From patchwork Wed Jul 10 12:19:06 2024 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Matthew Malcomson X-Patchwork-Id: 1958822 Return-Path: X-Original-To: incoming@patchwork.ozlabs.org Delivered-To: patchwork-incoming@legolas.ozlabs.org Authentication-Results: legolas.ozlabs.org; dkim=pass (1024-bit key; unprotected) header.d=arm.com header.i=@arm.com header.a=rsa-sha256 header.s=selector1 header.b=CWp+iQXk; dkim=pass (1024-bit key) header.d=arm.com header.i=@arm.com header.a=rsa-sha256 header.s=selector1 header.b=CWp+iQXk; dkim-atps=neutral Authentication-Results: legolas.ozlabs.org; spf=pass (sender SPF authorized) smtp.mailfrom=gcc.gnu.org (client-ip=2620:52:3:1:0:246e:9693:128c; helo=server2.sourceware.org; envelope-from=gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org; receiver=patchwork.ozlabs.org) Received: from server2.sourceware.org (server2.sourceware.org [IPv6:2620:52:3:1:0:246e:9693:128c]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (secp384r1) server-digest SHA384) (No client certificate requested) by legolas.ozlabs.org (Postfix) with ESMTPS id 4WJxlC0XRlz1xqj for ; Wed, 10 Jul 2024 22:20:23 +1000 (AEST) Received: from server2.sourceware.org (localhost [IPv6:::1]) by sourceware.org (Postfix) with ESMTP id 395F4385DDFB for ; Wed, 10 Jul 2024 12:20:21 +0000 (GMT) X-Original-To: gcc-patches@gcc.gnu.org Delivered-To: gcc-patches@gcc.gnu.org Received: from EUR05-AM6-obe.outbound.protection.outlook.com (mail-am6eur05on20613.outbound.protection.outlook.com [IPv6:2a01:111:f403:2612::613]) by sourceware.org (Postfix) with ESMTPS id 342CB3858D20 for ; Wed, 10 Jul 2024 12:19:57 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.2 sourceware.org 342CB3858D20 Authentication-Results: sourceware.org; dmarc=pass (p=none dis=none) header.from=arm.com Authentication-Results: sourceware.org; spf=pass smtp.mailfrom=arm.com ARC-Filter: OpenARC Filter v1.0.0 sourceware.org 342CB3858D20 Authentication-Results: server2.sourceware.org; arc=pass smtp.remote-ip=2a01:111:f403:2612::613 ARC-Seal: i=3; a=rsa-sha256; d=sourceware.org; s=key; t=1720613999; cv=pass; b=E4E0Ms98zkrNtyUTjp70jzbfo3MhS+oiTvesVaTt1G5kBvsoJQ2XIOc5X/OdFEq1FSUuew1NxMcT7azfaAOD+zvFkr9jovY0KHj5ccEcbI5ZqXt7FXdPagoap5NahOIKI11d47SrUbLxLJnNKLaiAFmEKmN6TuKtuGYR6nM0wcM= ARC-Message-Signature: i=3; a=rsa-sha256; d=sourceware.org; s=key; t=1720613999; c=relaxed/simple; bh=P/9St6vKRwEAqq00Y7X1gXR2xM+xJbns9m/4P7ZhtWI=; h=DKIM-Signature:DKIM-Signature:MIME-Version:From:To:Subject:Date: Message-ID; b=JDgp/KRLEzIolaoTnI06XHyOmJCxWPNkHfWw1vmE37gLLCknSG7Zgu9LeReiSM7XNnCezUAmF40EY4mGhUqXW0NVBlLwgVSb6jrp4jOyqidQQ48AcJTDW4575stJe1hDMd9x0t3QmgGl/Dj8RLAeZa1eAY0UEs+95J+h4LyLemw= ARC-Authentication-Results: i=3; server2.sourceware.org ARC-Seal: