From 8f655fc0fb9e057dca0d6d8eb2ee983c16b16ea1 Mon Sep 17 00:00:00 2001 From: Timur Iskhodzhanov Date: Fri, 30 May 2014 11:58:32 +0000 Subject: [PATCH] [ASan Win] Fix a couple of warnings in tests and enable -WX llvm-svn: 209887 --- compiler-rt/test/asan/TestCases/Windows/dll_intercept_memcpy.cc | 1 + compiler-rt/test/asan/TestCases/Windows/dll_intercept_memcpy_indirect.cc | 1 + compiler-rt/test/asan/TestCases/Windows/dll_intercept_memset.cc | 1 + compiler-rt/test/asan/lit.cfg | 1 + 4 files changed, 4 insertions(+) diff --git a/compiler-rt/test/asan/TestCases/Windows/dll_intercept_memcpy.cc b/compiler-rt/test/asan/TestCases/Windows/dll_intercept_memcpy.cc index befeca6..7ad0d82 100644 --- a/compiler-rt/test/asan/TestCases/Windows/dll_intercept_memcpy.cc +++ b/compiler-rt/test/asan/TestCases/Windows/dll_intercept_memcpy.cc @@ -28,4 +28,5 @@ int test_function() { // CHECK: Address [[ADDR]] is located in stack of thread T0 at offset {{.*}} in frame // CHECK-NEXT: test_function {{.*}}dll_intercept_memcpy.cc // CHECK: 'buff2' <== Memory access at offset {{.*}} overflows this variable + return 0; } diff --git a/compiler-rt/test/asan/TestCases/Windows/dll_intercept_memcpy_indirect.cc b/compiler-rt/test/asan/TestCases/Windows/dll_intercept_memcpy_indirect.cc index 3c75f28..0c4bfba 100644 --- a/compiler-rt/test/asan/TestCases/Windows/dll_intercept_memcpy_indirect.cc +++ b/compiler-rt/test/asan/TestCases/Windows/dll_intercept_memcpy_indirect.cc @@ -30,4 +30,5 @@ int test_function() { // CHECK: Address [[ADDR]] is located in stack of thread T0 at offset {{.*}} in frame // CHECK-NEXT: test_function {{.*}}dll_intercept_memcpy_indirect.cc // CHECK: 'buff2' <== Memory access at offset {{.*}} overflows this variable + return 0; } diff --git a/compiler-rt/test/asan/TestCases/Windows/dll_intercept_memset.cc b/compiler-rt/test/asan/TestCases/Windows/dll_intercept_memset.cc index b5bc1e7..d4be376 100644 --- a/compiler-rt/test/asan/TestCases/Windows/dll_intercept_memset.cc +++ b/compiler-rt/test/asan/TestCases/Windows/dll_intercept_memset.cc @@ -28,4 +28,5 @@ int test_function() { // CHECK: Address [[ADDR]] is located in stack of thread T0 at offset {{.*}} in frame // CHECK-NEXT: test_function {{.*}}dll_intercept_memset.cc // CHECK: 'buff' <== Memory access at offset {{.*}} overflows this variable + return 0; } diff --git a/compiler-rt/test/asan/lit.cfg b/compiler-rt/test/asan/lit.cfg index 4063a20..db2459f 100644 --- a/compiler-rt/test/asan/lit.cfg +++ b/compiler-rt/test/asan/lit.cfg @@ -73,6 +73,7 @@ if config.asan_dynamic: if platform.system() == 'Windows': clang_cl_asan_cxxflags = ["-fsanitize=address", "-Wno-deprecated-declarations", + "-WX", "-D_HAS_EXCEPTIONS=0", "-Zi"] + target_cflags clang_invocation = build_invocation(clang_cl_asan_cxxflags) -- 2.7.4