[compiler-rt] r223932 - Update ASan/Win test expectations broken by r223508

Timur Iskhodzhanov timurrrr at google.com
Wed Dec 10 09:56:29 PST 2014


Author: timurrrr
Date: Wed Dec 10 11:56:29 2014
New Revision: 223932

URL: http://llvm.org/viewvc/llvm-project?rev=223932&view=rev
Log:
Update ASan/Win test expectations broken by r223508

Modified:
    compiler-rt/trunk/test/asan/TestCases/Windows/dll_intercept_memcpy.cc
    compiler-rt/trunk/test/asan/TestCases/Windows/dll_intercept_memcpy_indirect.cc
    compiler-rt/trunk/test/asan/TestCases/Windows/intercept_memcpy.cc

Modified: compiler-rt/trunk/test/asan/TestCases/Windows/dll_intercept_memcpy.cc
URL: http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/test/asan/TestCases/Windows/dll_intercept_memcpy.cc?rev=223932&r1=223931&r2=223932&view=diff
==============================================================================
--- compiler-rt/trunk/test/asan/TestCases/Windows/dll_intercept_memcpy.cc (original)
+++ compiler-rt/trunk/test/asan/TestCases/Windows/dll_intercept_memcpy.cc Wed Dec 10 11:56:29 2014
@@ -23,7 +23,7 @@ int test_function() {
   memcpy(buff2, buff1, 6);
 // CHECK: AddressSanitizer: stack-buffer-overflow on address [[ADDR:0x[0-9a-f]+]]
 // CHECK: WRITE of size 6 at [[ADDR]] thread T0
-// CHECK-NEXT:  __asan_memcpy
+// CHECK-NEXT:  __asan_{{.*}}memcpy
 // CHECK-NEXT:  test_function {{.*}}dll_intercept_memcpy.cc:[[@LINE-4]]
 // CHECK: Address [[ADDR]] is located in stack of thread T0 at offset {{.*}} in frame
 // CHECK-NEXT:  test_function {{.*}}dll_intercept_memcpy.cc

Modified: compiler-rt/trunk/test/asan/TestCases/Windows/dll_intercept_memcpy_indirect.cc
URL: http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/test/asan/TestCases/Windows/dll_intercept_memcpy_indirect.cc?rev=223932&r1=223931&r2=223932&view=diff
==============================================================================
--- compiler-rt/trunk/test/asan/TestCases/Windows/dll_intercept_memcpy_indirect.cc (original)
+++ compiler-rt/trunk/test/asan/TestCases/Windows/dll_intercept_memcpy_indirect.cc Wed Dec 10 11:56:29 2014
@@ -24,7 +24,7 @@ int test_function() {
   call_memcpy(&memcpy, buff2, buff1, 6);
 // CHECK: AddressSanitizer: stack-buffer-overflow on address [[ADDR:0x[0-9a-f]+]]
 // CHECK: WRITE of size 6 at [[ADDR]] thread T0
-// CHECK-NEXT:  __asan_memcpy
+// CHECK-NEXT:  __asan_{{.*}}memcpy
 // CHECK-NEXT:  call_memcpy
 // CHECK-NEXT:  test_function {{.*}}dll_intercept_memcpy_indirect.cc:[[@LINE-5]]
 // CHECK: Address [[ADDR]] is located in stack of thread T0 at offset {{.*}} in frame

Modified: compiler-rt/trunk/test/asan/TestCases/Windows/intercept_memcpy.cc
URL: http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/test/asan/TestCases/Windows/intercept_memcpy.cc?rev=223932&r1=223931&r2=223932&view=diff
==============================================================================
--- compiler-rt/trunk/test/asan/TestCases/Windows/intercept_memcpy.cc (original)
+++ compiler-rt/trunk/test/asan/TestCases/Windows/intercept_memcpy.cc Wed Dec 10 11:56:29 2014
@@ -22,7 +22,7 @@ int main() {
   call_memcpy(&memcpy, buff2, buff1, 6);
 // CHECK: AddressSanitizer: stack-buffer-overflow on address [[ADDR:0x[0-9a-f]+]]
 // CHECK: WRITE of size 6 at [[ADDR]] thread T0
-// CHECK-NEXT:  __asan_memcpy
+// CHECK-NEXT:  __asan_{{.*}}memcpy
 // CHECK-NEXT:  call_memcpy
 // CHECK-NEXT:  main {{.*}}intercept_memcpy.cc:[[@LINE-5]]
 // CHECK: Address [[ADDR]] is located in stack of thread T0 at offset {{.*}} in frame





More information about the llvm-commits mailing list