Преглед изворни кода

Prior to adding the new "expected-no-diagnostics" directive to VerifyDiagnosticConsumer, make the necessary adjustment to 580 test-cases which will henceforth require this new directive.

git-svn-id: https://llvm.org/svn/llvm-project/cfe/trunk@166280 91177308-0d34-0410-b5e6-96231b3b80d8
Andy Gibbs пре 13 година
родитељ
комит
8e8fb3be5b
100 измењених фајлова са 100 додато и 0 уклоњено
  1. 1 0
      test/ASTMerge/exprs.c
  2. 1 0
      test/Analysis/CFContainers-invalid.c
  3. 1 0
      test/Analysis/CFRetainRelease_NSAssertionHandler.m
  4. 1 0
      test/Analysis/MissingDealloc.m
  5. 1 0
      test/Analysis/NSPanel.m
  6. 1 0
      test/Analysis/NoReturn.m
  7. 1 0
      test/Analysis/OSAtomic_mac.cpp
  8. 1 0
      test/Analysis/ObjCProperties.m
  9. 1 0
      test/Analysis/PR9741.cpp
  10. 1 0
      test/Analysis/casts.c
  11. 1 0
      test/Analysis/casts.m
  12. 1 0
      test/Analysis/cfref_PR2519.c
  13. 1 0
      test/Analysis/cfref_rdar6080742.c
  14. 1 0
      test/Analysis/complex-init-list.cpp
  15. 1 0
      test/Analysis/concrete-address.c
  16. 1 0
      test/Analysis/cstring-syntax-cxx.cpp
  17. 1 0
      test/Analysis/cxx-method-names.cpp
  18. 1 0
      test/Analysis/cxx11-crashes.cpp
  19. 1 0
      test/Analysis/dead-stores.m
  20. 1 0
      test/Analysis/delegates.m
  21. 1 0
      test/Analysis/engine/replay-without-inlining.c
  22. 1 0
      test/Analysis/idempotent-operations.m
  23. 1 0
      test/Analysis/inline2.c
  24. 1 0
      test/Analysis/inline3.c
  25. 1 0
      test/Analysis/inline4.c
  26. 1 0
      test/Analysis/inlining/test_objc_inlining_option.m
  27. 1 0
      test/Analysis/lvalue.cpp
  28. 1 0
      test/Analysis/malloc-overflow.cpp
  29. 1 0
      test/Analysis/method-call-intra-p.cpp
  30. 1 0
      test/Analysis/misc-ps-64.m
  31. 1 0
      test/Analysis/misc-ps-arm.m
  32. 1 0
      test/Analysis/misc-ps-eager-assume.m
  33. 1 0
      test/Analysis/misc-ps-region-store-i386.m
  34. 1 0
      test/Analysis/misc-ps-region-store-x86_64.m
  35. 1 0
      test/Analysis/misc-ps-region-store.mm
  36. 1 0
      test/Analysis/no-exit-cfg.c
  37. 1 0
      test/Analysis/null-deref-ps-region.c
  38. 1 0
      test/Analysis/objc-bool.m
  39. 1 0
      test/Analysis/pr_4164.c
  40. 1 0
      test/Analysis/rdar-6442306-1.m
  41. 1 0
      test/Analysis/rdar-6562655.m
  42. 1 0
      test/Analysis/rdar-6600344-nil-receiver-undefined-struct-ret.m
  43. 1 0
      test/Analysis/redefined_system.c
  44. 1 0
      test/Analysis/region-1.m
  45. 1 0
      test/Analysis/region-store.c
  46. 1 0
      test/Analysis/security-syntax-checks-no-emit.c
  47. 1 0
      test/Analysis/static_local.m
  48. 1 0
      test/Analysis/svalbuilder-logic.c
  49. 1 0
      test/Analysis/taint-tester.cpp
  50. 1 0
      test/Analysis/taint-tester.m
  51. 1 0
      test/Analysis/uninit-vals.m
  52. 1 0
      test/Analysis/unions-region.m
  53. 1 0
      test/Analysis/unions.cpp
  54. 1 0
