xref: /aosp_15_r20/external/compiler-rt/test/asan/TestCases/Posix/coverage-sandboxing.cc (revision 7c3d14c8b49c529e04be81a3ce6f5cc23712e4c6)
1*7c3d14c8STreehugger Robot // RUN: %clangxx_asan -fsanitize-coverage=bb -DSHARED %s -shared -o %dynamiclib -fPIC %ld_flags_rpath_so
2*7c3d14c8STreehugger Robot // RUN: %clangxx_asan -fsanitize-coverage=func %s -o %t %ld_flags_rpath_exe
3*7c3d14c8STreehugger Robot 
4*7c3d14c8STreehugger Robot // RUN: rm -rf %T/coverage_sandboxing_test
5*7c3d14c8STreehugger Robot // RUN: mkdir %T/coverage_sandboxing_test && cd %T/coverage_sandboxing_test
6*7c3d14c8STreehugger Robot // RUN: mkdir vanilla && cd vanilla
7*7c3d14c8STreehugger Robot // RUN: %env_asan_opts=coverage=1:verbosity=1 %run %t 2>&1  | FileCheck %s --check-prefix=CHECK-vanilla
8*7c3d14c8STreehugger Robot // RUN: mkdir ../sandbox1 && cd ../sandbox1
9*7c3d14c8STreehugger Robot // RUN: %env_asan_opts=coverage=1:verbosity=1 %run %t a 2>&1 | FileCheck %s --check-prefix=CHECK-sandbox
10*7c3d14c8STreehugger Robot // RUN: %sancov unpack coverage_sandboxing_test.sancov.packed
11*7c3d14c8STreehugger Robot // RUN: mkdir ../sandbox2 && cd ../sandbox2
12*7c3d14c8STreehugger Robot // RUN: %env_asan_opts=coverage=1:verbosity=1 %run %t a b 2>&1 | FileCheck %s --check-prefix=CHECK-sandbox
13*7c3d14c8STreehugger Robot // RUN: %sancov unpack coverage_sandboxing_test.sancov.packed
14*7c3d14c8STreehugger Robot // RUN: cd ..
15*7c3d14c8STreehugger Robot // RUN: %sancov print vanilla/`basename %dynamiclib`*.sancov > vanilla.txt
16*7c3d14c8STreehugger Robot // RUN: %sancov print sandbox1/`basename %dynamiclib`*.sancov > sandbox1.txt
17*7c3d14c8STreehugger Robot // RUN: %sancov print sandbox2/`basename %dynamiclib`*.sancov > sandbox2.txt
18*7c3d14c8STreehugger Robot // RUN: diff vanilla.txt sandbox1.txt
19*7c3d14c8STreehugger Robot // RUN: diff vanilla.txt sandbox2.txt
20*7c3d14c8STreehugger Robot // RUN: rm -r %T/coverage_sandboxing_test
21*7c3d14c8STreehugger Robot 
22*7c3d14c8STreehugger Robot // https://code.google.com/p/address-sanitizer/issues/detail?id=263
23*7c3d14c8STreehugger Robot // XFAIL: android
24*7c3d14c8STreehugger Robot 
25*7c3d14c8STreehugger Robot #include <assert.h>
26*7c3d14c8STreehugger Robot #include <fcntl.h>
27*7c3d14c8STreehugger Robot #include <stdio.h>
28*7c3d14c8STreehugger Robot #include <string.h>
29*7c3d14c8STreehugger Robot #include <unistd.h>
30*7c3d14c8STreehugger Robot 
31*7c3d14c8STreehugger Robot #include <sanitizer/coverage_interface.h>
32*7c3d14c8STreehugger Robot 
33*7c3d14c8STreehugger Robot #define bb0(n)                        \
34*7c3d14c8STreehugger Robot   case n:                             \
35*7c3d14c8STreehugger Robot     fprintf(stderr, "foo: %d\n", n);  \
36*7c3d14c8STreehugger Robot     break;
37*7c3d14c8STreehugger Robot 
