1// RUN: %clangxx_asan -fsanitize-coverage=func -DSHARED %s -shared -o %dynamiclib -fPIC %ld_flags_rpath_so 2// RUN: %clangxx_asan -fsanitize-coverage=func %s %ld_flags_rpath_exe -o %t 3// RUN: rm -rf %T/coverage && mkdir -p %T/coverage && cd %T/coverage 4// RUN: %env_asan_opts=coverage=1:verbosity=1 %run %t 2>&1 | FileCheck %s --check-prefix=CHECK-main 5// RUN: %sancov print `ls coverage.*sancov | grep -v '.so'` 2>&1 | FileCheck %s --check-prefix=CHECK-SANCOV1 6// RUN: %env_asan_opts=coverage=1:verbosity=1 %run %t foo 2>&1 | FileCheck %s --check-prefix=CHECK-foo 7// RUN: %sancov print `ls coverage.*sancov | grep -v '.so'` 2>&1 | FileCheck %s --check-prefix=CHECK-SANCOV2 8// RUN: %env_asan_opts=coverage=1:verbosity=1 %run %t bar 2>&1 | FileCheck %s --check-prefix=CHECK-bar 9// RUN: %sancov print `ls *coverage.*sancov | grep -v '.so'` 2>&1 | FileCheck %s --check-prefix=CHECK-SANCOV2 10// RUN: %env_asan_opts=coverage=1:verbosity=1 %run %t foo bar 2>&1 | FileCheck %s --check-prefix=CHECK-foo-bar 11// RUN: %sancov print `ls *coverage.*sancov | grep -v '.so'` 2>&1 | FileCheck %s --check-prefix=CHECK-SANCOV2 12// RUN: %sancov print `ls *coverage.*sancov | grep '.so'` 2>&1 | FileCheck %s --check-prefix=CHECK-SANCOV1 13// RUN: %sancov merge `ls *coverage.*sancov | grep -v '.so'` > merged-cov 14// RUN: %sancov print merged-cov 2>&1 | FileCheck %s --check-prefix=CHECK-SANCOV2 15// RUN: %env_asan_opts=coverage=1:verbosity=1 not %run %t foo bar 4 2>&1 | FileCheck %s --check-prefix=CHECK-report 16// RUN: %env_asan_opts=coverage=1:verbosity=1 not %run %t foo bar 4 5 2>&1 | FileCheck %s --check-prefix=CHECK-segv 17// RUN: rm -r %T/coverage 18// 19// https://code.google.com/p/address-sanitizer/issues/detail?id=263 20// XFAIL: android 21 22#include <sanitizer/coverage_interface.h> 23#include <assert.h> 24#include <stdio.h> 25#include <string.h> 26#include <unistd.h> 27 28#ifdef SHARED 29void bar() { printf("bar\n"); } 30#else 31__attribute__((noinline)) 32void foo() { printf("foo\n"); } 33extern void bar(); 34 35int G[4]; 36 37int main(int argc, char **argv) { 38 fprintf(stderr, "PID: %d\n", getpid()); 39 for (int i = 1; i < argc; i++) { 40 if (!strcmp(argv[i], "foo")) { 41 uintptr_t old_coverage = __sanitizer_get_total_unique_coverage(); 42 foo(); 43 uintptr_t new_coverage = __sanitizer_get_total_unique_coverage(); 44 assert(new_coverage > old_coverage); 45 } 46 if (!strcmp(argv[i], "bar")) 47 bar(); 48 } 49 if (argc == 5) { 50 static volatile char *zero = 0; 51 *zero = 0; // SEGV if argc == 5. 52 } 53 return G[argc]; // Buffer overflow if argc >= 4. 54} 55#endif 56 57// CHECK-main: PID: [[PID:[0-9]+]] 58// CHECK-main: [[PID]].sancov: 1 PCs written 59// CHECK-main-NOT: .so.[[PID]] 60// 61// CHECK-foo: PID: [[PID:[0-9]+]] 62// CHECK-foo: [[PID]].sancov: 2 PCs written 63// CHECK-foo-NOT: .so.[[PID]] 64// 65// CHECK-bar: PID: [[PID:[0-9]+]] 66// CHECK-bar: .so.[[PID]].sancov: 1 PCs written 67// CHECK-bar: [[PID]].sancov: 1 PCs written 68// 69// CHECK-foo-bar: PID: [[PID:[0-9]+]] 70// CHECK-foo-bar: so.[[PID]].sancov: 1 PCs written 71// CHECK-foo-bar: [[PID]].sancov: 2 PCs written 72// 73// CHECK-report: AddressSanitizer: global-buffer-overflow 74// CHECK-report: PCs written 75// 76// CHECK-segv: AddressSanitizer: SEGV 77// CHECK-segv: PCs written 78// 79// CHECK-SANCOV1: 1 PCs total 80// CHECK-SANCOV2: 2 PCs total 81