forked from OSchip/llvm-project
Prior to adding the new "expected-no-diagnostics" directive to VerifyDiagnosticConsumer, make the necessary adjustment to 580 test-cases which will henceforth require this new directive.
llvm-svn: 166280
This commit is contained in:
parent
ac51de6ec2
commit
c6e68daac0
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -emit-pch -o %t.1.ast %S/Inputs/exprs1.c
|
// RUN: %clang_cc1 -emit-pch -o %t.1.ast %S/Inputs/exprs1.c
|
||||||
// RUN: %clang_cc1 -emit-pch -o %t.2.ast %S/Inputs/exprs2.c
|
// RUN: %clang_cc1 -emit-pch -o %t.2.ast %S/Inputs/exprs2.c
|
||||||
// RUN: %clang_cc1 -ast-merge %t.1.ast -ast-merge %t.2.ast -fsyntax-only -verify %s
|
// RUN: %clang_cc1 -ast-merge %t.1.ast -ast-merge %t.2.ast -fsyntax-only -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -analyze -analyzer-checker=osx.coreFoundation.containers.PointerSizedValues -triple x86_64-apple-darwin -verify %s
|
// RUN: %clang_cc1 -analyze -analyzer-checker=osx.coreFoundation.containers.PointerSizedValues -triple x86_64-apple-darwin -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
typedef const struct __CFAllocator * CFAllocatorRef;
|
typedef const struct __CFAllocator * CFAllocatorRef;
|
||||||
typedef const struct __CFArray * CFArrayRef;
|
typedef const struct __CFArray * CFArrayRef;
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -analyze -analyzer-checker=core,osx.cocoa.RetainCount,alpha.core -verify %s -analyzer-constraints=range -analyzer-store=region
|
// RUN: %clang_cc1 -analyze -analyzer-checker=core,osx.cocoa.RetainCount,alpha.core -verify %s -analyzer-constraints=range -analyzer-store=region
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
typedef struct objc_selector *SEL;
|
typedef struct objc_selector *SEL;
|
||||||
typedef signed char BOOL;
|
typedef signed char BOOL;
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -analyze -analyzer-checker=alpha.osx.cocoa.Dealloc %s -verify
|
// RUN: %clang_cc1 -analyze -analyzer-checker=alpha.osx.cocoa.Dealloc %s -verify
|
||||||
|
// expected-no-diagnostics
|
||||||
typedef signed char BOOL;
|
typedef signed char BOOL;
|
||||||
@protocol NSObject
|
@protocol NSObject
|
||||||
- (BOOL)isEqual:(id)object;
|
- (BOOL)isEqual:(id)object;
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -analyze -analyzer-checker=core,osx.cocoa.RetainCount,alpha.core -analyzer-store=region -analyzer-constraints=range -verify -Wno-objc-root-class %s
|
// RUN: %clang_cc1 -analyze -analyzer-checker=core,osx.cocoa.RetainCount,alpha.core -analyzer-store=region -analyzer-constraints=range -verify -Wno-objc-root-class %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
// BEGIN delta-debugging reduced header stuff
|
// BEGIN delta-debugging reduced header stuff
|
||||||
|
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -analyzer-constraints=range -verify %s
|
// RUN: %clang_cc1 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -analyzer-constraints=range -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
#include <stdarg.h>
|
#include <stdarg.h>
|
||||||
|
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -triple x86_64-apple-darwin9 -analyze -analyzer-checker=core,osx -analyzer-store=region -verify -fblocks -analyzer-opt-analyze-nested-blocks %s
|
// RUN: %clang_cc1 -triple x86_64-apple-darwin9 -analyze -analyzer-checker=core,osx -analyzer-store=region -verify -fblocks -analyzer-opt-analyze-nested-blocks %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
// Test handling of OSAtomicCompareAndSwap when C++ inserts "no-op" casts and we
|
// Test handling of OSAtomicCompareAndSwap when C++ inserts "no-op" casts and we
|
||||||
// do a forced load and binding to the environment on an expression that would regularly
|
// do a forced load and binding to the environment on an expression that would regularly
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -analyzer-constraints=range -Wno-objc-root-class %s -verify
|
