1 | // Test that preloaded runtime works with unsanitized executables. |
2 | // |
3 | // RUN: %clangxx %s -o %t |
4 | // RUN: env LD_PRELOAD=%shared_libasan not %run %t 2>&1 | FileCheck %s |
5 | |
6 | // REQUIRES: asan-dynamic-runtime |
7 | |
8 | // This way of setting LD_PRELOAD does not work with Android test runner. |
9 | // REQUIRES: !android |
10 | |
11 | #include <stdlib.h> |
12 | |
13 | extern "C" ssize_t write(int fd, const void *buf, size_t count); |
14 | |
15 | void do_access(void *p) { |
16 | // CHECK: AddressSanitizer: heap-buffer-overflow |
17 | write(fd: 1, buf: p, count: 2); |
18 | } |
19 | |
20 | int main(int argc, char **argv) { |
21 | void *p = malloc(size: 1); |
22 | do_access(p); |
23 | return 0; |
24 | } |
25 | |