[compiler-rt] 725f0be - [compiler-rt] [test] [asan] Fix Windows tests in i386 mode after StripFunctionName() improvements
Martin Storsjö via llvm-commits
llvm-commits at lists.llvm.org
Mon May 29 12:52:44 PDT 2023
Author: Martin Storsjö
Date: 2023-05-29T22:49:34+03:00
New Revision: 725f0be8aec37561b8f2237c7f089742142b0e16
URL: https://github.com/llvm/llvm-project/commit/725f0be8aec37561b8f2237c7f089742142b0e16
DIFF: https://github.com/llvm/llvm-project/commit/725f0be8aec37561b8f2237c7f089742142b0e16.diff
LOG: [compiler-rt] [test] [asan] Fix Windows tests in i386 mode after StripFunctionName() improvements
This applies the same fix as a32a16311050fbccc03638b197910dc1415f60ab
to a testcase which isn't executed in x86_64 mode.
Added:
Modified:
compiler-rt/test/asan/TestCases/Windows/dll_intercept_memchr.cpp
Removed:
################################################################################
diff --git a/compiler-rt/test/asan/TestCases/Windows/dll_intercept_memchr.cpp b/compiler-rt/test/asan/TestCases/Windows/dll_intercept_memchr.cpp
index c41d937d32404..6d1894fb862e6 100644
--- a/compiler-rt/test/asan/TestCases/Windows/dll_intercept_memchr.cpp
+++ b/compiler-rt/test/asan/TestCases/Windows/dll_intercept_memchr.cpp
@@ -17,7 +17,7 @@ int test_function() {
memchr(buff, 'z', 7);
// CHECK: AddressSanitizer: stack-buffer-overflow on address [[ADDR:0x[0-9a-f]+]]
// CHECK: READ of size 7 at [[ADDR]] thread T0
-// CHECK-NEXT: __asan_wrap_memchr
+// CHECK-NEXT: memchr
// CHECK-NEXT: memchr
// CHECK-NEXT: test_function {{.*}}dll_intercept_memchr.cpp:[[@LINE-5]]
// CHECK: Address [[ADDR]] is located in stack of thread T0 at offset {{.*}} in frame
More information about the llvm-commits
mailing list