1 | // Test that mixed static/dynamic sanitization of program objects |
2 | // is prohibited. |
3 | // |
4 | // RUN: %clangxx_asan -DBUILD_SO=1 -fPIC -shared %s -o %dynamiclib |
5 | // RUN: %clangxx_asan_static %s %ld_flags_rpath_exe -o %t |
6 | // RUN: not %run %t 2>&1 | FileCheck %s |
7 | |
8 | // UNSUPPORTED: target={{.*}} |
9 | // REQUIRES: asan-dynamic-runtime |
10 | // XFAIL: android |
11 | |
12 | #if BUILD_SO |
13 | char dummy; |
14 | void do_access(const void *p) { dummy = ((const char *)p)[1]; } |
15 | #else |
16 | #include <stdlib.h> |
17 | extern void do_access(const void *p); |
18 | int main(int argc, char **argv) { |
19 | void *p = malloc(size: 1); |
20 | do_access(p); |
21 | free(ptr: p); |
22 | return 0; |
23 | } |
24 | #endif |
25 | |
26 | // CHECK: Your application is linked against incompatible ASan runtimes |
27 | |