      test/CXX/basic/basic.lookup/basic.lookup.argdep/p2-template-id.cpp
  55. 1 0
      test/CXX/basic/basic.lookup/basic.lookup.classref/p3.cpp
  56. 1 0
      test/CXX/basic/basic.lookup/basic.lookup.classref/p4-cxx11.cpp
  57. 1 0
      test/CXX/basic/basic.lookup/basic.lookup.qual/namespace.qual/p3.cpp
  58. 1 0
      test/CXX/basic/basic.lookup/basic.lookup.qual/namespace.qual/p4.cpp
  59. 1 0
      test/CXX/basic/basic.lookup/basic.lookup.udir/p1.cpp
  60. 1 0
      test/CXX/basic/basic.lookup/basic.lookup.unqual/p12.cpp
  61. 1 0
      test/CXX/basic/basic.lookup/basic.lookup.unqual/p13.cpp
  62. 1 0
      test/CXX/basic/basic.lookup/basic.lookup.unqual/p14.cpp
  63. 1 0
      test/CXX/basic/basic.lookup/basic.lookup.unqual/p3.cpp
  64. 1 0
      test/CXX/basic/basic.scope/basic.scope.pdecl/p9.cpp
  65. 1 0
      test/CXX/basic/basic.start/basic.start.main/p2a.cpp
  66. 1 0
      test/CXX/basic/basic.start/basic.start.main/p2b.cpp
  67. 1 0
      test/CXX/basic/basic.start/basic.start.main/p2c.cpp
  68. 1 0
      test/CXX/basic/basic.start/basic.start.main/p2g.cpp
  69. 1 0
      test/CXX/basic/basic.stc/basic.stc.dynamic/p2-nodef.cpp
  70. 1 0
      test/CXX/basic/basic.stc/basic.stc.dynamic/p2-noexceptions.cpp
  71. 1 0
      test/CXX/class.access/class.protected/p1-cxx11.cpp
  72. 1 0
      test/CXX/class.derived/p2.cpp
  73. 1 0
      test/CXX/class/class.friend/p1-ambiguous.cpp
  74. 1 0
      test/CXX/class/class.friend/p1-cxx11.cpp
  75. 1 0
      test/CXX/class/class.nest/p3.cpp
  76. 1 0
      test/CXX/class/p1-0x.cpp
  77. 1 0
      test/CXX/class/p6-0x.cpp
  78. 1 0
      test/CXX/conv/conv.prom/p2.cpp
  79. 1 0
      test/CXX/conv/conv.prom/p4.cpp
  80. 1 0
      test/CXX/conv/conv.ptr/p2.cpp
  81. 1 0
      test/CXX/conv/conv.qual/pr6089.cpp
  82. 1 0
      test/CXX/dcl.dcl/basic.namespace/namespace.def/p2.cpp
  83. 1 0
      test/CXX/dcl.dcl/basic.namespace/namespace.udecl/p10.cpp
  84. 1 0
      test/CXX/dcl.dcl/basic.namespace/namespace.udecl/p13.cpp
  85. 1 0
      test/CXX/dcl.dcl/basic.namespace/namespace.udir/p6.cpp
  86. 1 0
      test/CXX/dcl.decl/dcl.init/dcl.init.ref/basic.cpp
  87. 1 0
      test/CXX/dcl.decl/dcl.init/dcl.init.ref/p1.cpp
  88. 1 0
      test/CXX/dcl.decl/dcl.init/dcl.init.string/p1.cpp
  89. 1 0
      test/CXX/dcl.decl/dcl.meaning/dcl.fct.default/p2.cpp
  90. 1 0
      test/CXX/dcl.decl/dcl.meaning/dcl.fct/p14.cpp
  91. 1 0
      test/CXX/dcl.decl/dcl.meaning/dcl.ref/p6-0x.cpp
  92. 1 0
      test/CXX/dcl.decl/dcl.name/p1.cpp
  93. 1 0
      test/CXX/dcl.decl/p4-0x.cpp
  94. 1 0
      test/CXX/except/except.spec/canonical.cpp
  95. 1 0
      test/CXX/except/except.spec/p11.cpp
  96. 1 0
      test/CXX/expr/expr.cast/p4-0x.cpp
  97. 1 0
      test/CXX/expr/expr.const/p3-0x-nowarn.cpp
  98. 1 0
      test/CXX/expr/expr.post/expr.const.cast/p1-0x.cpp
  99. 1 0
      test/CXX/expr/expr.post/expr.ref/p3.cpp
  100. 1 0
      test/CXX/expr/expr.post/expr.static.cast/p3-0x.cpp