i=2; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=pass; b=GLrZtD7rPO4OwOzRK74iN6Nbsky2+24A736bTnnn+clflFMeXJDQBZMbGxxN5i9rDCfdPSn2qSXHNEhAL98y+69qvgEHX4HhVZ/gNszY/utpBoPJmsoNeQth33MQEktAi9tiABQiOoNVUCHhCkQoOJJDPZ5NGxlwIfaaxyO90EqVQYZWZ4m98gDplFqSmdRg4Q9F7SikR5e9rgh7zSB2EkK7nZxK9most0y+Tc8erFEuDVStdY/DOIj3zycforQnUzswo5qqU1ZLSLz8CglQ4f21oNIruN3mfPrzZfnDi/bpQiPFT2YHrO7Mgfx17rGpo+2cfdyU8bn7zMwo7wWikw== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=2kRdhwAQhIKHVlm/jRVg7uGOugbwDPb3lzJfTumsbhY=; b=bRfDn5Ktz2H1GacJ+w7FNkMsDjmnFoXforS0rz6feBE89SZ66k3XwLXn3x9oWzfIocWgfr+HjTXEiewC1+pA3aC9Ha8A+d9eBbjRg5D0mt5lykFQfKMo+yEB7TPnQCehf1dy6eW7BpoIb1ySkcp8DsfCY9fvOLj1Zsmb4OhvjRzBFKPqu0X6i5Y+NOptAGAyG6HiCLcdH4/NxkRqrMdCINWWhaJMi+O+3TmzVHAtRX/qnPRwhg7+LaCGHoM7qBAgQ3uqW9v+SAb1VpgmN1LKSC30UtewOO6bd+e3O5ZWdXfmphMDIhFvsW9YEXDtjZrA6S2LnpdDFxox00e9idd2mQ== ARC-Authentication-Results: i=2; mx.microsoft.com 1; spf=pass (sender ip is 63.35.35.123) smtp.rcpttodomain=gcc.gnu.org smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=pass (signature was verified) header.d=arm.com; arc=pass (0 oda=1 ltdi=1 spf=[1,1,smtp.mailfrom=arm.com] dmarc=[1,1,header.from=arm.com]) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=arm.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=2kRdhwAQhIKHVlm/jRVg7uGOugbwDPb3lzJfTumsbhY=; b=CWp+iQXkT2YY0sEDos7k4ZV5UrmOJ3KXASRRgkIgndU1x+AYfOwge28nzLdlOtErOvcCkMZlwH5HhNfhoiG3BRcsN7t7pIiPCFmRuUxSQY9uWGRIGipSdsytvP8jnTlMUAMwaxrZ5jajWsYbw6U0/FbixJsIorJvYFdnKwCHNIc= Received: from DU6P191CA0004.EURP191.PROD.OUTLOOK.COM (2603:10a6:10:540::21) by DB4PR08MB9141.eurprd08.prod.outlook.com (2603:10a6:10:3ff::17) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7741.35; Wed, 10 Jul 2024 12:19:51 +0000 Received: from DB1PEPF000509FB.eurprd03.prod.outlook.com (2603:10a6:10:540:cafe::5a) by DU6P191CA0004.outlook.office365.com (2603:10a6:10:540::21) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7762.20 via Frontend Transport; Wed, 10 Jul 2024 12:19:51 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 63.35.35.123) smtp.mailfrom=arm.com; dkim=pass (signature was verified) header.d=arm.com;dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 63.35.35.123 as permitted sender) receiver=protection.outlook.com; client-ip=63.35.35.123; helo=64aa7808-outbound-1.mta.getcheckrecipient.com; pr=C Received: from 64aa7808-outbound-1.mta.getcheckrecipient.com (63.35.35.123) by DB1PEPF000509FB.mail.protection.outlook.com (10.167.242.37) with Microsoft SMTP Server (version=TLS1_3, cipher=TLS_AES_256_GCM_SHA384) id 15.20.7762.17 via Frontend Transport; Wed, 10 Jul 2024 12:19:51 +0000 Received: ("Tessian outbound 1bd2b4f45798:v359"); Wed, 10 Jul 2024 12:19:50 +0000 X-CheckRecipientChecked: true X-CR-MTA-CID: e7e776ab80bc5b82 X-CR-MTA-TID: 64aa7808 Received: from 5a4646d04f8c.1 by 64aa7808-outbound-1.mta.getcheckrecipient.com id 8DE898EC-E452-4E50-B9C8-0185DCF6921A.1; Wed, 10 Jul 2024 12:19:44 +0000 Received: from EUR05-AM6-obe.outbound.protection.outlook.com by 64aa7808-outbound-1.mta.getcheckrecipient.com with ESMTPS id 5a4646d04f8c.1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384); Wed, 10 Jul 2024 12:19:44 