// CHECK: Address [[ADDR]] is located in stack of thread T0 at offset {{.*}} in frame
// CHECK-NEXT: test_function {{.*}}dll_intercept_memcpy.cc
// CHECK: 'buff2' <== Memory access at offset {{.*}} overflows this variable
+ return 0;
}
// CHECK: Address [[ADDR]] is located in stack of thread T0 at offset {{.*}} in frame
// CHECK-NEXT: test_function {{.*}}dll_intercept_memcpy_indirect.cc
// CHECK: 'buff2' <== Memory access at offset {{.*}} overflows this variable
+ return 0;
}
// CHECK: Address [[ADDR]] is located in stack of thread T0 at offset {{.*}} in frame
// CHECK-NEXT: test_function {{.*}}dll_intercept_memset.cc
// CHECK: 'buff' <== Memory access at offset {{.*}} overflows this variable
+ return 0;
}
if platform.system() == 'Windows':
clang_cl_asan_cxxflags = ["-fsanitize=address",
"-Wno-deprecated-declarations",
+ "-WX",
"-D_HAS_EXCEPTIONS=0",
"-Zi"] + target_cflags
clang_invocation = build_invocation(clang_cl_asan_cxxflags)