+ 1 - 0
test/ASTMerge/exprs.c

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -emit-pch -o %t.1.ast %S/Inputs/exprs1.c
 // RUN: %clang_cc1 -emit-pch -o %t.2.ast %S/Inputs/exprs2.c
 // RUN: %clang_cc1 -ast-merge %t.1.ast -ast-merge %t.2.ast -fsyntax-only -verify %s
+// expected-no-diagnostics
 

+ 1 - 0
test/Analysis/CFContainers-invalid.c

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -analyze -analyzer-checker=osx.coreFoundation.containers.PointerSizedValues -triple x86_64-apple-darwin -verify %s
+// expected-no-diagnostics
 
 typedef const struct __CFAllocator * CFAllocatorRef;
 typedef const struct __CFArray * CFArrayRef;

+ 1 - 0
test/Analysis/CFRetainRelease_NSAssertionHandler.m

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -analyze -analyzer-checker=core,osx.cocoa.RetainCount,alpha.core -verify %s -analyzer-constraints=range -analyzer-store=region
+// expected-no-diagnostics
 
 typedef struct objc_selector *SEL;
 typedef signed char BOOL;

+ 1 - 0
test/Analysis/MissingDealloc.m

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -analyze -analyzer-checker=alpha.osx.cocoa.Dealloc %s -verify
+// expected-no-diagnostics
 typedef signed char BOOL;
 @protocol NSObject
 - (BOOL)isEqual:(id)object;

+ 1 - 0
test/Analysis/NSPanel.m

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -analyze -analyzer-checker=core,osx.cocoa.RetainCount,alpha.core -analyzer-store=region -analyzer-constraints=range -verify -Wno-objc-root-class %s
+// expected-no-diagnostics
 
 // BEGIN delta-debugging reduced header stuff
 

+ 1 - 0
test/Analysis/NoReturn.m

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -analyzer-constraints=range -verify %s
+// expected-no-diagnostics
 
 #include <stdarg.h>
 

+ 1 - 0
test/Analysis/OSAtomic_mac.cpp

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -triple x86_64-apple-darwin9 -analyze -analyzer-checker=core,osx -analyzer-store=region -verify -fblocks   -analyzer-opt-analyze-nested-blocks %s
+// expected-no-diagnostics
 
 // Test handling of OSAtomicCompareAndSwap when C++ inserts "no-op" casts and we
 // do a forced load and binding to the environment on an expression that would regularly

+ 1 - 0
test/Analysis/ObjCProperties.m

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -analyzer-constraints=range -Wno-objc-root-class %s -verify
+// expected-no-diagnostics
 
 // The point of this test cases is to exercise properties in the static
 // analyzer

+ 1 - 0
test/Analysis/PR9741.cpp

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -cc1 -std=c++11 -Wuninitialized -verify %s
+// expected-no-diagnostics
 
 void f() {
   int a[] = { 1, 2, 3 };

+ 1 - 0
test/Analysis/casts.c

@@ -1,5 +1,6 @@
 // RUN: %clang_cc1 -triple x86_64-apple-darwin9 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -verify %s
 // RUN: %clang_cc1 -triple i386-apple-darwin9 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -verify %s
+// expected-no-diagnostics
 
 // Test if the 'storage' region gets properly initialized after it is cast to
 // 'struct sockaddr *'. 

+ 1 - 0
test/Analysis/casts.m

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -verify %s
+// expected-no-diagnostics
 
 // Test function pointer casts.  Currently we track function addresses using
 // loc::FunctionVal.  Because casts can be arbitrary, do we need to model

+ 1 - 0
test/Analysis/cfref_PR2519.c

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -analyze -analyzer-checker=core,osx.cocoa.RetainCount,alpha.core -analyzer-store=region -analyzer-constraints=range -verify %s
+// expected-no-diagnostics
 
 typedef unsigned char Boolean;
 typedef signed long CFIndex;

+ 1 - 0
test/Analysis/cfref_rdar6080742.c

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -analyzer-constraints=range -verify %s
+// expected-no-diagnostics
 
 // This test case was reported in <rdar:problem/6080742>.
 // It tests path-sensitivity with respect to '!(cfstring != 0)' (negation of inequality).

+ 1 - 0
test/Analysis/complex-init-list.cpp

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -analyze -analyzer-checker=core -analyzer-output=text -verify %s
+// expected-no-diagnostics
 
 // Do not crash on initialization to complex numbers.
 void init_complex() {

+ 1 - 0
test/Analysis/concrete-address.c

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -verify %s
+// expected-no-diagnostics
 
 void foo() {
   int *p = (int*) 0x10000; // Should not crash here.