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=JfqqvO3Brp6BEIpyrYC1c1pj4vkw4smbvxZnheg2khv9nF+Otp8a25JkjWbptzLu/+FovKj8adVBblN4DwOMdwd/SmKaYBqJDvPWVEzkqu+c2SEpH5O552//+FLTHXNpZJN2kYJd2hf928vAKcHwQN5hFir/MPQXodHzbivqJv5b6BrfD3HlAxPfZd0OTM6rrNvXh1f8XSiMiZEq6VVNdPR7cEwiy+WYoLRO3u7GnLq0dOgmJsiEO/yFAck0GrdtIq4fRQf2l3PH4y4y0eRHz1Z8cgXR5jHogPjSnRrJAV/+P+xgByUlcUz4B6NWcBO1+RK6SCRPKPqpQ01b3rvwnQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=2kRdhwAQhIKHVlm/jRVg7uGOugbwDPb3lzJfTumsbhY=; b=dXCqYkudteTSdBeoCvu/t+nar05F4OrlLp87aNq2IA9IzoFjKjF1MsUJ4e79dtJ/Nk+XKCbKpWmCGmXtEMnAAJ8FKFWLK2344+X24g0YeNNBKoX6Edvpl8S2UpF0rPsZKYE7EmRQuplNZshBrzesOQMEO29IcHkBltNxvfEFZArPM7eBa/vFoQyD9jE1HgNdG43Fodl7u1kYisW9eHoNMxabG5lmWggJiBfvAIIGunwick4HS3n1higsCs5SrdLEcFyLluoYZ6Ll9e7Xd1ZJE+wiEG0MfZvKvmJdwg7Dc88NhGXOwjEJhotAlgjcTgjhmNzADJgn1lGtADOV1tipsA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 40.67.248.234) smtp.rcpttodomain=gcc.gnu.org smtp.mailfrom=arm.com; dmarc=pass (p=none sp=none pct=100) action=none header.from=arm.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=arm.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=2kRdhwAQhIKHVlm/jRVg7uGOugbwDPb3lzJfTumsbhY=; b=CWp+iQXkT2YY0sEDos7k4ZV5UrmOJ3KXASRRgkIgndU1x+AYfOwge28nzLdlOtErOvcCkMZlwH5HhNfhoiG3BRcsN7t7pIiPCFmRuUxSQY9uWGRIGipSdsytvP8jnTlMUAMwaxrZ5jajWsYbw6U0/FbixJsIorJvYFdnKwCHNIc= Received: from AM6P192CA0054.EURP192.PROD.OUTLOOK.COM (2603:10a6:209:82::31) by VI0PR08MB10827.eurprd08.prod.outlook.com (2603:10a6:800:203::6) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7741.35; Wed, 10 Jul 2024 12:19:07 +0000 Received: from AMS1EPF00000044.eurprd04.prod.outlook.com (2603:10a6:209:82:cafe::ca) by AM6P192CA0054.outlook.office365.com (2603:10a6:209:82::31) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7741.35 via Frontend Transport; Wed, 10 Jul 2024 12:19:07 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 40.67.248.234) smtp.mailfrom=arm.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=arm.com; Received-SPF: Pass (protection.outlook.com: domain of arm.com designates 40.67.248.234 as permitted sender) receiver=protection.outlook.com; client-ip=40.67.248.234; helo=nebula.arm.com; pr=C Received: from nebula.arm.com (40.67.248.234) by AMS1EPF00000044.mail.protection.outlook.com (10.167.16.41) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.20.7762.17 via Frontend Transport; Wed, 10 Jul 2024 12:19:07 +0000 Received: from AZ-NEU-EX02.Emea.Arm.com (10.251.26.5) by AZ-NEU-EX04.Arm.com (10.251.24.32) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.35; Wed, 10 Jul 2024 12:19:07 +0000 Received: from AZ-NEU-EX04.Arm.com (10.251.24.32) by AZ-NEU-EX02.Emea.Arm.com (10.251.26.5) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.35; Wed, 10 Jul 2024 12:19:06 +0000 Received: from e120487.cambridge.arm.com (10.2.78.76) by mail.arm.com (10.251.24.32) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.35 via Frontend Transport; Wed, 10 Jul 2024 12:19:06 +0000 MIME-Version: 1.0 From: Matthew Malcomson To: , Rainer Orth , "Mike Stump" Subject: testsuite: Remove no_fsanitize_address install directory dependency Date: Wed, 10 Jul 2024 13:19:06 +0100 Message-ID: <4cb07848-58b3-48c2-ac0b-783ca07d317c@AZ-NEU-EX04.Arm.com> X-EOPAttributedMessage: 1 X-MS-TrafficTypeDiagnostic: AMS1EPF00000044:EE_|VI0PR08MB10827:EE_|DB1PEPF000509FB:EE_|DB4PR08MB9141:EE_ X-MS-Office365-Filtering-Correlation-Id: 4c6df38e-2969-4865-04ec-08dca0da990c x-checkrecipientrouted: true NoDisclaimer: true X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam-Untrusted: