diff options
author | Timur Iskhodzhanov <timurrrr@google.com> | 2014-12-10 17:56:29 +0000 |
---|---|---|
committer | Timur Iskhodzhanov <timurrrr@google.com> | 2014-12-10 17:56:29 +0000 |
commit | 346859fba48cb3524aacb7f60afbe098061be8a2 (patch) | |
tree | 46aeb4a003642d7acbe41dfd850b3b4eb7f96859 /test | |
parent | 429de66ac351c8b1e9a1bdd9da4d2fe78c14df05 (diff) |
Update ASan/Win test expectations broken by r223508
git-svn-id: https://llvm.org/svn/llvm-project/compiler-rt/trunk@223932 91177308-0d34-0410-b5e6-96231b3b80d8
Diffstat (limited to 'test')
-rw-r--r-- | test/asan/TestCases/Windows/dll_intercept_memcpy.cc | 2 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/dll_intercept_memcpy_indirect.cc | 2 | ||||
-rw-r--r-- | test/asan/TestCases/Windows/intercept_memcpy.cc | 2 |
3 files changed, 3 insertions, 3 deletions
diff --git a/test/asan/TestCases/Windows/dll_intercept_memcpy.cc b/test/asan/TestCases/Windows/dll_intercept_memcpy.cc index 7ad0d82be..736e6969d 100644 --- a/test/asan/TestCases/Windows/dll_intercept_memcpy.cc +++ b/test/asan/TestCases/Windows/dll_intercept_memcpy.cc @@ -23,7 +23,7 @@ int test_function() { memcpy(buff2, buff1, 6); // CHECK: AddressSanitizer: stack-buffer-overflow on address [[ADDR:0x[0-9a-f]+]] // CHECK: WRITE of size 6 at [[ADDR]] thread T0 -// CHECK-NEXT: __asan_memcpy +// CHECK-NEXT: __asan_{{.*}}memcpy // CHECK-NEXT: test_function {{.*}}dll_intercept_memcpy.cc:[[@LINE-4]] // CHECK: Address [[ADDR]] is located in stack of thread T0 at offset {{.*}} in frame // CHECK-NEXT: test_function {{.*}}dll_intercept_memcpy.cc diff --git a/test/asan/TestCases/Windows/dll_intercept_memcpy_indirect.cc b/test/asan/TestCases/Windows/dll_intercept_memcpy_indirect.cc index 0c4bfbafe..c5f44df3f 100644 --- a/test/asan/TestCases/Windows/dll_intercept_memcpy_indirect.cc +++ b/test/asan/TestCases/Windows/dll_intercept_memcpy_indirect.cc @@ -24,7 +24,7 @@ int test_function() { call_memcpy(&memcpy, buff2, buff1, 6); // CHECK: AddressSanitizer: stack-buffer-overflow on address [[ADDR:0x[0-9a-f]+]] // CHECK: WRITE of size 6 at [[ADDR]] thread T0 -// CHECK-NEXT: __asan_memcpy +// CHECK-NEXT: __asan_{{.*}}memcpy // CHECK-NEXT: call_memcpy // CHECK-NEXT: test_function {{.*}}dll_intercept_memcpy_indirect.cc:[[@LINE-5]] // CHECK: Address [[ADDR]] is located in stack of thread T0 at offset {{.*}} in frame diff --git a/test/asan/TestCases/Windows/intercept_memcpy.cc b/test/asan/TestCases/Windows/intercept_memcpy.cc index 89eb175fd..9ee984b18 100644 --- a/test/asan/TestCases/Windows/intercept_memcpy.cc +++ b/test/asan/TestCases/Windows/intercept_memcpy.cc @@ -22,7 +22,7 @@ int main() { call_memcpy(&memcpy, buff2, buff1, 6); // CHECK: AddressSanitizer: stack-buffer-overflow on address [[ADDR:0x[0-9a-f]+]] // CHECK: WRITE of size 6 at [[ADDR]] thread T0 -// CHECK-NEXT: __asan_memcpy +// CHECK-NEXT: __asan_{{.*}}memcpy // CHECK-NEXT: call_memcpy // CHECK-NEXT: main {{.*}}intercept_memcpy.cc:[[@LINE-5]] // CHECK: Address [[ADDR]] is located in stack of thread T0 at offset {{.*}} in frame |