+ 1 - 0
test/Analysis/cstring-syntax-cxx.cpp

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -analyze -analyzer-checker=unix.cstring.BadSizeArg -analyzer-store=region -verify %s
+// expected-no-diagnostics
 
 // Ensure we don't crash on C++ declarations with special names.
 struct X {

+ 1 - 0
test/Analysis/cxx-method-names.cpp

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -analyze -analyzer-checker=core,unix,osx,alpha.unix,alpha.security.taint -analyzer-store region -verify %s
+// expected-no-diagnostics
 
 class Evil {
 public:

+ 1 - 0
test/Analysis/cxx11-crashes.cpp

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -analyze -analyzer-checker=core -std=c++11 -verify %s
+// expected-no-diagnostics
 
 // radar://11485149, PR12871
 class PlotPoint {

+ 1 - 0
test/Analysis/dead-stores.m

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -analyze -analyzer-checker=alpha.core -analyzer-checker=deadcode.DeadStores,osx.cocoa.RetainCount -fblocks -verify -Wno-objc-root-class %s
+// expected-no-diagnostics
 
 typedef signed char BOOL;
 typedef unsigned int NSUInteger;

+ 1 - 0
test/Analysis/delegates.m

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -analyze -analyzer-checker=core,osx.cocoa.RetainCount -analyzer-store=region -Wno-objc-root-class -verify %s
+// expected-no-diagnostics
 
 
 //===----------------------------------------------------------------------===//

+ 1 - 0
test/Analysis/engine/replay-without-inlining.c

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -analyze -analyzer-checker=core,unix.Malloc -verify %s
+// expected-no-diagnostics
 
 typedef struct {
     char I[4];

+ 1 - 0
test/Analysis/idempotent-operations.m

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -analyze -analyzer-store=region -analyzer-constraints=range -fblocks -analyzer-opt-analyze-nested-blocks -analyzer-checker=alpha.deadcode.IdempotentOperations,osx.cocoa.RetainCount -verify %s
+// expected-no-diagnostics
 
 typedef signed char BOOL;
 typedef unsigned long NSUInteger;

+ 1 - 0
test/Analysis/inline2.c

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -analyze -analyzer-checker=core -verify %s
+// expected-no-diagnostics
 
 // Test parameter 'a' is registered to LiveVariables analysis data although it
 // is not referenced in the function body. 

+ 1 - 0
test/Analysis/inline3.c

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -analyze -analyzer-checker=core -verify %s
+// expected-no-diagnostics
 
 // Test when entering f1(), we set the right AnalysisDeclContext to Environment.
 // Otherwise, block-level expr '1 && a' would not be block-level.

+ 1 - 0
test/Analysis/inline4.c

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -analyze -analyzer-checker=core -verify %s
+// expected-no-diagnostics
 
 int g(int a) {    
   return a;

+ 1 - 0
test/Analysis/inlining/test_objc_inlining_option.m

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -analyze -analyzer-checker=core -analyzer-ipa=dynamic-bifurcate -analyzer-config objc-inlining=false -verify %s
+// expected-no-diagnostics
 
 typedef signed char BOOL;
 typedef struct objc_class *Class;

+ 1 - 0
test/Analysis/lvalue.cpp

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -analyze -analyzer-checker=core -analyzer-store=region -verify %s
+// expected-no-diagnostics
 
 int f1() {
   int x = 0, y = 1;

+ 1 - 0
test/Analysis/malloc-overflow.cpp

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -analyze -analyzer-checker=alpha.security.MallocOverflow -verify %s
+// expected-no-diagnostics
 
 class A {
 public:

+ 1 - 0
test/Analysis/method-call-intra-p.cpp

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -analyze -analyzer-checker=core -analyzer-store region -verify %s
+// expected-no-diagnostics
 
 // Intra-procedural C++ tests.
 

+ 1 - 0
test/Analysis/misc-ps-64.m

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -triple x86_64-apple-darwin9 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -analyzer-constraints=range -verify -fblocks %s
+// expected-no-diagnostics
 
 // <rdar://problem/6440393> - A bunch of misc. failures involving evaluating
 //  these expressions and building CFGs.  These tests are here to prevent

+ 1 - 0
test/Analysis/misc-ps-arm.m

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -triple thumbv7-apple-ios0.0.0 -analyze -analyzer-checker=core -analyzer-store=region -verify -fblocks -analyzer-opt-analyze-nested-blocks -Wno-objc-root-class %s
+// expected-no-diagnostics
 
 // <rdar://problem/11405978> - Handle casts of vectors to structs, and loading
 // a value.

