CC: kbuild-all(a)lists.01.org
BCC: lkp(a)intel.com
In-Reply-To: <20220228094857.557329-1-damien.lemoal(a)opensource.wdc.com>
References: <20220228094857.557329-1-damien.lemoal(a)opensource.wdc.com>
TO: Damien Le Moal <damien.lemoal(a)opensource.wdc.com>
TO: linux-scsi(a)vger.kernel.org
TO: "Martin K . Petersen" <martin.petersen(a)oracle.com>
TO: John Garry <john.garry(a)huawei.com>
TO: Dan Carpenter <error27(a)gmail.com>
TO: Jason Yan <yanaijie(a)huawei.com>
Hi Damien,
I love your patch! Perhaps something to improve:
[auto build test WARNING on jejb-scsi/for-next]
[also build test WARNING on mkp-scsi/for-next v5.17-rc6 next-20220225]
[If your patch is applied to the wrong git tree, kindly drop us a note.
And when submitting patch, we suggest to use '--base' as documented in
https://git-scm.com/docs/git-format-patch]
url: https://github.com/0day-ci/linux/commits/Damien-Le-Moal/scsi-libsas-clean...
base: https://git.kernel.org/pub/scm/linux/kernel/git/jejb/scsi.git for-next
:::::: branch date: 10 hours ago
:::::: commit date: 10 hours ago
config: x86_64-randconfig-m001-20220228 (https://download.01.org/0day-ci/archive/20220301/202203010428.5Gka1xt4-lk...)
compiler: gcc-9 (Debian 9.3.0-22) 9.3.0
If you fix the issue, kindly add following tag as appropriate
Reported-by: kernel test robot <lkp(a)intel.com>
Reported-by: Dan Carpenter <dan.carpenter(a)oracle.com>
smatch warnings:
drivers/scsi/libsas/sas_port.c:172 sas_form_port() error: we previously assumed 'port' could be null (see line 115)
vim +/port +172 drivers/scsi/libsas/sas_port.c
2da00b1cacb2885 Damien Le Moal 2022-02-28 97
2908d778ab3e244 James Bottomley 2006-08-29 98 /**
121246ae93a1ef3 Bart Van Assche 2018-02-22 99 * sas_form_port - add this phy to a port
2908d778ab3e244 James Bottomley 2006-08-29 100 * @phy: the phy of interest
2908d778ab3e244 James Bottomley 2006-08-29 101 *
2908d778ab3e244 James Bottomley 2006-08-29 102 * This function adds this phy to an existing port, thus creating a wide
2908d778ab3e244 James Bottomley 2006-08-29 103 * port, or it creates a port and adds the phy to the port.
2908d778ab3e244 James Bottomley 2006-08-29 104 */
2908d778ab3e244 James Bottomley 2006-08-29 105 static void sas_form_port(struct asd_sas_phy *phy)
2908d778ab3e244 James Bottomley 2006-08-29 106 {
2908d778ab3e244 James Bottomley 2006-08-29 107 int i;
2908d778ab3e244 James Bottomley 2006-08-29 108 struct sas_ha_struct *sas_ha = phy->ha;
2908d778ab3e244 James Bottomley 2006-08-29 109 struct asd_sas_port *port = phy->port;
2da00b1cacb2885 Damien Le Moal 2022-02-28 110 struct domain_device *port_dev = NULL;
2908d778ab3e244 James Bottomley 2006-08-29 111 struct sas_internal *si =
2908d778ab3e244 James Bottomley 2006-08-29 112 to_sas_internal(sas_ha->core.shost->transportt);
980fa2f9d64b9be Darrick J. Wong 2007-01-11 113 unsigned long flags;
2908d778ab3e244 James Bottomley 2006-08-29 114
2908d778ab3e244 James Bottomley 2006-08-29 @115 if (port) {
00f0254ed9b1916 Dan Williams 2010-10-01 116 if (!phy_is_wideport_member(port, phy))
90f1e10d08bad84 Dan Williams 2011-05-24 117 sas_deform_port(phy, 0);
303694eeee5eaca Dan Williams 2012-06-21 118 else if (phy->suspended) {
303694eeee5eaca Dan Williams 2012-06-21 119 phy->suspended = 0;
303694eeee5eaca Dan Williams 2012-06-21 120 sas_resume_port(phy);
303694eeee5eaca Dan Williams 2012-06-21 121
303694eeee5eaca Dan Williams 2012-06-21 122 /* phy came back, try to cancel the timeout */
303694eeee5eaca Dan Williams 2012-06-21 123 wake_up(&sas_ha->eh_wait_q);
303694eeee5eaca Dan Williams 2012-06-21 124 return;
303694eeee5eaca Dan Williams 2012-06-21 125 } else {
15ba7806c316ce8 John Garry 2018-11-15 126 pr_info("%s: phy%d belongs to port%d already(%d)!\n",
cadbd4a5e36dde7 Harvey Harrison 2008-07-03 127 __func__, phy->id, phy->port->id,
2908d778ab3e244 James Bottomley 2006-08-29 128 phy->port->num_phys);
2908d778ab3e244 James Bottomley 2006-08-29 129 return;
2908d778ab3e244 James Bottomley 2006-08-29 130 }
2908d778ab3e244 James Bottomley 2006-08-29 131 }
2908d778ab3e244 James Bottomley 2006-08-29 132
5381837f125cc62 Tom Peng 2009-07-01 133 /* see if the phy should be part of a wide port */
980fa2f9d64b9be Darrick J. Wong 2007-01-11 134 spin_lock_irqsave(&sas_ha->phy_port_lock, flags);
2908d778ab3e244 James Bottomley 2006-08-29 135 for (i = 0; i < sas_ha->num_phys; i++) {
2908d778ab3e244 James Bottomley 2006-08-29 136 port = sas_ha->sas_port[i];
2908d778ab3e244 James Bottomley 2006-08-29 137 spin_lock(&port->phy_list_lock);
2908d778ab3e244 James Bottomley 2006-08-29 138 if (*(u64 *) port->sas_addr &&
00f0254ed9b1916 Dan Williams 2010-10-01 139 phy_is_wideport_member(port, phy) && port->num_phys > 0) {
2908d778ab3e244 James Bottomley 2006-08-29 140 /* wide port */
2da00b1cacb2885 Damien Le Moal 2022-02-28 141 port_dev = port->port_dev;
2da00b1cacb2885 Damien Le Moal 2022-02-28 142 sas_form_port_add_phy(port, phy, true);
2da00b1cacb2885 Damien Le Moal 2022-02-28 143 spin_unlock(&port->phy_list_lock);
2908d778ab3e244 James Bottomley 2006-08-29 144 break;
5381837f125cc62 Tom Peng 2009-07-01 145 }
5381837f125cc62 Tom Peng 2009-07-01 146 spin_unlock(&port->phy_list_lock);
5381837f125cc62 Tom Peng 2009-07-01 147 }
5381837f125cc62 Tom Peng 2009-07-01 148 /* The phy does not match any existing port, create a new one */
5381837f125cc62 Tom Peng 2009-07-01 149 if (i == sas_ha->num_phys) {
5381837f125cc62 Tom Peng 2009-07-01 150 for (i = 0; i < sas_ha->num_phys; i++) {
5381837f125cc62 Tom Peng 2009-07-01 151 port = sas_ha->sas_port[i];
5381837f125cc62 Tom Peng 2009-07-01 152 spin_lock(&port->phy_list_lock);
5381837f125cc62 Tom Peng 2009-07-01 153 if (*(u64 *)port->sas_addr == 0
5381837f125cc62 Tom Peng 2009-07-01 154 && port->num_phys == 0) {
2da00b1cacb2885 Damien Le Moal 2022-02-28 155 port_dev = port->port_dev;
2da00b1cacb2885 Damien Le Moal 2022-02-28 156 sas_form_port_add_phy(port, phy, false);
2da00b1cacb2885 Damien Le Moal 2022-02-28 157 spin_unlock(&port->phy_list_lock);
2908d778ab3e244 James Bottomley 2006-08-29 158 break;
2908d778ab3e244 James Bottomley 2006-08-29 159 }
2908d778ab3e244 James Bottomley 2006-08-29 160 spin_unlock(&port->phy_list_lock);
2908d778ab3e244 James Bottomley 2006-08-29 161 }
2908d778ab3e244 James Bottomley 2006-08-29 162
2908d778ab3e244 James Bottomley 2006-08-29 163 if (i >= sas_ha->num_phys) {
2da00b1cacb2885 Damien Le Moal 2022-02-28 164 pr_err("%s: couldn't find a free port, bug?\n",
2da00b1cacb2885 Damien Le Moal 2022-02-28 165 __func__);
980fa2f9d64b9be Darrick J. Wong 2007-01-11 166 spin_unlock_irqrestore(&sas_ha->phy_port_lock, flags);
2908d778ab3e244 James Bottomley 2006-08-29 167 return;
2908d778ab3e244 James Bottomley 2006-08-29 168 }
2da00b1cacb2885 Damien Le Moal 2022-02-28 169 }
980fa2f9d64b9be Darrick J. Wong 2007-01-11 170 spin_unlock_irqrestore(&sas_ha->phy_port_lock, flags);
2908d778ab3e244 James Bottomley 2006-08-29 171
2908d778ab3e244 James Bottomley 2006-08-29 @172 if (!port->port) {
b4698d88585e23d Dan Williams 2012-04-19 173 port->port = sas_port_alloc(phy->phy->dev.parent, port->id);
2908d778ab3e244 James Bottomley 2006-08-29 174 BUG_ON(!port->port);
2908d778ab3e244 James Bottomley 2006-08-29 175 sas_port_add(port->port);
2908d778ab3e244 James Bottomley 2006-08-29 176 }
2908d778ab3e244 James Bottomley 2006-08-29 177 sas_port_add_phy(port->port, phy->phy);
2908d778ab3e244 James Bottomley 2006-08-29 178
b3e3d4c618c5b97 John Garry 2019-12-19 179 pr_debug("%s added to %s, phy_mask:0x%x (%016llx)\n",
71610f55fa4db63 Kay Sievers 2008-12-03 180 dev_name(&phy->phy->dev), dev_name(&port->port->dev),
a29c05153630b2c James Bottomley 2008-02-23 181 port->phy_mask,
a29c05153630b2c James Bottomley 2008-02-23 182 SAS_ADDR(port->attached_sas_addr));
a29c05153630b2c James Bottomley 2008-02-23 183
085f104a83d5650 John Garry 2019-04-12 184 if (port_dev)
085f104a83d5650 John Garry 2019-04-12 185 port_dev->pathways = port->num_phys;
2908d778ab3e244 James Bottomley 2006-08-29 186
2908d778ab3e244 James Bottomley 2006-08-29 187 /* Tell the LLDD about this port formation. */
2908d778ab3e244 James Bottomley 2006-08-29 188 if (si->dft->lldd_port_formed)
2908d778ab3e244 James Bottomley 2006-08-29 189 si->dft->lldd_port_formed(phy);
2908d778ab3e244 James Bottomley 2006-08-29 190
2908d778ab3e244 James Bottomley 2006-08-29 191 sas_discover_event(phy->port, DISCE_DISCOVER_DOMAIN);
085f104a83d5650 John Garry 2019-04-12 192 /* Only insert a revalidate event after initial discovery */
924a3541eab0d28 John Garry 2019-06-10 193 if (port_dev && dev_is_expander(port_dev->dev_type)) {
085f104a83d5650 John Garry 2019-04-12 194 struct expander_device *ex_dev = &port_dev->ex_dev;
085f104a83d5650 John Garry 2019-04-12 195
085f104a83d5650 John Garry 2019-04-12 196 ex_dev->ex_change_count = -1;
085f104a83d5650 John Garry 2019-04-12 197 sas_discover_event(port, DISCE_REVALIDATE_DOMAIN);
085f104a83d5650 John Garry 2019-04-12 198 }
517e5153d242cb2 Jason Yan 2017-12-08 199 flush_workqueue(sas_ha->disco_q);
2908d778ab3e244 James Bottomley 2006-08-29 200 }
2908d778ab3e244 James Bottomley 2006-08-29 201
---
0-DAY CI Kernel Test Service, Intel Corporation
https://lists.01.org/hyperkitty/list/kbuild-all@lists.01.org
CC: llvm(a)lists.linux.dev
CC: kbuild-all(a)lists.01.org
BCC: lkp(a)intel.com
In-Reply-To: <20220228004605.367040-9-marex(a)denx.de>
References: <20220228004605.367040-9-marex(a)denx.de>
TO: Marek Vasut <marex(a)denx.de>
TO: dri-devel(a)lists.freedesktop.org
CC: Marek Vasut <marex(a)denx.de>
CC: Peng Fan <peng.fan(a)nxp.com>
CC: Alexander Stein <alexander.stein(a)ew.tq-group.com>
CC: Laurent Pinchart <laurent.pinchart(a)ideasonboard.com>
CC: Sam Ravnborg <sam(a)ravnborg.org>
CC: Robby Cai <robby.cai(a)nxp.com>
Hi Marek,
I love your patch! Perhaps something to improve:
[auto build test WARNING on drm-intel/for-linux-next]
[also build test WARNING on drm-exynos/exynos-drm-next next-20220225]
[cannot apply to drm/drm-next drm-tip/drm-tip tegra-drm/drm/tegra/for-next v5.17-rc6]
[If your patch is applied to the wrong git tree, kindly drop us a note.
