forked from OSchip/llvm-project
Prior to adding the new "expected-no-diagnostics" directive to VerifyDiagnosticConsumer, make the necessary adjustment to 580 test-cases which will henceforth require this new directive.
llvm-svn: 166280
This commit is contained in:
parent
ac51de6ec2
commit
c6e68daac0
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -emit-pch -o %t.1.ast %S/Inputs/exprs1.c
|
||||
// RUN: %clang_cc1 -emit-pch -o %t.2.ast %S/Inputs/exprs2.c
|
||||
// RUN: %clang_cc1 -ast-merge %t.1.ast -ast-merge %t.2.ast -fsyntax-only -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -analyze -analyzer-checker=osx.coreFoundation.containers.PointerSizedValues -triple x86_64-apple-darwin -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
typedef const struct __CFAllocator * CFAllocatorRef;
|
||||
typedef const struct __CFArray * CFArrayRef;
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -analyze -analyzer-checker=core,osx.cocoa.RetainCount,alpha.core -verify %s -analyzer-constraints=range -analyzer-store=region
|
||||
// expected-no-diagnostics
|
||||
|
||||
typedef struct objc_selector *SEL;
|
||||
typedef signed char BOOL;
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -analyze -analyzer-checker=alpha.osx.cocoa.Dealloc %s -verify
|
||||
// expected-no-diagnostics
|
||||
typedef signed char BOOL;
|
||||
@protocol NSObject
|
||||
- (BOOL)isEqual:(id)object;
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -analyze -analyzer-checker=core,osx.cocoa.RetainCount,alpha.core -analyzer-store=region -analyzer-constraints=range -verify -Wno-objc-root-class %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
// BEGIN delta-debugging reduced header stuff
|
||||
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -analyzer-constraints=range -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
#include <stdarg.h>
|
||||
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -triple x86_64-apple-darwin9 -analyze -analyzer-checker=core,osx -analyzer-store=region -verify -fblocks -analyzer-opt-analyze-nested-blocks %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
// Test handling of OSAtomicCompareAndSwap when C++ inserts "no-op" casts and we
|
||||
// do a forced load and binding to the environment on an expression that would regularly
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -analyzer-constraints=range -Wno-objc-root-class %s -verify
|
||||
// expected-no-diagnostics
|
||||
|
||||
// The point of this test cases is to exercise properties in the static
|
||||
// analyzer
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -cc1 -std=c++11 -Wuninitialized -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
void f() {
|
||||
int a[] = { 1, 2, 3 };
|
||||
|
|
|
@ -1,5 +1,6 @@
|
|||
// RUN: %clang_cc1 -triple x86_64-apple-darwin9 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -verify %s
|
||||
// RUN: %clang_cc1 -triple i386-apple-darwin9 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
// Test if the 'storage' region gets properly initialized after it is cast to
|
||||
// 'struct sockaddr *'.
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
// Test function pointer casts. Currently we track function addresses using
|
||||
// loc::FunctionVal. Because casts can be arbitrary, do we need to model
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -analyze -analyzer-checker=core,osx.cocoa.RetainCount,alpha.core -analyzer-store=region -analyzer-constraints=range -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
typedef unsigned char Boolean;
|
||||
typedef signed long CFIndex;
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -analyzer-constraints=range -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
// This test case was reported in <rdar:problem/6080742>.
|
||||
// It tests path-sensitivity with respect to '!(cfstring != 0)' (negation of inequality).
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -analyze -analyzer-checker=core -analyzer-output=text -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
// Do not crash on initialization to complex numbers.
|
||||
void init_complex() {
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
void foo() {
|
||||
int *p = (int*) 0x10000; // Should not crash here.
