Index: compiler-rt/trunk/test/asan/TestCases/Posix/closed-fds.cc =================================================================== --- compiler-rt/trunk/test/asan/TestCases/Posix/closed-fds.cc +++ compiler-rt/trunk/test/asan/TestCases/Posix/closed-fds.cc @@ -8,6 +8,7 @@ // FIXME: copy %t.log back from the device and re-enable on Android. // UNSUPPORTED: android +// UNSUPPORTED: ios #include #include Index: compiler-rt/trunk/test/asan/TestCases/Posix/coverage-maybe-open-file.cc =================================================================== --- compiler-rt/trunk/test/asan/TestCases/Posix/coverage-maybe-open-file.cc +++ compiler-rt/trunk/test/asan/TestCases/Posix/coverage-maybe-open-file.cc @@ -1,5 +1,6 @@ // FIXME: https://code.google.com/p/address-sanitizer/issues/detail?id=316 // XFAIL: android +// UNSUPPORTED: ios // // RUN: %clangxx_asan -fsanitize-coverage=func %s -o %t // RUN: rm -rf %T/coverage-maybe-open-file Index: compiler-rt/trunk/test/asan/TestCases/Posix/coverage-sandboxing.cc =================================================================== --- compiler-rt/trunk/test/asan/TestCases/Posix/coverage-sandboxing.cc +++ compiler-rt/trunk/test/asan/TestCases/Posix/coverage-sandboxing.cc @@ -21,6 +21,7 @@ // https://code.google.com/p/address-sanitizer/issues/detail?id=263 // XFAIL: android +// UNSUPPORTED: ios #include #include Index: compiler-rt/trunk/test/asan/TestCases/Posix/coverage.cc =================================================================== --- compiler-rt/trunk/test/asan/TestCases/Posix/coverage.cc +++ compiler-rt/trunk/test/asan/TestCases/Posix/coverage.cc @@ -18,6 +18,7 @@ // // https://code.google.com/p/address-sanitizer/issues/detail?id=263 // XFAIL: android +// UNSUPPORTED: ios #include #include Index: compiler-rt/trunk/test/asan/TestCases/Posix/start-deactivated.cc =================================================================== --- compiler-rt/trunk/test/asan/TestCases/Posix/start-deactivated.cc +++ compiler-rt/trunk/test/asan/TestCases/Posix/start-deactivated.cc @@ -19,6 +19,7 @@ // RUN: ASAN_ACTIVATION_OPTIONS=help=1,handle_segv=0,verbosity=1 not %run %t 2>&1 | FileCheck %s --check-prefix=CHECK-UNSUPPORTED // XFAIL: arm-linux-gnueabi +// UNSUPPORTED: ios // END. Index: compiler-rt/trunk/test/asan/TestCases/default_blacklist.cc =================================================================== --- compiler-rt/trunk/test/asan/TestCases/default_blacklist.cc +++ compiler-rt/trunk/test/asan/TestCases/default_blacklist.cc @@ -1,5 +1,6 @@ // FIXME: https://code.google.com/p/address-sanitizer/issues/detail?id=316 // XFAIL: android +// UNSUPPORTED: ios // // Test that ASan uses the default blacklist from resource directory. // RUN: %clangxx_asan -### %s 2>&1 | FileCheck %s Index: compiler-rt/trunk/test/asan/TestCases/suppressions-function.cc =================================================================== --- compiler-rt/trunk/test/asan/TestCases/suppressions-function.cc +++ compiler-rt/trunk/test/asan/TestCases/suppressions-function.cc @@ -8,6 +8,7 @@ // FIXME: Windows symbolizer needs work to make this pass. // XFAIL: android,win32 +// UNSUPPORTED: ios #include #include