1// Check that unloading a module doesn't break coverage dumping for remaining 2// modules. 3// RUN: %clangxx_asan -fsanitize-coverage=func -DSHARED %s -shared -o %dynamiclib1 -fPIC 4// RUN: %clangxx_asan -fsanitize-coverage=func -DSHARED %s -shared -o %dynamiclib2 -fPIC 5// RUN: %clangxx_asan -fsanitize-coverage=func %s %libdl -o %t 6// RUN: mkdir -p %T/coverage-module-unloaded && cd %T/coverage-module-unloaded 7// RUN: %env_asan_opts=coverage=1:verbosity=1 %run %t %dynamiclib1 %dynamiclib2 2>&1 | FileCheck %s 8// RUN: %env_asan_opts=coverage=1:verbosity=1 %run %t %dynamiclib1 %dynamiclib2 foo 2>&1 | FileCheck %s 9// RUN: rm -r %T/coverage-module-unloaded 10// 11// https://code.google.com/p/address-sanitizer/issues/detail?id=263 12// XFAIL: android 13 14#include <assert.h> 15#include <dlfcn.h> 16#include <stdio.h> 17#include <unistd.h> 18 19#ifdef SHARED 20extern "C" { 21void bar() { printf("bar\n"); } 22} 23#else 24 25int main(int argc, char **argv) { 26 fprintf(stderr, "PID: %d\n", getpid()); 27 assert(argc > 2); 28 void *handle1 = dlopen(argv[1], RTLD_LAZY); // %dynamiclib1 29 assert(handle1); 30 void (*bar1)() = (void (*)())dlsym(handle1, "bar"); 31 assert(bar1); 32 bar1(); 33 void *handle2 = dlopen(argv[2], RTLD_LAZY); // %dynamiclib2 34 assert(handle2); 35 void (*bar2)() = (void (*)())dlsym(handle2, "bar"); 36 assert(bar2); 37 bar2(); 38 39 // It matters whether the unloaded module has a higher or lower address range 40 // than the remaining one. Make sure to test both cases. 41 if (argc < 2) 42 dlclose(bar1 < bar2 ? handle1 : handle2); 43 else 44 dlclose(bar1 < bar2 ? handle2 : handle1); 45 return 0; 46} 47#endif 48 49// CHECK: PID: [[PID:[0-9]+]] 50// CHECK: [[PID]].sancov: 1 PCs written 51// CHECK: coverage-module-unloaded{{.*}}1.[[PID]] 52// CHECK: coverage-module-unloaded{{.*}}2.[[PID]] 53// Even though we've unloaded one of the libs we still dump the coverage file 54// for that lib (although the data will be inaccurate, if at all useful) 55