+ 1 - 0
test/Analysis/misc-ps-eager-assume.m

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -analyzer-constraints=range -verify -fblocks %s -analyzer-eagerly-assume
+// expected-no-diagnostics
 
 // Delta-reduced header stuff (needed for test cases).
 typedef signed char BOOL;

+ 1 - 0
test/Analysis/misc-ps-region-store-i386.m

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -triple i386-apple-darwin9 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -verify -fblocks %s
+// expected-no-diagnostics
 
 // Here is a case where a pointer is treated as integer, invalidated as an
 // integer, and then used again as a pointer.   This test just makes sure

+ 1 - 0
test/Analysis/misc-ps-region-store-x86_64.m

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -triple x86_64-apple-darwin9 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -verify -fblocks %s
+// expected-no-diagnostics
 
 // Here is a case where a pointer is treated as integer, invalidated as an
 // integer, and then used again as a pointer.   This test just makes sure

+ 1 - 0
test/Analysis/misc-ps-region-store.mm

@@ -1,5 +1,6 @@
 // RUN: %clang_cc1 -triple i386-apple-darwin9 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -verify -fblocks -analyzer-opt-analyze-nested-blocks %s
 // RUN: %clang_cc1 -triple x86_64-apple-darwin9 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -verify -fblocks   -analyzer-opt-analyze-nested-blocks %s
+// expected-no-diagnostics
 
 //===------------------------------------------------------------------------------------------===//
 // This files tests our path-sensitive handling of Objective-c++ files.

+ 1 - 0
test/Analysis/no-exit-cfg.c

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -verify %s 
+// expected-no-diagnostics
 
 // This is a test case for the issue reported in PR 2819:
 //  http://llvm.org/bugs/show_bug.cgi?id=2819

+ 1 - 0
test/Analysis/null-deref-ps-region.c

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -analyze -analyzer-checker=core,alpha.core -std=gnu99 -analyzer-store=region -verify %s
+// expected-no-diagnostics
 
 
 // The store for 'a[1]' should not be removed mistakenly. SymbolicRegions may

+ 1 - 0
test/Analysis/objc-bool.m

@@ -1,4 +1,5 @@
 // RUN: %clang --analyze %s -o %t -Xclang -verify
+// expected-no-diagnostics
 
 // Test handling of ObjC bool literals.
 

+ 1 - 0
test/Analysis/pr_4164.c

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -triple x86_64-apple-darwin9 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -verify %s
+// expected-no-diagnostics
 
 // PR 4164: http://llvm.org/bugs/show_bug.cgi?id=4164
 //

+ 1 - 0
test/Analysis/rdar-6442306-1.m

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -analyze -analyzer-checker=core,alpha.core %s -analyzer-store=region -verify
+// expected-no-diagnostics
 
 typedef int bar_return_t;
 typedef struct {

+ 1 - 0
test/Analysis/rdar-6562655.m

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -analyze -analyzer-checker=core,osx.cocoa.RetainCount,alpha.core -analyzer-constraints=range -analyzer-store=region -verify %s
+// expected-no-diagnostics
 //
 // This test case mainly checks that the retain/release checker doesn't crash
 // on this file.

+ 1 - 0
test/Analysis/rdar-6600344-nil-receiver-undefined-struct-ret.m

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -analyze -analyzer-checker=core,alpha.core -analyzer-constraints=range -analyzer-store=region -verify -Wno-objc-root-class %s
+// expected-no-diagnostics
 
 typedef struct Foo { int x; } Bar;
 

+ 1 - 0
test/Analysis/redefined_system.c

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -analyze -analyzer-checker=unix,core,alpha.security.taint -w -verify %s
+// expected-no-diagnostics
 
 // Make sure we don't crash when someone redefines a system function we reason about.
 

+ 1 - 0
test/Analysis/region-1.m

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -analyze -analyzer-checker=core,alpha.core -analyzer-store=region -verify %s
+// expected-no-diagnostics
 //
 // This test case simply should not crash.  It evaluates the logic of not
 // using MemRegion::getRValueType in incorrect places.

+ 1 - 0
test/Analysis/region-store.c

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -analyze -analyzer-checker=core,unix -verify %s
+// expected-no-diagnostics
 
 int printf(const char *restrict,...);
 

+ 1 - 0
test/Analysis/security-syntax-checks-no-emit.c

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -triple i686-pc-linux-gnu -analyze -analyzer-checker=security.insecureAPI,security.FloatLoopCounter %s -verify
+// expected-no-diagnostics
 
 // This file complements 'security-syntax-checks.m', but tests that we omit
 // specific checks on platforms where they don't make sense.

