diff --git a/compiler-rt/lib/asan/asan_descriptions.cpp b/compiler-rt/lib/asan/asan_descriptions.cpp --- a/compiler-rt/lib/asan/asan_descriptions.cpp +++ b/compiler-rt/lib/asan/asan_descriptions.cpp @@ -129,11 +129,11 @@ str.append("%s", d.Location()); switch (descr.access_type) { case kAccessTypeLeft: - str.append("%p is located %zd bytes to the left of", + str.append("%p is located %zd bytes after", (void *)descr.bad_addr, descr.offset); break; case kAccessTypeRight: - str.append("%p is located %zd bytes to the right of", + str.append("%p is located %zd bytes before", (void *)descr.bad_addr, descr.offset); break; case kAccessTypeInside: diff --git a/compiler-rt/lib/asan/tests/asan_mem_test.cpp b/compiler-rt/lib/asan/tests/asan_mem_test.cpp --- a/compiler-rt/lib/asan/tests/asan_mem_test.cpp +++ b/compiler-rt/lib/asan/tests/asan_mem_test.cpp @@ -37,7 +37,7 @@ MEMSET(array + length, 0, zero); MEMSET(array + length + 1, 0, zero); - // try to memset bytes to the right of array + // try to memset bytes after array EXPECT_DEATH(MEMSET(array, 0, size + 1), RightOOBWriteMessage(0)); EXPECT_DEATH(MEMSET((char*)(array + length) - 1, element, 6), @@ -143,7 +143,7 @@ M::transfer(dest, src - 1, zero); M::transfer(dest, src, zero); - // try to change mem to the right of dest + // try to change mem after dest EXPECT_DEATH(M::transfer(dest + 1, src, size), RightOOBWriteMessage(0)); EXPECT_DEATH(M::transfer((char*)(dest + length) - 1, src, 5), @@ -155,7 +155,7 @@ EXPECT_DEATH(M::transfer((char*)dest - 3, src, 4), LeftOOBWriteMessage(3)); - // try to access mem to the right of src + // try to access mem after src EXPECT_DEATH(M::transfer(dest, src + 2, size), RightOOBReadMessage(0)); EXPECT_DEATH(M::transfer(dest, (char*)(src + length) - 3, 6), diff --git a/compiler-rt/lib/asan/tests/asan_str_test.cpp b/compiler-rt/lib/asan/tests/asan_str_test.cpp --- a/compiler-rt/lib/asan/tests/asan_str_test.cpp +++ b/compiler-rt/lib/asan/tests/asan_str_test.cpp @@ -51,7 +51,7 @@ } // namespace // Input to a test is a zero-terminated string str with given length -// Accesses to the bytes to the left and to the right of str +// Accesses to the bytes to the left and after str // are presumed to produce OOB errors void StrLenOOBTestTemplate(char *str, size_t length, OOBKind oob_kind) { // Normal strlen calls diff --git a/compiler-rt/lib/asan/tests/asan_test.cpp b/compiler-rt/lib/asan/tests/asan_test.cpp --- a/compiler-rt/lib/asan/tests/asan_test.cpp +++ b/compiler-rt/lib/asan/tests/asan_test.cpp @@ -734,7 +734,7 @@ EXPECT_DEATH(_mm_store_si128((__m128i*)p, value_wide), "WRITE of size 16"); EXPECT_DEATH(_mm_store_si128((__m128i*)p, value_wide), - "located 0 bytes to the right of 12-byte"); + "located 0 bytes after 12-byte"); free(a); } #endif @@ -812,7 +812,7 @@ EXPECT_DEATH(READ_N_BYTES, \ ASAN_PCRE_DOTALL \ "AddressSanitizer: heap-buffer-overflow" \ - ".* is located 0 bytes to the right of 10-byte region"); \ + ".