// RUN: %clang_cc1 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -analyzer-constraints=range -Wno-objc-root-class %s -verify
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
// The point of this test cases is to exercise properties in the static
|
// The point of this test cases is to exercise properties in the static
|
||||||
// analyzer
|
// analyzer
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -cc1 -std=c++11 -Wuninitialized -verify %s
|
// RUN: %clang_cc1 -cc1 -std=c++11 -Wuninitialized -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
void f() {
|
void f() {
|
||||||
int a[] = { 1, 2, 3 };
|
int a[] = { 1, 2, 3 };
|
||||||
|
|
|
@ -1,5 +1,6 @@
|
||||||
// RUN: %clang_cc1 -triple x86_64-apple-darwin9 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -verify %s
|
// RUN: %clang_cc1 -triple x86_64-apple-darwin9 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -verify %s
|
||||||
// RUN: %clang_cc1 -triple i386-apple-darwin9 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -verify %s
|
// RUN: %clang_cc1 -triple i386-apple-darwin9 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
// Test if the 'storage' region gets properly initialized after it is cast to
|
// Test if the 'storage' region gets properly initialized after it is cast to
|
||||||
// 'struct sockaddr *'.
|
// 'struct sockaddr *'.
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -verify %s
|
// RUN: %clang_cc1 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
// Test function pointer casts. Currently we track function addresses using
|
// Test function pointer casts. Currently we track function addresses using
|
||||||
// loc::FunctionVal. Because casts can be arbitrary, do we need to model
|
// loc::FunctionVal. Because casts can be arbitrary, do we need to model
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -analyze -analyzer-checker=core,osx.cocoa.RetainCount,alpha.core -analyzer-store=region -analyzer-constraints=range -verify %s
|
// RUN: %clang_cc1 -analyze -analyzer-checker=core,osx.cocoa.RetainCount,alpha.core -analyzer-store=region -analyzer-constraints=range -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
typedef unsigned char Boolean;
|
typedef unsigned char Boolean;
|
||||||
typedef signed long CFIndex;
|
typedef signed long CFIndex;
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -analyzer-constraints=range -verify %s
|
// RUN: %clang_cc1 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -analyzer-constraints=range -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
// This test case was reported in <rdar:problem/6080742>.
|
// This test case was reported in <rdar:problem/6080742>.
|
||||||
// It tests path-sensitivity with respect to '!(cfstring != 0)' (negation of inequality).
|
// It tests path-sensitivity with respect to '!(cfstring != 0)' (negation of inequality).
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -analyze -analyzer-checker=core -analyzer-output=text -verify %s
|
// RUN: %clang_cc1 -analyze -analyzer-checker=core -analyzer-output=text -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
// Do not crash on initialization to complex numbers.
|
// Do not crash on initialization to complex numbers.
|
||||||
void init_complex() {
|
void init_complex() {
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -verify %s
|
// RUN: %clang_cc1 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
void foo() {
|
void foo() {
|
||||||
int *p = (int*) 0x10000; // Should not crash here.
|
int *p = (int*) 0x10000; // Should not crash here.
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -analyze -analyzer-checker=unix.cstring.BadSizeArg -analyzer-store=region -verify %s
|
// RUN: %clang_cc1 -analyze -analyzer-checker=unix.cstring.BadSizeArg -analyzer-store=region -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
// Ensure we don't crash on C++ declarations with special names.
|
// Ensure we don't crash on C++ declarations with special names.
