1 // RUN: %clangxx_asan -fsanitize-coverage=func,trace-pc-guard -DSHARED %s -shared -o %dynamiclib -fPIC %ld_flags_rpath_so 2 // RUN: %clangxx_asan -fsanitize-coverage=func,trace-pc-guard %s %ld_flags_rpath_exe -o %t 3 // RUN: rm -rf %t-dir && mkdir -p %t-dir && cd %t-dir 4 // RUN: %env_asan_opts=coverage=1:verbosity=1 %run %t 2>&1 | FileCheck %s --check-prefix=CHECK-main 5 // RUN: %sancov print coverage.*sancov 2>&1 | FileCheck %s --check-prefix=CHECK-SANCOV1 6 // RUN: %env_asan_opts=coverage=1:verbosity=1 %run %t foo 2>&1 | FileCheck %s --check-prefix=CHECK-foo 7 // RUN: %sancov print coverage.*sancov 2>&1 | FileCheck %s --check-prefix=CHECK-SANCOV2 8 // RUN: %env_asan_opts=coverage=1:verbosity=1 %run %t bar 2>&1 | FileCheck %s --check-prefix=CHECK-bar 9 // RUN: %sancov print coverage.*sancov 2>&1 | FileCheck %s --check-prefix=CHECK-SANCOV2 10 // RUN: %env_asan_opts=coverage=1:verbosity=1 %run %t foo bar 2>&1 | FileCheck %s --check-prefix=CHECK-foo-bar 11 // RUN: %sancov print coverage.*sancov 2>&1 | FileCheck %s --check-prefix=CHECK-SANCOV2 12 // RUN: %sancov print libcoverage.*sancov 2>&1 | FileCheck %s --check-prefix=CHECK-SANCOV1 13 // RUN: %sancov merge coverage.*sancov > merged-cov 14 // RUN: %sancov print merged-cov 2>&1 | FileCheck %s --check-prefix=CHECK-SANCOV2 15 // RUN: %env_asan_opts=coverage=1:verbosity=1 not %run %t foo bar 4 2>&1 | FileCheck %s --check-prefix=CHECK-report 16 // RUN: %env_asan_opts=coverage=1:verbosity=1 not %run %t foo bar 4 5 2>&1 | FileCheck %s --check-prefix=CHECK-segv 17 // RUN: cd .. && rm -rf %t-dir 18 // 19 // https://code.google.com/p/address-sanitizer/issues/detail?id=263 20 // XFAIL: android 21 // UNSUPPORTED: ios 22 23 #include <assert.h> 24 #include <stdio.h> 25 #include <string.h> 26 #include <unistd.h> 27 28 #ifdef SHARED 29 void bar() { printf("bar\n"); } 30 #else 31 __attribute__((noinline)) 32 void foo() { printf("foo\n"); } 33 extern void bar(); 34 35 int G[4]; 36 37 int main(int argc, char **argv) { 38 fprintf(stderr, "PID: %d\n", getpid()); 39 for (int i = 1; i < argc; i++) { 40 if (!strcmp(argv[i], "foo")) 41 foo(); 42 if (!strcmp(argv[i], "bar")) 43 bar(); 44 } 45 if (argc == 5) { 46 static volatile char *zero = 0; 47 *zero = 0; // SEGV if argc == 5. 48 } 49 return G[argc]; // Buffer overflow if argc >= 4. 50 } 51 #endif 52 53 // CHECK-main: PID: [[PID:[0-9]+]] 54 // CHECK-main: [[PID]].sancov: 1 PCs written 55 // CHECK-main-NOT: .so.[[PID]] 56 // 57 // CHECK-foo: PID: [[PID:[0-9]+]] 58 // CHECK-foo: [[PID]].sancov: 2 PCs written 59 // CHECK-foo-NOT: .so.[[PID]] 60 // 61 // CHECK-bar: PID: [[PID:[0-9]+]] 62 // CHECK-bar-DAG: .so.[[PID]].sancov: 1 PCs written 63 // CHECK-bar-DAG: [[PID]].sancov: 1 PCs written 64 // 65 // CHECK-foo-bar: PID: [[PID:[0-9]+]] 66 // CHECK-foo-bar-DAG: so.[[PID]].sancov: 1 PCs written 67 // CHECK-foo-bar-DAG: [[PID]].sancov: 2 PCs written 68 // 69 // CHECK-report: AddressSanitizer: global-buffer-overflow 70 // CHECK-report: PCs written 71 // 72 // CHECK-segv: AddressSanitizer: SEGV 73 // CHECK-segv: PCs written 74 // 75 // CHECK-SANCOV1: 1 PCs total 76 // CHECK-SANCOV2: 2 PCs total 77