diff options
-rw-r--r-- | test/CodeGen/address-safety-attr.cpp | 3 | ||||
-rw-r--r-- | test/CodeGen/ubsan-blacklist.c | 3 |
2 files changed, 6 insertions, 0 deletions
diff --git a/test/CodeGen/address-safety-attr.cpp b/test/CodeGen/address-safety-attr.cpp index 6556e7bf1d..d6832a46d7 100644 --- a/test/CodeGen/address-safety-attr.cpp +++ b/test/CodeGen/address-safety-attr.cpp @@ -3,6 +3,9 @@ // RUN: echo "src:%s" > %t // RUN: %clang_cc1 -emit-llvm -o - %s -fsanitize=address -fsanitize-blacklist=%t | FileCheck %s +// FIXME: %t is like "src:x:\path\to\clang\test\CodeGen\address-safety-attr.cpp" +// REQUIRES: shell + // The address_safety attribute should be attached to functions // when AddressSanitizer is enabled, unless no_address_safety_analysis attribute // is present. diff --git a/test/CodeGen/ubsan-blacklist.c b/test/CodeGen/ubsan-blacklist.c index 1173b58e46..6c67f027e9 100644 --- a/test/CodeGen/ubsan-blacklist.c +++ b/test/CodeGen/ubsan-blacklist.c @@ -5,6 +5,9 @@ // RUN: %clang_cc1 -fsanitize=unsigned-integer-overflow -fsanitize-blacklist=%t-func.blacklist -emit-llvm %s -o - | FileCheck %s --check-prefix=FUNC // RUN: %clang_cc1 -fsanitize=unsigned-integer-overflow -fsanitize-blacklist=%t-file.blacklist -emit-llvm %s -o - | FileCheck %s --check-prefix=FILE +// FIXME: %t-file.blacklist contains DOSish paths. +// REQUIRES: shell + unsigned i; // DEFAULT: @hash |