Author: rnk Date: Thu Oct 20 18:11:45 2016 New Revision: 284793 URL: http://llvm.org/viewvc/llvm-project?rev=284793&view=rev Log: Remove 24 instances of 'REQUIRES: shell'
Tests fall into one of the following categories: - The requirement was unnecessary - Additional quoting was required for backslashes in paths (see "sed -e 's/\\/\\\\/g'") in the sanitizer tests. - OpenMP used 'REQUIRES: shell' as a proxy for the test failing on Windows. Those tests fail there reliably, so use XFAIL instead. I tried not to remove shell requirements that were added to suppress flaky test failures, but if I screwed up, we can add it back as needed. Modified: cfe/trunk/test/Analysis/plist-html-macros.c cfe/trunk/test/CodeGen/address-safety-attr.cpp cfe/trunk/test/CodeGen/asan-globals.cpp cfe/trunk/test/CodeGen/sanitize-init-order.cpp cfe/trunk/test/CodeGen/sanitize-thread-attr.cpp cfe/trunk/test/CodeGen/ubsan-blacklist.c cfe/trunk/test/Driver/fsanitize-blacklist.c cfe/trunk/test/Driver/rewrite-map-in-diagnostics.c cfe/trunk/test/Modules/ModuleDebugInfo.cpp cfe/trunk/test/Modules/ModuleDebugInfo.m cfe/trunk/test/Modules/dependency-dump-dependent-module.m cfe/trunk/test/Modules/empty.modulemap cfe/trunk/test/Modules/explicit-build-extra-files.cpp cfe/trunk/test/Modules/prune.m cfe/trunk/test/Modules/signal.m cfe/trunk/test/OpenMP/task_firstprivate_codegen.cpp cfe/trunk/test/OpenMP/task_private_codegen.cpp cfe/trunk/test/OpenMP/taskloop_firstprivate_codegen.cpp cfe/trunk/test/OpenMP/taskloop_lastprivate_codegen.cpp cfe/trunk/test/OpenMP/taskloop_private_codegen.cpp cfe/trunk/test/OpenMP/taskloop_simd_firstprivate_codegen.cpp cfe/trunk/test/OpenMP/taskloop_simd_lastprivate_codegen.cpp cfe/trunk/test/OpenMP/taskloop_simd_private_codegen.cpp cfe/trunk/test/PCH/debug-info-pch-path.c Modified: cfe/trunk/test/Analysis/plist-html-macros.c URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/test/Analysis/plist-html-macros.c?rev=284793&r1=284792&r2=284793&view=diff ============================================================================== --- cfe/trunk/test/Analysis/plist-html-macros.c (original) +++ cfe/trunk/test/Analysis/plist-html-macros.c Thu Oct 20 18:11:45 2016 @@ -1,12 +1,11 @@ -// REQUIRES: shell // RUN: %clang_cc1 -analyze -analyzer-checker=core -verify %s // (sanity check) // RUN: rm -rf %t.dir // RUN: mkdir -p %t.dir // RUN: %clang_cc1 -analyze -analyzer-checker=core -analyzer-output=plist-html -o %t.dir/index.plist %s -// RUN: ls %t.dir | grep \\.html | count 1 -// RUN: grep \\.html %t.dir/index.plist | count 1 +// RUN: ls %t.dir | grep '\.html' | count 1 +// RUN: grep '\.html' %t.dir/index.plist | count 1 // This tests two things: that the two calls to null_deref below are coalesced // into a single bug by both the plist and HTML diagnostics, and that the plist Modified: cfe/trunk/test/CodeGen/address-safety-attr.cpp URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/test/CodeGen/address-safety-attr.cpp?rev=284793&r1=284792&r2=284793&view=diff ============================================================================== --- cfe/trunk/test/CodeGen/address-safety-attr.cpp (original) +++ cfe/trunk/test/CodeGen/address-safety-attr.cpp Thu Oct 20 18:11:45 2016 @@ -9,12 +9,11 @@ int DefinedInDifferentFile(int *a); // RUN: echo "fun:*BlacklistedFunction*" > %t.func.blacklist // RUN: %clang_cc1 -std=c++11 -triple x86_64-apple-darwin -emit-llvm -o - %s -include %t.extra-source.cpp -fsanitize=address -fsanitize-blacklist=%t.func.blacklist | FileCheck -check-prefix=BLFUNC %s -// RUN: echo "src:%s" > %t.file.blacklist +// The blacklist file uses regexps, so escape backslashes, which are common in +// Windows paths. +// RUN: echo "src:%s" | sed -e 's/\\/\\\\/g' > %t.file.blacklist // RUN: %clang_cc1 -std=c++11 -triple x86_64-apple-darwin -emit-llvm -o - %s -include %t.extra-source.cpp -fsanitize=address -fsanitize-blacklist=%t.file.blacklist | FileCheck -check-prefix=BLFILE %s -// FIXME: %t.file.blacklist is like "src:x:\path\to\clang\test\CodeGen\address-safety-attr.cpp" -// REQUIRES: shell - // The sanitize_address attribute should be attached to functions // when AddressSanitizer is enabled, unless no_sanitize_address attribute // is present. Modified: cfe/trunk/test/CodeGen/asan-globals.cpp URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/test/CodeGen/asan-globals.cpp?rev=284793&r1=284792&r2=284793&view=diff ============================================================================== --- cfe/trunk/test/CodeGen/asan-globals.cpp (original) +++ cfe/trunk/test/CodeGen/asan-globals.cpp Thu Oct 20 18:11:45 2016 @@ -1,9 +1,9 @@ // RUN: echo "int extra_global;" > %t.extra-source.cpp // RUN: echo "global:*blacklisted_global*" > %t.blacklist // RUN: %clang_cc1 -include %t.extra-source.cpp -fsanitize=address -fsanitize-blacklist=%t.blacklist -emit-llvm -o - %s | FileCheck %s -// RUN: echo "src:%s" > %t.blacklist-src +// The blacklist file uses regexps, so Windows path backslashes. +// RUN: echo "src:%s" | sed -e 's/\\/\\\\/g' > %t.blacklist-src // RUN: %clang_cc1 -include %t.extra-source.cpp -fsanitize=address -fsanitize-blacklist=%t.blacklist-src -emit-llvm -o - %s | FileCheck %s --check-prefix=BLACKLIST-SRC -// REQUIRES: shell int global; int dyn_init_global = global; Modified: cfe/trunk/test/CodeGen/sanitize-init-order.cpp URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/test/CodeGen/sanitize-init-order.cpp?rev=284793&r1=284792&r2=284793&view=diff ============================================================================== --- cfe/trunk/test/CodeGen/sanitize-init-order.cpp (original) +++ cfe/trunk/test/CodeGen/sanitize-init-order.cpp Thu Oct 20 18:11:45 2016 @@ -1,12 +1,11 @@ // RUN: %clang_cc1 -fsanitize=address -emit-llvm -o - %s | FileCheck %s // Test blacklist functionality. -// RUN: echo "src:%s=init" > %t-file.blacklist +// RUN: echo "src:%s=init" | sed -e 's/\\/\\\\/g' > %t-file.blacklist // RUN: echo "type:PODWithCtorAndDtor=init" > %t-type.blacklist // RUN: echo "type:NS::PODWithCtor=init" >> %t-type.blacklist // RUN: %clang_cc1 -fsanitize=address -fsanitize-blacklist=%t-file.blacklist -emit-llvm -o - %s | FileCheck %s --check-prefix=BLACKLIST // RUN: %clang_cc1 -fsanitize=address -fsanitize-blacklist=%t-type.blacklist -emit-llvm -o - %s | FileCheck %s --check-prefix=BLACKLIST -// REQUIRES: shell struct PODStruct { int x; Modified: cfe/trunk/test/CodeGen/sanitize-thread-attr.cpp URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/test/CodeGen/sanitize-thread-attr.cpp?rev=284793&r1=284792&r2=284793&view=diff ============================================================================== --- cfe/trunk/test/CodeGen/sanitize-thread-attr.cpp (original) +++ cfe/trunk/test/CodeGen/sanitize-thread-attr.cpp Thu Oct 20 18:11:45 2016 @@ -1,10 +1,8 @@ // RUN: %clang_cc1 -triple x86_64-apple-darwin -emit-llvm -o - %s | FileCheck -check-prefix=WITHOUT %s // RUN: %clang_cc1 -triple x86_64-apple-darwin -emit-llvm -o - %s -fsanitize=thread | FileCheck -check-prefix=TSAN %s -// RUN: echo "src:%s" > %t +// RUN: echo "src:%s" | sed -e 's/\\/\\\\/g' > %t // RUN: %clang_cc1 -triple x86_64-apple-darwin -emit-llvm -o - %s -fsanitize=thread -fsanitize-blacklist=%t | FileCheck -check-prefix=BL %s -// REQUIRES: shell - // The sanitize_thread attribute should be attached to functions // when ThreadSanitizer is enabled, unless no_sanitize_thread attribute // is present. Modified: cfe/trunk/test/CodeGen/ubsan-blacklist.c URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/test/CodeGen/ubsan-blacklist.c?rev=284793&r1=284792&r2=284793&view=diff ============================================================================== --- cfe/trunk/test/CodeGen/ubsan-blacklist.c (original) +++ cfe/trunk/test/CodeGen/ubsan-blacklist.c Thu Oct 20 18:11:45 2016 @@ -1,13 +1,10 @@ // Verify ubsan doesn't emit checks for blacklisted functions and files // RUN: echo "fun:hash" > %t-func.blacklist -// RUN: echo "src:%s" > %t-file.blacklist +// RUN: echo "src:%s" | sed -e 's/\\/\\\\/g' > %t-file.blacklist // RUN: %clang_cc1 -fsanitize=unsigned-integer-overflow -emit-llvm %s -o - | FileCheck %s --check-prefix=DEFAULT // RUN: %clang_cc1 -fsanitize=unsigned-integer-overflow -fsanitize-blacklist=%t-func.blacklist -emit-llvm %s -o - | FileCheck %s --check-prefix=FUNC // RUN: %clang_cc1 -fsanitize=unsigned-integer-overflow -fsanitize-blacklist=%t-file.blacklist -emit-llvm %s -o - | FileCheck %s --check-prefix=FILE -// FIXME: %t-file.blacklist contains DOSish paths. -// REQUIRES: shell - unsigned i; // DEFAULT: @hash Modified: cfe/trunk/test/Driver/fsanitize-blacklist.c URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/test/Driver/fsanitize-blacklist.c?rev=284793&r1=284792&r2=284793&view=diff ============================================================================== --- cfe/trunk/test/Driver/fsanitize-blacklist.c (original) +++ cfe/trunk/test/Driver/fsanitize-blacklist.c Thu Oct 20 18:11:45 2016 @@ -1,7 +1,7 @@ // General blacklist usage. // PR12920 -// REQUIRES: clang-driver, shell +// REQUIRES: clang-driver // Make sure we don't match the -NOT lines with the linker invocation. // Delimiters match the start of the cc1 and the start of the linker lines Modified: cfe/trunk/test/Driver/rewrite-map-in-diagnostics.c URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/test/Driver/rewrite-map-in-diagnostics.c?rev=284793&r1=284792&r2=284793&view=diff ============================================================================== --- cfe/trunk/test/Driver/rewrite-map-in-diagnostics.c (original) +++ cfe/trunk/test/Driver/rewrite-map-in-diagnostics.c Thu Oct 20 18:11:45 2016 @@ -9,6 +9,3 @@ // CHECK: note: diagnostic msg: {{.*}}rewrite.map // REQUIRES: crash-recovery - -// FIXME: This doesn't fail on "env clang". Investigating. -// REQUIRES: shell Modified: cfe/trunk/test/Modules/ModuleDebugInfo.cpp URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/test/Modules/ModuleDebugInfo.cpp?rev=284793&r1=284792&r2=284793&view=diff ============================================================================== --- cfe/trunk/test/Modules/ModuleDebugInfo.cpp (original) +++ cfe/trunk/test/Modules/ModuleDebugInfo.cpp Thu Oct 20 18:11:45 2016 @@ -1,7 +1,7 @@ // Test that (the same) debug info is emitted for an Objective-C++ // module and a C++ precompiled header. -// REQUIRES: asserts, shell +// REQUIRES: asserts // Modules: // RUN: rm -rf %t Modified: cfe/trunk/test/Modules/ModuleDebugInfo.m URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/test/Modules/ModuleDebugInfo.m?rev=284793&r1=284792&r2=284793&view=diff ============================================================================== --- cfe/trunk/test/Modules/ModuleDebugInfo.m (original) +++ cfe/trunk/test/Modules/ModuleDebugInfo.m Thu Oct 20 18:11:45 2016 @@ -1,7 +1,7 @@ // Test that debug info is emitted for an Objective-C module and // a precompiled header. -// REQUIRES: asserts, shell +// REQUIRES: asserts // Modules: // RUN: rm -rf %t Modified: cfe/trunk/test/Modules/dependency-dump-dependent-module.m URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/test/Modules/dependency-dump-dependent-module.m?rev=284793&r1=284792&r2=284793&view=diff ============================================================================== --- cfe/trunk/test/Modules/dependency-dump-dependent-module.m (original) +++ cfe/trunk/test/Modules/dependency-dump-dependent-module.m Thu Oct 20 18:11:45 2016 @@ -14,9 +14,3 @@ // VFS: 'name': "Sub2.h" @import AlsoDependsOnModule; - -// FIXME: This fails on win32 due to ERROR_FILENAME_EXCED_RANGE -// if the working directory is too deep. -// We should make Win32/Path.inc capable of long pathnames with '\\?\'. -// For now, this is suppressed on win32. -// REQUIRES: shell Modified: cfe/trunk/test/Modules/empty.modulemap URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/test/Modules/empty.modulemap?rev=284793&r1=284792&r2=284793&view=diff ============================================================================== --- cfe/trunk/test/Modules/empty.modulemap (original) +++ cfe/trunk/test/Modules/empty.modulemap Thu Oct 20 18:11:45 2016 @@ -14,7 +14,6 @@ // RUN: diff %t/base.pcm %t/check.pcm // // We expect an empty module to be less than 30KB (and at least 10K, for now). -// REQUIRES: shell // RUN: wc -c %t/base.pcm | FileCheck --check-prefix=CHECK-SIZE %s // CHECK-SIZE: {{(^|[^0-9])[12][0-9][0-9][0-9][0-9]($|[^0-9])}} Modified: cfe/trunk/test/Modules/explicit-build-extra-files.cpp URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/test/Modules/explicit-build-extra-files.cpp?rev=284793&r1=284792&r2=284793&view=diff ============================================================================== --- cfe/trunk/test/Modules/explicit-build-extra-files.cpp (original) +++ cfe/trunk/test/Modules/explicit-build-extra-files.cpp Thu Oct 20 18:11:45 2016 @@ -1,5 +1,3 @@ -// REQUIRES: shell -// // RUN: rm -rf %t // RUN: mkdir %t // RUN: cd %t Modified: cfe/trunk/test/Modules/prune.m URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/test/Modules/prune.m?rev=284793&r1=284792&r2=284793&view=diff ============================================================================== --- cfe/trunk/test/Modules/prune.m (original) +++ cfe/trunk/test/Modules/prune.m Thu Oct 20 18:11:45 2016 @@ -5,9 +5,6 @@ @import Module; #endif -// We need 'touch' and 'find' for this test to work. -// REQUIRES: shell - // Clear out the module cache // RUN: rm -rf %t // Run Clang twice so we end up creating the timestamp file (the second time). @@ -28,7 +25,7 @@ // Set the DependsOnModule access time back more than four days. // This shouldn't prune anything, because the timestamp has been updated, so // the pruning mechanism won't fire. -// RUN: find %t -name DependsOnModule*.pcm | xargs touch -a -t 201101010000 +// RUN: find %t -name DependsOnModule*.pcm | sed -e 's/\\/\//g' | xargs touch -a -t 201101010000 // RUN: %clang_cc1 -fmodules -fimplicit-module-maps -F %S/Inputs -fmodules-cache-path=%t -fmodules -fmodules-prune-interval=172800 -fmodules-prune-after=345600 %s -verify // RUN: ls %t | grep modules.timestamp // RUN: ls -R %t | grep ^Module.