From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from xry111.site (xry111.site [IPv6:2001:470:683e::1]) by sourceware.org (Postfix) with ESMTPS id B84843858D33 for ; Wed, 1 Mar 2023 18:07:48 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.2 sourceware.org B84843858D33 Authentication-Results: sourceware.org; dmarc=pass (p=reject dis=none) header.from=xry111.site Authentication-Results: sourceware.org; spf=pass smtp.mailfrom=xry111.site DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=xry111.site; s=default; t=1677694066; bh=a20HuIfwidkVgwFyjOTPC0IrYMTgzvmuPDubwFEuF4g=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=DUTqmVCGEZM5HE8fsrSolXuvUVbFSb7HVxcPwrBpiDxBh0oGfgW4ykWNRr4rsOALV GVu6tmeEL/i4UDkcYPgMq0MbZA+1UPVXS8/u/pVGFXS2yGzXgzEq/LkCsGU7uiBE7j H46ABynv21nZ8ZliQdQQ3aoc/Ao7e0Z+IopDNmdA= Received: from stargazer.. (unknown [IPv6:240e:358:113f:d600:dc73:854d:832e:4]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature ECDSA (P-384) server-digest SHA384) (Client did not present a certificate) (Authenticated sender: xry111@xry111.site) by xry111.site (Postfix) with ESMTPSA id 6C86665DC8; Wed, 1 Mar 2023 13:07:44 -0500 (EST) From: Xi Ruoyao To: gcc-patches@gcc.gnu.org Cc: Richard Sandiford , Xi Ruoyao Subject: [PATCH 4/8] aarch64: testsuite: disable stack protector for sve-pcs tests Date: Thu, 2 Mar 2023 02:07:16 +0800 Message-Id: <20230301180720.26514-5-xry111@xry111.site> X-Mailer: git-send-email 2.39.2 In-Reply-To: <20230301180720.26514-1-xry111@xry111.site> References: <20230301180720.26514-1-xry111@xry111.site> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-8.4 required=5.0 tests=BAYES_00,DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,GIT_PATCH_0,KAM_SHORT,LIKELY_SPAM_FROM,SPF_HELO_PASS,SPF_PASS,TXREP autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org List-Id: If GCC is configured with --enable-default-ssp, the stack protector can make many sve-pcs tests fail. gcc/testsuite/ChangeLog: * gcc.target/aarch64/sve/pcs/aarch64-sve-pcs.exp (sve_flags): Add -fno-stack-protector. --- .../gcc.target/aarch64/sve/pcs/aarch64-sve-pcs.exp | 7 ++++--- 1 file changed, 4 insertions(+), 3 deletions(-) diff --git a/gcc/testsuite/gcc.target/aarch64/sve/pcs/aarch64-sve-pcs.exp b/gcc/testsuite/gcc.target/aarch64/sve/pcs/aarch64-sve-pcs.exp index 5562502cc07..3dbf73f67c9 100644 --- a/gcc/testsuite/gcc.target/aarch64/sve/pcs/aarch64-sve-pcs.exp +++ b/gcc/testsuite/gcc.target/aarch64/sve/pcs/aarch64-sve-pcs.exp @@ -37,11 +37,12 @@ if ![info exists DEFAULT_CFLAGS] then { # Initialize `dg'. dg-init -# Force SVE if we're not testing it already. +# Force SVE if we're not testing it already. And, disable stack protector +# to avoid test failures with --enable-default-ssp. if { [check_effective_target_aarch64_sve] } { - set sve_flags "" + set sve_flags "-fno-stack-protector" } else { - set sve_flags "-march=armv8.2-a+sve" + set sve_flags "-march=armv8.2-a+sve -fno-stack-protector" } # Main loop. -- 2.39.2