| // Test that mixed static/dynamic sanitization of program objects |
| // is prohibited. |
| // |
| // RUN: %clangxx_asan -DBUILD_SO=1 -fPIC -shared %s -o %t.so |
| // RUN: %clangxx_asan_static %s %t.so -o %t |
| // RUN: not %run %t 2>&1 | FileCheck %s |
| |
| // REQUIRES: asan-dynamic-runtime |
| // XFAIL: android |
| |
| #if BUILD_SO |
| char dummy; |
| void do_access(const void *p) { dummy = ((const char *)p)[1]; } |
| #else |
| #include <stdlib.h> |
| extern void do_access(const void *p); |
| int main(int argc, char **argv) { |
| void *p = malloc(1); |
| do_access(p); |
| free(p); |
| return 0; |
| } |
| #endif |
| |
| // CHECK: Your application is linked against incompatible ASan runtimes |