And when submitting patch, we suggest to use '--base' as documented in
https://git-scm.com/docs/git-format-patch]
url: https://github.com/0day-ci/linux/commits/Marek-Vasut/dt-bindings-mxsfb-Ad...
base: git://anongit.freedesktop.org/drm-intel for-linux-next
:::::: branch date: 16 hours ago
:::::: commit date: 16 hours ago
config: mips-randconfig-c004-20220227 (https://download.01.org/0day-ci/archive/20220301/202203010150.L57Eax3W-lk...)
compiler: clang version 15.0.0 (https://github.com/llvm/llvm-project d271fc04d5b97b12e6b797c6067d3c96a8d7470e)
reproduce (this is a W=1 build):
wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross
chmod +x ~/bin/make.cross
# install mips cross compiling tool for clang build
# apt-get install binutils-mips-linux-gnu
# https://github.com/0day-ci/linux/commit/d6832d6fb879aabce18d9b451ed1ead1d...
git remote add linux-review https://github.com/0day-ci/linux
git fetch --no-tags linux-review Marek-Vasut/dt-bindings-mxsfb-Add-compatible-for-i-MX8MP/20220228-084809
git checkout d6832d6fb879aabce18d9b451ed1ead1da38c333
# save the config file to linux build tree
COMPILER_INSTALL_PATH=$HOME/0day COMPILER=clang make.cross ARCH=mips clang-analyzer
If you fix the issue, kindly add following tag as appropriate
Reported-by: kernel test robot <lkp(a)intel.com>
clang-analyzer warnings: (new ones prefixed by >>)
Suppressed 5 warnings (5 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
5 warnings generated.
Suppressed 5 warnings (5 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
5 warnings generated.
Suppressed 5 warnings (5 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
5 warnings generated.
Suppressed 5 warnings (5 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
5 warnings generated.
Suppressed 5 warnings (5 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
5 warnings generated.
Suppressed 5 warnings (5 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
5 warnings generated.
Suppressed 5 warnings (5 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
6 warnings generated.
drivers/video/fbdev/riva/rivafb-i2c.c:94:2: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(chan->adapter.name, name);
^~~~~~
drivers/video/fbdev/riva/rivafb-i2c.c:94:2: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(chan->adapter.name, name);
^~~~~~
Suppressed 5 warnings (5 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
5 warnings generated.
10 warnings generated.
Suppressed 10 warnings (10 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
5 warnings generated.
10 warnings generated.
Suppressed 10 warnings (10 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
5 warnings generated.
10 warnings generated.
Suppressed 10 warnings (10 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
6 warnings generated.
drivers/iio/dac/ad5764.c:52:8: warning: Excessive padding in 'struct ad5764_state' (144 padding bytes, where 16 is optimal).
Optimal fields order:
data,
spi,
chip_info,
vref_reg,
lock,
consider reordering the fields or adding explicit padding members [clang-analyzer-optin.performance.Padding]
struct ad5764_state {
~~~~~~~^~~~~~~~~~~~~~
drivers/iio/dac/ad5764.c:52:8: note: Excessive padding in 'struct ad5764_state' (144 padding bytes, where 16 is optimal). Optimal fields order: data, spi, chip_info, vref_reg, lock, consider reordering the fields or adding explicit padding members
struct ad5764_state {
~~~~~~~^~~~~~~~~~~~~~
Suppressed 5 warnings (5 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
6 warnings generated.
drivers/iio/dac/ad5766.c:112:8: warning: Excessive padding in 'struct ad5766_state' (144 padding bytes, where 16 is optimal).
Optimal fields order:
data,
spi,
chip_info,
gpio_reset,
crt_range,
dither_source,
dither_scale,
lock,
dither_enable,
dither_invert,
consider reordering the fields or adding explicit padding members [clang-analyzer-optin.performance.Padding]
struct ad5766_state {
~~~~~~~^~~~~~~~~~~~~~
drivers/iio/dac/ad5766.c:112:8: note: Excessive padding in 'struct ad5766_state' (144 padding bytes, where 16 is optimal). Optimal fields order: data, spi, chip_info, gpio_reset, crt_range, dither_source, dither_scale, lock, dither_enable, dither_invert, consider reordering the fields or adding explicit padding members
struct ad5766_state {
~~~~~~~^~~~~~~~~~~~~~
Suppressed 5 warnings (5 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
5 warnings generated.
Suppressed 5 warnings (5 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
5 warnings generated.
Suppressed 5 warnings (5 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
5 warnings generated.
Suppressed 5 warnings (5 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
5 warnings generated.
Suppressed 5 warnings (5 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
5 warnings generated.
Suppressed 5 warnings (5 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
5 warnings generated.
Suppressed 5 warnings (5 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
5 warnings generated.
Suppressed 5 warnings (5 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
11 warnings generated.
>> drivers/gpu/drm/mxsfb/mxsfb_kms.c:258:8: warning: The left expression of the compound assignment is an uninitialized value. The computed value will also be garbage [clang-analyzer-core.uninitialized.Assign]
ctrl |= CTRL_INV_HS;
^
drivers/gpu/drm/mxsfb/mxsfb_kms.c:542:6: note: Assuming field 'bridge' is null
if (mxsfb->bridge) {
^~~~~~~~~~~~~
drivers/gpu/drm/mxsfb/mxsfb_kms.c:542:2: note: Taking false branch
if (mxsfb->bridge) {
^
drivers/gpu/drm/mxsfb/mxsfb_kms.c:556:7: note: 'bus_format' is 0
if (!bus_format && mxsfb->connector->display_info.num_bus_formats)
^~~~~~~~~~
drivers/gpu/drm/mxsfb/mxsfb_kms.c:556:6: note: Left side of '&&' is true
if (!bus_format && mxsfb->connector->display_info.num_bus_formats)
^
drivers/gpu/drm/mxsfb/mxsfb_kms.c:556:21: note: Assuming field 'num_bus_formats' is not equal to 0
if (!bus_format && mxsfb->connector->display_info.num_bus_formats)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/gpu/drm/mxsfb/mxsfb_kms.c:556:2: note: Taking true branch
if (!bus_format && mxsfb->connector->display_info.num_bus_formats)
^
drivers/gpu/drm/mxsfb/mxsfb_kms.c:560:6: note: Assuming 'bus_format' is 0
if (!bus_format)
^~~~~~~~~~~
drivers/gpu/drm/mxsfb/mxsfb_kms.c:560:2: note: Taking true branch
if (!bus_format)
^
drivers/gpu/drm/mxsfb/mxsfb_kms.c:567:2: note: Calling 'mxsfb_crtc_mode_set_nofb'
mxsfb_crtc_mode_set_nofb(mxsfb, bus_format);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/gpu/drm/mxsfb/mxsfb_kms.c:466:13: note: Field 'bridge' is null
if (mxsfb->bridge && mxsfb->bridge->timings)
^
drivers/gpu/drm/mxsfb/mxsfb_kms.c:466:20: note: Left side of '&&' is false
if (mxsfb->bridge && mxsfb->bridge->timings)
^
drivers/gpu/drm/mxsfb/mxsfb_kms.c:476:6: note: Assuming field 'has_regsv8' is true
if (mxsfb->devdata->has_regsv8) {
^~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/gpu/drm/mxsfb/mxsfb_kms.c:476:2: note: Taking true branch
if (mxsfb->devdata->has_regsv8) {
^
drivers/gpu/drm/mxsfb/mxsfb_kms.c:479:7: note: Assuming 'err' is 0
if (err)
^~~
drivers/gpu/drm/mxsfb/mxsfb_kms.c:479:3: note: Taking false branch
if (err)
^
drivers/gpu/drm/mxsfb/mxsfb_kms.c:484:3: note: Calling 'mxsfb_v8_set_mode'
mxsfb_v8_set_mode(mxsfb, bus_flags);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/gpu/drm/mxsfb/mxsfb_kms.c:255:2: note: 'ctrl' declared without an initial value
u32 ctrl;
^~~~~~~~
drivers/gpu/drm/mxsfb/mxsfb_kms.c:257:6: note: Assuming the condition is true
if (m->flags & DRM_MODE_FLAG_PHSYNC)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/gpu/drm/mxsfb/mxsfb_kms.c:257:2: note: Taking true branch
if (m->flags & DRM_MODE_FLAG_PHSYNC)
^
drivers/gpu/drm/mxsfb/mxsfb_kms.c:258:8: note: The left expression of the compound assignment is an uninitialized value. The computed value will also be garbage
ctrl |= CTRL_INV_HS;
~~~~ ^
drivers/gpu/drm/mxsfb/mxsfb_kms.c:260:8: warning: The left expression of the compound assignment is an uninitialized value. The computed value will also be garbage [clang-analyzer-core.uninitialized.Assign]
ctrl |= CTRL_INV_VS;
^
drivers/gpu/drm/mxsfb/mxsfb_kms.c:542:6: note: Assuming field 'bridge' is null
if (mxsfb->bridge) {
^~~~~~~~~~~~~
drivers/gpu/drm/mxsfb/mxsfb_kms.c:542:2: note: Taking false branch
if (mxsfb->bridge) {
^
drivers/gpu/drm/mxsfb/mxsfb_kms.c:556:7: note: 'bus_format' is 0
if (!bus_format && mxsfb->connector->display_info.num_bus_formats)
^~~~~~~~~~
drivers/gpu/drm/mxsfb/mxsfb_kms.c:556:6: note: Left side of '&&' is true
if (!bus_format && mxsfb->connector->display_info.num_bus_formats)
^
drivers/gpu/drm/mxsfb/mxsfb_kms.c:556:21: note: Assuming field 'num_bus_formats' is not equal to 0
if (!bus_format && mxsfb->connector->display_info.num_bus_formats)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/gpu/drm/mxsfb/mxsfb_kms.c:556:2: note: Taking true branch
if (!bus_format && mxsfb->connector->display_info.num_bus_formats)
^
drivers/gpu/drm/mxsfb/mxsfb_kms.c:560:6: note: Assuming 'bus_format' is 0
if (!bus_format)
^~~~~~~~~~~
drivers/gpu/drm/mxsfb/mxsfb_kms.c:560:2: note: Taking true branch
if (!bus_format)
^
drivers/gpu/drm/mxsfb/mxsfb_kms.c:567:2: note: Calling 'mxsfb_crtc_mode_set_nofb'
mxsfb_crtc_mode_set_nofb(mxsfb, bus_format);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/gpu/drm/mxsfb/mxsfb_kms.c:466:13: note: Field 'bridge' is null
if (mxsfb->bridge && mxsfb->bridge->timings)
^
