diff --git a/compiler-rt/lib/asan/asan_report.cc b/compiler-rt/lib/asan/asan_report.cc index cff94e2d1402..bed82f5708f2 100644 --- a/compiler-rt/lib/asan/asan_report.cc +++ b/compiler-rt/lib/asan/asan_report.cc @@ -749,7 +749,7 @@ void __asan_report_error(uptr pc, uptr bp, uptr sp, bug_descr = "use-after-poison"; break; case kAsanContiguousContainerOOBMagic: - bug_descr = "contiguous-container-buffer-overflow"; + bug_descr = "container-overflow"; break; case kAsanStackUseAfterScopeMagic: bug_descr = "stack-use-after-scope"; diff --git a/compiler-rt/lib/asan/lit_tests/TestCases/contiguous_container_crash.cc b/compiler-rt/lib/asan/lit_tests/TestCases/contiguous_container_crash.cc index 92cf54b1b70a..e96c1af838fd 100644 --- a/compiler-rt/lib/asan/lit_tests/TestCases/contiguous_container_crash.cc +++ b/compiler-rt/lib/asan/lit_tests/TestCases/contiguous_container_crash.cc @@ -13,4 +13,4 @@ int main(int argc, char **argv) { &t[0] + 50); return t[60 * argc]; // Touches the poisoned memory. } -// CHECK: AddressSanitizer: contiguous-container-buffer-overflow +// CHECK: AddressSanitizer: container-overflow