1// Check that memset() call from a shared library gets intercepted. 2// Please always keep this file in sync with 3// ../Linux/interception-in-shared-lib-test.cc. 4 5// RUN: %clangxx_asan -O0 %s -DSHARED_LIB \ 6// RUN: -shared -o %T/libinterception-in-shared-lib-test.so \ 7// RUN: -fPIC 8// TODO(glider): figure out how to set rpath in a more portable way and unite 9// this test with ../Linux/interception-in-shared-lib-test.cc. 10// RUN: %clangxx_asan -O0 %s -o %t -Wl,-rpath,@executable-path -L%T -linterception-in-shared-lib-test && \ 11// RUN: not %run %t 2>&1 | FileCheck %s 12 13#include <stdio.h> 14#include <string.h> 15 16#if defined(SHARED_LIB) 17extern "C" 18void my_memset(void *p, size_t sz) { 19 memset(p, 0, sz); 20} 21#else 22extern "C" void my_memset(void *p, size_t sz); 23 24int main(int argc, char *argv[]) { 25 char buf[10]; 26 my_memset(buf, 11); 27 // CHECK: {{.*ERROR: AddressSanitizer: stack-buffer-overflow}} 28 // CHECK: {{WRITE of size 11 at 0x.* thread T0}} 29 // CHECK: {{0x.* in my_memset .*interception-in-shared-lib-test.cc:19}} 30 return 0; 31} 32#endif 33