BCL:0; ARA:13230040|36860700013|376014|82310400026|1800799024; X-Microsoft-Antispam-Message-Info-Original: rRtmkqqyB7zCmj7WKwdB3/Z8ost1tS48AT4txmFbYS9XtJ3hSXwtz4MAaJEhf7MjDY9fIVF2Q2AmoUQpnbgcMprjXstGtUs6oT+gascD7vyQzM5UWMLGmwGlvpgSC0vuN0Xtr4ZmawXj+yhdDCUvKArvUJh2eZe2nlvURIsjn4qncuhvInkVoHE+Apql8YZ45jehFJl2Wxh1YHLcH3TiVY2UlOHSQD7kVCnX3iyOjMz0ik83PCUbcNFPRlBuUVeJ3TuCUdUDh5r2oYqkt1C75Kl13XpC5RnPXL0hsZE/gGIPooL+rd0uGlbh4bi0YB6OHUdhPsT0kYDCHD29TgC3K6l241/B3q25TfoaISbzjndaVhhj5R74PmwMPlBfdqHO3UBeR+h27ZJ2G5QmEJg0vDdOUs3LTvCcPHorLObEPt2CppLNa9IhkO1Cgr9zw91XOoIpkEibE1DjY+WmqqSyLGAEFXnaYSgoFEXfmRuLG8qnzhlqPijpKfrCRiAivyrUsBt+QRZV9K3WoEJBiir4kRzTeYVTL54JaPp7pUi1l+LK0Sa/kef5hxagwvgtxqrF0LWZGw+nYvdJ1Htz5WpCrAo3w0DnPjff7RqlJeJeq8U/O6Y2dsR6oFr/+vMLAEtR+ObBD2K3iqDOgL2fx1yMn+ff0BAW1Etx0x2/OoguHonxai7V/QDywQAKz1fTsRI3vXXeY6tO5LTMQrPvSskJ22Ax3GhSNlHVMs1M5unod9ceIig8hWqga14UwiSwEx04odZTEeLfXsnKwiMlWMr7AWhSqKMLBFIDaE/oZ52CYSJYVI2CydUB+nZVsMmWGbV7kx4RCFbEvG7VeZXivlwZMbS8L8tReumGnCVX+OgheboG3hQyLUWtW4PPxPQwG+VP5MrvLFFFgyK5CpU2rbhiASCNxTBOvXIBeAXVdA8VG8NNExoxxA0iNLl71UFGb5MPWjNYXciHQGVZFKQG9ZsvneMSLtj+Q9vDBcE9HMq8U3CunytzAIMfmaPiU8snBOkY+tYaZqsZFlRv+LDo+oh1HOOQJKkhg5auel4cQzxZijnY6SnMQQFi6YkY6l+X/CZH2gkPIAHgqlx+ACyQ/j+LPybugjO023DGCOXimTis+r+4rT+jTU6N/FWpIoNQSEuXcuC8rVwGH+tz5lwc0lQUv4ZY0B22zkmFC2q41lUKy4Kqh9uvIwSZH1R2BRrqXNgLzc6co1b+i3nxWWR+zWlU1efKHcOWVZN97d6rzmhAF03j8FzvbyuiiB5+Nqe13E+NoODIVEQgBvutD2JSmG8OSBwo5c8pD4/FEthBwLGcovLESbNOEKXPYUYsrHxymz+QxL/kosPEDrpmtQeno/uxGD4Y6AzcxDgSRR2VE0UHLxI9gBE1vYZAKXWJmsfkWzRWAO4DJfl4jyxSg6fdoO4oyA== X-Forefront-Antispam-Report-Untrusted: CIP:40.67.248.234; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:nebula.arm.com; PTR:InfoDomainNonexistent; CAT:NONE; SFS:(13230040)(36860700013)(376014)(82310400026)(1800799024); DIR:OUT; SFP:1101; X-MS-Exchange-Transport-CrossTenantHeadersStamped: VI0PR08MB10827 X-MS-Exchange-Transport-CrossTenantHeadersStripped: DB1PEPF000509FB.eurprd03.prod.outlook.com X-MS-PublicTrafficType: Email X-MS-Office365-Filtering-Correlation-Id-Prvs: ba4d5950-3611-4dd7-33af-08dca0da7f0e X-Microsoft-Antispam: BCL:0; ARA:13230040|376014|36860700013|35042699022|1800799024|82310400026; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:63.35.35.123; CTRY:IE; LANG:en; SCL:1; SRV:; IPV:CAL; SFV:NSPM; H:64aa7808-outbound-1.mta.getcheckrecipient.com; PTR:ec2-63-35-35-123.eu-west-1.compute.amazonaws.com; CAT:NONE; SFS:(13230040)(376014)(36860700013)(35042699022)(1800799024)(82310400026); DIR:OUT; SFP:1101; X-OriginatorOrg: arm.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 10 Jul 2024 12:19:51.0627 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 4c6df38e-2969-4865-04ec-08dca0da990c X-MS-Exchange-CrossTenant-Id: f34e5979-57d9-4aaa-ad4d-b122a662184d X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=f34e5979-57d9-4aaa-ad4d-b122a662184d; Ip=[63.35.35.123]; Helo=[64aa7808-outbound-1.mta.getcheckrecipient.com] X-MS-Exchange-CrossTenant-AuthSource: DB1PEPF000509FB.eurprd03.