https://gcc.gnu.org/bugzilla/show_bug.cgi?id=124116

            Bug ID: 124116
           Summary: c-c++-common/analyzer/null-deref-pr108400-SoftEtherVPN
                    -WebUi.c XPASSes
           Product: gcc
           Version: 16.0
            Status: UNCONFIRMED
          Severity: normal
          Priority: P3
         Component: analyzer
          Assignee: dmalcolm at gcc dot gnu.org
          Reporter: ro at gcc dot gnu.org
  Target Milestone: ---

The c-c++-common/analyzer/null-deref-pr108400-SoftEtherVPN-WebUi.c test started
to XPASS between 20260206 (786e316de5c25a3fddeaa2003f6efb64fb5ab4a9) and
20260208 (742bafdeed7cbea68ca0d995ce43df523fce0261):

+XPASS: c-c++-common/analyzer/null-deref-pr108400-SoftEtherVPN-WebUi.c 
-std=c++20  (test for bogus messages, line 63)
+XPASS: c-c++-common/analyzer/null-deref-pr108400-SoftEtherVPN-WebUi.c 
-std=c++20 PR analyzer/108400 (test for bogus messages, line 64)
+XPASS: c-c++-common/analyzer/null-deref-pr108400-SoftEtherVPN-WebUi.c 
-std=c++26  (test for bogus messages, line 63)
+XPASS: c-c++-common/analyzer/null-deref-pr108400-SoftEtherVPN-WebUi.c 
-std=c++26 PR analyzer/108400 (test for bogus messages, line 64)
+XPASS: c-c++-common/analyzer/null-deref-pr108400-SoftEtherVPN-WebUi.c 
-std=c++98  (test for bogus messages, line 63)
+XPASS: c-c++-common/analyzer/null-deref-pr108400-SoftEtherVPN-WebUi.c 
-std=c++98 PR analyzer/108400 (test for bogus messages, line 64)

no doubt due to

commit 498fb8a24516b10897dfbe08bb8f7574b2d28839
Author: David Malcolm <[email protected]>
Date:   Fri Feb 6 10:54:52 2026 -0500

    analyzer: use value_range and range_op in eval_condition [PR98447]

I'm seeing this everywhere: Solaris, Linux, Darwin, FreeBSD.  I guess the two
xfail's there can just be removed?

Reply via email to