+ 1 - 0
test/Analysis/static_local.m

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -analyze -analyzer-checker=core -verify -Wno-objc-root-class %s
+// expected-no-diagnostics
 
 // Test reasoning about static locals in ObjCMethods. 
 int *getValidPtr();

+ 1 - 0
test/Analysis/svalbuilder-logic.c

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -analyze -analyzer-checker=core,unix -verify %s
+// expected-no-diagnostics
 
 // Testing core functionality of the SValBuilder.
 

+ 1 - 0
test/Analysis/taint-tester.cpp

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1  -analyze -analyzer-checker=alpha.security.taint,debug.TaintTest %s -verify
+// expected-no-diagnostics
 
 typedef struct _FILE FILE;
 typedef __typeof(sizeof(int)) size_t;

+ 1 - 0
test/Analysis/taint-tester.m

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1  -analyze -analyzer-checker=alpha.security.taint,debug.TaintTest %s -verify
+// expected-no-diagnostics
 
 #import <stdarg.h>
 

+ 1 - 0
test/Analysis/uninit-vals.m

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -analyze -analyzer-checker=core -analyzer-store=region -verify %s
+// expected-no-diagnostics
 
 typedef unsigned int NSUInteger;
 

+ 1 - 0
test/Analysis/unions-region.m

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -analyze -analyzer-checker=core -analyzer-store=region -analyzer-constraints=range %s -verify
+// expected-no-diagnostics
 
 //===-- unions-region.m ---------------------------------------------------===//
 //

+ 1 - 0
test/Analysis/unions.cpp

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -analyze -analyzer-checker=core %s -verify
+// expected-no-diagnostics
 
 namespace PR14054_reduced {
   struct Definition;

+ 1 - 0
test/CXX/basic/basic.lookup/basic.lookup.argdep/p2-template-id.cpp

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -fsyntax-only -verify %s
+// expected-no-diagnostics
 
 namespace N1 {
   struct X { };

+ 1 - 0
test/CXX/basic/basic.lookup/basic.lookup.classref/p3.cpp

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -fsyntax-only -verify %s
+// expected-no-diagnostics
 
 // C++0x [basic.lookup.classref]p3:
 //   If the unqualified-id is ~type-name, the type-name is looked up in the 

+ 1 - 0
test/CXX/basic/basic.lookup/basic.lookup.classref/p4-cxx11.cpp

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -std=c++11 %s -verify
+// expected-no-diagnostics
 
 struct A { void f(); };
 struct C { void f(); };

+ 1 - 0
test/CXX/basic/basic.lookup/basic.lookup.qual/namespace.qual/p3.cpp

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -fsyntax-only -verify %s
+// expected-no-diagnostics
 
 // This is basically paraphrased from the standard.
 

+ 1 - 0
test/CXX/basic/basic.lookup/basic.lookup.qual/namespace.qual/p4.cpp

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -fsyntax-only -verify %s
+// expected-no-diagnostics
 
 namespace A {
   int a;

+ 1 - 0
test/CXX/basic/basic.lookup/basic.lookup.udir/p1.cpp

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -fsyntax-only -verify %s
+// expected-no-diagnostics
 
 // When looking up a namespace-name in a using-directive or
 // namespace-alias-definition, only namespace names are considered.

+ 1 - 0
test/CXX/basic/basic.lookup/basic.lookup.unqual/p12.cpp

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -fsyntax-only -verify %s
+// expected-no-diagnostics
 
 struct S {};
 S E0;

+ 1 - 0
test/CXX/basic/basic.lookup/basic.lookup.unqual/p13.cpp

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -fsyntax-only -verify %s
+// expected-no-diagnostics
 
 struct S {
   static const int f0 = 0;

+ 1 - 0
test/CXX/basic/basic.lookup/basic.lookup.unqual/p14.cpp

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -fsyntax-only -verify %s
+// expected-no-diagnostics
 
 // C++0x [basic.lookup.unqual]p14:
 //   If a variable member of a namespace is defined outside of the

+ 1 - 0
test/CXX/basic/basic.lookup/basic.lookup.unqual/p3.cpp

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -fsyntax-only -verify %s
+// expected-no-diagnostics
 
 typedef int f; 
 

+ 1 - 0
test/CXX/basic/basic.scope/basic.scope.pdecl/p9.cpp

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -fsyntax-only -verify %s
+// expected-no-diagnostics
 
 // Template type parameters.
 typedef unsigned char T;