*pcm @@ -37,7 +34,7 @@ // Set both timestamp and DependsOnModule.pcm back beyond the cutoff. // This should trigger pruning, which will remove DependsOnModule but not Module. // RUN: touch -m -a -t 201101010000 %t/modules.timestamp -// RUN: find %t -name DependsOnModule*.pcm | xargs touch -a -t 201101010000 +// RUN: find %t -name DependsOnModule*.pcm | sed -e 's/\\/\//g' | xargs touch -a -t 201101010000 // RUN: %clang_cc1 -fmodules -fimplicit-module-maps -F %S/Inputs -fmodules-cache-path=%t -fmodules -fmodules-prune-interval=172800 -fmodules-prune-after=345600 %s -verify // RUN: ls %t | grep modules.timestamp // RUN: ls -R %t | grep ^Module.*pcm Modified: cfe/trunk/test/Modules/signal.m URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/test/Modules/signal.m?rev=284793&r1=284792&r2=284793&view=diff ============================================================================== --- cfe/trunk/test/Modules/signal.m (original) +++ cfe/trunk/test/Modules/signal.m Thu Oct 20 18:11:45 2016 @@ -1,4 +1,4 @@ -// REQUIRES: crash-recovery,shell +// REQUIRES: crash-recovery // RUN: rm -rf %t // Crash building module. Modified: cfe/trunk/test/OpenMP/task_firstprivate_codegen.cpp URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/test/OpenMP/task_firstprivate_codegen.cpp?rev=284793&r1=284792&r2=284793&view=diff ============================================================================== --- cfe/trunk/test/OpenMP/task_firstprivate_codegen.cpp (original) +++ cfe/trunk/test/OpenMP/task_firstprivate_codegen.cpp Thu Oct 20 18:11:45 2016 @@ -7,7 +7,7 @@ // expected-no-diagnostics // REQUIRES: x86-registered-target // It doesn't pass on win32. -// REQUIRES: shell +// XFAIL: win32 #ifndef ARRAY #ifndef HEADER #define HEADER Modified: cfe/trunk/test/OpenMP/task_private_codegen.cpp URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/test/OpenMP/task_private_codegen.cpp?rev=284793&r1=284792&r2=284793&view=diff ============================================================================== --- cfe/trunk/test/OpenMP/task_private_codegen.cpp (original) +++ cfe/trunk/test/OpenMP/task_private_codegen.cpp Thu Oct 20 18:11:45 2016 @@ -7,7 +7,7 @@ // expected-no-diagnostics // REQUIRES: x86-registered-target // It doesn't pass on win32. Investigating. -// REQUIRES: shell +// XFAIL: win32 #ifndef ARRAY #ifndef HEADER Modified: cfe/trunk/test/OpenMP/taskloop_firstprivate_codegen.cpp URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/test/OpenMP/taskloop_firstprivate_codegen.cpp?rev=284793&r1=284792&r2=284793&view=diff ============================================================================== --- cfe/trunk/test/OpenMP/taskloop_firstprivate_codegen.cpp (original) +++ cfe/trunk/test/OpenMP/taskloop_firstprivate_codegen.cpp Thu Oct 20 18:11:45 2016 @@ -7,7 +7,7 @@ // expected-no-diagnostics // REQUIRES: x86-registered-target // It doesn't pass on win32. -// REQUIRES: shell +// XFAIL: win32 #ifndef ARRAY #ifndef HEADER #define HEADER Modified: cfe/trunk/test/OpenMP/taskloop_lastprivate_codegen.cpp URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/test/OpenMP/taskloop_lastprivate_codegen.cpp?rev=284793&r1=284792&r2=284793&view=diff ============================================================================== --- cfe/trunk/test/OpenMP/taskloop_lastprivate_codegen.cpp (original) +++ cfe/trunk/test/OpenMP/taskloop_lastprivate_codegen.cpp Thu Oct 20 18:11:45 2016 @@ -7,7 +7,7 @@ // expected-no-diagnostics // REQUIRES: x86-registered-target // It doesn't pass on win32. -// REQUIRES: shell +// XFAIL: win32 #ifndef ARRAY #ifndef HEADER #define HEADER Modified: cfe/trunk/test/OpenMP/taskloop_private_codegen.cpp URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/test/OpenMP/taskloop_private_codegen.cpp?rev=284793&r1=284792&r2=284793&view=diff ============================================================================== --- cfe/trunk/test/OpenMP/taskloop_private_codegen.cpp (original) +++ cfe/trunk/test/OpenMP/taskloop_private_codegen.cpp Thu Oct 20 18:11:45 2016 @@ -7,7 +7,7 @@ // expected-no-diagnostics // REQUIRES: x86-registered-target // It doesn't pass on win32. Investigating. -// REQUIRES: shell +// XFAIL: win32 #ifndef ARRAY #ifndef HEADER Modified: cfe/trunk/test/OpenMP/taskloop_simd_firstprivate_codegen.cpp URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/test/OpenMP/taskloop_simd_firstprivate_codegen.cpp?rev=284793&r1=284792&r2=284793&view=diff ============================================================================== --- cfe/trunk/test/OpenMP/taskloop_simd_firstprivate_codegen.cpp (original) +++ cfe/trunk/test/OpenMP/taskloop_simd_firstprivate_codegen.cpp Thu Oct 20 18:11:45 2016 @@ -7,7 +7,7 @@ // expected-no-diagnostics // REQUIRES: x86-registered-target // It doesn't pass on win32. -// REQUIRES: shell +// XFAIL: win32 #ifndef ARRAY #ifndef HEADER #define HEADER Modified: cfe/trunk/test/OpenMP/taskloop_simd_lastprivate_codegen.cpp URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/test/OpenMP/taskloop_simd_lastprivate_codegen.cpp?rev=284793&r1=284792&r2=284793&view=diff ============================================================================== --- cfe/trunk/test/OpenMP/taskloop_simd_lastprivate_codegen.cpp (original) +++ cfe/trunk/test/OpenMP/taskloop_simd_lastprivate_codegen.cpp Thu Oct 20 18:11:45 2016 @@ -6,8 +6,8 @@ // RUN: %clang_cc1 -verify -fopenmp -x c++ -std=c++11 -DARRAY -triple x86_64-apple-darwin10 -emit-llvm %s -o - | FileCheck -check-prefix=ARRAY %s // expected-no-diagnostics // REQUIRES: x86-registered-target -// It doesn't pass on win32. -// REQUIRES: shell +// XFAIL: win32 + #ifndef ARRAY #ifndef HEADER #define HEADER Modified: cfe/trunk/test/OpenMP/taskloop_simd_private_codegen.cpp URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/test/OpenMP/taskloop_simd_private_codegen.cpp?rev=284793&r1=284792&r2=284793&view=diff ============================================================================== --- cfe/trunk/test/OpenMP/taskloop_simd_private_codegen.cpp (original) +++ cfe/trunk/test/OpenMP/taskloop_simd_private_codegen.cpp Thu Oct 20 18:11:45 2016 @@ -7,7 +7,7 @@ // expected-no-diagnostics // REQUIRES: x86-registered-target // It doesn't pass on win32. Investigating. -// REQUIRES: shell +// XFAIL: win32 #ifndef ARRAY #ifndef HEADER Modified: cfe/trunk/test/PCH/debug-info-pch-path.c URL: http://llvm.org/viewvc/llvm-project/cfe/trunk/test/PCH/debug-info-pch-path.c?rev=284793&r1=284792&r2=284793&view=diff ============================================================================== --- cfe/trunk/test/PCH/debug-info-pch-path.c (original) +++ cfe/trunk/test/PCH/debug-info-pch-path.c Thu Oct 20 18:11:45 2016 @@ -1,5 +1,3 @@ -// REQUIRES: shell -// // RUN: rm -rf %t // RUN: mkdir %t // RUN: cd %t _______________________________________________ cfe-commits mailing list cfe-commits@lists.llvm.org http://lists.llvm.org/cgi-bin/mailman/listinfo/cfe-commits