drivers/gpu/drm/mxsfb/mxsfb_kms.c:466:20: note: Left side of '&&' is false
if (mxsfb->bridge && mxsfb->bridge->timings)
^
drivers/gpu/drm/mxsfb/mxsfb_kms.c:476:6: note: Assuming field 'has_regsv8' is true
if (mxsfb->devdata->has_regsv8) {
vim +258 drivers/gpu/drm/mxsfb/mxsfb_kms.c
56c727244a47cf Marek Vasut 2022-02-28 251
d6832d6fb879aa Marek Vasut 2022-02-28 252 static void mxsfb_v8_set_mode(struct mxsfb_drm_private *mxsfb, u32 bus_flags)
d6832d6fb879aa Marek Vasut 2022-02-28 253 {
d6832d6fb879aa Marek Vasut 2022-02-28 254 struct drm_display_mode *m = &mxsfb->crtc.state->adjusted_mode;
d6832d6fb879aa Marek Vasut 2022-02-28 255 u32 ctrl;
d6832d6fb879aa Marek Vasut 2022-02-28 256
d6832d6fb879aa Marek Vasut 2022-02-28 257 if (m->flags & DRM_MODE_FLAG_PHSYNC)
d6832d6fb879aa Marek Vasut 2022-02-28 @258 ctrl |= CTRL_INV_HS;
d6832d6fb879aa Marek Vasut 2022-02-28 259 if (m->flags & DRM_MODE_FLAG_PVSYNC)
d6832d6fb879aa Marek Vasut 2022-02-28 260 ctrl |= CTRL_INV_VS;
d6832d6fb879aa Marek Vasut 2022-02-28 261 /* Make sure Data Enable is high active by default */
d6832d6fb879aa Marek Vasut 2022-02-28 262 if (!(bus_flags & DRM_BUS_FLAG_DE_LOW))
d6832d6fb879aa Marek Vasut 2022-02-28 263 ctrl |= CTRL_INV_DE;
d6832d6fb879aa Marek Vasut 2022-02-28 264 if (bus_flags & DRM_BUS_FLAG_PIXDATA_DRIVE_NEGEDGE)
d6832d6fb879aa Marek Vasut 2022-02-28 265 ctrl |= CTRL_INV_PXCK;
d6832d6fb879aa Marek Vasut 2022-02-28 266
d6832d6fb879aa Marek Vasut 2022-02-28 267 writel(ctrl, mxsfb->base + LCDC_CTRL);
d6832d6fb879aa Marek Vasut 2022-02-28 268
d6832d6fb879aa Marek Vasut 2022-02-28 269 writel(DISP_SIZE_DELTA_Y(m->crtc_vdisplay) |
d6832d6fb879aa Marek Vasut 2022-02-28 270 DISP_SIZE_DELTA_X(m->crtc_hdisplay),
d6832d6fb879aa Marek Vasut 2022-02-28 271 mxsfb->base + LCDC_V8_DISP_SIZE);
d6832d6fb879aa Marek Vasut 2022-02-28 272
d6832d6fb879aa Marek Vasut 2022-02-28 273 writel(HSYN_PARA_BP_H(m->htotal - m->hsync_end) |
d6832d6fb879aa Marek Vasut 2022-02-28 274 HSYN_PARA_FP_H(m->hsync_start - m->hdisplay),
d6832d6fb879aa Marek Vasut 2022-02-28 275 mxsfb->base + LCDC_V8_HSYN_PARA);
d6832d6fb879aa Marek Vasut 2022-02-28 276
d6832d6fb879aa Marek Vasut 2022-02-28 277 writel(VSYN_PARA_BP_V(m->vtotal - m->vsync_end) |
d6832d6fb879aa Marek Vasut 2022-02-28 278 VSYN_PARA_FP_V(m->vsync_start - m->vdisplay),
d6832d6fb879aa Marek Vasut 2022-02-28 279 mxsfb->base + LCDC_V8_VSYN_PARA);
d6832d6fb879aa Marek Vasut 2022-02-28 280
d6832d6fb879aa Marek Vasut 2022-02-28 281 writel(VSYN_HSYN_WIDTH_PW_V(m->vsync_end - m->vsync_start) |
d6832d6fb879aa Marek Vasut 2022-02-28 282 VSYN_HSYN_WIDTH_PW_H(m->hsync_end - m->hsync_start),
d6832d6fb879aa Marek Vasut 2022-02-28 283 mxsfb->base + LCDC_V8_VSYN_HSYN_WIDTH);
d6832d6fb879aa Marek Vasut 2022-02-28 284
d6832d6fb879aa Marek Vasut 2022-02-28 285 writel(CTRLDESCL0_1_HEIGHT(m->crtc_vdisplay) |
d6832d6fb879aa Marek Vasut 2022-02-28 286 CTRLDESCL0_1_WIDTH(m->crtc_hdisplay),
d6832d6fb879aa Marek Vasut 2022-02-28 287 mxsfb->base + LCDC_V8_CTRLDESCL0_1);
d6832d6fb879aa Marek Vasut 2022-02-28 288
d6832d6fb879aa Marek Vasut 2022-02-28 289 writel(CTRLDESCL0_3_PITCH(mxsfb->crtc.primary->state->fb->pitches[0]),
d6832d6fb879aa Marek Vasut 2022-02-28 290 mxsfb->base + LCDC_V8_CTRLDESCL0_3);
d6832d6fb879aa Marek Vasut 2022-02-28 291 }
d6832d6fb879aa Marek Vasut 2022-02-28 292
---
0-DAY CI Kernel Test Service, Intel Corporation
https://lists.01.org/hyperkitty/list/kbuild-all@lists.01.org
CC: llvm(a)lists.linux.dev
CC: kbuild-all(a)lists.01.org
BCC: lkp(a)intel.com
CC: linux-kernel(a)vger.kernel.org
TO: Jason Gunthorpe <jgg(a)nvidia.com>
CC: Nicolin Chen <nicolinc(a)nvidia.com>
tree: https://github.com/jgunthorpe/linux iommufd
head: 446626304259cf3deb4a4799b42a909bea0bc070
commit: 6df3783f55eb10f5583783566fd12646ef693568 [10/12] iommufd: vfio container FD ioctl compatibility
:::::: branch date: 3 days ago
:::::: commit date: 3 days ago
config: mips-randconfig-c004-20220227 (https://download.01.org/0day-ci/archive/20220301/202203010007.dMWQzNHZ-lk...)
compiler: clang version 15.0.0 (https://github.com/llvm/llvm-project d271fc04d5b97b12e6b797c6067d3c96a8d7470e)
reproduce (this is a W=1 build):
wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross
chmod +x ~/bin/make.cross
# install mips cross compiling tool for clang build
# apt-get install binutils-mips-linux-gnu
# https://github.com/jgunthorpe/linux/commit/6df3783f55eb10f5583783566fd126...
git remote add jgunthorpe https://github.com/jgunthorpe/linux
git fetch --no-tags jgunthorpe iommufd
git checkout 6df3783f55eb10f5583783566fd12646ef693568
# save the config file to linux build tree
COMPILER_INSTALL_PATH=$HOME/0day COMPILER=clang make.cross ARCH=mips clang-analyzer
If you fix the issue, kindly add following tag as appropriate
Reported-by: kernel test robot <lkp(a)intel.com>
clang-analyzer warnings: (new ones prefixed by >>)
^
include/linux/uaccess.h:163:2: note: Returning without writing to 'to->argsz'
return res;
^
include/linux/uaccess.h:163:2: note: Returning zero (loaded from 'res'), which participates in a condition later
return res;
^~~~~~~~~~
include/linux/uaccess.h:192:7: note: Returning from '_copy_from_user'
n = _copy_from_user(to, from, n);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/uaccess.h:193:2: note: Returning without writing to 'to->argsz'
return n;
^
include/linux/uaccess.h:193:2: note: Returning zero (loaded from 'n'), which participates in a condition later
return n;
^~~~~~~~
drivers/iommu/iommufd/vfio_compat.c:139:6: note: Returning from 'copy_from_user'
if (copy_from_user(&unmap, arg, minsz))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/iommu/iommufd/vfio_compat.c:139:2: note: Taking false branch
if (copy_from_user(&unmap, arg, minsz))
^
drivers/iommu/iommufd/vfio_compat.c:142:18: note: The left operand of '<' is a garbage value
if (unmap.argsz < minsz || unmap.flags & ~supported_flags)
~~~~~~~~~~~ ^
drivers/iommu/iommufd/vfio_compat.c:313:17: warning: The left operand of '<' is a garbage value [clang-analyzer-core.UndefinedBinaryOperatorResult]
if (info.argsz < minsz)
^
drivers/iommu/iommufd/vfio_compat.c:383:2: note: Control jumps to 'case 536886128:' at line 390
switch (cmd) {
^
drivers/iommu/iommufd/vfio_compat.c:391:10: note: Calling 'iommufd_vfio_iommu_get_info'
return iommufd_vfio_iommu_get_info(ictx, uarg);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/iommu/iommufd/vfio_compat.c:310:6: note: Calling 'copy_from_user'
if (copy_from_user(&info, arg, minsz))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/uaccess.h:191:2: note: Taking true branch
if (likely(check_copy_size(to, n, false)))
^
include/linux/uaccess.h:192:7: note: Calling '_copy_from_user'
n = _copy_from_user(to, from, n);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/uaccess.h:157:7: note: Calling 'should_fail_usercopy'
if (!should_fail_usercopy() && likely(access_ok(from, n))) {
^~~~~~~~~~~~~~~~~~~~~~
include/linux/fault-inject-usercopy.h:18:49: note: Returning zero, which participates in a condition later
static inline bool should_fail_usercopy(void) { return false; }
^~~~~~~~~~~~
include/linux/uaccess.h:157:7: note: Returning from 'should_fail_usercopy'
if (!should_fail_usercopy() && likely(access_ok(from, n))) {
^~~~~~~~~~~~~~~~~~~~~~
include/linux/uaccess.h:157:6: note: Left side of '&&' is true
if (!should_fail_usercopy() && likely(access_ok(from, n))) {
^
include/linux/uaccess.h:157:2: note: Taking true branch
if (!should_fail_usercopy() && likely(access_ok(from, n))) {
^
include/linux/uaccess.h:159:9: note: Calling 'raw_copy_from_user'
res = raw_copy_from_user(to, from, n);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
arch/mips/include/asm/uaccess.h:455:2: note: Returning without writing to 'to->argsz'
return __cu_len_r;
^
include/linux/uaccess.h:159:9: note: Returning from 'raw_copy_from_user'
res = raw_copy_from_user(to, from, n);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/uaccess.h:161:6: note: Assuming 'res' is 0, which participates in a condition later
if (unlikely(res))
^
include/linux/compiler.h:78:40: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^~~~
include/linux/uaccess.h:161:2: note: Taking false branch
if (unlikely(res))
^
include/linux/uaccess.h:163:2: note: Returning without writing to 'to->argsz'
return res;
^
include/linux/uaccess.h:163:2: note: Returning zero (loaded from 'res'), which participates in a condition later
return res;
^~~~~~~~~~
include/linux/uaccess.h:192:7: note: Returning from '_copy_from_user'
n = _copy_from_user(to, from, n);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/uaccess.h:193:2: note: Returning without writing to 'to->argsz'
return n;
^
include/linux/uaccess.h:193:2: note: Returning zero (loaded from 'n'), which participates in a condition later
return n;
^~~~~~~~
drivers/iommu/iommufd/vfio_compat.c:310:6: note: Returning from 'copy_from_user'
if (copy_from_user(&info, arg, minsz))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/iommu/iommufd/vfio_compat.c:310:2: note: Taking false branch
if (copy_from_user(&info, arg, minsz))
^
drivers/iommu/iommufd/vfio_compat.c:313:17: note: The left operand of '<' is a garbage value
if (info.argsz < minsz)
~~~~~~~~~~ ^
>> drivers/iommu/iommufd/vfio_compat.c:358:3: warning: Value stored to 'rc' is never read [clang-analyzer-deadcode.DeadStores]
rc = -EFAULT;
^ ~~~~~~~
drivers/iommu/iommufd/vfio_compat.c:358:3: note: Value stored to 'rc' is never read
rc = -EFAULT;
^ ~~~~~~~
Suppressed 5 warnings (5 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
6 warnings generated.
