// PR c++/65209
+// { dg-additional-options "-fno-pie" { target sparc*-*-* } }
// { dg-final { scan-assembler-not "comdat" } }
// Everything involving the anonymous namespace bits should be private, not
/* PR tree-optimization/98508 - Sanitizer disable -Wall and -Wextra
{ dg-do compile }
- { dg-require-effective-target no_fsanitize_address }
- { dg-options "-O0 -Wall -fsanitize=address" } */
+ { dg-options "-O0 -Wall -fsanitize=address" }
+ { dg-skip-if "no address sanitizer" { no_fsanitize_address } } */
struct S
{
char *p = __builtin_malloc (15);
for (int i = 0; i != 16; ++i)
/* The size of the write below depends on the target. When vectorized
- the vector size may be 4 or 16, otherwise it may be a series of byte
+ the vector size may be 4, 8 or 16, otherwise it may be a series of byte
assignments. */
- p[i] = i; // { dg-warning "writing (1|2|4|16) bytes? into a region of size (0|1|3|15)" }
+ p[i] = i; // { dg-warning "writing (1|2|4|8|16) bytes? into a region of size (0|1|3|7|15)" }
return p;
}
/* PR target/91441 */
/* { dg-do compile } */
-/* { dg-require-effective-target no_fsanitize_address }*/
/* { dg-options "--param asan-stack=1 -fsanitize=kernel-address" } */
+/* { dg-skip-if "no address sanitizer" { no_fsanitize_address } } */
int *bar(int *);
int *f( int a)
{
return bar(&a);
}
-/* { dg-warning ".'-fsanitize=kernel-address' with stack protection is not supported without '-fasan-shadow-offset=' for this target" "" { target *-*-* } 0 } */
+/* { dg-warning ".'-fsanitize=kernel-address' with stack protection is not supported without '-fasan-shadow-offset=' for this target" "" { target riscv*-*-* } 0 } */
/* PR target/96260 */
/* { dg-do compile } */
-/* { dg-require-effective-target no_fsanitize_address }*/
/* { dg-options "--param asan-stack=1 -fsanitize=kernel-address -fasan-shadow-offset=0x100000" } */
+/* { dg-skip-if "no address sanitizer" { no_fsanitize_address } } */
int *bar(int *);
int *f( int a)
/* PR target/96307 */
/* { dg-do compile } */
-/* { dg-require-effective-target no_fsanitize_address }*/
/* { dg-additional-options "-fsanitize=kernel-address --param=asan-instrumentation-with-call-threshold=8" } */
+/* { dg-skip-if "no address sanitizer" { no_fsanitize_address } } */
#include <limits.h>
enum a {test1, test2, test3=INT_MAX};
/* PR tree-optimization/93100 - gcc -fsanitize=address inhibits -Wuninitialized
{ dg-do compile }
{ dg-options "-Wall -fsanitize=address" }
- { dg-skip-if "sanitize address" { "powerpc-ibm-aix*" } } */
+ { dg-skip-if "no address sanitizer" { no_fsanitize_address } } */
struct A
{
-- { dg-do compile }
-- { dg-additional-sources asan1_pkg.ads }
-- { dg-options "-fsanitize=address" }
--- { dg-skip-if "" no_fsanitize_address }
+-- { dg-skip-if "no address sanitizer" { no_fsanitize_address } }
with Asan1_Pkg;
} "-mmovdiri -mmovdir64b" ]
}
-# Return 1 if target is not support address sanitize, 1 otherwise.
+# Return 1 if the target does not support address sanitizer, 0 otherwise
proc check_effective_target_no_fsanitize_address {} {
if ![check_no_compiler_messages fsanitize_address executable {
int main (void) { return 0; }
- }] {
+ } "-fsanitize=address" ] {
return 1;
}
+
return 0;
}