https://gcc.gnu.org/bugzilla/show_bug.cgi?id=124116
Bug ID: 124116
Summary: c-c++-common/analyzer/null-deref-pr108400-SoftEtherVPN
-WebUi.c XPASSes
Product: gcc
Version: 16.0
Status: UNCONFIRMED
Severity: normal
Priority: P3
Component: analyzer
Assignee: dmalcolm at gcc dot gnu.org
Reporter: ro at gcc dot gnu.org
Target Milestone: ---
The c-c++-common/analyzer/null-deref-pr108400-SoftEtherVPN-WebUi.c test started
to XPASS between 20260206 (786e316de5c25a3fddeaa2003f6efb64fb5ab4a9) and
20260208 (742bafdeed7cbea68ca0d995ce43df523fce0261):
+XPASS: c-c++-common/analyzer/null-deref-pr108400-SoftEtherVPN-WebUi.c
-std=c++20 (test for bogus messages, line 63)
+XPASS: c-c++-common/analyzer/null-deref-pr108400-SoftEtherVPN-WebUi.c
-std=c++20 PR analyzer/108400 (test for bogus messages, line 64)
+XPASS: c-c++-common/analyzer/null-deref-pr108400-SoftEtherVPN-WebUi.c
-std=c++26 (test for bogus messages, line 63)
+XPASS: c-c++-common/analyzer/null-deref-pr108400-SoftEtherVPN-WebUi.c
-std=c++26 PR analyzer/108400 (test for bogus messages, line 64)
+XPASS: c-c++-common/analyzer/null-deref-pr108400-SoftEtherVPN-WebUi.c
-std=c++98 (test for bogus messages, line 63)
+XPASS: c-c++-common/analyzer/null-deref-pr108400-SoftEtherVPN-WebUi.c
-std=c++98 PR analyzer/108400 (test for bogus messages, line 64)
no doubt due to
commit 498fb8a24516b10897dfbe08bb8f7574b2d28839
Author: David Malcolm <[email protected]>
Date: Fri Feb 6 10:54:52 2026 -0500
analyzer: use value_range and range_op in eval_condition [PR98447]
I'm seeing this everywhere: Solaris, Linux, Darwin, FreeBSD. I guess the two
xfail's there can just be removed?