1 // Check that unloading a module doesn't break coverage dumping for remaining
3 // RUN: %clangxx_asan -fsanitize-coverage=func,trace-pc-guard -DSHARED %s -shared -o %dynamiclib1 -fPIC
4 // RUN: %clangxx_asan -fsanitize-coverage=func,trace-pc-guard -DSHARED %s -shared -o %dynamiclib2 -fPIC
5 // RUN: %clangxx_asan -fsanitize-coverage=func,trace-pc-guard %s %libdl -o %t.exe
6 // RUN: mkdir -p %t.tmp/coverage-module-unloaded && cd %t.tmp/coverage-module-unloaded
7 // RUN: %env_asan_opts=coverage=1:verbosity=1 %run %t.exe %dynamiclib1 %dynamiclib2 2>&1 | FileCheck %s
8 // RUN: %env_asan_opts=coverage=1:verbosity=1 %run %t.exe %dynamiclib1 %dynamiclib2 foo 2>&1 | FileCheck %s
10 // https://code.google.com/p/address-sanitizer/issues/detail?id=263
22 void bar() { printf("bar\n"); }
26 int main(int argc
, char **argv
) {
27 fprintf(stderr
, "PID: %d\n", getpid());
29 void *handle1
= dlopen(argv
[1], RTLD_LAZY
); // %dynamiclib1
31 void (*bar1
)() = (void (*)())dlsym(handle1
, "bar");
34 void *handle2
= dlopen(argv
[2], RTLD_LAZY
); // %dynamiclib2
36 void (*bar2
)() = (void (*)())dlsym(handle2
, "bar");
40 // It matters whether the unloaded module has a higher or lower address range
41 // than the remaining one. Make sure to test both cases.
42 bool lt
= reinterpret_cast<uintptr_t>(bar1
) < reinterpret_cast<uintptr_t>(bar2
);
44 dlclose(lt
? handle1
: handle2
);
46 dlclose(lt
? handle2
: handle1
);
51 // CHECK: PID: [[PID:[0-9]+]]
52 // CHECK-DAG: exe{{.*}}[[PID]].sancov: {{.*}}PCs written
53 // CHECK-DAG: dynamic{{.*}}[[PID]].sancov: {{.*}}PCs written