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: DB4PR08MB9141 X-Spam-Status: No, score=-12.7 required=5.0 tests=BAYES_00, DKIM_SIGNED, DKIM_VALID, DKIM_VALID_AU, DKIM_VALID_EF, FORGED_SPF_HELO, GIT_PATCH_0, KAM_LOTSOFHASH, KAM_SHORT, RCVD_IN_DNSWL_NONE, SPF_HELO_PASS, SPF_NONE, TXREP, UNPARSEABLE_RELAY autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org X-BeenThere: gcc-patches@gcc.gnu.org X-Mailman-Version: 2.1.30 Precedence: list List-Id: Gcc-patches mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: gcc-patches-bounces~incoming=patchwork.ozlabs.org@gcc.gnu.org The current no_fsanitize_address effective target check (implemented in target-supports.exp rather than in asan.exp) has some problems with the link path. Because it is not called from in between asan_init and asan_finish the link paths of the compiler are not changed to point at the build directories. That means that they point at the install directory that the current build is configured for. Hence this test passes if the current compiler has ASAN support *and* if there are ASAN libraries in the directory that this build is configured to install into. That is an unnecessary requirement. On looking through each of the tests that currently use no_fsanitize_address it seems all are `compile` tests. Hence we can change the logical test of the effective target from "can we link an ASAN executable" to "can we compile for ASAN" and avoid the need to set up link paths correctly for this test. N.b. one alternative would be to remove this effective target and try to move all tests which currently use this into directories which run their tests between calls to `asan_finish` and `asan_init`. This seems like it might ensure a clearer division of "asan tests must be run in X directories" and avoid problems similar to the one here in the future. I'm suggesting this change as it appears the easiest to make and I didn't think the above too bad a risk to take -- especially if the name of the test is clear. In doing this I also inverted the meaning of this check. Rather than the function indicating whether we *do not* support something and tests using `dg-skip-if` to avoid running a test if this returns true, this function indicates whether we *do* support something and tests use `dg-require-effective-target` to run a test if it returns true. Testing done by checking that each of the affected testcases changes from UNSUPPORTED to PASS when run individually without any install directory available. gcc/testsuite/ChangeLog: * g++.dg/warn/uninit-pr93100.C: Convert no_fsanitize_address use to fsanitize_address_compilation. * gcc.dg/pr91441.c: Likewise. * gcc.dg/pr96260.c: Likewise. * gcc.dg/pr96307.c: Likewise. * gcc.dg/uninit-pr93100.c: Likewise. * gnat.dg/asan1.adb: Likewise. * gcc.target/aarch64/sve/pr97696.c: Likewise. * lib/target-supports.exp (no_fsanitize_address): Rename to ... (fsanitize_address_compilation): Make this a compile-only test and avoid the need to set linker paths and invert semantics. ############### Attachment also inlined for ease of reply ############### diff --git a/gcc/testsuite/g++.dg/warn/uninit-pr93100.C b/gcc/testsuite/g++.dg/warn/uninit-pr93100.C index e08a36d68a91ba9620ab44d5772017d598f50826..2f6056cc3c3e8fd4aa8e88236a31b8f4344b89ca 100644 --- a/gcc/testsuite/g++.dg/warn/uninit-pr93100.C +++ b/gcc/testsuite/g++.dg/warn/uninit-pr93100.C @@ -1,7 +1,7 @@ /* PR tree-optimization/98508 - Sanitizer disable -Wall and -Wextra { dg-do compile } { dg-options "-O0 -Wall -fsanitize=address" } - { dg-skip-if "no address sanitizer" { no_fsanitize_address } } */ + { dg-require-effective-target fsanitize_address_compilation } */ struct S { diff --git a/gcc/testsuite/gcc.dg/pr91441.c b/gcc/testsuite/gcc.dg/pr91441.c index 4c785f61e597533202f9d3a42ce5a94aa3fd758f..4bd4c295913262463e2029f4a0466719474cc77a 100644 --- a/gcc/testsuite/gcc.dg/pr91441.c +++ b/gcc/testsuite/gcc.dg/pr91441.c @@ -1,7 +1,7 @@ /* PR target/91441 */ /* { dg-do compile } */ /* { dg-options "--param asan-stack=1 -fsanitize=kernel-address" } */ -/* { dg-skip-if "no address sanitizer" { no_fsanitize_address } } */ +/* { dg-require-effective-target fsanitize_address_compilation } */ int *bar(int *); int *f( int a) diff --git a/gcc/testsuite/gcc.dg/pr96260.c b/gcc/testsuite/gcc.dg/pr96260.c index 587afb76116c5759751d5d6a2ceb1b4a392bc38a..a2b326c8e567972494e6e64d33a3e7f6c514f91d 100644 --- a/gcc/testsuite/gcc.dg/pr96260.c +++ b/gcc/testsuite/gcc.dg/pr96260.c @@ -1,7 +1,7 @@ /* PR target/96260 */ /* { dg-do compile } */ /* { dg-options "--param asan-stack=1 -fsanitize=kernel-address -fasan-shadow-offset=0x100000" } */ -/* { dg-skip-if "no address sanitizer" { no_fsanitize_address } } */ +/* { dg-require-effective-target fsanitize_address_compilation } */ int *bar(int *); int *f( int a) diff --git a/gcc/testsuite/gcc.dg/pr96307.c b/gcc/testsuite/gcc.dg/pr96307.c index 89002b85c8ea6829e6b78679eedde653bb16753e..f49a9f642d35ffdfb16ac4f715dd8a25793a4817 100644 --- a/gcc/testsuite/gcc.dg/pr96307.c +++ b/gcc/testsuite/gcc.dg/pr96307.c @@ -1,7 +1,7 @@ /* PR target/96307 */ /* { dg-do compile } */ /* { dg-additional-options "-fsanitize=kernel-address --param=asan-instrumentation-with-call-threshold=8" } */ -/* { dg-skip-if "no address sanitizer" { no_fsanitize_address } } */ +/* { dg-require-effective-target fsanitize_address_compilation } */ #include enum a {test1, test2, test3=INT_MAX}; diff --git a/gcc/testsuite/gcc.dg/uninit-pr93100.c b/gcc/testsuite/gcc.dg/uninit-pr93100.c index 7cb02227bff8a448fd582efdee4ecf955ccaf16f..57838e61b1d3a4442700cd3f257a978f71589018 100644 --- a/gcc/testsuite/gcc.dg/uninit-pr93100.c +++ b/gcc/testsuite/gcc.dg/uninit-pr93100.c @@ -1,7 +1,7 @@ /* PR tree-optimization/93100 - gcc -fsanitize=address inhibits -Wuninitialized { dg-do compile } { dg-options "-Wall -fsanitize=address" } - { dg-skip-if "no address sanitizer" { no_fsanitize_address } } */ + { dg-require-effective-target fsanitize_address_compilation } */ struct A { diff --git a/gcc/testsuite/gcc.target/aarch64/sve/pr97696.c b/gcc/testsuite/gcc.target/aarch64/sve/pr97696.c index 8b7de18a07d8c855919e27c683007a70b1076aac..f63ad1455bce04d0e6568a07335c1b3107282770 100644 --- a/gcc/testsuite/gcc.target/aarch64/sve/pr97696.c +++ b/gcc/testsuite/gcc.target/aarch64/sve/pr97696.c @@ -1,4 +1,4 @@ -/* { dg-skip-if "" { no_fsanitize_address } } */ +/* { dg-require-effective-target fsanitize_address_compilation } */ /* { dg-options "-fsanitize=address -fsanitize-address-use-after-scope" } */ #include diff --git