There might be a situation when asan-ed binary links against DSO which were built with FORTIFY_SOURCE option, in case DSO has strcat, strncat, strcpy or strncpy functions, ASan should has interceptors for the "fortified" functions to be able to handle potential memory bugs.
GCC and clang produces different code with this functions:
in case compiler is gcc, it replaces strcat, strncat, strcpy or strncpy to "fortifed" functions, but clang generates code which does not have this functions at all.
So, to be able to test the interceptors, I've manually added strcat_chk, strncat_chk, strcpy_chk, strncpy_chk functions to the tests.
Interceptor should use to_size.