diff --git a/compiler-rt/test/asan/TestCases/alloca_big_alignment.cpp b/compiler-rt/test/asan/TestCases/alloca_big_alignment.cpp --- a/compiler-rt/test/asan/TestCases/alloca_big_alignment.cpp +++ b/compiler-rt/test/asan/TestCases/alloca_big_alignment.cpp @@ -3,10 +3,11 @@ // #include +#include __attribute__((noinline)) void foo(int index, int len) { volatile char str[len] __attribute__((aligned(128))); - assert(!(reinterpret_cast(str) & 127L)); + assert(!(reinterpret_cast(str) & 127L)); str[index] = '1'; // BOOM // CHECK: ERROR: AddressSanitizer: dynamic-stack-buffer-overflow on address [[ADDR:0x[0-9a-f]+]] // CHECK: WRITE of size 1 at [[ADDR]] thread T0 diff --git a/compiler-rt/test/asan/TestCases/alloca_detect_custom_size_.cpp b/compiler-rt/test/asan/TestCases/alloca_detect_custom_size_.cpp --- a/compiler-rt/test/asan/TestCases/alloca_detect_custom_size_.cpp +++ b/compiler-rt/test/asan/TestCases/alloca_detect_custom_size_.cpp @@ -3,6 +3,7 @@ // #include +#include struct A { char a[3]; @@ -11,7 +12,7 @@ __attribute__((noinline)) void foo(int index, int len) { volatile struct A str[len] __attribute__((aligned(32))); - assert(!(reinterpret_cast(str) & 31L)); + assert(!(reinterpret_cast(str) & 31L)); str[index].a[0] = '1'; // BOOM // CHECK: ERROR: AddressSanitizer: dynamic-stack-buffer-overflow on address [[ADDR:0x[0-9a-f]+]] // CHECK: WRITE of size 1 at [[ADDR]] thread T0 diff --git a/compiler-rt/test/asan/TestCases/alloca_instruments_all_paddings.cpp b/compiler-rt/test/asan/TestCases/alloca_instruments_all_paddings.cpp --- a/compiler-rt/test/asan/TestCases/alloca_instruments_all_paddings.cpp +++ b/compiler-rt/test/asan/TestCases/alloca_instruments_all_paddings.cpp @@ -5,10 +5,11 @@ #include "sanitizer/asan_interface.h" #include +#include __attribute__((noinline)) void foo(int index, int len) { volatile char str[len] __attribute__((aligned(32))); - assert(!(reinterpret_cast(str) & 31L)); + assert(!(reinterpret_cast(str) & 31L)); char *q = (char *)__asan_region_is_poisoned((char *)str, 64); assert(q && ((q - str) == index)); } diff --git a/compiler-rt/test/asan/TestCases/alloca_overflow_partial.cpp b/compiler-rt/test/asan/TestCases/alloca_overflow_partial.cpp --- a/compiler-rt/test/asan/TestCases/alloca_overflow_partial.cpp +++ b/compiler-rt/test/asan/TestCases/alloca_overflow_partial.cpp @@ -3,10 +3,11 @@ // #include +#include __attribute__((noinline)) void foo(int index, int len) { volatile char str[len] __attribute__((aligned(32))); - assert(!(reinterpret_cast(str) & 31L)); + assert(!(reinterpret_cast(str) & 31L)); str[index] = '1'; // BOOM // CHECK: ERROR: AddressSanitizer: dynamic-stack-buffer-overflow on address [[ADDR:0x[0-9a-f]+]] // CHECK: WRITE of size 1 at [[ADDR]] thread T0 diff --git a/compiler-rt/test/asan/TestCases/alloca_overflow_right.cpp b/compiler-rt/test/asan/TestCases/alloca_overflow_right.cpp --- a/compiler-rt/test/asan/TestCases/alloca_overflow_right.cpp +++ b/compiler-rt/test/asan/TestCases/alloca_overflow_right.cpp @@ -3,10 +3,11 @@ // #include +#include __attribute__((noinline)) void foo(int index, int len) { volatile char str[len] __attribute__((aligned(32))); - assert(!(reinterpret_cast(str) & 31L)); + assert(!(reinterpret_cast(str) & 31L)); str[index] = '1'; // BOOM // CHECK: ERROR: AddressSanitizer: dynamic-stack-buffer-overflow on address [[ADDR:0x[0-9a-f]+]] // CHECK: WRITE of size 1 at [[ADDR]] thread T0 diff --git a/compiler-rt/test/asan/TestCases/alloca_safe_access.cpp b/compiler-rt/test/asan/TestCases/alloca_safe_access.cpp --- a/compiler-rt/test/asan/TestCases/alloca_safe_access.cpp +++ b/compiler-rt/test/asan/TestCases/alloca_safe_access.cpp @@ -3,10 +3,11 @@ // #include +#include __attribute__((noinline)) void foo(int index, int len) { volatile char str[len] __attribute__((aligned(32))); - assert(!(reinterpret_cast(str) & 31L)); + assert(!(reinterpret_cast(str) & 31L)); str[index] = '1'; } diff --git a/compiler-rt/test/asan/TestCases/alloca_underflow_left.cpp b/compiler-rt/test/asan/TestCases/alloca_underflow_left.cpp --- a/compiler-rt/test/asan/TestCases/alloca_underflow_left.cpp +++ b/compiler-rt/test/asan/TestCases/alloca_underflow_left.cpp @@ -3,10 +3,11 @@ // #include +#include __attribute__((noinline)) void foo(int index, int len) { volatile char str[len] __attribute__((aligned(32))); - assert(!(reinterpret_cast(str) & 31L)); + assert(!(reinterpret_cast(str) & 31L)); str[index] = '1'; // BOOM // CHECK: ERROR: AddressSanitizer: dynamic-stack-buffer-overflow on address [[ADDR:0x[0-9a-f]+]] // CHECK: WRITE of size 1 at [[ADDR]] thread T0