| // RUN: %clangxx_asan -fsanitize-coverage=func,trace-pc-guard -DSHARED %s -shared -o %dynamiclib -fPIC %ld_flags_rpath_so |
| // RUN: %clangxx_asan -fsanitize-coverage=func,trace-pc-guard %s %ld_flags_rpath_exe -o %t |
| // RUN: rm -rf %t-dir && mkdir -p %t-dir && cd %t-dir |
| // RUN: %env_asan_opts=coverage=1:verbosity=1 %run %t 2>&1 | FileCheck %s --check-prefix=CHECK-main |
| // RUN: %sancov print coverage.*sancov 2>&1 | FileCheck %s --check-prefix=CHECK-SANCOV1 |
| // RUN: %env_asan_opts=coverage=1:verbosity=1 %run %t foo 2>&1 | FileCheck %s --check-prefix=CHECK-foo |
| // RUN: %sancov print coverage.*sancov 2>&1 | FileCheck %s --check-prefix=CHECK-SANCOV2 |
| // RUN: %env_asan_opts=coverage=1:verbosity=1 %run %t bar 2>&1 | FileCheck %s --check-prefix=CHECK-bar |
| // RUN: %sancov print coverage.*sancov 2>&1 | FileCheck %s --check-prefix=CHECK-SANCOV2 |
| // RUN: %env_asan_opts=coverage=1:verbosity=1 %run %t foo bar 2>&1 | FileCheck %s --check-prefix=CHECK-foo-bar |
| // RUN: %sancov print coverage.*sancov 2>&1 | FileCheck %s --check-prefix=CHECK-SANCOV2 |
| // RUN: %sancov print libcoverage.*sancov 2>&1 | FileCheck %s --check-prefix=CHECK-SANCOV1 |
| // RUN: %sancov merge coverage.*sancov > merged-cov |
| // RUN: %sancov print merged-cov 2>&1 | FileCheck %s --check-prefix=CHECK-SANCOV2 |
| // RUN: %env_asan_opts=coverage=1:verbosity=1 not %run %t foo bar 4 2>&1 | FileCheck %s --check-prefix=CHECK-report |
| // RUN: %env_asan_opts=coverage=1:verbosity=1 not %run %t foo bar 4 5 2>&1 | FileCheck %s --check-prefix=CHECK-segv |
| // RUN: cd .. && rm -rf %t-dir |
| // |
| // https://code.google.com/p/address-sanitizer/issues/detail?id=263 |
| // XFAIL: android |
| // UNSUPPORTED: ios |
| |
| #include <assert.h> |
| #include <stdio.h> |
| #include <string.h> |
| #include <unistd.h> |
| |
| #ifdef SHARED |
| void bar() { printf("bar\n"); } |
| #else |
| __attribute__((noinline)) |
| void foo() { printf("foo\n"); } |
| extern void bar(); |
| |
| int G[4]; |
| |
| int main(int argc, char **argv) { |
| fprintf(stderr, "PID: %d\n", getpid()); |
| for (int i = 1; i < argc; i++) { |
| if (!strcmp(argv[i], "foo")) |
| foo(); |
| if (!strcmp(argv[i], "bar")) |
| bar(); |
| } |
| if (argc == 5) { |
| static volatile char *zero = 0; |
| *zero = 0; // SEGV if argc == 5. |
| } |
| return G[argc]; // Buffer overflow if argc >= 4. |
| } |
| #endif |
| |
| // CHECK-main: PID: [[PID:[0-9]+]] |
| // CHECK-main: [[PID]].sancov: 1 PCs written |
| // CHECK-main-NOT: .so.[[PID]] |
| // |
| // CHECK-foo: PID: [[PID:[0-9]+]] |
| // CHECK-foo: [[PID]].sancov: 2 PCs written |
| // CHECK-foo-NOT: .so.[[PID]] |
| // |
| // CHECK-bar: PID: [[PID:[0-9]+]] |
| // CHECK-bar-DAG: .so.[[PID]].sancov: 1 PCs written |
| // CHECK-bar-DAG: [[PID]].sancov: 1 PCs written |
| // |
| // CHECK-foo-bar: PID: [[PID:[0-9]+]] |
| // CHECK-foo-bar-DAG: so.[[PID]].sancov: 1 PCs written |
| // CHECK-foo-bar-DAG: [[PID]].sancov: 2 PCs written |
| // |
| // CHECK-report: AddressSanitizer: global-buffer-overflow |
| // CHECK-report: PCs written |
| // |
| // CHECK-segv: AddressSanitizer: SEGV |
| // CHECK-segv: PCs written |
| // |
| // CHECK-SANCOV1: 1 PCs total |
| // CHECK-SANCOV2: 2 PCs total |