From patchwork Thu Jan 26 14:20:45 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: David Malcolm X-Patchwork-Id: 63739 Return-Path: X-Original-To: patchwork@sourceware.org Delivered-To: patchwork@sourceware.org Received: from server2.sourceware.org (localhost [IPv6:::1]) by sourceware.org (Postfix) with ESMTP id A6A483857C5A for ; Thu, 26 Jan 2023 14:21:15 +0000 (GMT) DKIM-Filter: OpenDKIM Filter v2.11.0 sourceware.org A6A483857C5A DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gcc.gnu.org; s=default; t=1674742875; bh=qrySDPK5fgNKgLioK1orzfcZOT5I/Hwb1+rDPLkcDFE=; h=To:Cc:Subject:Date:List-Id:List-Unsubscribe:List-Archive: List-Post:List-Help:List-Subscribe:From:Reply-To:From; b=MtlR1Req1SSN9HmFf+Sv9DdBZpSyg/7cjzlKeDeaMnlcYaDFKoHTQeD8QtF2OXjCB nr99NLCKVRPAnpo8qih9O0vUT7BzpoybD7J9FX4+Fnua1UiBXME3ejNN5V18UEzGdj pY0pBdRGvLWreQ1+ZvuZA5BZ3UdI96Zb50DjaF7Y= X-Original-To: gcc-patches@gcc.gnu.org Delivered-To: gcc-patches@gcc.gnu.org Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by sourceware.org (Postfix) with ESMTPS id 695DE3858423 for ; Thu, 26 Jan 2023 14:20:48 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.2 sourceware.org 695DE3858423 Received: from mimecast-mx02.redhat.com (mimecast-mx02.redhat.com [66.187.233.88]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-628--_gPVDnBOt2YAIdcyPrNtg-1; Thu, 26 Jan 2023 09:20:46 -0500 X-MC-Unique: -_gPVDnBOt2YAIdcyPrNtg-1 Received: from smtp.corp.redhat.com (int-mx06.intmail.prod.int.rdu2.redhat.com [10.11.54.6]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 9893F802D1A for ; Thu, 26 Jan 2023 14:20:46 +0000 (UTC) Received: from t14s.localdomain.com (unknown [10.2.16.174]) by smtp.corp.redhat.com (Postfix) with ESMTP id 6B8E12166B26; Thu, 26 Jan 2023 14:20:46 +0000 (UTC) To: gcc-patches@gcc.gnu.org Cc: David Malcolm Subject: [committed] analyzer: fix SARD-tc841-basic-00182-min.c test case [PR108507] Date: Thu, 26 Jan 2023 09:20:45 -0500 Message-Id: <20230126142045.500121-1-dmalcolm@redhat.com> MIME-Version: 1.0 X-Scanned-By: MIMEDefang 3.1 on 10.11.54.6 X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: redhat.com X-Spam-Status: No, score=-11.5 required=5.0 tests=BAYES_00, DKIMWL_WL_HIGH, DKIM_SIGNED, DKIM_VALID, DKIM_VALID_AU, DKIM_VALID_EF, GIT_PATCH_0, RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H2, SPF_HELO_NONE, SPF_NONE, TXREP autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org X-BeenThere: gcc-patches@gcc.gnu.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Gcc-patches mailing list List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-Patchwork-Original-From: David Malcolm via Gcc-patches From: David Malcolm Reply-To: David Malcolm Errors-To: gcc-patches-bounces+patchwork=sourceware.org@gcc.gnu.org Sender: "Gcc-patches" Lightly tested on Compiler Explorer; fixes issues on aarch64-unknown-linux-gnu. Successfully regrtested on x86_64-pc-linux-gnu. Pushed to trunk as r13-5389-gf1eab269288ffa. gcc/testsuite/ChangeLog: PR analyzer/108507 * gcc.dg/analyzer/SARD-tc841-basic-00182-min.c: Add -Wno-stringop-overflow. Signed-off-by: David Malcolm --- gcc/testsuite/gcc.dg/analyzer/SARD-tc841-basic-00182-min.c | 3 +++ 1 file changed, 3 insertions(+) diff --git a/gcc/testsuite/gcc.dg/analyzer/SARD-tc841-basic-00182-min.c b/gcc/testsuite/gcc.dg/analyzer/SARD-tc841-basic-00182-min.c index 577dce13f00..ed9ad317d19 100644 --- a/gcc/testsuite/gcc.dg/analyzer/SARD-tc841-basic-00182-min.c +++ b/gcc/testsuite/gcc.dg/analyzer/SARD-tc841-basic-00182-min.c @@ -4,6 +4,9 @@ Black, P. , Koo, H. and Irish, T. (2013), A Basic CWE-121 Buffer Overflow Effectiveness Test Suite, Proc. 6th Latin-American Symposium on Dependable Computing, Rio de Janeiro, -1, [online], https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=913117 (Accessed January 17, 2023) */ +/* The purpose of this testcase is to see if -fanalyzer can detect the bug. */ +/* { dg-additional-options "-Wno-stringop-overflow" } */ + /* Taxonomy Classification: 0000300602130000031110 */ /*