[Sanitizer] fix overloaded operator error

git-svn-id: https://llvm.org/svn/llvm-project/compiler-rt/trunk@162990 91177308-0d34-0410-b5e6-96231b3b80d8
diff --git a/lib/sanitizer_common/sanitizer_symbolizer.cc b/lib/sanitizer_common/sanitizer_symbolizer.cc
index ad6eaa6..8adfd41 100644
--- a/lib/sanitizer_common/sanitizer_symbolizer.cc
+++ b/lib/sanitizer_common/sanitizer_symbolizer.cc
@@ -255,7 +255,7 @@
   }
 
   static const uptr kMaxNumberOfModuleContexts = 4096;
-  LoadedModule *modules_; // Array of module descriptions is leaked.
+  LoadedModule *modules_;  // Array of module descriptions is leaked.
   uptr n_modules_;
 
   ExternalSymbolizer *external_symbolizer_;  // Leaked.
diff --git a/lib/sanitizer_common/sanitizer_symbolizer_linux.cc b/lib/sanitizer_common/sanitizer_symbolizer_linux.cc
index 61c7724..7c3903d 100644
--- a/lib/sanitizer_common/sanitizer_symbolizer_linux.cc
+++ b/lib/sanitizer_common/sanitizer_symbolizer_linux.cc
@@ -122,7 +122,7 @@
   if (data->current_n == data->max_n)
     return 0;
   InternalScopedBuffer<char> module_name(kMaxPathLength);
-  module_name[0] = '\0';
+  module_name.data()[0] = '\0';
   if (data->current_n == 0) {
     // First module is the binary itself.
     uptr module_name_len = readlink("/proc/self/exe",
@@ -133,7 +133,7 @@
   } else if (info->dlpi_name) {
     internal_strncpy(module_name, info->dlpi_name, module_name.size());
   }
-  if (module_name[0] == '\0')
+  if (module_name.data()[0] == '\0')
     return 0;
   void *mem = &data->modules[data->current_n];
   LoadedModule *cur_module = new(mem) LoadedModule(module_name,