diff options
author | David Malcolm <dmalcolm@redhat.com> | 2024-04-10 16:43:27 -0400 |
---|---|---|
committer | David Malcolm <dmalcolm@redhat.com> | 2024-04-10 16:43:27 -0400 |
commit | d09d70cdb2a4bc45825fc887047ef4a20de590c6 (patch) | |
tree | 759e865912f32cd2f8ffec003d3692f2d08c0f7b /gcc | |
parent | 19b98410eb43be60f7e2673afeaabd016321c625 (diff) | |
download | gcc-d09d70cdb2a4bc45825fc887047ef4a20de590c6.zip gcc-d09d70cdb2a4bc45825fc887047ef4a20de590c6.tar.gz gcc-d09d70cdb2a4bc45825fc887047ef4a20de590c6.tar.bz2 |
testsuite: add some missing -fanalyzer to plugin tests
gcc/testsuite/ChangeLog:
* gcc.dg/plugin/copy_from_user-1.c: Add missing directives for an
analyzer test.
* gcc.dg/plugin/taint-CVE-2011-0521-1-fixed.c: Add missing
-fanalyzer to options.
* gcc.dg/plugin/taint-CVE-2011-0521-1.c: Likewise.
* gcc.dg/plugin/taint-CVE-2011-0521-2-fixed.c: Likewise.
(dvb_usercopy): Add default case to avoid complaints about NULL
derefs.
* gcc.dg/plugin/taint-CVE-2011-0521-2.c: Likewise.
* gcc.dg/plugin/taint-CVE-2011-0521-3-fixed.c: Add missing
-fanalyzer to options.
* gcc.dg/plugin/taint-CVE-2011-0521-3.c: Likewise. Drop
xfail.
Signed-off-by: David Malcolm <dmalcolm@redhat.com>
Diffstat (limited to 'gcc')
7 files changed, 15 insertions, 8 deletions
diff --git a/gcc/testsuite/gcc.dg/plugin/copy_from_user-1.c b/gcc/testsuite/gcc.dg/plugin/copy_from_user-1.c index a1415f3..1acedc2 100644 --- a/gcc/testsuite/gcc.dg/plugin/copy_from_user-1.c +++ b/gcc/testsuite/gcc.dg/plugin/copy_from_user-1.c @@ -1,3 +1,7 @@ +/* { dg-do compile } */ +/* { dg-options "-fanalyzer" } */ +/* { dg-require-effective-target analyzer } */ + typedef __SIZE_TYPE__ size_t; #define __user diff --git a/gcc/testsuite/gcc.dg/plugin/taint-CVE-2011-0521-1-fixed.c b/gcc/testsuite/gcc.dg/plugin/taint-CVE-2011-0521-1-fixed.c index 51526b8..9ad05ff 100644 --- a/gcc/testsuite/gcc.dg/plugin/taint-CVE-2011-0521-1-fixed.c +++ b/gcc/testsuite/gcc.dg/plugin/taint-CVE-2011-0521-1-fixed.c @@ -1,6 +1,6 @@ /* { dg-do compile } */ /* { dg-require-effective-target analyzer } */ -/* { dg-additional-options "-Wno-pedantic" } */ +/* { dg-additional-options "-fanalyzer -Wno-pedantic" } */ /* See notes in this header. */ #include "taint-CVE-2011-0521.h" diff --git a/gcc/testsuite/gcc.dg/plugin/taint-CVE-2011-0521-1.c b/gcc/testsuite/gcc.dg/plugin/taint-CVE-2011-0521-1.c index 3d11a75..688d014 100644 --- a/gcc/testsuite/gcc.dg/plugin/taint-CVE-2011-0521-1.c +++ b/gcc/testsuite/gcc.dg/plugin/taint-CVE-2011-0521-1.c @@ -1,5 +1,5 @@ /* { dg-do compile } */ -/* { dg-additional-options "-Wno-pedantic" } */ +/* { dg-additional-options "-fanalyzer -Wno-pedantic" } */ /* { dg-require-effective-target analyzer } */ /* See notes in this header. */ diff --git a/gcc/testsuite/gcc.dg/plugin/taint-CVE-2011-0521-2-fixed.c b/gcc/testsuite/gcc.dg/plugin/taint-CVE-2011-0521-2-fixed.c