1 // Test that mixed static/dynamic sanitization of program objects
2 // is prohibited.
3 //
4 // RUN: %clangxx_asan -DBUILD_SO=1 -fPIC -shared %s -o %dynamiclib
5 // RUN: %clangxx_asan_static %s %ld_flags_rpath_exe -o %t
6 // RUN: not %run %t 2>&1 | FileCheck %s
7 
8 // REQUIRES: asan-dynamic-runtime
9 // XFAIL: android
10 
11 #if BUILD_SO
12 char dummy;
do_access(const void * p)13 void do_access(const void *p) { dummy = ((const char *)p)[1]; }
14 #else
15 #include <stdlib.h>
16 extern void do_access(const void *p);
main(int argc,char ** argv)17 int main(int argc, char **argv) {
18   void *p = malloc(1);
19   do_access(p);
20   free(p);
21   return 0;
22 }
23 #endif
24 
25 // CHECK: Your application is linked against incompatible ASan runtimes
26