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -analyze -analyzer-checker=unix.cstring.BadSizeArg -analyzer-store=region -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
// Ensure we don't crash on C++ declarations with special names.
|
||||
struct X {
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -analyze -analyzer-checker=core,unix,osx,alpha.unix,alpha.security.taint -analyzer-store region -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
class Evil {
|
||||
public:
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -analyze -analyzer-checker=core -std=c++11 -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
// radar://11485149, PR12871
|
||||
class PlotPoint {
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -analyze -analyzer-checker=alpha.core -analyzer-checker=deadcode.DeadStores,osx.cocoa.RetainCount -fblocks -verify -Wno-objc-root-class %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
typedef signed char BOOL;
|
||||
typedef unsigned int NSUInteger;
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -analyze -analyzer-checker=core,osx.cocoa.RetainCount -analyzer-store=region -Wno-objc-root-class -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
|
||||
//===----------------------------------------------------------------------===//
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -analyze -analyzer-checker=core,unix.Malloc -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
typedef struct {
|
||||
char I[4];
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -analyze -analyzer-store=region -analyzer-constraints=range -fblocks -analyzer-opt-analyze-nested-blocks -analyzer-checker=alpha.deadcode.IdempotentOperations,osx.cocoa.RetainCount -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
typedef signed char BOOL;
|
||||
typedef unsigned long NSUInteger;
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -analyze -analyzer-checker=core -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
// Test parameter 'a' is registered to LiveVariables analysis data although it
|
||||
// is not referenced in the function body.
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -analyze -analyzer-checker=core -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
// Test when entering f1(), we set the right AnalysisDeclContext to Environment.
|
||||
// Otherwise, block-level expr '1 && a' would not be block-level.
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -analyze -analyzer-checker=core -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
int g(int a) {
|
||||
return a;
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -analyze -analyzer-checker=core -analyzer-ipa=dynamic-bifurcate -analyzer-config objc-inlining=false -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
typedef signed char BOOL;
|
||||
typedef struct objc_class *Class;
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -analyze -analyzer-checker=core -analyzer-store=region -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
int f1() {
|
||||
int x = 0, y = 1;
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -analyze -analyzer-checker=alpha.security.MallocOverflow -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
class A {
|
||||
public:
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -analyze -analyzer-checker=core -analyzer-store region -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
// Intra-procedural C++ tests.
|
||||
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -triple x86_64-apple-darwin9 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -analyzer-constraints=range -verify -fblocks %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
// <rdar://problem/6440393> - A bunch of misc. failures involving evaluating
|
||||
// these expressions and building CFGs. These tests are here to prevent
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -triple thumbv7-apple-ios0.0.0 -analyze -analyzer-checker=core -analyzer-store=region -verify -fblocks -analyzer-opt-analyze-nested-blocks -Wno-objc-root-class %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
// <rdar://problem/11405978> - Handle casts of vectors to structs, and loading
|
||||
// a value.
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -analyzer-constraints=range -verify -fblocks %s -analyzer-eagerly-assume
|
||||
// expected-no-diagnostics
|
||||
|
||||
// Delta-reduced header stuff (needed for test cases).
|
||||
typedef signed char BOOL;
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -triple i386-apple-darwin9 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -verify -fblocks %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
// Here is a case where a pointer is treated as integer, invalidated as an
|
||||
// integer, and then used again as a pointer. This test just makes sure
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -triple x86_64-apple-darwin9 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -verify -fblocks %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
// Here is a case where a pointer is treated as integer, invalidated as an
|
||||
// integer, and then used again as a pointer. This test just makes sure
|
||||
|
|
|
@ -1,5 +1,6 @@
|
|||
// RUN: %clang_cc1 -triple i386-apple-darwin9 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -verify -fblocks -analyzer-opt-analyze-nested-blocks %s
|
||||
// RUN: %clang_cc1 -triple x86_64-apple-darwin9 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -verify -fblocks -analyzer-opt-analyze-nested-blocks %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
//===------------------------------------------------------------------------------------------===//
|
||||
// This files tests our path-sensitive handling of Objective-c++ files.