* is located 0 bytes after 10-byte region"); \ close(fd); \ delete [] x; \ @@ -1013,23 +1013,23 @@ glob5[Ident(4)] = 0; EXPECT_DEATH(glob5[Ident(5)] = 0, - "0 bytes to the right of global variable.*glob5.* size 5"); + "0 bytes after global variable.*glob5.* size 5"); EXPECT_DEATH(glob5[Ident(5+6)] = 0, - "6 bytes to the right of global variable.*glob5.* size 5"); + "6 bytes after global variable.*glob5.* size 5"); Ident(static110); // avoid optimizations static110[Ident(0)] = 0; static110[Ident(109)] = 0; EXPECT_DEATH(static110[Ident(110)] = 0, - "0 bytes to the right of global variable"); + "0 bytes after global variable"); EXPECT_DEATH(static110[Ident(110+7)] = 0, - "7 bytes to the right of global variable"); + "7 bytes after global variable"); Ident(func_static15); // avoid optimizations func_static15[Ident(0)] = 0; EXPECT_DEATH(func_static15[Ident(15)] = 0, - "0 bytes to the right of global variable"); + "0 bytes after global variable"); EXPECT_DEATH(func_static15[Ident(15 + 9)] = 0, - "9 bytes to the right of global variable"); + "9 bytes after global variable"); Ident(fs1); Ident(fs2); @@ -1040,9 +1040,9 @@ EXPECT_DEATH(fs2[Ident(-1)] = 0, "is located.*of global variable"); EXPECT_DEATH(Ident(Ident(ConstGlob)[8]), - "is located 1 bytes to the right of .*ConstGlob"); + "is located 1 bytes after .*ConstGlob"); EXPECT_DEATH(Ident(Ident(StaticConstGlob)[5]), - "is located 2 bytes to the right of .*StaticConstGlob"); + "is located 2 bytes after .*StaticConstGlob"); // call stuff from another file. GlobalsTest(0); diff --git a/compiler-rt/test/asan/TestCases/Darwin/address-range-limit.mm b/compiler-rt/test/asan/TestCases/Darwin/address-range-limit.mm --- a/compiler-rt/test/asan/TestCases/Darwin/address-range-limit.mm +++ b/compiler-rt/test/asan/TestCases/Darwin/address-range-limit.mm @@ -38,4 +38,4 @@ // CHECK: AddressSanitizer: heap-buffer-overflow // CHECK: WRITE of size 1 // CHECK: {{#0 .* in main}} -// CHECK: is located 0 bytes to the right of 10-byte region +// CHECK: is located 0 bytes after 10-byte region diff --git a/compiler-rt/test/asan/TestCases/Darwin/dead-strip.c b/compiler-rt/test/asan/TestCases/Darwin/dead-strip.c --- a/compiler-rt/test/asan/TestCases/Darwin/dead-strip.c +++ b/compiler-rt/test/asan/TestCases/Darwin/dead-strip.c @@ -18,6 +18,6 @@ int main(int argc, char *argv[]) { alive[argc] = 0; - // ASAN-CHECK: {{0x.* is located 0 bytes to the right of global variable}} + // ASAN-CHECK: {{0x.* is located 0 bytes after global variable}} return 0; } diff --git a/compiler-rt/test/asan/TestCases/Darwin/haswell-symbolication.cpp b/compiler-rt/test/asan/TestCases/Darwin/haswell-symbolication.cpp --- a/compiler-rt/test/asan/TestCases/Darwin/haswell-symbolication.cpp +++ b/compiler-rt/test/asan/TestCases/Darwin/haswell-symbolication.cpp @@ -86,7 +86,7 @@ // CHECK: AddressSanitizer: global-buffer-overflow // CHECK-LI: #0 0x{{.*}} in faulty_func{{.*}} {{.*}}haswell-symbolication.cpp:[[@LINE-2]] // CHECK-NOLI: #0 0x{{.