|
||||||
struct X {
|
struct X {
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -analyze -analyzer-checker=core,unix,osx,alpha.unix,alpha.security.taint -analyzer-store region -verify %s
|
// RUN: %clang_cc1 -analyze -analyzer-checker=core,unix,osx,alpha.unix,alpha.security.taint -analyzer-store region -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
class Evil {
|
class Evil {
|
||||||
public:
|
public:
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -analyze -analyzer-checker=core -std=c++11 -verify %s
|
// RUN: %clang_cc1 -analyze -analyzer-checker=core -std=c++11 -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
// radar://11485149, PR12871
|
// radar://11485149, PR12871
|
||||||
class PlotPoint {
|
class PlotPoint {
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -analyze -analyzer-checker=alpha.core -analyzer-checker=deadcode.DeadStores,osx.cocoa.RetainCount -fblocks -verify -Wno-objc-root-class %s
|
// RUN: %clang_cc1 -analyze -analyzer-checker=alpha.core -analyzer-checker=deadcode.DeadStores,osx.cocoa.RetainCount -fblocks -verify -Wno-objc-root-class %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
typedef signed char BOOL;
|
typedef signed char BOOL;
|
||||||
typedef unsigned int NSUInteger;
|
typedef unsigned int NSUInteger;
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -analyze -analyzer-checker=core,osx.cocoa.RetainCount -analyzer-store=region -Wno-objc-root-class -verify %s
|
// RUN: %clang_cc1 -analyze -analyzer-checker=core,osx.cocoa.RetainCount -analyzer-store=region -Wno-objc-root-class -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
|
|
||||||
//===----------------------------------------------------------------------===//
|
//===----------------------------------------------------------------------===//
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -analyze -analyzer-checker=core,unix.Malloc -verify %s
|
// RUN: %clang_cc1 -analyze -analyzer-checker=core,unix.Malloc -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
typedef struct {
|
typedef struct {
|
||||||
char I[4];
|
char I[4];
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -analyze -analyzer-store=region -analyzer-constraints=range -fblocks -analyzer-opt-analyze-nested-blocks -analyzer-checker=alpha.deadcode.IdempotentOperations,osx.cocoa.RetainCount -verify %s
|
// RUN: %clang_cc1 -analyze -analyzer-store=region -analyzer-constraints=range -fblocks -analyzer-opt-analyze-nested-blocks -analyzer-checker=alpha.deadcode.IdempotentOperations,osx.cocoa.RetainCount -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
typedef signed char BOOL;
|
typedef signed char BOOL;
|
||||||
typedef unsigned long NSUInteger;
|
typedef unsigned long NSUInteger;
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -analyze -analyzer-checker=core -verify %s
|
// RUN: %clang_cc1 -analyze -analyzer-checker=core -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
// Test parameter 'a' is registered to LiveVariables analysis data although it
|
// Test parameter 'a' is registered to LiveVariables analysis data although it
|
||||||
// is not referenced in the function body.
|
// is not referenced in the function body.
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -analyze -analyzer-checker=core -verify %s
|
// RUN: %clang_cc1 -analyze -analyzer-checker=core -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
// Test when entering f1(), we set the right AnalysisDeclContext to Environment.
|
// Test when entering f1(), we set the right AnalysisDeclContext to Environment.
|
||||||
// Otherwise, block-level expr '1 && a' would not be block-level.
|
// Otherwise, block-level expr '1 && a' would not be block-level.
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -analyze -analyzer-checker=core -verify %s
|
// RUN: %clang_cc1 -analyze -analyzer-checker=core -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
int g(int a) {
|
int g(int a) {
|
||||||
return a;
|
return a;
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -analyze -analyzer-checker=core -analyzer-ipa=dynamic-bifurcate -analyzer-config objc-inlining=false -verify %s
|
// RUN: %clang_cc1 -analyze -analyzer-checker=core -analyzer-ipa=dynamic-bifurcate -analyzer-config objc-inlining=false -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
typedef signed char BOOL;
|
typedef signed char BOOL;
|
||||||
typedef struct objc_class *Class;
|
typedef struct objc_class *Class;
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -analyze -analyzer-checker=core -analyzer-store=region -verify %s
|
// RUN: %clang_cc1 -analyze -analyzer-checker=core -analyzer-store=region -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
int f1() {
|
int f1() {
|
||||||
int x = 0, y = 1;
|
int x = 0, y = 1;
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -analyze -analyzer-checker=alpha.security.MallocOverflow -verify %s
|
// RUN: %clang_cc1 -analyze -analyzer-checker=alpha.security.MallocOverflow -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
class A {
|
class A {
|
||||||
public:
|
public:
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -analyze -analyzer-checker=core -analyzer-store region -verify %s
|
// RUN: %clang_cc1 -analyze -analyzer-checker=core -analyzer-store region -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
// Intra-procedural C++ tests.
