1 | // Test that mixed static/dynamic sanitization of program objects |
2 | // is prohibited. |
3 | // |
4 | // RUN: %clangxx_asan -DBUILD_SO=1 -fPIC -shared %s -o %dynamiclib |
5 | // RUN: %clangxx_asan_static %s %ld_flags_rpath_exe -o %t |
6 | // RUN: not %run %t 2>&1 | FileCheck %s |
7 | |
8 | // REQUIRES: asan-dynamic-runtime |
9 | // XFAIL: android |
10 | |
11 | #if BUILD_SO |
12 | char dummy; |
13 | void do_access(const void *p) { dummy = ((const char *)p)[1]; } |
14 | #else |
15 | #include <stdlib.h> |
16 | extern void do_access(const void *p); |
17 | int main(int argc, char **argv) { |
18 | void *p = malloc(size: 1); |
19 | do_access(p); |
20 | free(ptr: p); |
21 | return 0; |
22 | } |
23 | #endif |
24 | |
25 | // CHECK: Your application is linked against incompatible ASan runtimes |
26 | |