Suppressed 6 warnings (6 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
5 warnings generated.
Suppressed 5 warnings (5 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
5 warnings generated.
Suppressed 5 warnings (5 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
5 warnings generated.
Suppressed 5 warnings (5 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
5 warnings generated.
Suppressed 5 warnings (5 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
5 warnings generated.
Suppressed 5 warnings (5 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
5 warnings generated.
Suppressed 5 warnings (5 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
5 warnings generated.
Suppressed 5 warnings (5 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
5 warnings generated.
Suppressed 5 warnings (5 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
5 warnings generated.
Suppressed 5 warnings (5 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
5 warnings generated.
Suppressed 5 warnings (5 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
5 warnings generated.
Suppressed 5 warnings (5 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
5 warnings generated.
Suppressed 5 warnings (5 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
5 warnings generated.
Suppressed 5 warnings (5 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
5 warnings generated.
Suppressed 5 warnings (5 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
5 warnings generated.
Suppressed 5 warnings (5 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
5 warnings generated.
Suppressed 5 warnings (5 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
5 warnings generated.
Suppressed 5 warnings (5 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
5 warnings generated.
Suppressed 5 warnings (5 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
5 warnings generated.
Suppressed 5 warnings (5 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
4 warnings generated.
Suppressed 4 warnings (4 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
4 warnings generated.
Suppressed 4 warnings (4 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
4 warnings generated.
Suppressed 4 warnings (4 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
5 warnings generated.
Suppressed 5 warnings (5 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
5 warnings generated.
Suppressed 5 warnings (5 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
5 warnings generated.
Suppressed 5 warnings (5 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
5 warnings generated.
Suppressed 5 warnings (5 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
5 warnings generated.
Suppressed 5 warnings (5 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
5 warnings generated.
Suppressed 5 warnings (5 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
5 warnings generated.
Suppressed 5 warnings (5 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
5 warnings generated.
Suppressed 5 warnings (5 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
vim +/rc +358 drivers/iommu/iommufd/vfio_compat.c
6df3783f55eb10 Jason Gunthorpe 2021-12-15 291
6df3783f55eb10 Jason Gunthorpe 2021-12-15 292 static int iommufd_vfio_iommu_get_info(struct iommufd_ctx *ictx,
6df3783f55eb10 Jason Gunthorpe 2021-12-15 293 void __user *arg)
6df3783f55eb10 Jason Gunthorpe 2021-12-15 294 {
6df3783f55eb10 Jason Gunthorpe 2021-12-15 295 typedef int (*fill_cap_fn)(struct iommufd_ioas *ioas,
6df3783f55eb10 Jason Gunthorpe 2021-12-15 296 struct vfio_info_cap_header __user *cur,
6df3783f55eb10 Jason Gunthorpe 2021-12-15 297 size_t avail);
6df3783f55eb10 Jason Gunthorpe 2021-12-15 298 static const fill_cap_fn fill_fns[] = {
6df3783f55eb10 Jason Gunthorpe 2021-12-15 299 iommufd_fill_cap_iova,
6df3783f55eb10 Jason Gunthorpe 2021-12-15 300 iommufd_fill_cap_dma_avail,
6df3783f55eb10 Jason Gunthorpe 2021-12-15 301 };
6df3783f55eb10 Jason Gunthorpe 2021-12-15 302 size_t minsz = offsetofend(struct vfio_iommu_type1_info, iova_pgsizes);
6df3783f55eb10 Jason Gunthorpe 2021-12-15 303 struct vfio_info_cap_header __user *last_cap = NULL;
6df3783f55eb10 Jason Gunthorpe 2021-12-15 304 struct vfio_iommu_type1_info info;
6df3783f55eb10 Jason Gunthorpe 2021-12-15 305 struct iommufd_ioas *ioas;
6df3783f55eb10 Jason Gunthorpe 2021-12-15 306 size_t total_cap_size;
6df3783f55eb10 Jason Gunthorpe 2021-12-15 307 int rc;
6df3783f55eb10 Jason Gunthorpe 2021-12-15 308 int i;
6df3783f55eb10 Jason Gunthorpe 2021-12-15 309
6df3783f55eb10 Jason Gunthorpe 2021-12-15 310 if (copy_from_user(&info, arg, minsz))
6df3783f55eb10 Jason Gunthorpe 2021-12-15 311 return -EFAULT;
6df3783f55eb10 Jason Gunthorpe 2021-12-15 312
6df3783f55eb10 Jason Gunthorpe 2021-12-15 313 if (info.argsz < minsz)
6df3783f55eb10 Jason Gunthorpe 2021-12-15 314 return -EINVAL;
6df3783f55eb10 Jason Gunthorpe 2021-12-15 315 minsz = min_t(size_t, info.argsz, sizeof(info));
6df3783f55eb10 Jason Gunthorpe 2021-12-15 316
6df3783f55eb10 Jason Gunthorpe 2021-12-15 317 ioas = get_compat_ioas(ictx);
6df3783f55eb10 Jason Gunthorpe 2021-12-15 318 if (IS_ERR(ioas))
6df3783f55eb10 Jason Gunthorpe 2021-12-15 319 return PTR_ERR(ioas);
6df3783f55eb10 Jason Gunthorpe 2021-12-15 320
6df3783f55eb10 Jason Gunthorpe 2021-12-15 321 down_read(&ioas->iopt.iova_rwsem);
6df3783f55eb10 Jason Gunthorpe 2021-12-15 322 info.flags = VFIO_IOMMU_INFO_PGSIZES;
6df3783f55eb10 Jason Gunthorpe 2021-12-15 323 info.iova_pgsizes = iommufd_get_pagesizes(ioas);
6df3783f55eb10 Jason Gunthorpe 2021-12-15 324 info.cap_offset = 0;
6df3783f55eb10 Jason Gunthorpe 2021-12-15 325
6df3783f55eb10 Jason Gunthorpe 2021-12-15 326 total_cap_size = sizeof(info);
6df3783f55eb10 Jason Gunthorpe 2021-12-15 327 for (i = 0; i != ARRAY_SIZE(fill_fns); i++) {
6df3783f55eb10 Jason Gunthorpe 2021-12-15 328 int cap_size;
6df3783f55eb10 Jason Gunthorpe 2021-12-15 329
6df3783f55eb10 Jason Gunthorpe 2021-12-15 330 if (info.argsz > total_cap_size)
6df3783f55eb10 Jason Gunthorpe 2021-12-15 331 cap_size = fill_fns[i](ioas, arg + total_cap_size,
6df3783f55eb10 Jason Gunthorpe 2021-12-15 332 info.argsz - total_cap_size);
6df3783f55eb10 Jason Gunthorpe 2021-12-15 333 else
6df3783f55eb10 Jason Gunthorpe 2021-12-15 334 cap_size = fill_fns[i](ioas, NULL, 0);
6df3783f55eb10 Jason Gunthorpe 2021-12-15 335 if (cap_size < 0) {
6df3783f55eb10 Jason Gunthorpe 2021-12-15 336 rc = cap_size;
6df3783f55eb10 Jason Gunthorpe 2021-12-15 337 goto out_put;
6df3783f55eb10 Jason Gunthorpe 2021-12-15 338 }
6df3783f55eb10 Jason Gunthorpe 2021-12-15 339 if (last_cap && info.argsz >= total_cap_size &&
6df3783f55eb10 Jason Gunthorpe 2021-12-15 340 put_user(total_cap_size, &last_cap->next)) {
6df3783f55eb10 Jason Gunthorpe 2021-12-15 341 rc = -EFAULT;
6df3783f55eb10 Jason Gunthorpe 2021-12-15 342 goto out_put;
6df3783f55eb10 Jason Gunthorpe 2021-12-15 343 }
6df3783f55eb10 Jason Gunthorpe 2021-12-15 344 last_cap = arg + total_cap_size;
6df3783f55eb10 Jason Gunthorpe 2021-12-15 345 total_cap_size += cap_size;
6df3783f55eb10 Jason Gunthorpe 2021-12-15 346 }
6df3783f55eb10 Jason Gunthorpe 2021-12-15 347
6df3783f55eb10 Jason Gunthorpe 2021-12-15 348 /*
6df3783f55eb10 Jason Gunthorpe 2021-12-15 349 * If the user did not provide enough space then only some caps are
6df3783f55eb10 Jason Gunthorpe 2021-12-15 350 * returned and the argsz will be updated to the correct amount to get
6df3783f55eb10 Jason Gunthorpe 2021-12-15 351 * all caps.
