[compiler-rt] r209887 - [ASan Win] Fix a couple of warnings in tests and enable -WX
Timur Iskhodzhanov
timurrrr at google.com
Fri May 30 04:58:33 PDT 2014
Author: timurrrr
Date: Fri May 30 06:58:32 2014
New Revision: 209887
URL: http://llvm.org/viewvc/llvm-project?rev=209887&view=rev
Log:
[ASan Win] Fix a couple of warnings in tests and enable -WX
Modified:
compiler-rt/trunk/test/asan/TestCases/Windows/dll_intercept_memcpy.cc
compiler-rt/trunk/test/asan/TestCases/Windows/dll_intercept_memcpy_indirect.cc
compiler-rt/trunk/test/asan/TestCases/Windows/dll_intercept_memset.cc
compiler-rt/trunk/test/asan/lit.cfg
Modified: compiler-rt/trunk/test/asan/TestCases/Windows/dll_intercept_memcpy.cc
URL: http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/test/asan/TestCases/Windows/dll_intercept_memcpy.cc?rev=209887&r1=209886&r2=209887&view=diff
==============================================================================
--- compiler-rt/trunk/test/asan/TestCases/Windows/dll_intercept_memcpy.cc (original)
+++ compiler-rt/trunk/test/asan/TestCases/Windows/dll_intercept_memcpy.cc Fri May 30 06:58:32 2014
@@ -28,4 +28,5 @@ int test_function() {
// CHECK: Address [[ADDR]] is located in stack of thread T0 at offset {{.*}} in frame
// CHECK-NEXT: test_function {{.*}}dll_intercept_memcpy.cc
// CHECK: 'buff2' <== Memory access at offset {{.*}} overflows this variable
+ return 0;
}
Modified: compiler-rt/trunk/test/asan/TestCases/Windows/dll_intercept_memcpy_indirect.cc
URL: http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/test/asan/TestCases/Windows/dll_intercept_memcpy_indirect.cc?rev=209887&r1=209886&r2=209887&view=diff
==============================================================================
--- compiler-rt/trunk/test/asan/TestCases/Windows/dll_intercept_memcpy_indirect.cc (original)
+++ compiler-rt/trunk/test/asan/TestCases/Windows/dll_intercept_memcpy_indirect.cc Fri May 30 06:58:32 2014
@@ -30,4 +30,5 @@ int test_function() {
// CHECK: Address [[ADDR]] is located in stack of thread T0 at offset {{.*}} in frame
// CHECK-NEXT: test_function {{.*}}dll_intercept_memcpy_indirect.cc
// CHECK: 'buff2' <== Memory access at offset {{.*}} overflows this variable
+ return 0;
}
Modified: compiler-rt/trunk/test/asan/TestCases/Windows/dll_intercept_memset.cc
URL: http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/test/asan/TestCases/Windows/dll_intercept_memset.cc?rev=209887&r1=209886&r2=209887&view=diff
==============================================================================
--- compiler-rt/trunk/test/asan/TestCases/Windows/dll_intercept_memset.cc (original)
+++ compiler-rt/trunk/test/asan/TestCases/Windows/dll_intercept_memset.cc Fri May 30 06:58:32 2014
@@ -28,4 +28,5 @@ int test_function() {
// CHECK: Address [[ADDR]] is located in stack of thread T0 at offset {{.*}} in frame
// CHECK-NEXT: test_function {{.*}}dll_intercept_memset.cc
// CHECK: 'buff' <== Memory access at offset {{.*}} overflows this variable
+ return 0;
}
Modified: compiler-rt/trunk/test/asan/lit.cfg
URL: http://llvm.org/viewvc/llvm-project/compiler-rt/trunk/test/asan/lit.cfg?rev=209887&r1=209886&r2=209887&view=diff
==============================================================================
--- compiler-rt/trunk/test/asan/lit.cfg (original)
+++ compiler-rt/trunk/test/asan/lit.cfg Fri May 30 06:58:32 2014
@@ -73,6 +73,7 @@ if config.asan_dynamic:
if platform.system() == 'Windows':
clang_cl_asan_cxxflags = ["-fsanitize=address",
"-Wno-deprecated-declarations",
+ "-WX",
"-D_HAS_EXCEPTIONS=0",
"-Zi"] + target_cflags
clang_invocation = build_invocation(clang_cl_asan_cxxflags)
More information about the llvm-commits
mailing list