*}} in faulty_func{{.*}} {{.*}}haswell-symbolication - // CHECK: is located 2 bytes to the right of global variable 'faulty_global' + // CHECK: is located 2 bytes after global variable 'faulty_global' // CHECK-NOT: LLVMSymbolizer: error reading file } diff --git a/compiler-rt/test/asan/TestCases/Linux/global-overflow-bfd.cpp b/compiler-rt/test/asan/TestCases/Linux/global-overflow-bfd.cpp --- a/compiler-rt/test/asan/TestCases/Linux/global-overflow-bfd.cpp +++ b/compiler-rt/test/asan/TestCases/Linux/global-overflow-bfd.cpp @@ -12,7 +12,7 @@ memset(ZZZ, 0, 10); int res = YYY[argc * 10]; // BOOOM // CHECK: {{READ of size 1 at}} - // CHECK: {{located 0 bytes to the right of global variable}} + // CHECK: {{located 0 bytes after global variable}} res += XXX[argc] + ZZZ[argc]; return res; } diff --git a/compiler-rt/test/asan/TestCases/Linux/global-overflow-lld.cpp b/compiler-rt/test/asan/TestCases/Linux/global-overflow-lld.cpp --- a/compiler-rt/test/asan/TestCases/Linux/global-overflow-lld.cpp +++ b/compiler-rt/test/asan/TestCases/Linux/global-overflow-lld.cpp @@ -13,7 +13,7 @@ memset(ZZZ, 0, 10); int res = YYY[argc * 10]; // BOOOM // CHECK: {{READ of size 1 at}} - // CHECK: {{located 0 bytes to the right of global variable}} + // CHECK: {{located 0 bytes after global variable}} res += XXX[argc] + ZZZ[argc]; return res; } diff --git a/compiler-rt/test/asan/TestCases/Linux/overflow-in-qsort.cpp b/compiler-rt/test/asan/TestCases/Linux/overflow-in-qsort.cpp --- a/compiler-rt/test/asan/TestCases/Linux/overflow-in-qsort.cpp +++ b/compiler-rt/test/asan/TestCases/Linux/overflow-in-qsort.cpp @@ -40,10 +40,10 @@ // Fast unwind may not unwind through qsort. // CHECK-FAST: ERROR: AddressSanitizer: global-buffer-overflow // CHECK-FAST: #0{{.*}} in QsortCallback -// CHECK-FAST: is located 0 bytes to the right of global variable 'global_array +// CHECK-FAST: is located 0 bytes after global variable 'global_array // CHECK-SLOW: ERROR: AddressSanitizer: global-buffer-overflow // CHECK-SLOW: #0{{.*}} in QsortCallback // CHECK-SLOW: #{{.*}} in MyQsort // CHECK-SLOW: #{{.*}} in main -// CHECK-SLOW: is located 0 bytes to the right of global variable 'global_array +// CHECK-SLOW: is located 0 bytes after global variable 'global_array diff --git a/compiler-rt/test/asan/TestCases/PR52382.c b/compiler-rt/test/asan/TestCases/PR52382.c --- a/compiler-rt/test/asan/TestCases/PR52382.c +++ b/compiler-rt/test/asan/TestCases/PR52382.c @@ -9,4 +9,4 @@ int main(void) { return global_array[103]; } // CHECK: AddressSanitizer: global-buffer-overflow on address -// CHECK: is located 12 bytes to the right of global variable 'global_array' +// CHECK: is located 12 bytes after global variable 'global_array' diff --git a/compiler-rt/test/asan/TestCases/Posix/start-deactivated.cpp b/compiler-rt/test/asan/TestCases/Posix/start-deactivated.cpp --- a/compiler-rt/test/asan/TestCases/Posix/start-deactivated.cpp +++ b/compiler-rt/test/asan/TestCases/Posix/start-deactivated.cpp @@ -115,7 +115,7 @@ // CHECK: AddressSanitizer: heap-buffer-overflow // CHECK: READ of size 1 // CHECK: {{#0 .