6df3783f55eb10 Jason Gunthorpe 2021-12-15 352 */
6df3783f55eb10 Jason Gunthorpe 2021-12-15 353 if (info.argsz >= total_cap_size)
6df3783f55eb10 Jason Gunthorpe 2021-12-15 354 info.cap_offset = sizeof(info);
6df3783f55eb10 Jason Gunthorpe 2021-12-15 355 info.argsz = total_cap_size;
6df3783f55eb10 Jason Gunthorpe 2021-12-15 356 info.flags |= VFIO_IOMMU_INFO_CAPS;
6df3783f55eb10 Jason Gunthorpe 2021-12-15 357 if (copy_to_user(arg, &info, minsz))
6df3783f55eb10 Jason Gunthorpe 2021-12-15 @358 rc = -EFAULT;
6df3783f55eb10 Jason Gunthorpe 2021-12-15 359 rc = 0;
6df3783f55eb10 Jason Gunthorpe 2021-12-15 360
6df3783f55eb10 Jason Gunthorpe 2021-12-15 361 out_put:
6df3783f55eb10 Jason Gunthorpe 2021-12-15 362 up_read(&ioas->iopt.iova_rwsem);
6df3783f55eb10 Jason Gunthorpe 2021-12-15 363 iommufd_put_object(&ioas->obj);
6df3783f55eb10 Jason Gunthorpe 2021-12-15 364 return rc;
6df3783f55eb10 Jason Gunthorpe 2021-12-15 365 }
6df3783f55eb10 Jason Gunthorpe 2021-12-15 366
---
0-DAY CI Kernel Test Service, Intel Corporation
https://lists.01.org/hyperkitty/list/kbuild-all@lists.01.org
CC: llvm(a)lists.linux.dev
CC: kbuild-all(a)lists.01.org
BCC: lkp(a)intel.com
In-Reply-To: <20220227215408.3180023-1-arnd(a)kernel.org>
References: <20220227215408.3180023-1-arnd(a)kernel.org>
TO: Arnd Bergmann <arnd(a)kernel.org>
TO: linux-kbuild(a)vger.kernel.org
CC: Arnd Bergmann <arnd(a)arndb.de>
CC: Masahiro Yamada <masahiroy(a)kernel.org>
CC: llvm(a)lists.linux.dev
CC: Jonathan Corbet <corbet(a)lwn.net>
CC: Federico Vaga <federico.vaga(a)vaga.pv.it>
CC: Alex Shi <alexs(a)kernel.org>
CC: Hu Haowen <src.res(a)email.cn>
CC: Michal Marek <michal.lkml(a)markovi.net>
CC: Nick Desaulniers <ndesaulniers(a)google.com>
CC: linux-doc(a)vger.kernel.org
CC: linux-kernel(a)vger.kernel.org
CC: linux-doc-tw-discuss(a)lists.sourceforge.net
CC: linux-arm-kernel(a)lists.infradead.org
CC: intel-gfx(a)lists.freedesktop.org
CC: dri-devel(a)lists.freedesktop.org
CC: greybus-dev(a)lists.linaro.org
CC: linux-staging(a)lists.linux.dev
CC: linux-btrfs(a)vger.kernel.org
Hi Arnd,
I love your patch! Perhaps something to improve:
[auto build test WARNING on arm64/for-next/core]
[also build test WARNING on drm-intel/for-linux-next staging/staging-testing kdave/for-next soc/for-next linus/master v5.17-rc6]
[cannot apply to masahiroy-kbuild/for-next srcres258-doc/doc-zh-tw next-20220225]
[If your patch is applied to the wrong git tree, kindly drop us a note.
And when submitting patch, we suggest to use '--base' as documented in
https://git-scm.com/docs/git-format-patch]
url: https://github.com/0day-ci/linux/commits/Arnd-Bergmann/Kbuild-remove-std-...
base: https://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-next/core
:::::: branch date: 17 hours ago
:::::: commit date: 17 hours ago
config: riscv-randconfig-c006-20220227 (https://download.01.org/0day-ci/archive/20220228/202202282249.aKeM5wOk-lk...)
compiler: clang version 15.0.0 (https://github.com/llvm/llvm-project d271fc04d5b97b12e6b797c6067d3c96a8d7470e)
reproduce (this is a W=1 build):
wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross
chmod +x ~/bin/make.cross
# install riscv cross compiling tool for clang build
# apt-get install binutils-riscv64-linux-gnu
# https://github.com/0day-ci/linux/commit/c34e5f15d634547ada0607723cd7242fb...
git remote add linux-review https://github.com/0day-ci/linux
git fetch --no-tags linux-review Arnd-Bergmann/Kbuild-remove-std-gnu89-from-compiler-arguments/20220228-055556
git checkout c34e5f15d634547ada0607723cd7242fb8e527d5
# save the config file to linux build tree
COMPILER_INSTALL_PATH=$HOME/0day COMPILER=clang make.cross ARCH=riscv clang-analyzer
If you fix the issue, kindly add following tag as appropriate
Reported-by: kernel test robot <lkp(a)intel.com>
clang-analyzer warnings: (new ones prefixed by >>)
include/linux/blkdev.h:500:3: note: Returning without writing to 'q->limits.zoned', which participates in a condition later
return true;
^
include/linux/blkdev.h:508:9: note: Returning from 'blk_queue_is_zoned'
return blk_queue_is_zoned(q) ? q->limits.chunk_sectors : 0;
^~~~~~~~~~~~~~~~~~~~~
include/linux/blkdev.h:508:9: note: '?' condition is true
include/linux/blkdev.h:508:2: note: Returning without writing to 'q->limits.zoned', which participates in a condition later
return blk_queue_is_zoned(q) ? q->limits.chunk_sectors : 0;
^
block/blk-zoned.c:195:26: note: Returning from 'blk_queue_zone_sectors'
sector_t zone_sectors = blk_queue_zone_sectors(q);
^~~~~~~~~~~~~~~~~~~~~~~~~
block/blk-zoned.c:202:6: note: Assuming 'need_reset' is non-null
if (!need_reset)
^~~~~~~~~~~
block/blk-zoned.c:202:2: note: Taking false branch
if (!need_reset)
^
block/blk-zoned.c:208:6: note: Assuming 'ret' is >= 0
if (ret < 0)
^~~~~~~
block/blk-zoned.c:208:2: note: Taking false branch
if (ret < 0)
^
block/blk-zoned.c:212:9: note: 'sector' is < 'capacity'
while (sector < capacity) {
^~~~~~
block/blk-zoned.c:212:2: note: Loop condition is true. Entering loop body
while (sector < capacity) {
^
block/blk-zoned.c:213:17: note: Calling 'blk_queue_zone_no'
if (!test_bit(blk_queue_zone_no(q, sector), need_reset)) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/blkdev.h:520:7: note: Calling 'blk_queue_is_zoned'
if (!blk_queue_is_zoned(q))
^~~~~~~~~~~~~~~~~~~~~
include/linux/blkdev.h:497:10: note: Calling 'blk_queue_zoned_model'
switch (blk_queue_zoned_model(q)) {
^~~~~~~~~~~~~~~~~~~~~~~~
include/linux/blkdev.h:490:2: note: Taking true branch
if (IS_ENABLED(CONFIG_BLK_DEV_ZONED))
^
include/linux/blkdev.h:491:3: note: Returning without writing to 'q->limits.zoned', which participates in a condition later
return q->limits.zoned;
^
include/linux/blkdev.h:491:3: note: Returning the value 2, which participates in a condition later
return q->limits.zoned;
^~~~~~~~~~~~~~~~~~~~~~
include/linux/blkdev.h:497:10: note: Returning from 'blk_queue_zoned_model'
switch (blk_queue_zoned_model(q)) {
^~~~~~~~~~~~~~~~~~~~~~~~
include/linux/blkdev.h:497:2: note: Control jumps to 'case BLK_ZONED_HM:' at line 499
switch (blk_queue_zoned_model(q)) {
^
include/linux/blkdev.h:500:3: note: Returning the value 1, which participates in a condition later
return true;
^~~~~~~~~~~
include/linux/blkdev.h:520:7: note: Returning from 'blk_queue_is_zoned'
if (!blk_queue_is_zoned(q))
^~~~~~~~~~~~~~~~~~~~~
include/linux/blkdev.h:520:2: note: Taking false branch
if (!blk_queue_is_zoned(q))
^
include/linux/blkdev.h:522:19: note: '?' condition is false
return sector >> ilog2(q->limits.chunk_sectors);
^
include/linux/log2.h:158:2: note: expanded from macro 'ilog2'
__builtin_constant_p(n) ? \
^
include/linux/blkdev.h:522:19: note: '?' condition is true
return sector >> ilog2(q->limits.chunk_sectors);
^
include/linux/log2.h:161:2: note: expanded from macro 'ilog2'
(sizeof(n) <= 4) ? \
^
include/linux/blkdev.h:522:19: note: Calling '__ilog2_u32'
return sector >> ilog2(q->limits.chunk_sectors);
^
include/linux/log2.h:162:2: note: expanded from macro 'ilog2'
__ilog2_u32(n) : \
^~~~~~~~~~~~~~
include/linux/log2.h:24:2: note: Returning the value -1
return fls(n) - 1;
^~~~~~~~~~~~~~~~~
include/linux/blkdev.h:522:19: note: Returning from '__ilog2_u32'
return sector >> ilog2(q->limits.chunk_sectors);
^
include/linux/log2.h:162:2: note: expanded from macro 'ilog2'
__ilog2_u32(n) : \
^~~~~~~~~~~~~~
include/linux/blkdev.h:522:16: note: The result of the right shift is undefined because the right operand is negative
return sector >> ilog2(q->limits.chunk_sectors);
^
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
20 warnings generated.
>> fs/pstore/platform.c:360:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(psinfo->buf, big_oops_buf, hsize);
^~~~~~
fs/pstore/platform.c:360:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(psinfo->buf, big_oops_buf, hsize);
^~~~~~
fs/pstore/platform.c:361:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(psinfo->buf + hsize, big_oops_buf + diff,
^~~~~~
fs/pstore/platform.c:361:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(psinfo->buf + hsize, big_oops_buf + diff,
^~~~~~
fs/pstore/platform.c:365:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(psinfo->buf, big_oops_buf, total_len);
^~~~~~
fs/pstore/platform.c:365:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(psinfo->buf, big_oops_buf, total_len);
^~~~~~
>> fs/pstore/platform.c:373:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(record, 0, sizeof(*record));
^~~~~~
fs/pstore/platform.c:373:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(record, 0, sizeof(*record));
^~~~~~
>> fs/pstore/platform.c:436:17: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
header_size = snprintf(dst, dst_size, "%s#%d Part%u\n", why,
^~~~~~~~
fs/pstore/platform.c:436:17: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
header_size = snprintf(dst, dst_size, "%s#%d Part%u\n", why,
^~~~~~~~
fs/pstore/platform.c:709:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(workspace + unzipped_len, record->buf + record->size,
^~~~~~
fs/pstore/platform.c:709:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(workspace + unzipped_len, record->buf + record->size,
^~~~~~
Suppressed 14 warnings (14 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
crypto/crypto_null.c:32:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dst, src, slen);
^~~~~~
crypto/crypto_null.c:32:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dst, src, slen);
^~~~~~
crypto/crypto_null.c:73:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dst, src, NULL_BLOCK_SIZE);
^~~~~~
crypto/crypto_null.c:73:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dst, src, NULL_BLOCK_SIZE);
^~~~~~
crypto/crypto_null.c:85:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(walk.dst.virt.addr, walk.src.virt.addr,
^~~~~~
crypto/crypto_null.c:85:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(walk.dst.virt.addr, walk.src.virt.addr,
^~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
20 warnings generated.
