[compiler-rt] 725f0be - [compiler-rt] [test] [asan] Fix Windows tests in i386 mode after StripFunctionName() improvements

Martin Storsjö via llvm-commits llvm-commits at lists.llvm.org
Mon May 29 12:52:44 PDT 2023


Author: Martin Storsjö
Date: 2023-05-29T22:49:34+03:00
New Revision: 725f0be8aec37561b8f2237c7f089742142b0e16

URL: https://github.com/llvm/llvm-project/commit/725f0be8aec37561b8f2237c7f089742142b0e16
DIFF: https://github.com/llvm/llvm-project/commit/725f0be8aec37561b8f2237c7f089742142b0e16.diff

LOG: [compiler-rt] [test] [asan] Fix Windows tests in i386 mode after StripFunctionName() improvements

This applies the same fix as a32a16311050fbccc03638b197910dc1415f60ab
to a testcase which isn't executed in x86_64 mode.

Added: 
    

Modified: 
    compiler-rt/test/asan/TestCases/Windows/dll_intercept_memchr.cpp

Removed: 
    


################################################################################
diff  --git a/compiler-rt/test/asan/TestCases/Windows/dll_intercept_memchr.cpp b/compiler-rt/test/asan/TestCases/Windows/dll_intercept_memchr.cpp
index c41d937d32404..6d1894fb862e6 100644
--- a/compiler-rt/test/asan/TestCases/Windows/dll_intercept_memchr.cpp
+++ b/compiler-rt/test/asan/TestCases/Windows/dll_intercept_memchr.cpp
@@ -17,7 +17,7 @@ int test_function() {
   memchr(buff, 'z', 7);
 // CHECK: AddressSanitizer: stack-buffer-overflow on address [[ADDR:0x[0-9a-f]+]]
 // CHECK: READ of size 7 at [[ADDR]] thread T0
-// CHECK-NEXT:  __asan_wrap_memchr
+// CHECK-NEXT:  memchr
 // CHECK-NEXT:  memchr
 // CHECK-NEXT:  test_function {{.*}}dll_intercept_memchr.cpp:[[@LINE-5]]
 // CHECK: Address [[ADDR]] is located in stack of thread T0 at offset {{.*}} in frame


        


More information about the llvm-commits mailing list