|
// Intra-procedural C++ tests.
|
||||||
|
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -triple x86_64-apple-darwin9 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -analyzer-constraints=range -verify -fblocks %s
|
// RUN: %clang_cc1 -triple x86_64-apple-darwin9 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -analyzer-constraints=range -verify -fblocks %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
// <rdar://problem/6440393> - A bunch of misc. failures involving evaluating
|
// <rdar://problem/6440393> - A bunch of misc. failures involving evaluating
|
||||||
// these expressions and building CFGs. These tests are here to prevent
|
// these expressions and building CFGs. These tests are here to prevent
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -triple thumbv7-apple-ios0.0.0 -analyze -analyzer-checker=core -analyzer-store=region -verify -fblocks -analyzer-opt-analyze-nested-blocks -Wno-objc-root-class %s
|
// RUN: %clang_cc1 -triple thumbv7-apple-ios0.0.0 -analyze -analyzer-checker=core -analyzer-store=region -verify -fblocks -analyzer-opt-analyze-nested-blocks -Wno-objc-root-class %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
// <rdar://problem/11405978> - Handle casts of vectors to structs, and loading
|
// <rdar://problem/11405978> - Handle casts of vectors to structs, and loading
|
||||||
// a value.
|
// a value.
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -analyzer-constraints=range -verify -fblocks %s -analyzer-eagerly-assume
|
// RUN: %clang_cc1 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -analyzer-constraints=range -verify -fblocks %s -analyzer-eagerly-assume
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
// Delta-reduced header stuff (needed for test cases).
|
// Delta-reduced header stuff (needed for test cases).
|
||||||
typedef signed char BOOL;
|
typedef signed char BOOL;
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -triple i386-apple-darwin9 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -verify -fblocks %s
|
// RUN: %clang_cc1 -triple i386-apple-darwin9 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -verify -fblocks %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
// Here is a case where a pointer is treated as integer, invalidated as an
|
// Here is a case where a pointer is treated as integer, invalidated as an
|
||||||
// integer, and then used again as a pointer. This test just makes sure
|
// integer, and then used again as a pointer. This test just makes sure
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -triple x86_64-apple-darwin9 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -verify -fblocks %s
|
// RUN: %clang_cc1 -triple x86_64-apple-darwin9 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -verify -fblocks %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
// Here is a case where a pointer is treated as integer, invalidated as an
|
// Here is a case where a pointer is treated as integer, invalidated as an
|
||||||
// integer, and then used again as a pointer. This test just makes sure
|
// integer, and then used again as a pointer. This test just makes sure
|
||||||
|
|
|
@ -1,5 +1,6 @@
|
||||||
// RUN: %clang_cc1 -triple i386-apple-darwin9 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -verify -fblocks -analyzer-opt-analyze-nested-blocks %s
|
// RUN: %clang_cc1 -triple i386-apple-darwin9 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -verify -fblocks -analyzer-opt-analyze-nested-blocks %s
|
||||||
// RUN: %clang_cc1 -triple x86_64-apple-darwin9 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -verify -fblocks -analyzer-opt-analyze-nested-blocks %s
|
// RUN: %clang_cc1 -triple x86_64-apple-darwin9 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -verify -fblocks -analyzer-opt-analyze-nested-blocks %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
//===------------------------------------------------------------------------------------------===//
|
//===------------------------------------------------------------------------------------------===//
|
||||||
// This files tests our path-sensitive handling of Objective-c++ files.
|
// This files tests our path-sensitive handling of Objective-c++ files.
