| 1 | // Test that mixed static/dynamic sanitization of program objects |
| 2 | // is prohibited. |
| 3 | // |
| 4 | // RUN: %clangxx_asan -DBUILD_SO=1 -fPIC -shared %s -o %dynamiclib |
| 5 | // RUN: %clangxx_asan_static %s %ld_flags_rpath_exe -o %t |
| 6 | // RUN: not %run %t 2>&1 | FileCheck %s |
| 7 | |
| 8 | // UNSUPPORTED: target={{.*}} |
| 9 | // REQUIRES: asan-dynamic-runtime |
| 10 | // XFAIL: android |
| 11 | |
| 12 | #if BUILD_SO |
| 13 | char dummy; |
| 14 | void do_access(const void *p) { dummy = ((const char *)p)[1]; } |
| 15 | #else |
| 16 | #include <stdlib.h> |
| 17 | extern void do_access(const void *p); |
| 18 | int main(int argc, char **argv) { |
| 19 | void *p = malloc(size: 1); |
| 20 | do_access(p); |
| 21 | free(ptr: p); |
| 22 | return 0; |
| 23 | } |
| 24 | #endif |
| 25 | |
| 26 | // CHECK: Your application is linked against incompatible ASan runtimes |
| 27 | |