* in do_another_bad_thing}} - // CHECK: is located 5 bytes to the right of 100-byte region + // CHECK: is located 5 bytes after 100-byte region // CHECK: in do_another_bad_thing return 0; diff --git a/compiler-rt/test/asan/TestCases/Windows/calloc_right_oob.cpp b/compiler-rt/test/asan/TestCases/Windows/calloc_right_oob.cpp --- a/compiler-rt/test/asan/TestCases/Windows/calloc_right_oob.cpp +++ b/compiler-rt/test/asan/TestCases/Windows/calloc_right_oob.cpp @@ -9,7 +9,7 @@ // CHECK: AddressSanitizer: heap-buffer-overflow on address [[ADDR:0x[0-9a-f]+]] // CHECK: WRITE of size 4 at [[ADDR]] thread T0 // CHECK-NEXT: {{#0 .* main .*calloc_right_oob.cpp}}:[[@LINE-3]] -// CHECK: [[ADDR]] is located 0 bytes to the right of 168-byte region +// CHECK: [[ADDR]] is located 0 bytes after 168-byte region // CHECK: allocated by thread T0 here: // CHECK-NEXT: {{#0 .* calloc }} // CHECK-NEXT: {{#1 .* main .*calloc_right_oob.cpp}}:[[@LINE-8]] diff --git a/compiler-rt/test/asan/TestCases/Windows/fuse-lld-globals.cpp b/compiler-rt/test/asan/TestCases/Windows/fuse-lld-globals.cpp --- a/compiler-rt/test/asan/TestCases/Windows/fuse-lld-globals.cpp +++ b/compiler-rt/test/asan/TestCases/Windows/fuse-lld-globals.cpp @@ -11,7 +11,7 @@ int res = YYY[argc * 10]; // BOOOM // CHECK: {{READ of size 1 at 0x.* thread T0}} // CHECK: {{ #0 0x.* in main .*fuse-lld-globals.cpp:}}[[@LINE-2]] - // CHECK: {{0x.* is located 0 bytes to the right of global variable}} + // CHECK: {{0x.* is located 0 bytes after global variable}} // CHECK: {{.*YYY.* of size 10}} res += XXX[argc] + ZZZ[argc]; return res; diff --git a/compiler-rt/test/asan/TestCases/Windows/global_const_string_oob.cpp b/compiler-rt/test/asan/TestCases/Windows/global_const_string_oob.cpp --- a/compiler-rt/test/asan/TestCases/Windows/global_const_string_oob.cpp +++ b/compiler-rt/test/asan/TestCases/Windows/global_const_string_oob.cpp @@ -13,7 +13,7 @@ // CHECK: AddressSanitizer: global-buffer-overflow on address [[ADDR:0x[0-9a-f]+]] // CHECK: READ of size 1 at [[ADDR]] thread T0 // CHECK-NEXT: {{#0 .* main .*global_const_string_oob.cpp:}}[[@LINE-5]] - // CHECK: [[ADDR]] is located 5 bytes to the right of global variable [[STR:.*]] defined in {{'.*global_const_string_oob.cpp' .*}} of size 11 + // CHECK: [[ADDR]] is located 5 bytes after global variable [[STR:.*]] defined in {{'.*global_const_string_oob.cpp' .*}} of size 11 // CHECK: [[STR]] is ascii string 'foobarspam' return 0; } diff --git a/compiler-rt/test/asan/TestCases/Windows/malloc_right_oob.cpp b/compiler-rt/test/asan/TestCases/Windows/malloc_right_oob.cpp --- a/compiler-rt/test/asan/TestCases/Windows/malloc_right_oob.cpp +++ b/compiler-rt/test/asan/TestCases/Windows/malloc_right_oob.cpp @@ -9,7 +9,7 @@ // CHECK: AddressSanitizer: heap-buffer-overflow on address [[ADDR:0x[0-9a-f]+]] // CHECK: WRITE of size 1 at [[ADDR]] thread T0 // CHECK-NEXT: {{#0 .