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
// This is a test case for the issue reported in PR 2819:
|
||||
// http://llvm.org/bugs/show_bug.cgi?id=2819
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -analyze -analyzer-checker=core,alpha.core -std=gnu99 -analyzer-store=region -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
|
||||
// The store for 'a[1]' should not be removed mistakenly. SymbolicRegions may
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang --analyze %s -o %t -Xclang -verify
|
||||
// expected-no-diagnostics
|
||||
|
||||
// Test handling of ObjC bool literals.
|
||||
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -triple x86_64-apple-darwin9 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
// PR 4164: http://llvm.org/bugs/show_bug.cgi?id=4164
|
||||
//
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -analyze -analyzer-checker=core,alpha.core %s -analyzer-store=region -verify
|
||||
// expected-no-diagnostics
|
||||
|
||||
typedef int bar_return_t;
|
||||
typedef struct {
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -analyze -analyzer-checker=core,osx.cocoa.RetainCount,alpha.core -analyzer-constraints=range -analyzer-store=region -verify %s
|
||||
// expected-no-diagnostics
|
||||
//
|
||||
// This test case mainly checks that the retain/release checker doesn't crash
|
||||
// on this file.
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -analyze -analyzer-checker=core,alpha.core -analyzer-constraints=range -analyzer-store=region -verify -Wno-objc-root-class %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
typedef struct Foo { int x; } Bar;
|
||||
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -analyze -analyzer-checker=unix,core,alpha.security.taint -w -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
// Make sure we don't crash when someone redefines a system function we reason about.
|
||||
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -verify %s
|
||||
// expected-no-diagnostics
|
||||
//
|
||||
// This test case simply should not crash. It evaluates the logic of not
|
||||
// using MemRegion::getRValueType in incorrect places.
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -analyze -analyzer-checker=core,unix -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
int printf(const char *restrict,...);
|
||||
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -triple i686-pc-linux-gnu -analyze -analyzer-checker=security.insecureAPI,security.FloatLoopCounter %s -verify
|
||||
// expected-no-diagnostics
|
||||
|
||||
// This file complements 'security-syntax-checks.m', but tests that we omit
|
||||
// specific checks on platforms where they don't make sense.
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -analyze -analyzer-checker=core -verify -Wno-objc-root-class %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
// Test reasoning about static locals in ObjCMethods.
|
||||
int *getValidPtr();
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -analyze -analyzer-checker=core,unix -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
// Testing core functionality of the SValBuilder.
|
||||
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -analyze -analyzer-checker=alpha.security.taint,debug.TaintTest %s -verify
|
||||
// expected-no-diagnostics
|
||||
|
||||
typedef struct _FILE FILE;
|
||||
typedef __typeof(sizeof(int)) size_t;
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -analyze -analyzer-checker=alpha.security.taint,debug.TaintTest %s -verify
|
||||
// expected-no-diagnostics
|
||||
|
||||
#import <stdarg.h>
|
||||
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -analyze -analyzer-checker=core -analyzer-store=region -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
typedef unsigned int NSUInteger;
|
||||
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -analyze -analyzer-checker=core -analyzer-store=region -analyzer-constraints=range %s -verify
|
||||
// expected-no-diagnostics
|
||||
|
||||
//===-- unions-region.m ---------------------------------------------------===//
|
||||
//
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -analyze -analyzer-checker=core %s -verify
|
||||
// expected-no-diagnostics
|
||||
|
||||
namespace PR14054_reduced {
|
||||
struct Definition;
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
namespace N1 {
|
||||
struct X { };
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
// C++0x [basic.lookup.classref]p3:
|
||||
// If the unqualified-id is ~type-name, the type-name is looked up in the
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -std=c++11 %s -verify
|
||||
// expected-no-diagnostics
|
||||
|
||||
struct A { void f(); };
|
||||
struct C { void f(); };
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
// This is basically paraphrased from the standard.
|
||||
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
namespace A {
|
||||
int a;
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
// When looking up a namespace-name in a using-directive or
|
||||
// namespace-alias-definition, only namespace names are considered.
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
struct S {};
|
||||
S E0;
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
struct S {
|
||||
static const int f0 = 0;
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
// C++0x [basic.lookup.unqual]p14:
|
||||
// If a variable member of a namespace is defined outside of the
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
typedef int f;
|
||||
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
// Template type parameters.
|
||||
typedef unsigned char T;
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
typedef int Int;
|
||||
typedef char Char;
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
typedef int Int;
|
||||
typedef char Char;
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
int main() {
|
||||
}
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
int main(int argc, const char* const* argv) {
|
||||
}
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
int *use_new(int N) {
|
||||
return new int [N];
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
||||
// expected-no-diagnostics
|
||||
namespace std {
|
||||
class bad_alloc { };
|
||||
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
// PR12497
|
||||
namespace test0 {
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 %s -fsyntax-only -verify
|
||||
// expected-no-diagnostics
|
||||
|
||||
// "During the lookup for a base class name, non-type names are ignored"
|
||||
namespace PR5840 {
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
// Make sure that friend declarations don't introduce ambiguous
|
||||
// declarations.