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -verify %s
|
// RUN: %clang_cc1 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
// This is a test case for the issue reported in PR 2819:
|
// This is a test case for the issue reported in PR 2819:
|
||||||
// http://llvm.org/bugs/show_bug.cgi?id=2819
|
// http://llvm.org/bugs/show_bug.cgi?id=2819
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -analyze -analyzer-checker=core,alpha.core -std=gnu99 -analyzer-store=region -verify %s
|
// RUN: %clang_cc1 -analyze -analyzer-checker=core,alpha.core -std=gnu99 -analyzer-store=region -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
|
|
||||||
// The store for 'a[1]' should not be removed mistakenly. SymbolicRegions may
|
// The store for 'a[1]' should not be removed mistakenly. SymbolicRegions may
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang --analyze %s -o %t -Xclang -verify
|
// RUN: %clang --analyze %s -o %t -Xclang -verify
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
// Test handling of ObjC bool literals.
|
// Test handling of ObjC bool literals.
|
||||||
|
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -triple x86_64-apple-darwin9 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -verify %s
|
// RUN: %clang_cc1 -triple x86_64-apple-darwin9 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
// PR 4164: http://llvm.org/bugs/show_bug.cgi?id=4164
|
// PR 4164: http://llvm.org/bugs/show_bug.cgi?id=4164
|
||||||
//
|
//
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -analyze -analyzer-checker=core,alpha.core %s -analyzer-store=region -verify
|
// RUN: %clang_cc1 -analyze -analyzer-checker=core,alpha.core %s -analyzer-store=region -verify
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
typedef int bar_return_t;
|
typedef int bar_return_t;
|
||||||
typedef struct {
|
typedef struct {
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -analyze -analyzer-checker=core,osx.cocoa.RetainCount,alpha.core -analyzer-constraints=range -analyzer-store=region -verify %s
|
// RUN: %clang_cc1 -analyze -analyzer-checker=core,osx.cocoa.RetainCount,alpha.core -analyzer-constraints=range -analyzer-store=region -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
//
|
//
|
||||||
// This test case mainly checks that the retain/release checker doesn't crash
|
// This test case mainly checks that the retain/release checker doesn't crash
|
||||||
// on this file.
|
// on this file.
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -analyze -analyzer-checker=core,alpha.core -analyzer-constraints=range -analyzer-store=region -verify -Wno-objc-root-class %s
|
// RUN: %clang_cc1 -analyze -analyzer-checker=core,alpha.core -analyzer-constraints=range -analyzer-store=region -verify -Wno-objc-root-class %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
typedef struct Foo { int x; } Bar;
|
typedef struct Foo { int x; } Bar;
|
||||||
|
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -analyze -analyzer-checker=unix,core,alpha.security.taint -w -verify %s
|
// RUN: %clang_cc1 -analyze -analyzer-checker=unix,core,alpha.security.taint -w -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
// Make sure we don't crash when someone redefines a system function we reason about.
|
// Make sure we don't crash when someone redefines a system function we reason about.
|
||||||
|
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -verify %s
|
// RUN: %clang_cc1 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
//
|
//
|
||||||
// This test case simply should not crash. It evaluates the logic of not
|
// This test case simply should not crash. It evaluates the logic of not
|
||||||
// using MemRegion::getRValueType in incorrect places.
|
// using MemRegion::getRValueType in incorrect places.
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -analyze -analyzer-checker=core,unix -verify %s
|
// RUN: %clang_cc1 -analyze -analyzer-checker=core,unix -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
int printf(const char *restrict,...);
|
int printf(const char *restrict,...);
|
||||||
|
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -triple i686-pc-linux-gnu -analyze -analyzer-checker=security.insecureAPI,security.FloatLoopCounter %s -verify
|
// RUN: %clang_cc1 -triple i686-pc-linux-gnu -analyze -analyzer-checker=security.insecureAPI,security.FloatLoopCounter %s -verify
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
// This file complements 'security-syntax-checks.m', but tests that we omit
|
// This file complements 'security-syntax-checks.m', but tests that we omit
|
||||||
// specific checks on platforms where they don't make sense.
|
// specific checks on platforms where they don't make sense.
