* AddressSanitizerContainerOverflow has false positives because not
all dependencies are compiled with ASAN according to:
https://github.com/google/sanitizers/wiki/AddressSanitizerContainerOverflow
* Hence we need to disable container overflow check. We do this at
compile time per instructiosn at:
https://github.com/google/sanitizers/wiki/AddressSanitizerFlags#run-time-flags
Bug:
175033589
Test: gd/cert/run
Tag: #gd-refactor
Change-Id: I80a0fbcef022101b57d1c68919add6acf6aa81e4
],
},
},
+ sanitize: {
+ address: true,
+ cfi: true,
+ }
}
cc_test {
using ::bluetooth::hal::HciHalHostRootcanalConfig;
using ::bluetooth::os::Thread;
+extern "C" const char* __asan_default_options() {
+ return "detect_container_overflow=0";
+}
+
namespace {
::bluetooth::facade::GrpcRootServer grpc_root_server;
constexpr uint16_t kHciServerPort = 6402;
constexpr uint16_t kLinkServerPort = 6403;
+extern "C" const char* __asan_default_options() {
+ return "detect_container_overflow=0";
+}
+
bool crash_callback(const void* crash_context, size_t crash_context_size,
__attribute__((unused)) void* context) {
pid_t tid = BACKTRACE_CURRENT_THREAD;