From ea8bca7679d8e5129ad4b49758a43843d1d0dbe0 Mon Sep 17 00:00:00 2001 From: NAKAMURA Takumi Date: Fri, 18 Jan 2013 14:11:04 +0000 Subject: [PATCH] clang/test/CodeGen: Suppress a couple of tests on win32. It seems -fsanitize-blacklist doesn't accept DOSish pathnames. git-svn-id: https://llvm.org/svn/llvm-project/cfe/trunk@172820 91177308-0d34-0410-b5e6-96231b3b80d8 --- test/CodeGen/address-safety-attr.cpp | 3 +++ test/CodeGen/ubsan-blacklist.c | 3 +++ 2 files changed, 6 insertions(+) diff --git a/test/CodeGen/address-safety-attr.cpp b/test/CodeGen/address-safety-attr.cpp index 6556e7bf1d..d6832a46d7 100644 --- a/test/CodeGen/address-safety-attr.cpp +++ b/test/CodeGen/address-safety-attr.cpp @@ -3,6 +3,9 @@ // RUN: echo "src:%s" > %t // RUN: %clang_cc1 -emit-llvm -o - %s -fsanitize=address -fsanitize-blacklist=%t | FileCheck %s +// FIXME: %t is like "src:x:\path\to\clang\test\CodeGen\address-safety-attr.cpp" +// REQUIRES: shell + // The address_safety attribute should be attached to functions // when AddressSanitizer is enabled, unless no_address_safety_analysis attribute // is present. diff --git a/test/CodeGen/ubsan-blacklist.c b/test/CodeGen/ubsan-blacklist.c index 1173b58e46..6c67f027e9 100644 --- a/test/CodeGen/ubsan-blacklist.c +++ b/test/CodeGen/ubsan-blacklist.c @@ -5,6 +5,9 @@ // RUN: %clang_cc1 -fsanitize=unsigned-integer-overflow -fsanitize-blacklist=%t-func.blacklist -emit-llvm %s -o - | FileCheck %s --check-prefix=FUNC // RUN: %clang_cc1 -fsanitize=unsigned-integer-overflow -fsanitize-blacklist=%t-file.blacklist -emit-llvm %s -o - | FileCheck %s --check-prefix=FILE +// FIXME: %t-file.blacklist contains DOSish paths. +// REQUIRES: shell + unsigned i; // DEFAULT: @hash -- 2.40.0