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -analyze -analyzer-checker=core -verify -Wno-objc-root-class %s
|
// RUN: %clang_cc1 -analyze -analyzer-checker=core -verify -Wno-objc-root-class %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
// Test reasoning about static locals in ObjCMethods.
|
// Test reasoning about static locals in ObjCMethods.
|
||||||
int *getValidPtr();
|
int *getValidPtr();
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -analyze -analyzer-checker=core,unix -verify %s
|
// RUN: %clang_cc1 -analyze -analyzer-checker=core,unix -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
// Testing core functionality of the SValBuilder.
|
// Testing core functionality of the SValBuilder.
|
||||||
|
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -analyze -analyzer-checker=alpha.security.taint,debug.TaintTest %s -verify
|
// RUN: %clang_cc1 -analyze -analyzer-checker=alpha.security.taint,debug.TaintTest %s -verify
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
typedef struct _FILE FILE;
|
typedef struct _FILE FILE;
|
||||||
typedef __typeof(sizeof(int)) size_t;
|
typedef __typeof(sizeof(int)) size_t;
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -analyze -analyzer-checker=alpha.security.taint,debug.TaintTest %s -verify
|
// RUN: %clang_cc1 -analyze -analyzer-checker=alpha.security.taint,debug.TaintTest %s -verify
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
#import <stdarg.h>
|
#import <stdarg.h>
|
||||||
|
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -analyze -analyzer-checker=core -analyzer-store=region -verify %s
|
// RUN: %clang_cc1 -analyze -analyzer-checker=core -analyzer-store=region -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
typedef unsigned int NSUInteger;
|
typedef unsigned int NSUInteger;
|
||||||
|
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -analyze -analyzer-checker=core -analyzer-store=region -analyzer-constraints=range %s -verify
|
// RUN: %clang_cc1 -analyze -analyzer-checker=core -analyzer-store=region -analyzer-constraints=range %s -verify
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
//===-- unions-region.m ---------------------------------------------------===//
|
//===-- unions-region.m ---------------------------------------------------===//
|
||||||
//
|
//
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -analyze -analyzer-checker=core %s -verify
|
// RUN: %clang_cc1 -analyze -analyzer-checker=core %s -verify
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
namespace PR14054_reduced {
|
namespace PR14054_reduced {
|
||||||
struct Definition;
|
struct Definition;
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
namespace N1 {
|
namespace N1 {
|
||||||
struct X { };
|
struct X { };
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
// C++0x [basic.lookup.classref]p3:
|
// C++0x [basic.lookup.classref]p3:
|
||||||
// If the unqualified-id is ~type-name, the type-name is looked up in the
|
// If the unqualified-id is ~type-name, the type-name is looked up in the
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -std=c++11 %s -verify
|
// RUN: %clang_cc1 -std=c++11 %s -verify
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
struct A { void f(); };
|
struct A { void f(); };
|
||||||
struct C { void f(); };
|
struct C { void f(); };
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
// This is basically paraphrased from the standard.
|
// This is basically paraphrased from the standard.
|
||||||
|
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
namespace A {
|
namespace A {
|
||||||
int a;
|
int a;
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
// When looking up a namespace-name in a using-directive or
|
// When looking up a namespace-name in a using-directive or
|
||||||
// namespace-alias-definition, only namespace names are considered.
|
// namespace-alias-definition, only namespace names are considered.
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
struct S {};
|
struct S {};
|
||||||
S E0;
|
S E0;
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
struct S {
|
struct S {
|
||||||
static const int f0 = 0;
|
static const int f0 = 0;
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
// C++0x [basic.lookup.unqual]p14:
|
// C++0x [basic.lookup.unqual]p14:
|
||||||
// If a variable member of a namespace is defined outside of the
|
// If a variable member of a namespace is defined outside of the
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
typedef int f;
|
typedef int f;
|
||||||
|
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
// Template type parameters.
|
// Template type parameters.