a/gcc/testsuite/gnat.dg/asan1.adb b/gcc/testsuite/gnat.dg/asan1.adb index 26bc1a404475ad7811f607de15d2dfd8f237d2e3..eef58efa4baa8f79e9c6b650f0e41cf8d90362d5 100644 --- a/gcc/testsuite/gnat.dg/asan1.adb +++ b/gcc/testsuite/gnat.dg/asan1.adb @@ -1,7 +1,7 @@ -- { dg-do compile } -- { dg-additional-sources asan1_pkg.ads } -- { dg-options "-fsanitize=address" } --- { dg-skip-if "no address sanitizer" { no_fsanitize_address } } +-- { dg-require-effective-target fsanitize_address_compilation } with Asan1_Pkg; diff --git a/gcc/testsuite/lib/target-supports.exp b/gcc/testsuite/lib/target-supports.exp index d3edc7d839ec2d9460501c157c1129176542d870..d9ea048d01212c4d28e68860a38c523cea8f2393 100644 --- a/gcc/testsuite/lib/target-supports.exp +++ b/gcc/testsuite/lib/target-supports.exp @@ -13166,16 +13166,16 @@ proc check_effective_target_movdir { } { } "-mmovdiri -mmovdir64b" ] } -# Return 1 if the target does not support address sanitizer, 0 otherwise +# Return 1 if the target supports address sanitizer, 0 otherwise -proc check_effective_target_no_fsanitize_address {} { - if ![check_no_compiler_messages fsanitize_address executable { +proc check_effective_target_fsanitize_address_compilation {} { + if ![check_no_compiler_messages fsanitize_address assembly { int main (void) { return 0; } } "-fsanitize=address" ] { - return 1; + return 0; } - return 0; + return 1; } # Return 1 if this target supports 'R' flag in .section directive, 0 diff --git a/gcc/testsuite/g++.dg/warn/uninit-pr93100.C b/gcc/testsuite/g++.dg/warn/uninit-pr93100.C index e08a36d68a91ba9620ab44d5772017d598f50826..2f6056cc3c3e8fd4aa8e88236a31b8f4344b89ca 100644 --- a/gcc/testsuite/g++.dg/warn/uninit-pr93100.C +++ b/gcc/testsuite/g++.dg/warn/uninit-pr93100.C @@ -1,7 +1,7 @@ /* PR tree-optimization/98508 - Sanitizer disable -Wall and -Wextra { dg-do compile } { dg-options "-O0 -Wall -fsanitize=address" } - { dg-skip-if "no address sanitizer" { no_fsanitize_address } } */ + { dg-require-effective-target fsanitize_address_compilation } */ struct S { diff --git a/gcc/testsuite/gcc.dg/pr91441.c b/gcc/testsuite/gcc.dg/pr91441.c index 4c785f61e597533202f9d3a42ce5a94aa3fd758f..4bd4c295913262463e2029f4a0466719474cc77a 100644 --- a/gcc/testsuite/gcc.dg/pr91441.c +++ b/gcc/testsuite/gcc.dg/pr91441.c @@ -1,7 +1,7 @@ /* PR target/91441 */ /* { dg-do compile } */ /* { dg-options "--param asan-stack=1 -fsanitize=kernel-address" } */ -/* { dg-skip-if "no address sanitizer" { no_fsanitize_address } } */ +/* { dg-require-effective-target fsanitize_address_compilation } */ int *bar(int *); int *f( int a) diff --git a/gcc/testsuite/gcc.dg/pr96260.c b/gcc/testsuite/gcc.dg/pr96260.c index 587afb76116c5759751d5d6a2ceb1b4a392bc38a..a2b326c8e567972494e6e64d33a3e7f6c514f91d 100644 --- a/gcc/testsuite/gcc.dg/pr96260.c +++ b/gcc/testsuite/gcc.dg/pr96260.c @@ -1,7 +1,7 @@ /* PR target/96260 */ /* { dg-do compile } */ /* { dg-options "--param asan-stack=1 -fsanitize=kernel-address -fasan-shadow-offset=0x100000" } */ -/* { dg-skip-if "no address sanitizer" { no_fsanitize_address } } */ +/* { dg-require-effective-target fsanitize_address_compilation } */ int *bar(int *); int *f( int a) diff --git a/gcc/testsuite/gcc.dg/pr96307.c b/gcc/testsuite/gcc.dg/pr96307.c index 89002b85c8ea6829e6b78679eedde653bb16753e..f49a9f642d35ffdfb16ac4f715dd8a25793a4817 100644 --- a/gcc/testsuite/gcc.dg/pr96307.c +++ b/gcc/testsuite/gcc.dg/pr96307.c @@ -1,7 +1,7 @@ /* PR target/96307 */ /* { dg-do compile } */ /* { dg-additional-options "-fsanitize=kernel-address --param=asan-instrumentation-with-call-threshold=8" } */ -/* { dg-skip-if "no address sanitizer" { no_fsanitize_address } } */ +/* { dg-require-effective-target fsanitize_address_compilation } */ #include enum a {test1, test2, test3=INT_MAX}; diff --git a/gcc/testsuite/gcc.dg/uninit-pr93100.c b/gcc/testsuite/gcc.dg/uninit-pr93100.c index 7cb02227bff8a448fd582efdee4ecf955ccaf16f..57838e61b1d3a4442700cd3f257a978f71589018 100644 --- a/gcc/testsuite/gcc.dg/uninit-pr93100.c +++ b/gcc/testsuite/gcc.dg/uninit-pr93100.c @@ -1,7 +1,7 @@ /* PR tree-optimization/93100 - gcc -fsanitize=address inhibits -Wuninitialized { dg-do compile } { dg-options "-Wall -fsanitize=address" } - { dg-skip-if "no address sanitizer" { no_fsanitize_address } } */ + { dg-require-effective-target fsanitize_address_compilation } */ struct A { diff --git a/gcc/testsuite/gcc.target/aarch64/sve/pr97696.c b/gcc/testsuite/gcc.target/aarch64/sve/pr97696.c index 8b7de18a07d8c855919e27c683007a70b1076aac..f63ad1455bce04d0e6568a07335c1b3107282770 100644 --- a/gcc/testsuite/gcc.target/aarch64/sve/pr97696.c +++ b/gcc/testsuite/gcc.target/aarch64/sve/pr97696.c @@ -1,4 +1,4 @@ -/* { dg-skip-if "" { no_fsanitize_address } } */ +/* { dg-require-effective-target fsanitize_address_compilation } */ /* { dg-options "-fsanitize=address -fsanitize-address-use-after-scope" } */ #include diff --git a/gcc/testsuite/gnat.dg/asan1.adb b/gcc/testsuite/gnat.dg/asan1.adb index 26bc1a404475ad7811f607de15d2dfd8f237d2e3..eef58efa4baa8f79e9c6b650f0e41cf8d90362d5 100644 --- a/gcc/testsuite/gnat.dg/asan1.adb +++ b/gcc/testsuite/gnat.dg/asan1.adb @@ -1,7 +1,7 @@ -- { dg-do compile } -- { dg-additional-sources asan1_pkg.ads } -- { dg-options "-fsanitize=address" } --- { dg-skip-if "no address sanitizer" { no_fsanitize_address } } +-- { dg-require-effective-target fsanitize_address_compilation } with Asan1_Pkg; diff --git a/gcc/testsuite/lib/target-supports.exp b/gcc/testsuite/lib/target-supports.exp index d3edc7d839ec2d9460501c157c1129176542d870..d9ea048d01212c4d28e68860a38c523cea8f2393 100644 --- a/gcc/testsuite/lib/target-supports.exp +++ b/gcc/testsuite/lib/target-supports.exp @@ -13166,16 +13166,16 @@ proc check_effective_target_movdir { } { } "-mmovdiri -mmovdir64b" ] } -# Return 1 if the target does not support address sanitizer, 0 otherwise +# Return 1 if the target supports address sanitizer, 0 otherwise -proc check_effective_target_no_fsanitize_address {} { - if ![check_no_compiler_messages fsanitize_address executable { +proc check_effective_target_fsanitize_address_compilation {} { + if ![check_no_compiler_messages fsanitize_address assembly { int main (void) { return 0; } } "-fsanitize=address" ] { - return 1; + return 0; } - return 0; + return 1; } # Return 1 if this target supports 'R' flag in .section directive, 0