[compiler-rt] r209887 - [ASan Win] Fix a couple of warnings in tests and enable -WX

Timur Iskhodzhanov timurrrr at google.com
Fri May 30 04:58:33 PDT 2014


Author: timurrrr
Date: Fri May 30 06:58:32 2014
New Revision: 209887

URL: http://llvm.org/viewvc/llvm-project?rev=209887&view=rev
Log:
[ASan Win] Fix a couple of warnings in tests and enable -WX

Modified:
    compiler-rt/trunk/test/asan/TestCases/Windows/dll_intercept_memcpy.cc
    compiler-rt/trunk/test/asan/TestCases/Windows/dll_intercept_memcpy_indirect.cc
    compiler-rt/trunk/test/asan/TestCases/Windows/dll_intercept_memset.cc
    compiler-rt/trunk/test/asan/lit.cfg

Modified: compiler-rt/trunk/test/asan/TestCases/Windows/dll_intercept_memcpy.cc
URL: http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/test/asan/TestCases/Windows/dll_intercept_memcpy.cc?rev=209887&r1=209886&r2=209887&view=diff
==============================================================================
--- compiler-rt/trunk/test/asan/TestCases/Windows/dll_intercept_memcpy.cc (original)
+++ compiler-rt/trunk/test/asan/TestCases/Windows/dll_intercept_memcpy.cc Fri May 30 06:58:32 2014
@@ -28,4 +28,5 @@ int test_function() {
 // CHECK: Address [[ADDR]] is located in stack of thread T0 at offset {{.*}} in frame
 // CHECK-NEXT:  test_function {{.*}}dll_intercept_memcpy.cc
 // CHECK: 'buff2' <== Memory access at offset {{.*}} overflows this variable
+  return 0;
 }

Modified: compiler-rt/trunk/test/asan/TestCases/Windows/dll_intercept_memcpy_indirect.cc
URL: http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/test/asan/TestCases/Windows/dll_intercept_memcpy_indirect.cc?rev=209887&r1=209886&r2=209887&view=diff
==============================================================================
--- compiler-rt/trunk/test/asan/TestCases/Windows/dll_intercept_memcpy_indirect.cc (original)
+++ compiler-rt/trunk/test/asan/TestCases/Windows/dll_intercept_memcpy_indirect.cc Fri May 30 06:58:32 2014
@@ -30,4 +30,5 @@ int test_function() {
 // CHECK: Address [[ADDR]] is located in stack of thread T0 at offset {{.*}} in frame
 // CHECK-NEXT:  test_function {{.*}}dll_intercept_memcpy_indirect.cc
 // CHECK: 'buff2' <== Memory access at offset {{.*}} overflows this variable
+  return 0;
 }

Modified: compiler-rt/trunk/test/asan/TestCases/Windows/dll_intercept_memset.cc
URL: http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/test/asan/TestCases/Windows/dll_intercept_memset.cc?rev=209887&r1=209886&r2=209887&view=diff
==============================================================================
--- compiler-rt/trunk/test/asan/TestCases/Windows/dll_intercept_memset.cc (original)
+++ compiler-rt/trunk/test/asan/TestCases/Windows/dll_intercept_memset.cc Fri May 30 06:58:32 2014
@@ -28,4 +28,5 @@ int test_function() {
 // CHECK: Address [[ADDR]] is located in stack of thread T0 at offset {{.*}} in frame
 // CHECK-NEXT:  test_function {{.*}}dll_intercept_memset.cc
 // CHECK: 'buff' <== Memory access at offset {{.*}} overflows this variable
+  return 0;
 }

Modified: compiler-rt/trunk/test/asan/lit.cfg
URL: http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/test/asan/lit.cfg?rev=209887&r1=209886&r2=209887&view=diff
==============================================================================
--- compiler-rt/trunk/test/asan/lit.cfg (original)
+++ compiler-rt/trunk/test/asan/lit.cfg Fri May 30 06:58:32 2014
@@ -73,6 +73,7 @@ if config.asan_dynamic:
 if platform.system() == 'Windows':
   clang_cl_asan_cxxflags = ["-fsanitize=address",
                             "-Wno-deprecated-declarations",
+                            "-WX",
                             "-D_HAS_EXCEPTIONS=0",
                             "-Zi"] + target_cflags
   clang_invocation = build_invocation(clang_cl_asan_cxxflags)





More information about the llvm-commits mailing list