forked from OSchip/llvm-project
81 lines
3.2 KiB
C++
81 lines
3.2 KiB
C++
// RUN: %clangxx_asan -fsanitize-coverage=func -DSHARED %s -shared -o %dynamiclib -fPIC %ld_flags_rpath_so
|
|
// RUN: %clangxx_asan -fsanitize-coverage=func %s %ld_flags_rpath_exe -o %t
|
|
// RUN: rm -rf %T/coverage && mkdir -p %T/coverage && cd %T/coverage
|
|
// RUN: %env_asan_opts=coverage=1:verbosity=1 %run %t 2>&1 | FileCheck %s --check-prefix=CHECK-main
|
|
// RUN: %sancov print `ls coverage.*sancov | grep -v '.so'` 2>&1 | FileCheck %s --check-prefix=CHECK-SANCOV1
|
|
// RUN: %env_asan_opts=coverage=1:verbosity=1 %run %t foo 2>&1 | FileCheck %s --check-prefix=CHECK-foo
|
|
// RUN: %sancov print `ls coverage.*sancov | grep -v '.so'` 2>&1 | FileCheck %s --check-prefix=CHECK-SANCOV2
|
|
// RUN: %env_asan_opts=coverage=1:verbosity=1 %run %t bar 2>&1 | FileCheck %s --check-prefix=CHECK-bar
|
|
// RUN: %sancov print `ls *coverage.*sancov | grep -v '.so'` 2>&1 | FileCheck %s --check-prefix=CHECK-SANCOV2
|
|
// RUN: %env_asan_opts=coverage=1:verbosity=1 %run %t foo bar 2>&1 | FileCheck %s --check-prefix=CHECK-foo-bar
|
|
// RUN: %sancov print `ls *coverage.*sancov | grep -v '.so'` 2>&1 | FileCheck %s --check-prefix=CHECK-SANCOV2
|
|
// RUN: %sancov print `ls *coverage.*sancov | grep '.so'` 2>&1 | FileCheck %s --check-prefix=CHECK-SANCOV1
|
|
// RUN: %sancov merge `ls *coverage.*sancov | grep -v '.so'` > merged-cov
|
|
// RUN: %sancov print merged-cov 2>&1 | FileCheck %s --check-prefix=CHECK-SANCOV2
|
|
// RUN: %env_asan_opts=coverage=1:verbosity=1 not %run %t foo bar 4 2>&1 | FileCheck %s --check-prefix=CHECK-report
|
|
// RUN: %env_asan_opts=coverage=1:verbosity=1 not %run %t foo bar 4 5 2>&1 | FileCheck %s --check-prefix=CHECK-segv
|
|
// RUN: rm -r %T/coverage
|
|
//
|
|
// https://code.google.com/p/address-sanitizer/issues/detail?id=263
|
|
// XFAIL: android
|
|
|
|
#include <sanitizer/coverage_interface.h>
|
|
#include <assert.h>
|
|
#include <stdio.h>
|
|
#include <string.h>
|
|
#include <unistd.h>
|
|
|
|
#ifdef SHARED
|
|
void bar() { printf("bar\n"); }
|
|
#else
|
|
__attribute__((noinline))
|
|
void foo() { printf("foo\n"); }
|
|
extern void bar();
|
|
|
|
int G[4];
|
|
|
|
int main(int argc, char **argv) {
|
|
fprintf(stderr, "PID: %d\n", getpid());
|
|
for (int i = 1; i < argc; i++) {
|
|
if (!strcmp(argv[i], "foo")) {
|
|
uintptr_t old_coverage = __sanitizer_get_total_unique_coverage();
|
|
foo();
|
|
uintptr_t new_coverage = __sanitizer_get_total_unique_coverage();
|
|
assert(new_coverage > old_coverage);
|
|
}
|
|
if (!strcmp(argv[i], "bar"))
|
|
bar();
|
|
}
|
|
if (argc == 5) {
|
|
static volatile char *zero = 0;
|
|
*zero = 0; // SEGV if argc == 5.
|
|
}
|
|
return G[argc]; // Buffer overflow if argc >= 4.
|
|
}
|
|
#endif
|
|
|
|
// CHECK-main: PID: [[PID:[0-9]+]]
|
|
// CHECK-main: [[PID]].sancov: 1 PCs written
|
|
// CHECK-main-NOT: .so.[[PID]]
|
|
//
|
|
// CHECK-foo: PID: [[PID:[0-9]+]]
|
|
// CHECK-foo: [[PID]].sancov: 2 PCs written
|
|
// CHECK-foo-NOT: .so.[[PID]]
|
|
//
|
|
// CHECK-bar: PID: [[PID:[0-9]+]]
|
|
// CHECK-bar: .so.[[PID]].sancov: 1 PCs written
|
|
// CHECK-bar: [[PID]].sancov: 1 PCs written
|
|
//
|
|
// CHECK-foo-bar: PID: [[PID:[0-9]+]]
|
|
// CHECK-foo-bar: so.[[PID]].sancov: 1 PCs written
|
|
// CHECK-foo-bar: [[PID]].sancov: 2 PCs written
|
|
//
|
|
// CHECK-report: AddressSanitizer: global-buffer-overflow
|
|
// CHECK-report: PCs written
|
|
//
|
|
// CHECK-segv: AddressSanitizer: SEGV
|
|
// CHECK-segv: PCs written
|
|
//
|
|
// CHECK-SANCOV1: 1 PCs total
|
|
// CHECK-SANCOV2: 2 PCs total
|