38*7c3d14c8STreehugger Robot #define bb1(n) bb0(n) bb0(n + 1)
39*7c3d14c8STreehugger Robot #define bb2(n) bb1(n) bb1(n + 2)
40*7c3d14c8STreehugger Robot #define bb3(n) bb2(n) bb2(n + 4)
41*7c3d14c8STreehugger Robot #define bb4(n) bb3(n) bb3(n + 8)
42*7c3d14c8STreehugger Robot #define bb5(n) bb4(n) bb4(n + 16)
43*7c3d14c8STreehugger Robot #define bb6(n) bb5(n) bb5(n + 32)
44*7c3d14c8STreehugger Robot #define bb7(n) bb6(n) bb6(n + 64)
45*7c3d14c8STreehugger Robot #define bb8(n) bb7(n) bb7(n + 128)
46*7c3d14c8STreehugger Robot 
47*7c3d14c8STreehugger Robot #ifdef SHARED
foo(int i)48*7c3d14c8STreehugger Robot void foo(int i) {
49*7c3d14c8STreehugger Robot   switch(i) {
50*7c3d14c8STreehugger Robot     // 256 basic blocks
51*7c3d14c8STreehugger Robot     bb8(0)
52*7c3d14c8STreehugger Robot   }
53*7c3d14c8STreehugger Robot }
54*7c3d14c8STreehugger Robot #else
55*7c3d14c8STreehugger Robot extern void foo(int i);
56*7c3d14c8STreehugger Robot 
main(int argc,char ** argv)57*7c3d14c8STreehugger Robot int main(int argc, char **argv) {
58*7c3d14c8STreehugger Robot   assert(argc <= 3);
59*7c3d14c8STreehugger Robot   for (int i = 0; i < 256; i++) foo(i);
60*7c3d14c8STreehugger Robot   fprintf(stderr, "PID: %d\n", getpid());
61*7c3d14c8STreehugger Robot   if (argc == 1) {
62*7c3d14c8STreehugger Robot     // Vanilla mode, dump to individual files.
63*7c3d14c8STreehugger Robot     return 0;
64*7c3d14c8STreehugger Robot   }
65*7c3d14c8STreehugger Robot   // Dump to packed file.
66*7c3d14c8STreehugger Robot   int fd = creat("coverage_sandboxing_test.sancov.packed", 0660);
67*7c3d14c8STreehugger Robot   __sanitizer_sandbox_arguments args = {0};
68*7c3d14c8STreehugger Robot   args.coverage_sandboxed = 1;
69*7c3d14c8STreehugger Robot   args.coverage_fd = fd;
70*7c3d14c8STreehugger Robot   if (argc == 2)
71*7c3d14c8STreehugger Robot     // Write to packed file, do not split into blocks.
72*7c3d14c8STreehugger Robot     args.coverage_max_block_size = 0;
73*7c3d14c8STreehugger Robot   else if (argc == 3)
74*7c3d14c8STreehugger Robot     // Write to packed file, split into blocks (as if writing to a socket).
75*7c3d14c8STreehugger Robot     args.coverage_max_block_size = 100;
76*7c3d14c8STreehugger Robot   __sanitizer_sandbox_on_notify(&args);
77*7c3d14c8STreehugger Robot   return 0;
78*7c3d14c8STreehugger Robot }
79*7c3d14c8STreehugger Robot #endif
80*7c3d14c8STreehugger Robot 
81*7c3d14c8STreehugger Robot // CHECK-vanilla: PID: [[PID:[0-9]+]]
82*7c3d14c8STreehugger Robot // CHECK-vanilla: .so.[[PID]].sancov: 257 PCs written
83*7c3d14c8STreehugger Robot // CHECK-vanilla: [[PID]].sancov: 1 PCs written
84*7c3d14c8STreehugger Robot 
85*7c3d14c8STreehugger Robot // CHECK-sandbox: PID: [[PID:[0-9]+]]
86*7c3d14c8STreehugger Robot // CHECK-sandbox: 257 PCs written to packed file
87