| 1 | // Test that non-sanitized executables work with sanitized shared libs |
| 2 | // and preloaded runtime. |
| 3 | // |
| 4 | // RUN: %clangxx -DBUILD_SO=1 -fPIC -shared %s -o %t.so |
| 5 | // RUN: %clangxx %s %t.so -o %t |
| 6 | // |
| 7 | // RUN: %clangxx_asan -DBUILD_SO=1 -fPIC -shared %s -o %t.so |
| 8 | // RUN: env LD_PRELOAD=%shared_libasan not %run %t 2>&1 | FileCheck %s |
| 9 | |
| 10 | // REQUIRES: asan-dynamic-runtime |
| 11 | |
| 12 | // This way of setting LD_PRELOAD does not work with Android test runner. |
| 13 | // REQUIRES: !android |
| 14 | |
| 15 | #if BUILD_SO |
| 16 | char dummy; |
| 17 | void do_access(const void *p) { |
| 18 | // CHECK: AddressSanitizer: heap-buffer-overflow |
| 19 | dummy = ((const char *)p)[1]; |
| 20 | } |
| 21 | #else |
| 22 | #include <stdlib.h> |
| 23 | extern void do_access(const void *p); |
| 24 | int main(int argc, char **argv) { |
| 25 | void *p = malloc(size: 1); |
| 26 | do_access(p); |
| 27 | free(ptr: p); |
| 28 | return 0; |
| 29 | } |
| 30 | #endif |
| 31 | |