index d035266..7e597037 100644 --- a/gcc/testsuite/gcc.dg/plugin/taint-CVE-2011-0521-2-fixed.c +++ b/gcc/testsuite/gcc.dg/plugin/taint-CVE-2011-0521-2-fixed.c @@ -1,5 +1,5 @@ /* { dg-do compile } */ -/* { dg-additional-options "-Wno-pedantic" } */ +/* { dg-additional-options "-fanalyzer -Wno-pedantic" } */ /* { dg-require-effective-target analyzer } */ /* See notes in this header. */ @@ -67,6 +67,8 @@ int dvb_usercopy(struct file *file, if (copy_from_user(parg, (void __user *)arg, _IOC_SIZE(cmd))) goto out; break; + default: + goto out; } /* call driver */ diff --git a/gcc/testsuite/gcc.dg/plugin/taint-CVE-2011-0521-2.c b/gcc/testsuite/gcc.dg/plugin/taint-CVE-2011-0521-2.c index 5270e22..9189cdb 100644 --- a/gcc/testsuite/gcc.dg/plugin/taint-CVE-2011-0521-2.c +++ b/gcc/testsuite/gcc.dg/plugin/taint-CVE-2011-0521-2.c @@ -1,6 +1,6 @@ /* { dg-do compile } */ /* { dg-require-effective-target analyzer } */ -/* { dg-additional-options "-Wno-pedantic" } */ +/* { dg-additional-options "-fanalyzer -Wno-pedantic" } */ /* See notes in this header. */ #include "taint-CVE-2011-0521.h" @@ -67,6 +67,8 @@ int dvb_usercopy(struct file *file, if (copy_from_user(parg, (void __user *)arg, _IOC_SIZE(cmd))) goto out; break; + default: + goto out; } /* call driver */ diff --git a/gcc/testsuite/gcc.dg/plugin/taint-CVE-2011-0521-3-fixed.c b/gcc/testsuite/gcc.dg/plugin/taint-CVE-2011-0521-3-fixed.c index b8268fa..d10ce28 100644 --- a/gcc/testsuite/gcc.dg/plugin/taint-CVE-2011-0521-3-fixed.c +++ b/gcc/testsuite/gcc.dg/plugin/taint-CVE-2011-0521-3-fixed.c @@ -1,6 +1,6 @@ /* { dg-do compile } */ /* { dg-require-effective-target analyzer } */ -/* { dg-additional-options "-Wno-pedantic" } */ +/* { dg-additional-options "-fanalyzer -Wno-pedantic" } */ /* See notes in this header. */ #include "taint-CVE-2011-0521.h" diff --git a/gcc/testsuite/gcc.dg/plugin/taint-CVE-2011-0521-3.c b/gcc/testsuite/gcc.dg/plugin/taint-CVE-2011-0521-3.c index 86868a0..5185ffd 100644 --- a/gcc/testsuite/gcc.dg/plugin/taint-CVE-2011-0521-3.c +++ b/gcc/testsuite/gcc.dg/plugin/taint-CVE-2011-0521-3.c @@ -1,6 +1,6 @@ /* { dg-do compile } */ /* { dg-require-effective-target analyzer } */ -/* { dg-additional-options "-Wno-pedantic" } */ +/* { dg-additional-options "-fanalyzer -Wno-pedantic" } */ /* See notes in this header. */ #include "taint-CVE-2011-0521.h" @@ -19,8 +19,7 @@ int dvb_ca_ioctl(struct file *file, unsigned int cmd, void *parg) if (info->num > 1) return -EINVAL; - av7110->ci_slot[info->num].num = info->num; /* { dg-warning "attacker-controlled value" "" { xfail *-*-* } } */ - /* TODO(xfail). */ + av7110->ci_slot[info->num].num = info->num; /* { dg-warning "attacker-controlled value" } */ av7110->ci_slot[info->num].type = FW_CI_LL_SUPPORT(av7110->arm_app) ? CA_CI_LINK : CA_CI; memcpy(info, &av7110->ci_slot[info->num], sizeof(ca_slot_info_t)); |