From: Yann Collet Date: Mon, 29 Jun 2015 08:31:41 +0000 (-0800) Subject: Fixed a few minor visual analyzer warnings X-Git-Tag: upstream/1.9.3~207 X-Git-Url: http://review.tizen.org/git/?a=commitdiff_plain;h=dfabec2d1817e08fda70c19ed9248819b6a1fb22;p=platform%2Fupstream%2Flz4.git Fixed a few minor visual analyzer warnings --- diff --git a/lib/lz4frame.c b/lib/lz4frame.c index d1733d0..e5458bb 100644 --- a/lib/lz4frame.c +++ b/lib/lz4frame.c @@ -205,8 +205,8 @@ static void LZ4F_writeLE32 (BYTE* dstPtr, U32 value32) static U64 LZ4F_readLE64 (const BYTE* srcPtr) { U64 value64 = srcPtr[0]; - value64 += (srcPtr[1]<<8); - value64 += (srcPtr[2]<<16); + value64 += ((U64)srcPtr[1]<<8); + value64 += ((U64)srcPtr[2]<<16); value64 += ((U64)srcPtr[3]<<24); value64 += ((U64)srcPtr[4]<<32); value64 += ((U64)srcPtr[5]<<40); diff --git a/programs/fuzzer.c b/programs/fuzzer.c index de12478..f1da1a8 100644 --- a/programs/fuzzer.c +++ b/programs/fuzzer.c @@ -208,12 +208,12 @@ static int FUZ_AddressOverflow(void) int i, nbBuff=0; int highAddress = 0; - printf("Overflow tests : "); + DISPLAY("Overflow tests : "); /* Only possible in 32-bits */ if (sizeof(void*)==8) { - printf("64 bits mode : no overflow \n"); + DISPLAY("64 bits mode : no overflow \n"); fflush(stdout); return 0; } @@ -222,23 +222,23 @@ static int FUZ_AddressOverflow(void) buffers[1] = (char*)malloc(BLOCKSIZE_I134); if ((!buffers[0]) || (!buffers[1])) { - printf("not enough memory for tests \n"); + DISPLAY("not enough memory for tests \n"); return 0; } + for (nbBuff=2; nbBuff < MAX_NB_BUFF_I134; nbBuff++) { - printf("%3i \b\b\b\b", nbBuff); + DISPLAY("%3i \b\b\b\b", nbBuff); buffers[nbBuff] = (char*)malloc(BLOCKSIZE_I134); - //printf("%08X ", (U32)(size_t)(buffers[nbBuff])); - fflush(stdout); + if (buffers[nbBuff]==NULL) goto _endOfTests; + //DISPLAY("%08X ", (U32)(size_t)(buffers[nbBuff])); fflush(stdout); if (((size_t)buffers[nbBuff] > (size_t)0x80000000) && (!highAddress)) { - printf("high address detected : "); + DISPLAY("high address detected : "); fflush(stdout); highAddress=1; } - if (buffers[nbBuff]==NULL) goto _endOfTests; { size_t sizeToGenerateOverflow = (size_t)(- ((size_t)buffers[nbBuff-1]) + 512); @@ -279,12 +279,12 @@ static int FUZ_AddressOverflow(void) nbBuff++; _endOfTests: for (i=0 ; i /* _O_BINARY */ # include /* _setmode, _fileno, _get_osfhandle */ # if !defined(__DJGPP__) -# define SET_BINARY_MODE(file) _setmode(_fileno(file), _O_BINARY) +# define SET_BINARY_MODE(file) { int unused=_setmode(_fileno(file), _O_BINARY); (void)unused; } # include /* DeviceIoControl, HANDLE, FSCTL_SET_SPARSE */ # define SET_SPARSE_FILE_MODE(file) { DWORD dw; DeviceIoControl((HANDLE) _get_osfhandle(_fileno(file)), FSCTL_SET_SPARSE, 0, 0, 0, 0, &dw, 0); } # if defined(_MSC_VER) && (_MSC_VER >= 1400) /* Avoid MSVC fseek()'s 2GiB barrier */