Created attachment 1815187 [details] c file trigger the report Description of problem: Given C file triggers a report which is technically possible, but irrelevant in practise. The bug to trigger depends on the func1 function to be called twice and the ++ptr manipulation inside. The analyzer assumes this _could_ overflow to NULL and hit a NULL pointer deref in the final return statement. Version-Release number of selected component (if applicable): gcc (GCC) 11.2.1 20210728 (Red Hat 11.2.1-2) How reproducible: always Steps to Reproduce: 1. gcc -fanalyzer attachment.c Actual results: see second attachment Expected results: no error
Created attachment 1815188 [details] gcc output
Filed upstream as https://gcc.gnu.org/bugzilla/show_bug.cgi?id=101962
Fixed upstream on trunk for gcc 12.
Fixed upstream on gcc 11 branch.
Moving DTM -- I think we might have a new rebase by then, which would include the bugfix.
Build blocked on a problem with aarch64 builders.
The fix should be in gcc-11.2.1-9.1.el9, need to double check.
Upstream status: Fixed upstream on trunk (for GCC 12) on 2021-08-23 in r12-3094-ge82e0f149b0aba660896ea9aa12c442c07a16d12 Fixed upstream on releases/gcc-11 branch on 2021-12-10 in r11-9374-gde0656f98640a57cd9dfdb090264afaa06ba46cc This fix is *not* in the upstream gcc 11.2 release (which was tagged on 2021-07-28) I don't plan to backport the fix to gcc 10 (too much has changed within the analyzer)
r11-9374 is in gcc-11.2.1-9.1.el9.
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory (new packages: gcc), and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHBA-2022:3966