|
||||||
typedef unsigned char T;
|
typedef unsigned char T;
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
typedef int Int;
|
typedef int Int;
|
||||||
typedef char Char;
|
typedef char Char;
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
typedef int Int;
|
typedef int Int;
|
||||||
typedef char Char;
|
typedef char Char;
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
int main() {
|
int main() {
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
int main(int argc, const char* const* argv) {
|
int main(int argc, const char* const* argv) {
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
int *use_new(int N) {
|
int *use_new(int N) {
|
||||||
return new int [N];
|
return new int [N];
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
namespace std {
|
namespace std {
|
||||||
class bad_alloc { };
|
class bad_alloc { };
|
||||||
|
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
// PR12497
|
// PR12497
|
||||||
namespace test0 {
|
namespace test0 {
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 %s -fsyntax-only -verify
|
// RUN: %clang_cc1 %s -fsyntax-only -verify
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
// "During the lookup for a base class name, non-type names are ignored"
|
// "During the lookup for a base class name, non-type names are ignored"
|
||||||
namespace PR5840 {
|
namespace PR5840 {
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
// Make sure that friend declarations don't introduce ambiguous
|
// Make sure that friend declarations don't introduce ambiguous
|
||||||
// declarations.
|
// declarations.
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -fsyntax-only -verify -std=c++11 %s
|
// RUN: %clang_cc1 -fsyntax-only -verify -std=c++11 %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
class A {
|
class A {
|
||||||
class AInner {
|
class AInner {
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
// C++0x [class.nest] p3:
|
// C++0x [class.nest] p3:
|
||||||
// If class X is defined in a namespace scope, a nested class Y may be
|
// If class X is defined in a namespace scope, a nested class Y may be
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -fsyntax-only -verify %s -std=c++11
|
// RUN: %clang_cc1 -fsyntax-only -verify %s -std=c++11
|
||||||
|
// expected-no-diagnostics
|
||||||
namespace Test1 {
|
namespace Test1 {
|
||||||
|
|
||||||
class A final { };
|
class A final { };
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -fsyntax-only -verify %s -std=c++11
|
// RUN: %clang_cc1 -fsyntax-only -verify %s -std=c++11
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
class Trivial { int n; void f(); };
|
class Trivial { int n; void f(); };
|
||||||
class NonTrivial1 { NonTrivial1(const NonTrivial1 &); };
|
class NonTrivial1 { NonTrivial1(const NonTrivial1 &); };
|
||||||
|
|
|
@ -1,5 +1,6 @@
|
||||||
// RUN: %clang_cc1 -fsyntax-only -verify -std=c++0x -triple x86_64-pc-linux-gnu -ffreestanding %s
|
// RUN: %clang_cc1 -fsyntax-only -verify -std=c++0x -triple x86_64-pc-linux-gnu -ffreestanding %s
|
||||||
// RUN: %clang_cc1 -fsyntax-only -verify -std=c++0x -triple x86_64-pc-linux-gnu -ffreestanding -fshort-wchar %s
|
// RUN: %clang_cc1 -fsyntax-only -verify -std=c++0x -triple x86_64-pc-linux-gnu -ffreestanding -fshort-wchar %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
#include <stdint.h>
|
#include <stdint.h>
|
||||||
|
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -fsyntax-only -verify -std=c++0x %s
|
// RUN: %clang_cc1 -fsyntax-only -verify -std=c++0x %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
enum X : short { A, B };
|
enum X : short { A, B };
|
||||||
extern decltype(+A) x;
|
extern decltype(+A) x;
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
namespace pr7801 {
|
namespace pr7801 {
|
||||||
extern void* x[];
|
extern void* x[];
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
bool is_char_ptr( const char* );
|
bool is_char_ptr( const char* );
|
||||||
|
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
// PR8430
|
// PR8430
|
||||||
namespace N {
|
namespace N {
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
namespace test0 {
|
namespace test0 {
|
||||||
namespace ns0 {
|
namespace ns0 {
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
// C++03 [namespace.udecl]p3:
|
// C++03 [namespace.udecl]p3:
|
||||||
// For the purpose of overload resolution, the functions which are
|
// For the purpose of overload resolution, the functions which are
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
// <rdar://problem/8296180>
|
// <rdar://problem/8296180>
|