+ 1 - 0
test/CXX/basic/basic.start/basic.start.main/p2a.cpp

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -fsyntax-only -verify %s 
+// expected-no-diagnostics
 
 typedef int Int;
 typedef char Char;

+ 1 - 0
test/CXX/basic/basic.start/basic.start.main/p2b.cpp

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -fsyntax-only -verify %s 
+// expected-no-diagnostics
 
 typedef int Int;
 typedef char Char;

+ 1 - 0
test/CXX/basic/basic.start/basic.start.main/p2c.cpp

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -fsyntax-only -verify %s 
+// expected-no-diagnostics
 
 int main() {
 }

+ 1 - 0
test/CXX/basic/basic.start/basic.start.main/p2g.cpp

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -fsyntax-only -verify %s 
+// expected-no-diagnostics
 
 int main(int argc, const char* const* argv) {
 }

+ 1 - 0
test/CXX/basic/basic.stc/basic.stc.dynamic/p2-nodef.cpp

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -fsyntax-only -verify %s
+// expected-no-diagnostics
 
 int *use_new(int N) {
   return new int [N];

+ 1 - 0
test/CXX/basic/basic.stc/basic.stc.dynamic/p2-noexceptions.cpp

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -fsyntax-only -verify %s
+// expected-no-diagnostics
 namespace std {
   class bad_alloc { };
   

+ 1 - 0
test/CXX/class.access/class.protected/p1-cxx11.cpp

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -fsyntax-only -verify %s
+// expected-no-diagnostics
 
 // PR12497
 namespace test0 {

+ 1 - 0
test/CXX/class.derived/p2.cpp

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 %s -fsyntax-only -verify
+// expected-no-diagnostics
 
 // "During the lookup for a base class name, non-type names are ignored"
 namespace PR5840 {

+ 1 - 0
test/CXX/class/class.friend/p1-ambiguous.cpp

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -fsyntax-only -verify %s
+// expected-no-diagnostics
 
 // Make sure that friend declarations don't introduce ambiguous
 // declarations.

+ 1 - 0
test/CXX/class/class.friend/p1-cxx11.cpp

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -fsyntax-only -verify -std=c++11 %s
+// expected-no-diagnostics
 
 class A {
   class AInner {

+ 1 - 0
test/CXX/class/class.nest/p3.cpp

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -fsyntax-only -verify %s
+// expected-no-diagnostics
 
 // C++0x [class.nest] p3:
 //   If class X is defined in a namespace scope, a nested class Y may be

+ 1 - 0
test/CXX/class/p1-0x.cpp

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -fsyntax-only -verify %s -std=c++11
+// expected-no-diagnostics
 namespace Test1 {
 
 class A final { };

+ 1 - 0
test/CXX/class/p6-0x.cpp

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -fsyntax-only -verify %s -std=c++11
+// expected-no-diagnostics
 
 class Trivial { int n; void f(); };
 class NonTrivial1 { NonTrivial1(const NonTrivial1 &); };

+ 1 - 0
test/CXX/conv/conv.prom/p2.cpp

@@ -1,5 +1,6 @@
 // RUN: %clang_cc1 -fsyntax-only -verify -std=c++0x -triple x86_64-pc-linux-gnu -ffreestanding %s
 // RUN: %clang_cc1 -fsyntax-only -verify -std=c++0x -triple x86_64-pc-linux-gnu -ffreestanding -fshort-wchar %s
+// expected-no-diagnostics
 
 #include <stdint.h>
 

+ 1 - 0
test/CXX/conv/conv.prom/p4.cpp

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -fsyntax-only -verify -std=c++0x %s
+// expected-no-diagnostics
 
 enum X : short { A, B };
 extern decltype(+A) x;

+ 1 - 0
test/CXX/conv/conv.ptr/p2.cpp

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -fsyntax-only -verify %s
+// expected-no-diagnostics
 
 namespace pr7801 {
   extern void* x[];

+ 1 - 0
test/CXX/conv/conv.qual/pr6089.cpp

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -fsyntax-only -verify %s
+// expected-no-diagnostics
 
 bool is_char_ptr( const char* );
 

+ 1 - 0
test/CXX/dcl.dcl/basic.namespace/namespace.def/p2.cpp

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -fsyntax-only -verify %s
+// expected-no-diagnostics
 
 // PR8430
 namespace N {

+ 1 - 0
test/CXX/dcl.dcl/basic.namespace/namespace.udecl/p10.cpp

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -fsyntax-only -verify %s
+// expected-no-diagnostics
 
 namespace test0 {
   namespace ns0 {

+ 1 - 0
test/CXX/dcl.dcl/basic.namespace/namespace.udecl/p13.cpp

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -fsyntax-only -verify %s
+// expected-no-diagnostics
 
