Lightly tested on Compiler Explorer; fixes issues on
aarch64-unknown-linux-gnu.
Successfully regrtested on x86_64-pc-linux-gnu.
Pushed to trunk as r13-5389-gf1eab269288ffa.

gcc/testsuite/ChangeLog:
        PR analyzer/108507
        * gcc.dg/analyzer/SARD-tc841-basic-00182-min.c: Add
        -Wno-stringop-overflow.

Signed-off-by: David Malcolm <dmalc...@redhat.com>
---
 gcc/testsuite/gcc.dg/analyzer/SARD-tc841-basic-00182-min.c | 3 +++
 1 file changed, 3 insertions(+)

diff --git a/gcc/testsuite/gcc.dg/analyzer/SARD-tc841-basic-00182-min.c 
b/gcc/testsuite/gcc.dg/analyzer/SARD-tc841-basic-00182-min.c
index 577dce13f00..ed9ad317d19 100644
--- a/gcc/testsuite/gcc.dg/analyzer/SARD-tc841-basic-00182-min.c
+++ b/gcc/testsuite/gcc.dg/analyzer/SARD-tc841-basic-00182-min.c
@@ -4,6 +4,9 @@
      Black, P. , Koo, H. and Irish, T. (2013), A Basic CWE-121 Buffer Overflow 
Effectiveness Test Suite, Proc. 6th Latin-American Symposium on Dependable 
Computing, Rio de Janeiro, -1, [online], 
https://tsapps.nist.gov/publication/get_pdf.cfm?pub_id=913117 (Accessed January 
17, 2023)
 */
 
+/* The purpose of this testcase is to see if -fanalyzer can detect the bug.  */
+/* { dg-additional-options "-Wno-stringop-overflow" } */
+
 /* Taxonomy Classification: 0000300602130000031110 */
 
 /*
-- 
2.26.3

Reply via email to