[compiler-rt] a32a163 - [asan] Fix Windows tests after StripFunctionName() improvements

Marco Elver via llvm-commits llvm-commits at lists.llvm.org
Thu May 25 08:56:34 PDT 2023


Author: Marco Elver
Date: 2023-05-25T17:54:50+02:00
New Revision: a32a16311050fbccc03638b197910dc1415f60ab

URL: https://github.com/llvm/llvm-project/commit/a32a16311050fbccc03638b197910dc1415f60ab
DIFF: https://github.com/llvm/llvm-project/commit/a32a16311050fbccc03638b197910dc1415f60ab.diff

LOG: [asan] Fix Windows tests after StripFunctionName() improvements

Stacktraces should no longer show __asan_wrap_, but the "normal"
function name.

Reflect that in tests.

Added: 
    

Modified: 
    compiler-rt/test/asan/TestCases/Windows/dll_intercept_memcpy_indirect.cpp
    compiler-rt/test/asan/TestCases/Windows/intercept_memcpy.cpp
    compiler-rt/test/asan/TestCases/Windows/intercept_strdup.cpp

Removed: 
    


################################################################################
diff  --git a/compiler-rt/test/asan/TestCases/Windows/dll_intercept_memcpy_indirect.cpp b/compiler-rt/test/asan/TestCases/Windows/dll_intercept_memcpy_indirect.cpp
index f79e4d6dbcef5..0bdd350ed409b 100644
--- a/compiler-rt/test/asan/TestCases/Windows/dll_intercept_memcpy_indirect.cpp
+++ b/compiler-rt/test/asan/TestCases/Windows/dll_intercept_memcpy_indirect.cpp
@@ -24,7 +24,7 @@ int test_function() {
   call_memcpy(&memcpy, buff2, buff1, 6);
 // CHECK: AddressSanitizer: stack-buffer-overflow on address [[ADDR:0x[0-9a-f]+]]
 // CHECK: WRITE of size 6 at [[ADDR]] thread T0
-// CHECK-NEXT:  __asan_{{.*}}mem{{.*}}
+// CHECK-NEXT:  mem{{.*}}
 // CHECK-NEXT:  call_memcpy
 // CHECK-NEXT:  test_function {{.*}}dll_intercept_memcpy_indirect.cpp:[[@LINE-5]]
 // CHECK: Address [[ADDR]] is located in stack of thread T0 at offset {{.*}} in frame

diff  --git a/compiler-rt/test/asan/TestCases/Windows/intercept_memcpy.cpp b/compiler-rt/test/asan/TestCases/Windows/intercept_memcpy.cpp
index eda82a4279dcf..a80ab09b0e3bf 100644
--- a/compiler-rt/test/asan/TestCases/Windows/intercept_memcpy.cpp
+++ b/compiler-rt/test/asan/TestCases/Windows/intercept_memcpy.cpp
@@ -22,7 +22,7 @@ int main() {
   call_memcpy(&memcpy, buff2, buff1, 6);
 // CHECK: AddressSanitizer: stack-buffer-overflow on address [[ADDR:0x[0-9a-f]+]]
 // CHECK: WRITE of size 6 at [[ADDR]] thread T0
-// CHECK-NEXT:  __asan_{{.*}}mem{{.*}}
+// CHECK-NEXT:  mem{{.*}}
 // CHECK-NEXT:  call_mem{{.*}}
 // CHECK-NEXT:  main {{.*}}intercept_memcpy.cpp:[[@LINE-5]]
 // CHECK: Address [[ADDR]] is located in stack of thread T0 at offset {{.*}} in frame

diff  --git a/compiler-rt/test/asan/TestCases/Windows/intercept_strdup.cpp b/compiler-rt/test/asan/TestCases/Windows/intercept_strdup.cpp
index 244485ded36db..b519f53fe4269 100644
--- a/compiler-rt/test/asan/TestCases/Windows/intercept_strdup.cpp
+++ b/compiler-rt/test/asan/TestCases/Windows/intercept_strdup.cpp
@@ -23,7 +23,7 @@ int main() {
 //
 // The first frame is our wrapper normally but will be malloc in the dynamic
 // config.
-// CHECK:   #0 {{.*}} in {{malloc|__asan_wrap_strdup}}
+// CHECK:   #0 {{.*}} in {{malloc|strdup}}
 //
 // The local call to _strdup above may be the second or third frame depending
 // on whether we're using the dynamic config.


        


More information about the llvm-commits mailing list