From patchwork Thu Jan 19 17:49:45 2017 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Rainer Orth X-Patchwork-Id: 717282 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@bilbo.ozlabs.org Received: from sourceware.org (server1.sourceware.org [209.132.180.131]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ozlabs.org (Postfix) with ESMTPS id 3v4BFH0lG9z9syB for ; Fri, 20 Jan 2017 04:50:10 +1100 (AEDT) Authentication-Results: ozlabs.org; dkim=pass (1024-bit key; unprotected) header.d=gcc.gnu.org header.i=@gcc.gnu.org header.b="NC9XexUU"; dkim-atps=neutral DomainKey-Signature: a=rsa-sha1; c=nofws; d=gcc.gnu.org; h=list-id :list-unsubscribe:list-archive:list-post:list-help:sender:from :to:cc:subject:date:message-id:mime-version:content-type; q=dns; s=default; b=urE4FMbcqlVPqcmMdihFLEidyxeFIqjmhUcNA6/3WS/+Ojnwav 5EG5jHYnUaKJEUHTEnyHNodwl0EbvLA2o+Vqei0C0EOme0yqpOjuUtJQGsiGb20g 5lFSVvRQ+Qxmj7wZZh+0oWiOs0tuyxePftTkcDpKNWGIaePsf0DhKLxJ0= DKIM-Signature: v=1; a=rsa-sha1; c=relaxed; d=gcc.gnu.org; h=list-id :list-unsubscribe:list-archive:list-post:list-help:sender:from :to:cc:subject:date:message-id:mime-version:content-type; s= default; bh=tHeooxNSlktzKAwI5Z8+c9pV7gY=; b=NC9XexUUBfIB7WHnHF6s YTwFreUJeKQqhuKw6CXcB1FdE1OYC+YWN916ratayCu16K0rkJoT2lU0JaE4Ag2V 42Qgo6ZgdCUYU3VF+GRJ3sAMK7t7TM23hMximm36tA+7UI59Zx/2xm7D6c4W8/OP JhpgBpdrwvpbYsSFnTQP6/c= Received: (qmail 28796 invoked by alias); 19 Jan 2017 17:50:03 -0000 Mailing-List: contact gcc-patches-help@gcc.gnu.org; run by ezmlm Precedence: bulk List-Id: List-Unsubscribe: List-Archive: List-Post: List-Help: Sender: gcc-patches-owner@gcc.gnu.org Delivered-To: mailing list gcc-patches@gcc.gnu.org Received: (qmail 28773 invoked by uid 89); 19 Jan 2017 17:50:02 -0000 Authentication-Results: sourceware.org; auth=none X-Virus-Found: No X-Spam-SWARE-Status: No, score=-4.1 required=5.0 tests=BAYES_00, KAM_LAZY_DOMAIN_SECURITY, RP_MATCHES_RCVD autolearn=ham version=3.3.2 spammy=sk:roCeBi, Hx-languages-length:1561, roCeBiTecUniBielefeldDE, sk:ro@CeBi X-HELO: smtp.CeBiTec.Uni-Bielefeld.DE Received: from smtp.CeBiTec.Uni-Bielefeld.DE (HELO smtp.CeBiTec.Uni-Bielefeld.DE) (129.70.160.84) by sourceware.org (qpsmtpd/0.93/v0.84-503-g423c35a) with ESMTP; Thu, 19 Jan 2017 17:49:52 +0000 Received: from localhost (localhost.CeBiTec.Uni-Bielefeld.DE [127.0.0.1]) by smtp.CeBiTec.Uni-Bielefeld.DE (Postfix) with ESMTP id 8D358E63; Thu, 19 Jan 2017 18:49:49 +0100 (CET) Received: from smtp.CeBiTec.Uni-Bielefeld.DE ([127.0.0.1]) by localhost (malfoy.CeBiTec.Uni-Bielefeld.DE [127.0.0.1]) (amavisd-new, port 10024) with LMTP id 0SM4E3xZYa+T; Thu, 19 Jan 2017 18:49:47 +0100 (CET) Received: from manam.CeBiTec.Uni-Bielefeld.DE (p5DCE319C.dip0.t-ipconnect.de [93.206.49.156]) (using TLSv1 with cipher DHE-RSA-AES128-SHA (128/128 bits)) (No client certificate requested) by smtp.CeBiTec.Uni-Bielefeld.DE (Postfix) with ESMTPSA id 4910FE62; Thu, 19 Jan 2017 18:49:47 +0100 (CET) From: Rainer Orth To: gcc-patches@gcc.gnu.org Cc: Martin Sebor Subject: [testsuite] Fix gcc.dg/attr-alloc_size-4.c on i?86 (PR testsuite/79051) Date: Thu, 19 Jan 2017 18:49:45 +0100 Message-ID: User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/25.1 (usg-unix-v) MIME-Version: 1.0 X-IsSubscribed: yes As described in the PR, gcc.dg/attr-alloc_size-4.c was FAILing on 32-bit x86 targets. Fixed as follows by removing the mismatch between #if conditions and target selectors. Tested with the appropriate runtest invocations on i386-pc-solaris2.12 and amd64-pc-solaris2.12, installed on mainline. Rainer # HG changeset patch # Parent a83e32258f0450b5c0538ef71d8c6230eb72180f Further fix for PR testsuite/79051 diff --git a/gcc/testsuite/gcc.dg/attr-alloc_size-4.c b/gcc/testsuite/gcc.dg/attr-alloc_size-4.c --- a/gcc/testsuite/gcc.dg/attr-alloc_size-4.c +++ b/gcc/testsuite/gcc.dg/attr-alloc_size-4.c @@ -140,7 +140,7 @@ test_int_range (int n) #if __i386__ || __x86_64__ /* Avoid failures described in bug 79051. */ - sink (f_int_1 (SAR (min + 2, 1235))); /* { dg-warning "argument 1 range \\\[1236, \[0-9\]+\\\] exceeds maximum object size 1234" "" { target { x86_64-*-* } } } */ + sink (f_int_1 (SAR (min + 2, 1235))); /* { dg-warning "argument 1 range \\\[1236, \[0-9\]+\\\] exceeds maximum object size 1234" "" { target { i?86-*-* x86_64-*-* } } } */ #endif sink (f_int_1 (SAR (0, max))); /* { dg-warning "argument 1 range \\\[-\[0-9\]*, -1\\\] is negative" } */