Skip to content

Commit 116bbf2

Browse files
author
Farzon Lotfi
committed
apply clang format
1 parent 885226f commit 116bbf2

File tree

2 files changed

+8
-8
lines changed

2 files changed

+8
-8
lines changed

compiler-rt/lib/interception/interception_win.cpp

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -432,7 +432,7 @@ static uptr AllocateMemoryForTrampoline(uptr image_address, size_t size) {
432432
// jumping to the patching region.
433433

434434
// Short jump patterns below are only for x86_64.
435-
#if SANITIZER_WINDOWS_x64
435+
# if SANITIZER_WINDOWS_x64
436436
// ntdll!wcslen in Win11
437437
// 488bc1 mov rax,rcx
438438
// 0fb710 movzx edx,word ptr [rax]
@@ -463,7 +463,7 @@ static size_t GetInstructionSize(uptr address, size_t* rel_offset = nullptr) {
463463
return 4;
464464
#endif
465465

466-
#if SANITIZER_WINDOWS_x64
466+
# if SANITIZER_WINDOWS_x64
467467
if (memcmp((u8*)address, kPrologueWithShortJump1,
468468
sizeof(kPrologueWithShortJump1)) == 0 ||
469469
memcmp((u8*)address, kPrologueWithShortJump2,
@@ -545,7 +545,7 @@ static size_t GetInstructionSize(uptr address, size_t* rel_offset = nullptr) {
545545
return 7;
546546
}
547547

548-
#if SANITIZER_WINDOWS_x64
548+
# if SANITIZER_WINDOWS_x64
549549
switch (*(u8*)address) {
550550
case 0xA1: // A1 XX XX XX XX XX XX XX XX :
551551
// movabs eax, dword ptr ds:[XXXXXXXX]

compiler-rt/lib/interception/tests/interception_win_test.cpp

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -18,12 +18,12 @@
1818
// Disabling for ARM64 since testcases are x86/x64 assembly.
1919
#if !SANITIZER_DEBUG
2020
#if SANITIZER_WINDOWS
21-
#if !SANITIZER_WINDOWS_ARM64
21+
# if !SANITIZER_WINDOWS_ARM64
2222

23-
#include <stdarg.h>
23+
# include <stdarg.h>
2424

25-
#define WIN32_LEAN_AND_MEAN
26-
#include <windows.h>
25+
# define WIN32_LEAN_AND_MEAN
26+
# include <windows.h>
2727

2828
namespace __interception {
2929
namespace {
@@ -795,6 +795,6 @@ TEST(Interception, EmptyExportTable) {
795795

796796
} // namespace __interception
797797

798-
#endif // !SANITIZER_WINDOWS_ARM64
798+
# endif // !SANITIZER_WINDOWS_ARM64
799799
#endif // SANITIZER_WINDOWS
800800
#endif // #if !SANITIZER_DEBUG

0 commit comments

Comments
 (0)