* main .*malloc_right_oob.cpp}}:[[@LINE-3]] -// CHECK: [[ADDR]] is located 0 bytes to the right of 42-byte region +// CHECK: [[ADDR]] is located 0 bytes after 42-byte region // CHECK: allocated by thread T0 here: // CHECK-NEXT: {{#0 .* malloc }} // CHECK-NEXT: {{#1 .* main .*malloc_right_oob.cpp}}:[[@LINE-8]] diff --git a/compiler-rt/test/asan/TestCases/Windows/operator_array_new_right_oob.cpp b/compiler-rt/test/asan/TestCases/Windows/operator_array_new_right_oob.cpp --- a/compiler-rt/test/asan/TestCases/Windows/operator_array_new_right_oob.cpp +++ b/compiler-rt/test/asan/TestCases/Windows/operator_array_new_right_oob.cpp @@ -9,7 +9,7 @@ // CHECK: AddressSanitizer: heap-buffer-overflow on address [[ADDR:0x[0-9a-f]+]] // CHECK: WRITE of size 1 at [[ADDR]] thread T0 // CHECK: {{#0 .* main .*operator_array_new_right_oob.cpp}}:[[@LINE-3]] -// CHECK: [[ADDR]] is located 0 bytes to the right of 42-byte region +// CHECK: [[ADDR]] is located 0 bytes after 42-byte region // CHECK: allocated by thread T0 here: // FIXME: The 'operator new' frame should have []. // CHECK: {{#0 .* operator new}} diff --git a/compiler-rt/test/asan/TestCases/Windows/operator_new_right_oob.cpp b/compiler-rt/test/asan/TestCases/Windows/operator_new_right_oob.cpp --- a/compiler-rt/test/asan/TestCases/Windows/operator_new_right_oob.cpp +++ b/compiler-rt/test/asan/TestCases/Windows/operator_new_right_oob.cpp @@ -9,7 +9,7 @@ // CHECK: AddressSanitizer: heap-buffer-overflow on address [[ADDR:0x[0-9a-f]+]] // CHECK: WRITE of size 1 at [[ADDR]] thread T0 // CHECK: {{#0 .* main .*operator_new_right_oob.cpp}}:[[@LINE-3]] -// CHECK: [[ADDR]] is located 0 bytes to the right of 1-byte region +// CHECK: [[ADDR]] is located 0 bytes after 1-byte region // CHECK: allocated by thread T0 here: // CHECK: {{#0 .* operator new}} // CHECK: {{#1 .* main .*operator_new_right_oob.cpp}}:[[@LINE-8]] diff --git a/compiler-rt/test/asan/TestCases/Windows/realloc_right_oob.cpp b/compiler-rt/test/asan/TestCases/Windows/realloc_right_oob.cpp --- a/compiler-rt/test/asan/TestCases/Windows/realloc_right_oob.cpp +++ b/compiler-rt/test/asan/TestCases/Windows/realloc_right_oob.cpp @@ -9,7 +9,7 @@ // CHECK: AddressSanitizer: heap-buffer-overflow on address [[ADDR:0x[0-9a-f]+]] // CHECK: WRITE of size 1 at [[ADDR]] thread T0 // CHECK-NEXT: {{#0 .* main .*realloc_right_oob.cpp}}:[[@LINE-3]] -// CHECK: [[ADDR]] is located 0 bytes to the right of 42-byte region +// CHECK: [[ADDR]] is located 0 bytes after 42-byte region // CHECK: allocated by thread T0 here: // CHECK-NEXT: {{#0 .* realloc }} // CHECK-NEXT: {{#1 .* main .*realloc_right_oob.cpp}}:[[@LINE-8]] diff --git a/compiler-rt/test/asan/TestCases/Windows/wrong_downcast_on_heap.cpp b/compiler-rt/test/asan/TestCases/Windows/wrong_downcast_on_heap.cpp --- a/compiler-rt/test/asan/TestCases/Windows/wrong_downcast_on_heap.cpp +++ b/compiler-rt/test/asan/TestCases/Windows/wrong_downcast_on_heap.cpp @@ -18,7 +18,7 @@ // CHECK: AddressSanitizer: heap-buffer-overflow on address [[ADDR:0x[0-9a-f]+]] // CHECK: WRITE of size 4 at [[ADDR]] thread T0 // CHECK: {{#0 0x[0-9a-f]* in main .