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -fsyntax-only -verify -std=c++11 %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
class A {
|
||||
class AInner {
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
// C++0x [class.nest] p3:
|
||||
// If class X is defined in a namespace scope, a nested class Y may be
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -fsyntax-only -verify %s -std=c++11
|
||||
// expected-no-diagnostics
|
||||
namespace Test1 {
|
||||
|
||||
class A final { };
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -fsyntax-only -verify %s -std=c++11
|
||||
// expected-no-diagnostics
|
||||
|
||||
class Trivial { int n; void f(); };
|
||||
class NonTrivial1 { NonTrivial1(const NonTrivial1 &); };
|
||||
|
|
|
@ -1,5 +1,6 @@
|
|||
// RUN: %clang_cc1 -fsyntax-only -verify -std=c++0x -triple x86_64-pc-linux-gnu -ffreestanding %s
|
||||
// RUN: %clang_cc1 -fsyntax-only -verify -std=c++0x -triple x86_64-pc-linux-gnu -ffreestanding -fshort-wchar %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
#include <stdint.h>
|
||||
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -fsyntax-only -verify -std=c++0x %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
enum X : short { A, B };
|
||||
extern decltype(+A) x;
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
namespace pr7801 {
|
||||
extern void* x[];
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
bool is_char_ptr( const char* );
|
||||
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
// PR8430
|
||||
namespace N {
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
namespace test0 {
|
||||
namespace ns0 {
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
// C++03 [namespace.udecl]p3:
|
||||
// For the purpose of overload resolution, the functions which are
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
// <rdar://problem/8296180>
|
||||
typedef int pid_t;
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
// PR5787
|
||||
class C {
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -fsyntax-only -verify -std=c++11 %s
|
||||
// expected-no-diagnostics
|
||||
int g(int);
|
||||
void f() {
|
||||
int i;
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
char x1[]("hello");
|
||||
extern char x1[6];
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
void point(int = 3, int = 4);
|
||||
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -std=c++11 -fsyntax-only -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
template<typename T> struct identity;
|
||||
template<typename ...Types> struct tuple;
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -std=c++11 -fsyntax-only -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
template<typename T, typename U>
|
||||
struct is_same {
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -fsyntax-only -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
namespace pr6200 {
|
||||
struct v {};
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -std=c++11 -fsyntax-only -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
struct X {
|
||||
void f() &;
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -fsyntax-only -verify -std=c++11 %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
// PR10087: Make sure that we don't conflate exception specifications
|
||||
// from different functions in the canonical type system.
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -std=c++11 -fexceptions -fcxx-exceptions -fsyntax-only -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
// This is the "let the user shoot himself in the foot" clause.
|
||||
void f() noexcept {
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -std=c++11 -fsyntax-only -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
struct X { };
|
||||
struct Y : X { };
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -fsyntax-only -std=c++11 -Wno-c++11-narrowing -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
// <rdar://problem/11121178>
|
||||
void f(int x) {
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -std=c++11 -fsyntax-only -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
// The result of the expression const_cast<T>(v) is of type T. If T is
|
||||
// an lvalue reference to object type, the result is an lvalue; if T
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -verify -fsyntax-only %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
template<typename T> struct Node {
|
||||
int lhs;
|
||||
|
|
|
@ -1,4 +1,5 @@
|
|||
// RUN: %clang_cc1 -std=c++11 -fsyntax-only -verify %s
|
||||
// expected-no-diagnostics
|
||||
|
||||
// A glvalue of type "cv1 T1" can be cast to type "rvalue reference to
|
||||
// cv2 T2" if "cv2 T2" is reference-compatible with "cv1 T1" (8.5.3).
|
||||
|
|
Some files were not shown because too many files have changed in this diff Show More
Loading…
Reference in New Issue