[Sanitizer] fix overloaded operator error
git-svn-id: https://llvm.org/svn/llvm-project/compiler-rt/trunk@162990 91177308-0d34-0410-b5e6-96231b3b80d8
diff --git a/lib/sanitizer_common/sanitizer_symbolizer.cc b/lib/sanitizer_common/sanitizer_symbolizer.cc
index ad6eaa6..8adfd41 100644
--- a/lib/sanitizer_common/sanitizer_symbolizer.cc
+++ b/lib/sanitizer_common/sanitizer_symbolizer.cc
@@ -255,7 +255,7 @@
}
static const uptr kMaxNumberOfModuleContexts = 4096;
- LoadedModule *modules_; // Array of module descriptions is leaked.
+ LoadedModule *modules_; // Array of module descriptions is leaked.
uptr n_modules_;
ExternalSymbolizer *external_symbolizer_; // Leaked.
diff --git a/lib/sanitizer_common/sanitizer_symbolizer_linux.cc b/lib/sanitizer_common/sanitizer_symbolizer_linux.cc
index 61c7724..7c3903d 100644
--- a/lib/sanitizer_common/sanitizer_symbolizer_linux.cc
+++ b/lib/sanitizer_common/sanitizer_symbolizer_linux.cc
@@ -122,7 +122,7 @@
if (data->current_n == data->max_n)
return 0;
InternalScopedBuffer<char> module_name(kMaxPathLength);
- module_name[0] = '\0';
+ module_name.data()[0] = '\0';
if (data->current_n == 0) {
// First module is the binary itself.
uptr module_name_len = readlink("/proc/self/exe",
@@ -133,7 +133,7 @@
} else if (info->dlpi_name) {
internal_strncpy(module_name, info->dlpi_name, module_name.size());
}
- if (module_name[0] == '\0')
+ if (module_name.data()[0] == '\0')
return 0;
void *mem = &data->modules[data->current_n];
LoadedModule *cur_module = new(mem) LoadedModule(module_name,