > 2); |
29 | void *handle1 = dlopen(file: argv[1], RTLD_LAZY); // %dynamiclib1 |
30 | assert(handle1); |
31 | void (*bar1)() = (void (*)())dlsym(handle: handle1, name: "bar" ); |
32 | assert(bar1); |
33 | bar1(); |
34 | void *handle2 = dlopen(file: argv[2], RTLD_LAZY); // %dynamiclib2 |
35 | assert(handle2); |
36 | void (*bar2)() = (void (*)())dlsym(handle: handle2, name: "bar" ); |
37 | assert(bar2); |
38 | bar2(); |
39 | |
40 | // It matters whether the unloaded module has a higher or lower address range |
41 | // than the remaining one. Make sure to test both cases. |
42 | bool lt = reinterpret_cast<uintptr_t>(bar1) < reinterpret_cast<uintptr_t>(bar2); |
43 | if (argc < 2) |
44 | dlclose(handle: lt ? handle1 : handle2); |
45 | else |
46 | dlclose(handle: lt ? handle2 : handle1); |
47 | return 0; |
48 | } |
49 | #endif |
50 | |
51 | // CHECK: PID: [[PID:[0-9]+]] |
52 | // CHECK-DAG: exe{{.*}}[[PID]].sancov: {{.*}}PCs written |
53 | // CHECK-DAG: dynamic{{.*}}[[PID]].sancov: {{.*}}PCs written |
54 | |