*wrong_downcast_on_heap.cpp}}:[[@LINE-3]] -// CHECK: [[ADDR]] is located 0 bytes to the right of 4-byte region +// CHECK: [[ADDR]] is located 0 bytes after 4-byte region // CHECK: allocated by thread T0 here: // CHECK: #0 {{.*}} operator new return 0; diff --git a/compiler-rt/test/asan/TestCases/global-demangle.cpp b/compiler-rt/test/asan/TestCases/global-demangle.cpp --- a/compiler-rt/test/asan/TestCases/global-demangle.cpp +++ b/compiler-rt/test/asan/TestCases/global-demangle.cpp @@ -11,7 +11,7 @@ int main(int argc, char **argv) { return (int)XXX::YYY::ZZZ[argc + 5]; // BOOM // CHECK: {{READ of size 1 at 0x.*}} - // CHECK: {{0x.* is located 2 bytes to the right of global variable}} + // CHECK: {{0x.* is located 2 bytes after global variable}} // CHECK: '{{.*}}XXX::YYY::ZZZ{{.*}}' {{.*}} of size 4 // CHECK: '{{.*}}XXX::YYY::ZZZ{{.*}}' is ascii string 'abc' } diff --git a/compiler-rt/test/asan/TestCases/global-location-nodebug.cpp b/compiler-rt/test/asan/TestCases/global-location-nodebug.cpp --- a/compiler-rt/test/asan/TestCases/global-location-nodebug.cpp +++ b/compiler-rt/test/asan/TestCases/global-location-nodebug.cpp @@ -15,8 +15,8 @@ // UNSUPPORTED: windows // CHECK: AddressSanitizer: global-buffer-overflow -// CLASS_STATIC-NO-G: 0x{{.*}} is located 4 bytes to the right of global variable '{{.*}}C::array{{.*}}' defined in '{{.*}}global-location.cpp' {{.*}} of size 40 -// GLOB-NO-G: 0x{{.*}} is located 4 bytes to the right of global variable '{{.*}}global{{.*}}' defined in '{{.*}}global-location.cpp' {{.*}} of size 40 -// FUNC_STATIC-NO-G: 0x{{.*}} is located 4 bytes to the right of global variable '{{.*}}main::array{{.*}}' defined in '{{.*}}global-location.cpp' {{.*}} of size 40 -// LITERAL-NO-G: 0x{{.*}} is located 0 bytes to the right of global variable {{.*}} defined in '{{.*}}global-location.cpp' {{.*}} of size 11 +// CLASS_STATIC-NO-G: 0x{{.*}} is located 4 bytes after global variable '{{.*}}C::array{{.*}}' defined in '{{.*}}global-location.cpp' {{.*}} of size 40 +// GLOB-NO-G: 0x{{.*}} is located 4 bytes after global variable '{{.*}}global{{.*}}' defined in '{{.*}}global-location.cpp' {{.*}} of size 40 +// FUNC_STATIC-NO-G: 0x{{.*}} is located 4 bytes after global variable '{{.*}}main::array{{.*}}' defined in '{{.*}}global-location.cpp' {{.*}} of size 40 +// LITERAL-NO-G: 0x{{.*}} is located 0 bytes after global variable {{.*}} defined in '{{.*}}global-location.cpp' {{.*}} of size 11 // CHECK: SUMMARY: AddressSanitizer: global-buffer-overflow diff --git a/compiler-rt/test/asan/TestCases/global-location.cpp b/compiler-rt/test/asan/TestCases/global-location.cpp --- a/compiler-rt/test/asan/TestCases/global-location.cpp +++ b/compiler-rt/test/asan/TestCases/global-location.cpp @@ -16,11 +16,11 @@ struct C { static int array[10]; - // CLASS_STATIC: 0x{{.