crypto/md4.c:160:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy((char *)mctx->block + (sizeof(mctx->block) - avail),
^~~~~~
crypto/md4.c:160:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy((char *)mctx->block + (sizeof(mctx->block) - avail),
^~~~~~
crypto/md4.c:165:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy((char *)mctx->block + (sizeof(mctx->block) - avail),
^~~~~~
crypto/md4.c:165:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy((char *)mctx->block + (sizeof(mctx->block) - avail),
^~~~~~
crypto/md4.c:173:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(mctx->block, data, sizeof(mctx->block));
^~~~~~
crypto/md4.c:173:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(mctx->block, data, sizeof(mctx->block));
^~~~~~
crypto/md4.c:179:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(mctx->block, data, len);
^~~~~~
crypto/md4.c:179:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(mctx->block, data, len);
^~~~~~
crypto/md4.c:193:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(p, 0x00, padding + sizeof (u64));
^~~~~~
crypto/md4.c:193:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(p, 0x00, padding + sizeof (u64));
^~~~~~
crypto/md4.c:199:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(p, 0, padding);
^~~~~~
crypto/md4.c:199:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(p, 0, padding);
^~~~~~
crypto/md4.c:206:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(out, mctx->hash, sizeof(mctx->hash));
^~~~~~
crypto/md4.c:206:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(out, mctx->hash, sizeof(mctx->hash));
^~~~~~
crypto/md4.c:207:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(mctx, 0, sizeof(*mctx));
^~~~~~
crypto/md4.c:207:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(mctx, 0, sizeof(*mctx));
^~~~~~
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
29 warnings generated.
kernel/futex/waitwake.c:218:17: warning: The left operand of '==' is a garbage value [clang-analyzer-core.UndefinedBinaryOperatorResult]
return oldval == cmparg;
^
kernel/futex/waitwake.c:249:15: note: Assuming 'ret' is equal to 0
if (unlikely(ret != 0))
^
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
kernel/futex/waitwake.c:249:2: note: Taking false branch
if (unlikely(ret != 0))
^
kernel/futex/waitwake.c:252:15: note: Assuming 'ret' is equal to 0
if (unlikely(ret != 0))
--
^
include/linux/bitops.h:155:10: note: Calling 'fls'
return fls(l);
^~~~~~
include/asm-generic/bitops/fls.h:15:2: note: 'r' initialized to 32
int r = 32;
^~~~~
include/asm-generic/bitops/fls.h:17:6: note: Assuming 'x' is not equal to 0, which participates in a condition later
if (!x)
^~
include/asm-generic/bitops/fls.h:17:2: note: Taking false branch
if (!x)
^
include/asm-generic/bitops/fls.h:19:6: note: Assuming the condition is false
if (!(x & 0xffff0000u)) {
^~~~~~~~~~~~~~~~~~
include/asm-generic/bitops/fls.h:19:2: note: Taking false branch
if (!(x & 0xffff0000u)) {
^
include/asm-generic/bitops/fls.h:23:6: note: Assuming the condition is false
if (!(x & 0xff000000u)) {
^~~~~~~~~~~~~~~~~~
include/asm-generic/bitops/fls.h:23:2: note: Taking false branch
if (!(x & 0xff000000u)) {
^
include/asm-generic/bitops/fls.h:27:6: note: Assuming the condition is false
if (!(x & 0xf0000000u)) {
^~~~~~~~~~~~~~~~~~
include/asm-generic/bitops/fls.h:27:2: note: Taking false branch
if (!(x & 0xf0000000u)) {
^
include/asm-generic/bitops/fls.h:31:6: note: Assuming the condition is false
if (!(x & 0xc0000000u)) {
^~~~~~~~~~~~~~~~~~
include/asm-generic/bitops/fls.h:31:2: note: Taking false branch
if (!(x & 0xc0000000u)) {
^
include/asm-generic/bitops/fls.h:35:6: note: Assuming the condition is false
if (!(x & 0x80000000u)) {
^~~~~~~~~~~~~~~~~~
include/asm-generic/bitops/fls.h:35:2: note: Taking false branch
if (!(x & 0x80000000u)) {
^
include/asm-generic/bitops/fls.h:39:2: note: Returning the value 32 (loaded from 'r'), which participates in a condition later
return r;
^~~~~~~~
include/asm-generic/bitops/fls.h:39:2: note: Returning the value 32 (loaded from 'r')
return r;
^~~~~~~~
include/linux/bitops.h:155:10: note: Returning from 'fls'
return fls(l);
^~~~~~
include/linux/bitops.h:155:3: note: Returning the value 32, which participates in a condition later
return fls(l);
^~~~~~~~~~~~~
include/linux/bitops.h:155:3: note: Returning the value 32
return fls(l);
^~~~~~~~~~~~~
arch/riscv/mm/context.c:225:14: note: Returning from 'fls_long'
asid_bits = fls_long(asid_bits);
^~~~~~~~~~~~~~~~~~~
arch/riscv/mm/context.c:225:2: note: The value 32 is assigned to 'asid_bits'
asid_bits = fls_long(asid_bits);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
arch/riscv/mm/context.c:236:6: note: 'asid_bits' is 32
if (asid_bits) {
^~~~~~~~~
arch/riscv/mm/context.c:236:2: note: Taking true branch
if (asid_bits) {
^
arch/riscv/mm/context.c:237:17: note: The result of the left shift is undefined due to shifting by '32', which is greater or equal to the width of type 'int'
num_asids = 1 << asid_bits;
^ ~~~~~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
53 warnings generated.
>> lib/test_printf.c:49:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(alloced_buffer, FILL_CHAR, BUF_SIZE + 2*PAD_SIZE);
^~~~~~
lib/test_printf.c:49:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(alloced_buffer, FILL_CHAR, BUF_SIZE + 2*PAD_SIZE);
^~~~~~
>> lib/test_printf.c:51:8: warning: Call to function 'vsnprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'vsnprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = vsnprintf(test_buffer, bufsize, fmt, aq);
^~~~~~~~~
lib/test_printf.c:51:8: note: Call to function 'vsnprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'vsnprintf_s' in case of C11
ret = vsnprintf(test_buffer, bufsize, fmt, aq);
^~~~~~~~~
>> lib/test_printf.c:267:11: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
nchars = snprintf(buf, len, "%p", p);
^~~~~~~~
lib/test_printf.c:267:11: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
nchars = snprintf(buf, len, "%p", p);
^~~~~~~~
lib/test_printf.c:639:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(cmp_buf + size, BUF_SIZE - size, ")");
^~~~~~~~
lib/test_printf.c:639:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(cmp_buf + size, BUF_SIZE - size, ")");
^~~~~~~~
lib/test_printf.c:681:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(cmp_buffer, BUF_SIZE, "%#lx", (unsigned long) gfp);
^~~~~~~~
lib/test_printf.c:681:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(cmp_buffer, BUF_SIZE, "%#lx", (unsigned long) gfp);
^~~~~~~~
lib/test_printf.c:684:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(cmp_buffer, BUF_SIZE, "__GFP_ATOMIC|%#lx",
^~~~~~~~
lib/test_printf.c:684:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(cmp_buffer, BUF_SIZE, "__GFP_ATOMIC|%#lx",
^~~~~~~~
Suppressed 47 warnings (34 in non-user code, 13 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
56 warnings generated.
fs/pipe.c:490:24: warning: Value stored to 'buf' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct pipe_buffer *buf = &pipe->bufs[head & mask];
^~~ ~~~~~~~~~~~~~~~~~~~~~~~~
fs/pipe.c:490:24: note: Value stored to 'buf' during its initialization is never read
struct pipe_buffer *buf = &pipe->bufs[head & mask];
^~~ ~~~~~~~~~~~~~~~~~~~~~~~~
fs/pipe.c:1277:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(bufs, pipe->bufs + t,
^~~~~~
fs/pipe.c:1277:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(bufs, pipe->bufs + t,
^~~~~~
fs/pipe.c:1282:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(bufs + tsize, pipe->bufs,
^~~~~~
fs/pipe.c:1282:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(bufs + tsize, pipe->bufs,
^~~~~~
fs/pipe.c:1284:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(bufs, pipe->bufs + t,
^~~~~~
fs/pipe.c:1284:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(bufs, pipe->bufs + t,
^~~~~~
include/linux/log2.h:57:13: warning: The result of the left shift is undefined due to shifting by '32', which is greater or equal to the width of type 'unsigned long' [clang-analyzer-core.UndefinedBinaryOperatorResult]
return 1UL << fls_long(n - 1);
^
fs/pipe.c:1383:7: note: 'pipe' is non-null
if (!pipe)
^~~~
fs/pipe.c:1383:2: note: Taking false branch
if (!pipe)
^
fs/pipe.c:1388:2: note: Control jumps to 'case 1031:' at line 1389
switch (cmd) {
^
fs/pipe.c:1390:9: note: Calling 'pipe_set_size'
ret = pipe_set_size(pipe, arg);
^~~~~~~~~~~~~~~~~~~~~~~~
fs/pipe.c:1320:9: note: Calling 'round_pipe_size'
size = round_pipe_size(arg);
^~~~~~~~~~~~~~~~~~~~
fs/pipe.c:1233:6: note: Assuming the condition is false
if (size > (1U << 31))
^~~~~~~~~~~~~~~~~
fs/pipe.c:1233:2: note: Taking false branch
if (size > (1U << 31))
^
fs/pipe.c:1237:6: note: Assuming the condition is false
if (size < PAGE_SIZE)
^~~~~~~~~~~~~~~~
fs/pipe.c:1237:2: note: Taking false branch
if (size < PAGE_SIZE)
^
fs/pipe.c:1240:9: note: '?' condition is false
return roundup_pow_of_two(size);
^
include/linux/log2.h:176:2: note: expanded from macro 'roundup_pow_of_two'
__builtin_constant_p(n) ? ( \
^
fs/pipe.c:1240:9: note: Calling '__roundup_pow_of_two'
return roundup_pow_of_two(size);
^
include/linux/log2.h:180:2: note: expanded from macro 'roundup_pow_of_two'
__roundup_pow_of_two(n) \
^~~~~~~~~~~~~~~~~~~~~~~
include/linux/log2.h:57:16: note: Calling 'fls_long'
return 1UL << fls_long(n - 1);
^~~~~~~~~~~~~~~
include/linux/bitops.h:154:2: note: Taking true branch
if (sizeof(l) == 4)
^
include/linux/bitops.h:155:10: note: Calling 'fls'
return fls(l);
--
^
include/asm-generic/bitops/fls.h:39:2: note: Returning the value 32 (loaded from 'r')
return r;
^~~~~~~~
include/linux/bitops.h:155:10: note: Returning from 'fls'
return fls(l);
^~~~~~
include/linux/bitops.h:155:3: note: Returning the value 32
return fls(l);
^~~~~~~~~~~~~
include/linux/log2.h:57:16: note: Returning from 'fls_long'
return 1UL << fls_long(n - 1);
^~~~~~~~~~~~~~~
include/linux/log2.h:57:13: note: The result of the left shift is undefined due to shifting by '32', which is greater or equal to the width of type 'unsigned long'
return 1UL << fls_long(n - 1);
^ ~~~~~~~~~~~~~~~
Suppressed 51 warnings (46 in non-user code, 5 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
crypto/drbg.c:246:17: warning: Value stored to 'entropylen' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
unsigned short entropylen = drbg_sec_strength(drbg->core->flags);
^~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
crypto/drbg.c:246:17: note: Value stored to 'entropylen' during its initialization is never read
unsigned short entropylen = drbg_sec_strength(drbg->core->flags);
^~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
crypto/drbg.c:261:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(drbg->prev, entropy, entropylen);
^~~~~~
crypto/drbg.c:261:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(drbg->prev, entropy, entropylen);
^~~~~~
crypto/drbg.c:269:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(drbg->prev, entropy, entropylen);
^~~~~~
crypto/drbg.c:269:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(drbg->prev, entropy, entropylen);
^~~~~~
crypto/drbg.c:666:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(drbg->V, 1, drbg_statelen(drbg));
^~~~~~
crypto/drbg.c:666:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(drbg->V, 1, drbg_statelen(drbg));
^~~~~~
crypto/drbg.c:736:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf + len, drbg->V, outlen);
^~~~~~
crypto/drbg.c:736:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf + len, drbg->V, outlen);
^~~~~~
crypto/drbg.c:1200:4: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret = crypto_rng_get_bytes(drbg->jent,
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
crypto/drbg.c:1200:4: note: Value stored to 'ret' is never read
ret = crypto_rng_get_bytes(drbg->jent,
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
crypto/drbg.c:1242:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(drbg->V, 0, drbg_statelen(drbg));
^~~~~~
crypto/drbg.c:1242:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(drbg->V, 0, drbg_statelen(drbg));
^~~~~~
crypto/drbg.c:1243:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(drbg->C, 0, drbg_statelen(drbg));
^~~~~~
crypto/drbg.c:1243:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(drbg->C, 0, drbg_statelen(drbg));
^~~~~~
crypto/drbg.c:2081:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(alg->base.cra_name, "stdrng", 6);
^~~~~~
crypto/drbg.c:2081:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(alg->base.cra_name, "stdrng", 6);
^~~~~~
crypto/drbg.c:2083:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(alg->base.cra_driver_name, "drbg_pr_", 8);
^~~~~~
crypto/drbg.c:2083:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(alg->base.cra_driver_name, "drbg_pr_", 8);
^~~~~~
crypto/drbg.c:2086:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(alg->base.cra_driver_name, "drbg_nopr_", 10);
^~~~~~
crypto/drbg.c:2086:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(alg->base.cra_driver_name, "drbg_nopr_", 10);
^~~~~~
crypto/drbg.c:2089:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(alg->base.cra_driver_name + pos, core->cra_name,
^~~~~~
crypto/drbg.c:2089:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(alg->base.cra_driver_name + pos, core->cra_name,
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
49 warnings generated.