||||||
typedef int pid_t;
|
typedef int pid_t;
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
// PR5787
|
// PR5787
|
||||||
class C {
|
class C {
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -fsyntax-only -verify -std=c++11 %s
|
// RUN: %clang_cc1 -fsyntax-only -verify -std=c++11 %s
|
||||||
|
// expected-no-diagnostics
|
||||||
int g(int);
|
int g(int);
|
||||||
void f() {
|
void f() {
|
||||||
int i;
|
int i;
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
char x1[]("hello");
|
char x1[]("hello");
|
||||||
extern char x1[6];
|
extern char x1[6];
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
void point(int = 3, int = 4);
|
void point(int = 3, int = 4);
|
||||||
|
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -std=c++11 -fsyntax-only -verify %s
|
// RUN: %clang_cc1 -std=c++11 -fsyntax-only -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
template<typename T> struct identity;
|
template<typename T> struct identity;
|
||||||
template<typename ...Types> struct tuple;
|
template<typename ...Types> struct tuple;
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -std=c++11 -fsyntax-only -verify %s
|
// RUN: %clang_cc1 -std=c++11 -fsyntax-only -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
template<typename T, typename U>
|
template<typename T, typename U>
|
||||||
struct is_same {
|
struct is_same {
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
namespace pr6200 {
|
namespace pr6200 {
|
||||||
struct v {};
|
struct v {};
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -std=c++11 -fsyntax-only -verify %s
|
// RUN: %clang_cc1 -std=c++11 -fsyntax-only -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
struct X {
|
struct X {
|
||||||
void f() &;
|
void f() &;
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -fsyntax-only -verify -std=c++11 %s
|
// RUN: %clang_cc1 -fsyntax-only -verify -std=c++11 %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
// PR10087: Make sure that we don't conflate exception specifications
|
// PR10087: Make sure that we don't conflate exception specifications
|
||||||
// from different functions in the canonical type system.
|
// from different functions in the canonical type system.
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -std=c++11 -fexceptions -fcxx-exceptions -fsyntax-only -verify %s
|
// RUN: %clang_cc1 -std=c++11 -fexceptions -fcxx-exceptions -fsyntax-only -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
// This is the "let the user shoot himself in the foot" clause.
|
// This is the "let the user shoot himself in the foot" clause.
|
||||||
void f() noexcept {
|
void f() noexcept {
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -std=c++11 -fsyntax-only -verify %s
|
// RUN: %clang_cc1 -std=c++11 -fsyntax-only -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
struct X { };
|
struct X { };
|
||||||
struct Y : X { };
|
struct Y : X { };
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -fsyntax-only -std=c++11 -Wno-c++11-narrowing -verify %s
|
// RUN: %clang_cc1 -fsyntax-only -std=c++11 -Wno-c++11-narrowing -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
// <rdar://problem/11121178>
|
// <rdar://problem/11121178>
|
||||||
void f(int x) {
|
void f(int x) {
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -std=c++11 -fsyntax-only -verify %s
|
// RUN: %clang_cc1 -std=c++11 -fsyntax-only -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
// The result of the expression const_cast<T>(v) is of type T. If T is
|
// The result of the expression const_cast<T>(v) is of type T. If T is
|
||||||
// an lvalue reference to object type, the result is an lvalue; if T
|
// an lvalue reference to object type, the result is an lvalue; if T
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -verify -fsyntax-only %s
|
// RUN: %clang_cc1 -verify -fsyntax-only %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
template<typename T> struct Node {
|
template<typename T> struct Node {
|
||||||
int lhs;
|
int lhs;
|
||||||
|
|
|
@ -1,4 +1,5 @@
|
||||||
// RUN: %clang_cc1 -std=c++11 -fsyntax-only -verify %s
|
// RUN: %clang_cc1 -std=c++11 -fsyntax-only -verify %s
|
||||||
|
// expected-no-diagnostics
|
||||||
|
|
||||||
// A glvalue of type "cv1 T1" can be cast to type "rvalue reference to
|
// A glvalue of type "cv1 T1" can be cast to type "rvalue reference to
|
||||||
// cv2 T2" if "cv2 T2" is reference-compatible with "cv1 T1" (8.5.3).
|
// cv2 T2" if "cv2 T2" is reference-compatible with "cv1 T1" (8.5.3).
|
||||||
|
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
Reference in New Issue