*}} is located 4 bytes to the right of global variable 'C::array' defined in '{{.*}}global-location.cpp:[[@LINE-1]]' {{.*}} of size 40 + // CLASS_STATIC: 0x{{.*}} is located 4 bytes after global variable 'C::array' defined in '{{.*}}global-location.cpp:[[@LINE-1]]' {{.*}} of size 40 }; int global[10]; -// GLOB: 0x{{.*}} is located 4 bytes to the right of global variable 'global' defined in '{{.*}}global-location.cpp:[[@LINE-1]]' {{.*}} of size 40 +// GLOB: 0x{{.*}} is located 4 bytes after global variable 'global' defined in '{{.*}}global-location.cpp:[[@LINE-1]]' {{.*}} of size 40 int C::array[10]; int main(int argc, char **argv) { @@ -30,12 +30,12 @@ case 'c': return C::array[one * 11]; case 'f': static int array[10]; - // FUNC_STATIC: 0x{{.*}} is located 4 bytes to the right of global variable 'main::array' defined in '{{.*}}global-location.cpp:[[@LINE-1]]' {{.*}} of size 40 + // FUNC_STATIC: 0x{{.*}} is located 4 bytes after global variable 'main::array' defined in '{{.*}}global-location.cpp:[[@LINE-1]]' {{.*}} of size 40 memset(array, 0, 10); return array[one * 11]; case 'l': const char *str = "0123456789"; - // LITERAL: 0x{{.*}} is located 0 bytes to the right of global variable {{.*}} defined in '{{.*}}global-location.cpp:[[@LINE-1]]' {{.*}} of size 11 + // LITERAL: 0x{{.*}} is located 0 bytes after global variable {{.*}} defined in '{{.*}}global-location.cpp:[[@LINE-1]]' {{.*}} of size 11 return str[one * 11]; } return 0; diff --git a/compiler-rt/test/asan/TestCases/global-overflow.cpp b/compiler-rt/test/asan/TestCases/global-overflow.cpp --- a/compiler-rt/test/asan/TestCases/global-overflow.cpp +++ b/compiler-rt/test/asan/TestCases/global-overflow.cpp @@ -14,7 +14,7 @@ int res = YYY[argc * 10]; // BOOOM // CHECK: {{READ of size 1 at 0x.* thread T0}} // CHECK: {{ #0 0x.* in main .*global-overflow.cpp:}}[[@LINE-2]] - // CHECK: {{0x.* is located 0 bytes to the right of global variable}} + // CHECK: {{0x.* is located 0 bytes after global variable}} // CHECK: {{.*YYY.* of size 10}} res += XXX[argc] + ZZZ[argc]; return res; diff --git a/compiler-rt/test/asan/TestCases/heap-overflow.cpp b/compiler-rt/test/asan/TestCases/heap-overflow.cpp --- a/compiler-rt/test/asan/TestCases/heap-overflow.cpp +++ b/compiler-rt/test/asan/TestCases/heap-overflow.cpp @@ -15,7 +15,7 @@ int res = x[argc * 10]; // BOOOM // CHECK: {{READ of size 1 at 0x.* thread T0}} // CHECK: {{ #0 0x.* in main .*heap-overflow.cpp:}}[[@LINE-2]] - // CHECK: {{0x.* is located 0 bytes to the right of 10-byte region}} + // CHECK: {{0x.* is located 0 bytes after 10-byte region}} // CHECK: {{allocated by thread T0 here:}} // CHECK: {{ #0 0x.* in .*malloc}} diff --git a/compiler-rt/test/asan/TestCases/large_func_test.cpp b/compiler-rt/test/asan/TestCases/large_func_test.cpp --- a/compiler-rt/test/asan/TestCases/large_func_test.cpp +++ b/compiler-rt/test/asan/TestCases/large_func_test.cpp @@ -46,7 +46,7 @@ int *x = new int[100]; LargeFunction(x, argc - 1); // CHECK: {{ #1 0x.