Suppressed 49 warnings (49 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
49 warnings generated.
Suppressed 49 warnings (49 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
51 warnings generated.
>> block/partitions/sysv68.c:77:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(tmp, sizeof(tmp), "sysV68: %s(s%u)", state->name, slices);
^~~~~~~~
block/partitions/sysv68.c:77:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(tmp, sizeof(tmp), "sysV68: %s(s%u)", state->name, slices);
^~~~~~~~
block/partitions/sysv68.c:87:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(tmp, sizeof(tmp), "(s%u)", i);
^~~~~~~~
block/partitions/sysv68.c:87:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(tmp, sizeof(tmp), "(s%u)", i);
^~~~~~~~
Suppressed 49 warnings (49 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
53 warnings generated.
block/disk-events.c:347:11: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
pos += sprintf(buf + pos, "%s%s",
^~~~~~~
block/disk-events.c:347:11: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
pos += sprintf(buf + pos, "%s%s",
^~~~~~~
block/disk-events.c:352:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
pos += sprintf(buf + pos, "\n");
^~~~~~~
block/disk-events.c:352:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
pos += sprintf(buf + pos, "\n");
^~~~~~~
block/disk-events.c:379:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "-1\n");
^~~~~~~
block/disk-events.c:379:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "-1\n");
^~~~~~~
block/disk-events.c:380:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%ld\n", disk->ev->poll_msecs);
^~~~~~~
block/disk-events.c:380:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%ld\n", disk->ev->poll_msecs);
^~~~~~~
block/disk-events.c:390:17: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (!count || !sscanf(buf, "%ld", &intv))
^~~~~~
block/disk-events.c:390:17: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (!count || !sscanf(buf, "%ld", &intv))
^~~~~~
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
include/linux/log2.h:57:13: warning: The result of the left shift is undefined due to shifting by '32', which is greater or equal to the width of type 'unsigned long' [clang-analyzer-core.UndefinedBinaryOperatorResult]
return 1UL << fls_long(n - 1);
^
mm/readahead.c:587:6: note: Assuming field 'ra_pages' is not equal to 0
if (!ractl->ra->ra_pages)
^~~~~~~~~~~~~~~~~~~~
mm/readahead.c:587:2: note: Taking false branch
if (!ractl->ra->ra_pages)
^
mm/readahead.c:593:6: note: Assuming the condition is false
if (folio_test_writeback(folio))
^~~~~~~~~~~~~~~~~~~~~~~~~~~
mm/readahead.c:593:2: note: Taking false branch
if (folio_test_writeback(folio))
^
mm/readahead.c:601:6: note: Assuming the condition is false
if (inode_read_congested(ractl->mapping->host))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
mm/readahead.c:601:2: note: Taking false branch
if (inode_read_congested(ractl->mapping->host))
^
mm/readahead.c:604:2: note: Taking false branch
if (blk_cgroup_congested())
^
mm/readahead.c:608:2: note: Calling 'ondemand_readahead'
ondemand_readahead(ractl, true, req_count);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
mm/readahead.c:451:6: note: Assuming 'req_size' is <= 'max_pages'
if (req_size > max_pages && bdi->io_pages > max_pages)
^~~~~~~~~~~~~~~~~~~~
mm/readahead.c:451:27: note: Left side of '&&' is false
if (req_size > max_pages && bdi->io_pages > max_pages)
^
mm/readahead.c:457:6: note: Assuming 'index' is 0
if (!index)
^~~~~~
mm/readahead.c:457:2: note: Taking true branch
if (!index)
^
mm/readahead.c:458:3: note: Control jumps to line 528
goto initial_readahead;
^
mm/readahead.c:529:13: note: Calling 'get_init_ra_size'
ra->size = get_init_ra_size(req_size, max_pages);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
mm/readahead.c:315:26: note: '?' condition is false
unsigned long newsize = roundup_pow_of_two(size);
--
crypto/ecc.c:1303:2: note: Calling 'xycz_initial_double'
xycz_initial_double(rx[1], ry[1], rx[0], ry[0], initial_z, curve);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
crypto/ecc.c:1168:6: note: 'p_initial_z' is non-null
if (p_initial_z)
^~~~~~~~~~~
crypto/ecc.c:1168:2: note: Taking true branch
if (p_initial_z)
^
crypto/ecc.c:1173:2: note: Calling 'ecc_point_double_jacobian'
ecc_point_double_jacobian(x1, y1, z, curve);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
crypto/ecc.c:1089:6: note: Assuming the condition is false
if (vli_is_zero(z1, ndigits))
^~~~~~~~~~~~~~~~~~~~~~~~
crypto/ecc.c:1089:2: note: Taking false branch
if (vli_is_zero(z1, ndigits))
^
crypto/ecc.c:1093:2: note: Calling 'vli_mod_square_fast'
vli_mod_square_fast(t4, y1, curve);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
crypto/ecc.c:982:2: note: Calling 'vli_mmod_fast'
vli_mmod_fast(result, product, curve);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
crypto/ecc.c:918:2: note: Taking false branch
if (strncmp(curve->name, "nist_", 5) != 0) {
^
crypto/ecc.c:934:2: note: Control jumps to the 'default' case at line 944
switch (ndigits) {
^
crypto/ecc.c:945:3: note: Assuming the condition is false
pr_err_ratelimited("ecc: unsupported digits size!\n");
^
include/linux/printk.h:654:2: note: expanded from macro 'pr_err_ratelimited'
printk_ratelimited(KERN_ERR pr_fmt(fmt), ##__VA_ARGS__)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/printk.h:639:6: note: expanded from macro 'printk_ratelimited'
if (__ratelimit(&_rs)) \
^~~~~~~~~~~~~~~~~
include/linux/ratelimit_types.h:41:28: note: expanded from macro '__ratelimit'
#define __ratelimit(state) ___ratelimit(state, __func__)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
crypto/ecc.c:945:3: note: Taking false branch
pr_err_ratelimited("ecc: unsupported digits size!\n");
^
include/linux/printk.h:654:2: note: expanded from macro 'pr_err_ratelimited'
printk_ratelimited(KERN_ERR pr_fmt(fmt), ##__VA_ARGS__)
^
include/linux/printk.h:639:2: note: expanded from macro 'printk_ratelimited'
if (__ratelimit(&_rs)) \
^
crypto/ecc.c:946:3: note: Returning without writing to '*result'
return false;
^
crypto/ecc.c:982:2: note: Returning from 'vli_mmod_fast'
vli_mmod_fast(result, product, curve);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
crypto/ecc.c:983:1: note: Returning without writing to '*result'
}
^
crypto/ecc.c:1093:2: note: Returning from 'vli_mod_square_fast'
vli_mod_square_fast(t4, y1, curve);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
crypto/ecc.c:1097:2: note: Calling 'vli_mod_square_fast'
vli_mod_square_fast(t4, t4, curve);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
crypto/ecc.c:981:2: note: Calling 'vli_square'
vli_square(product, left, curve->g.ndigits);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
crypto/ecc.c:455:14: note: Assuming the condition is true
for (k = 0; k < ndigits * 2 - 1; k++) {
^~~~~~~~~~~~~~~~~~~
crypto/ecc.c:455:2: note: Loop condition is true. Entering loop body
for (k = 0; k < ndigits * 2 - 1; k++) {
^
crypto/ecc.c:458:7: note: Assuming 'k' is < 'ndigits'
if (k < ndigits)
^~~~~~~~~~~
crypto/ecc.c:458:3: note: Taking true branch
if (k < ndigits)
^
crypto/ecc.c:459:4: note: The value 0 is assigned to 'min'
min = 0;
^~~~~~~
crypto/ecc.c:463:8: note: The value 0 is assigned to 'i'
for (i = min; i <= k && i <= k - i; i++) {
^~~~~~~
crypto/ecc.c:463:17: note: 'i' is <= 'k'
for (i = min; i <= k && i <= k - i; i++) {
^
crypto/ecc.c:463:17: note: Left side of '&&' is true
crypto/ecc.c:463:3: note: Loop condition is true. Entering loop body
for (i = min; i <= k && i <= k - i; i++) {
^
crypto/ecc.c:466:14: note: 1st function call argument is an uninitialized value
product = mul_64_64(left[i], left[k - i]);
^ ~~~~~~~
Suppressed 13 warnings (13 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
53 warnings generated.