 // C++03 [namespace.udecl]p3:
 //   For the purpose of overload resolution, the functions which are

+ 1 - 0
test/CXX/dcl.dcl/basic.namespace/namespace.udir/p6.cpp

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -fsyntax-only -verify %s
+// expected-no-diagnostics
 
 // <rdar://problem/8296180>
 typedef int pid_t;

+ 1 - 0
test/CXX/dcl.decl/dcl.init/dcl.init.ref/basic.cpp

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -fsyntax-only -verify %s
+// expected-no-diagnostics
 
 // PR5787
 class C {

+ 1 - 0
test/CXX/dcl.decl/dcl.init/dcl.init.ref/p1.cpp

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -fsyntax-only -verify -std=c++11 %s
+// expected-no-diagnostics
 int g(int);
 void f() {
   int i; 

+ 1 - 0
test/CXX/dcl.decl/dcl.init/dcl.init.string/p1.cpp

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -fsyntax-only -verify %s
+// expected-no-diagnostics
 
 char x1[]("hello");
 extern char x1[6];

+ 1 - 0
test/CXX/dcl.decl/dcl.meaning/dcl.fct.default/p2.cpp

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -fsyntax-only -verify %s
+// expected-no-diagnostics
 
 void point(int = 3, int = 4);
 

+ 1 - 0
test/CXX/dcl.decl/dcl.meaning/dcl.fct/p14.cpp

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -std=c++11 -fsyntax-only -verify %s
+// expected-no-diagnostics
 
 template<typename T> struct identity;
 template<typename ...Types> struct tuple;

+ 1 - 0
test/CXX/dcl.decl/dcl.meaning/dcl.ref/p6-0x.cpp

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -std=c++11 -fsyntax-only -verify %s
+// expected-no-diagnostics
 
 template<typename T, typename U> 
 struct is_same {

+ 1 - 0
test/CXX/dcl.decl/dcl.name/p1.cpp

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -fsyntax-only -verify %s
+// expected-no-diagnostics
 
 namespace pr6200 {
   struct v {};

+ 1 - 0
test/CXX/dcl.decl/p4-0x.cpp

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -std=c++11 -fsyntax-only -verify %s
+// expected-no-diagnostics
 
 struct X {
   void f() &;

+ 1 - 0
test/CXX/except/except.spec/canonical.cpp

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -fsyntax-only -verify -std=c++11 %s
+// expected-no-diagnostics
 
 // PR10087: Make sure that we don't conflate exception specifications
 // from different functions in the canonical type system.

+ 1 - 0
test/CXX/except/except.spec/p11.cpp

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -std=c++11 -fexceptions -fcxx-exceptions -fsyntax-only -verify %s
+// expected-no-diagnostics
 
 // This is the "let the user shoot himself in the foot" clause.
 void f() noexcept {

+ 1 - 0
test/CXX/expr/expr.cast/p4-0x.cpp

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -std=c++11 -fsyntax-only -verify %s
+// expected-no-diagnostics
 
 struct X { };
 struct Y : X { };

+ 1 - 0
test/CXX/expr/expr.const/p3-0x-nowarn.cpp

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -fsyntax-only -std=c++11 -Wno-c++11-narrowing -verify %s
+// expected-no-diagnostics
 
 // <rdar://problem/11121178>
 void f(int x) {

+ 1 - 0
test/CXX/expr/expr.post/expr.const.cast/p1-0x.cpp

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -std=c++11 -fsyntax-only -verify %s
+// expected-no-diagnostics
 
 // The result of the expression const_cast<T>(v) is of type T. If T is
 // an lvalue reference to object type, the result is an lvalue; if T

+ 1 - 0
test/CXX/expr/expr.post/expr.ref/p3.cpp

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -verify -fsyntax-only %s
+// expected-no-diagnostics
 
 template<typename T> struct Node {
 	int lhs;

+ 1 - 0
test/CXX/expr/expr.post/expr.static.cast/p3-0x.cpp

@@ -1,4 +1,5 @@
 // RUN: %clang_cc1 -std=c++11 -fsyntax-only -verify %s
+// expected-no-diagnostics
 
 // A glvalue of type "cv1 T1" can be cast to type "rvalue reference to
 // cv2 T2" if "cv2 T2" is reference-compatible with "cv1 T1" (8.5.3).

Неке датотеке нису приказане због велике количине промена