From d6535ea4c4d49078a93735b315b8518fb692a592 Mon Sep 17 00:00:00 2001 From: Alexey Samsonov Date: Tue, 1 Apr 2014 13:16:30 +0000 Subject: [ASan] Optional support for dynamic ASan runtime on Linux. Based on http://llvm-reviews.chandlerc.com/D3042 by Yuri Gribov! git-svn-id: https://llvm.org/svn/llvm-project/compiler-rt/trunk@205308 91177308-0d34-0410-b5e6-96231b3b80d8 --- .../asan/TestCases/Linux/asan_rt_confict_test-2.cc | 24 ++++++++++++++++++++++ 1 file changed, 24 insertions(+) create mode 100644 test/asan/TestCases/Linux/asan_rt_confict_test-2.cc (limited to 'test/asan/TestCases/Linux/asan_rt_confict_test-2.cc') diff --git a/test/asan/TestCases/Linux/asan_rt_confict_test-2.cc b/test/asan/TestCases/Linux/asan_rt_confict_test-2.cc new file mode 100644 index 000000000..3898e7bb1 --- /dev/null +++ b/test/asan/TestCases/Linux/asan_rt_confict_test-2.cc @@ -0,0 +1,24 @@ +// Test that mixed static/dynamic sanitization of program objects +// is prohibited. +// +// RUN: %clangxx_asan -DBUILD_SO=1 -fPIC -shared %s -o %t.so +// RUN: %clangxx_asan_static %s %t.so -o %t +// RUN: not %t 2>&1 | FileCheck %s + +// REQUIRES: asan-dynamic-runtime + +#if BUILD_SO +char dummy; +void do_access(const void *p) { dummy = ((const char *)p)[1]; } +#else +#include +extern void do_access(const void *p); +int main(int argc, char **argv) { + void *p = malloc(1); + do_access(p); + free(p); + return 0; +} +#endif + +// CHECK: Your application is linked against incompatible ASan runtimes -- cgit v1.2.3