* in main .*large_func_test.cpp:}}[[@LINE-1]] - // CHECK: {{0x.* is located 12 bytes to the right of 400-byte region}} + // CHECK: {{0x.* is located 12 bytes after 400-byte region}} // CHECK: {{allocated by thread T0 here:}} // CHECK-Linux: {{ #0 0x.* in operator new}} // CHECK-SunOS: {{ #0 0x.* in operator new}} diff --git a/compiler-rt/test/asan/TestCases/partial_right.cpp b/compiler-rt/test/asan/TestCases/partial_right.cpp --- a/compiler-rt/test/asan/TestCases/partial_right.cpp +++ b/compiler-rt/test/asan/TestCases/partial_right.cpp @@ -8,6 +8,6 @@ volatile int *x = (int*)malloc(2*sizeof(int) + 2); int res = x[2]; // BOOOM // CHECK: {{READ of size 4 at 0x.* thread T0}} - // CHECK: [[ADDR:0x[01-9a-fa-f]+]] is located 0 bytes to the right of {{.*}}-byte region [{{.*}},{{.*}}[[ADDR]]) + // CHECK: [[ADDR:0x[01-9a-fa-f]+]] is located 0 bytes after {{.*}}-byte region [{{.*}},{{.*}}[[ADDR]]) return res; } diff --git a/compiler-rt/test/asan/TestCases/strncpy-overflow.cpp b/compiler-rt/test/asan/TestCases/strncpy-overflow.cpp --- a/compiler-rt/test/asan/TestCases/strncpy-overflow.cpp +++ b/compiler-rt/test/asan/TestCases/strncpy-overflow.cpp @@ -30,7 +30,7 @@ // CHECK: {{WRITE of size 10 at 0x.* thread T0}} // CHECK: {{ #0 0x.* in .*strncpy}} // CHECK: {{ #1 0x.* in main .*strncpy-overflow.cpp:}}[[@LINE-3]] - // CHECK: {{0x.* is located 0 bytes to the right of 9-byte region}} + // CHECK: {{0x.* is located 0 bytes after 9-byte region}} // CHECK: {{allocated by thread T0 here:}} // CHECK: {{ #0 0x.* in .*malloc}} // CHECK: {{ #1 0x.* in main .*strncpy-overflow.cpp:}}[[@LINE-8]] diff --git a/compiler-rt/test/asan/TestCases/unaligned_loads_and_stores.cpp b/compiler-rt/test/asan/TestCases/unaligned_loads_and_stores.cpp --- a/compiler-rt/test/asan/TestCases/unaligned_loads_and_stores.cpp +++ b/compiler-rt/test/asan/TestCases/unaligned_loads_and_stores.cpp @@ -24,7 +24,7 @@ case 'A': res = __sanitizer_unaligned_load16(x + 15); break; // CHECK-A ERROR: AddressSanitizer: heap-buffer-overflow on address // CHECK-A: main{{.*}}unaligned_loads_and_stores.cpp:[[@LINE-2]] -// CHECK-A: is located 0 bytes to the right of 16-byte region +// CHECK-A: is located 0 bytes after 16-byte region case 'B': res = __sanitizer_unaligned_load32(x + 14); break; // CHECK-B: main{{.*}}unaligned_loads_and_stores.cpp:[[@LINE-1]] case 'C': res = __sanitizer_unaligned_load32(x + 13); break; @@ -37,7 +37,7 @@ case 'K': __sanitizer_unaligned_store16(x + 15, 0); break; // CHECK-K ERROR: AddressSanitizer: heap-buffer-overflow on address // CHECK-K: main{{.*}}unaligned_loads_and_stores.cpp:[[@LINE-2]] -// CHECK-K: is located 0 bytes to the right of 16-byte region +// CHECK-K: is located 0 bytes after 16-byte region case 'L': __sanitizer_unaligned_store32(x + 15, 0); break; // CHECK-L: main{{.*}}unaligned_loads_and_stores.cpp:[[@LINE-1]] case 'M': __sanitizer_unaligned_store32(x + 13, 0); break;