>> fs/erofs/super.c:93:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(vi, 0, offsetof(struct erofs_inode, vfs_inode));
^~~~~~
fs/erofs/super.c:93:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(vi, 0, offsetof(struct erofs_inode, vfs_inode));
^~~~~~
>> fs/erofs/super.c:156:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buffer + i, ptr + erofs_blkoff(*offset), cnt);
^~~~~~
fs/erofs/super.c:156:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buffer + i, ptr + erofs_blkoff(*offset), cnt);
^~~~~~
fs/erofs/super.c:344:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&sb->s_uuid, dsb->uuid, sizeof(dsb->uuid));
^~~~~~
fs/erofs/super.c:344:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&sb->s_uuid, dsb->uuid, sizeof(dsb->uuid));
^~~~~~
include/linux/log2.h:57:13: warning: The result of the left shift is undefined due to shifting by '32', which is greater or equal to the width of type 'unsigned long' [clang-analyzer-core.UndefinedBinaryOperatorResult]
return 1UL << fls_long(n - 1);
^
fs/erofs/super.c:589:6: note: Assuming the condition is false
if (!sb_set_blocksize(sb, EROFS_BLKSIZ)) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/erofs/super.c:589:2: note: Taking false branch
if (!sb_set_blocksize(sb, EROFS_BLKSIZ)) {
^
fs/erofs/super.c:595:6: note: Assuming 'sbi' is non-null
if (!sbi)
^~~~
fs/erofs/super.c:595:2: note: Taking false branch
if (!sbi)
^
fs/erofs/super.c:604:8: note: Calling 'erofs_read_superblock'
err = erofs_read_superblock(sb);
^~~~~~~~~~~~~~~~~~~~~~~~~
fs/erofs/super.c:291:2: note: Taking false branch
if (IS_ERR(page)) {
^
fs/erofs/super.c:302:6: note: Assuming field 'magic' is equal to EROFS_SUPER_MAGIC_V1
if (le32_to_cpu(dsb->magic) != EROFS_SUPER_MAGIC_V1) {
^
include/linux/byteorder/generic.h:89:21: note: expanded from macro 'le32_to_cpu'
#define le32_to_cpu __le32_to_cpu
^
include/uapi/linux/byteorder/little_endian.h:35:26: note: expanded from macro '__le32_to_cpu'
#define __le32_to_cpu(x) ((__force __u32)(__le32)(x))
^
fs/erofs/super.c:302:2: note: Taking false branch
if (le32_to_cpu(dsb->magic) != EROFS_SUPER_MAGIC_V1) {
^
fs/erofs/super.c:308:6: note: Assuming the condition is false
if (erofs_sb_has_sb_chksum(sbi)) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/erofs/super.c:308:2: note: Taking false branch
if (erofs_sb_has_sb_chksum(sbi)) {
^
fs/erofs/super.c:317:6: note: Assuming 'blkszbits' is equal to LOG_BLOCK_SIZE
if (blkszbits != LOG_BLOCK_SIZE) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/erofs/super.c:317:2: note: Taking false branch
if (blkszbits != LOG_BLOCK_SIZE) {
^
fs/erofs/super.c:323:2: note: Taking false branch
if (!check_layout_compatibility(sb, dsb))
^
fs/erofs/super.c:327:6: note: Assuming the condition is false
if (sbi->sb_size > EROFS_BLKSIZ) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/erofs/super.c:327:2: note: Taking false branch
if (sbi->sb_size > EROFS_BLKSIZ) {
^
fs/erofs/super.c:337:19: note: '?' condition is true
sbi->islotbits = ilog2(sizeof(struct erofs_inode_compact));
^
include/linux/log2.h:158:2: note: expanded from macro 'ilog2'
__builtin_constant_p(n) ? \
^
fs/erofs/super.c:337:19: note: '?' condition is false
sbi->islotbits = ilog2(sizeof(struct erofs_inode_compact));
^
include/linux/log2.h:159:3: note: expanded from macro 'ilog2'
((n) < 2 ? 0 : \
^
fs/erofs/super.c:348:6: note: Assuming 'ret' is >= 0
if (ret < 0) { /* -E2BIG */
^~~~~~~
fs/erofs/super.c:348:2: note: Taking false branch
if (ret < 0) { /* -E2BIG */
^
fs/erofs/super.c:355:6: note: Assuming the condition is false
if (erofs_sb_has_compr_cfgs(sbi))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/erofs/super.c:355:2: note: Taking false branch
if (erofs_sb_has_compr_cfgs(sbi))
^
fs/erofs/super.c:359:6: note: Assuming 'ret' is >= 0
if (ret < 0)
^~~~~~~
fs/erofs/super.c:359:2: note: Taking false branch
if (ret < 0)
^
fs/erofs/super.c:363:8: note: Calling 'erofs_init_devices'
ret = erofs_init_devices(sb, dsb);
^~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/erofs/super.c:235:6: note: Assuming the condition is false
if (!erofs_sb_has_device_table(sbi))
--
^
kernel/sched/topology.c:2251:4: note: Calling 'claim_allocations'
claim_allocations(i, sd);
^~~~~~~~~~~~~~~~~~~~~~~~
kernel/sched/topology.c:1473:16: note: Loop condition is false. Exiting loop
WARN_ON_ONCE(*per_cpu_ptr(sdd->sd, cpu) != sd);
^
include/linux/percpu-defs.h:235:2: note: expanded from macro 'per_cpu_ptr'
__verify_pcpu_ptr(ptr); \
^
include/linux/percpu-defs.h:217:37: note: expanded from macro '__verify_pcpu_ptr'
#define __verify_pcpu_ptr(ptr) \
^
kernel/sched/topology.c:1473:2: note: Assuming '__ret_warn_on' is not equal to 0
WARN_ON_ONCE(*per_cpu_ptr(sdd->sd, cpu) != sd);
^
include/asm-generic/bug.h:179:33: note: expanded from macro 'WARN_ON_ONCE'
#define WARN_ON_ONCE(condition) WARN_ON(condition)
^~~~~~~~~~~~~~~~~~
include/asm-generic/bug.h:167:2: note: expanded from macro 'WARN_ON'
unlikely(__ret_warn_on); \
^~~~~~~~~~~~~~~~~~~~~~~
include/linux/compiler.h:78:40: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^~~~
kernel/sched/topology.c:1474:3: note: Loop condition is false. Exiting loop
*per_cpu_ptr(sdd->sd, cpu) = NULL;
^
include/linux/percpu-defs.h:235:2: note: expanded from macro 'per_cpu_ptr'
__verify_pcpu_ptr(ptr); \
^
include/linux/percpu-defs.h:217:37: note: expanded from macro '__verify_pcpu_ptr'
#define __verify_pcpu_ptr(ptr) \
^
kernel/sched/topology.c:1476:21: note: Loop condition is false. Exiting loop
if (atomic_read(&(*per_cpu_ptr(sdd->sds, cpu))->ref))
^
include/linux/percpu-defs.h:235:2: note: expanded from macro 'per_cpu_ptr'
__verify_pcpu_ptr(ptr); \
^
include/linux/percpu-defs.h:217:37: note: expanded from macro '__verify_pcpu_ptr'
#define __verify_pcpu_ptr(ptr) \
^
kernel/sched/topology.c:1476:6: note: Assuming the condition is false
if (atomic_read(&(*per_cpu_ptr(sdd->sds, cpu))->ref))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/sched/topology.c:1476:2: note: Taking false branch
if (atomic_read(&(*per_cpu_ptr(sdd->sds, cpu))->ref))
^
kernel/sched/topology.c:1479:21: note: Loop condition is false. Exiting loop
if (atomic_read(&(*per_cpu_ptr(sdd->sg, cpu))->ref))
^
include/linux/percpu-defs.h:235:2: note: expanded from macro 'per_cpu_ptr'
__verify_pcpu_ptr(ptr); \
^
include/linux/percpu-defs.h:217:37: note: expanded from macro '__verify_pcpu_ptr'
#define __verify_pcpu_ptr(ptr) \
^
kernel/sched/topology.c:1479:6: note: Assuming the condition is false
if (atomic_read(&(*per_cpu_ptr(sdd->sg, cpu))->ref))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/sched/topology.c:1479:2: note: Taking false branch
if (atomic_read(&(*per_cpu_ptr(sdd->sg, cpu))->ref))
^
kernel/sched/topology.c:1482:21: note: Loop condition is false. Exiting loop
if (atomic_read(&(*per_cpu_ptr(sdd->sgc, cpu))->ref))
^
include/linux/percpu-defs.h:235:2: note: expanded from macro 'per_cpu_ptr'
__verify_pcpu_ptr(ptr); \
^
include/linux/percpu-defs.h:217:37: note: expanded from macro '__verify_pcpu_ptr'
#define __verify_pcpu_ptr(ptr) \
^
kernel/sched/topology.c:1482:6: note: Assuming the condition is false
if (atomic_read(&(*per_cpu_ptr(sdd->sgc, cpu))->ref))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/sched/topology.c:1482:2: note: Taking false branch
if (atomic_read(&(*per_cpu_ptr(sdd->sgc, cpu))->ref))
^
kernel/sched/topology.c:1484:1: note: Returning without writing to 'sd->groups'
}
^
kernel/sched/topology.c:2251:4: note: Returning from 'claim_allocations'
claim_allocations(i, sd);
^~~~~~~~~~~~~~~~~~~~~~~~
kernel/sched/topology.c:2252:4: note: Calling 'init_sched_groups_capacity'
init_sched_groups_capacity(i, sd);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/sched/topology.c:1250:2: note: 'sg' initialized here
struct sched_group *sg = sd->groups;
^~~~~~~~~~~~~~~~~~~~~~
kernel/sched/topology.c:1252:10: note: Assuming 'sg' is null
WARN_ON(!sg);
^
include/asm-generic/bug.h:166:25: note: expanded from macro 'WARN_ON'
int __ret_warn_on = !!(condition); \
^~~~~~~~~
kernel/sched/topology.c:1257:20: note: Access to field 'group_weight' results in a dereference of a null pointer (loaded from variable 'sg')
sg->group_weight = cpumask_weight(sched_group_span(sg));
~~ ^
>> kernel/sched/topology.c:1450:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(d, 0, sizeof(*d));
^~~~~~
kernel/sched/topology.c:1450:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(d, 0, sizeof(*d));
^~~~~~
Suppressed 69 warnings (68 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
67 warnings generated.
Suppressed 67 warnings (67 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
67 warnings generated.
Suppressed 67 warnings (67 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
33 warnings generated.
crypto/asymmetric_keys/asymmetric_type.c:74:9: warning: Access to field 'len' results in a dereference of a null pointer (loaded from variable 'id_2') [clang-analyzer-core.NullDereference]
len = id_2->len;
^~~~
crypto/asymmetric_keys/asymmetric_type.c:64:10: note: Assuming 'id_0' is null
WARN_ON(!id_0 && !id_1 && !id_2);
^
include/asm-generic/bug.h:166:25: note: expanded from macro 'WARN_ON'
int __ret_warn_on = !!(condition); \
^~~~~~~~~
crypto/asymmetric_keys/asymmetric_type.c:64:10: note: Left side of '&&' is true
WARN_ON(!id_0 && !id_1 && !id_2);
^
crypto/asymmetric_keys/asymmetric_type.c:64:19: note: Assuming 'id_1' is null
WARN_ON(!id_0 && !id_1 && !id_2);
^
include/asm-generic/bug.h:166:25: note: expanded from macro 'WARN_ON'
int __ret_warn_on = !!(condition); \
^~~~~~~~~
crypto/asymmetric_keys/asymmetric_type.c:64:10: note: Left side of '&&' is true
WARN_ON(!id_0 && !id_1 && !id_2);
^
crypto/asymmetric_keys/asymmetric_type.c:64:28: note: Assuming 'id_2' is null
WARN_ON(!id_0 && !id_1 && !id_2);
^
include/asm-generic/bug.h:166:25: note: expanded from macro 'WARN_ON'
int __ret_warn_on = !!(condition); \
^~~~~~~~~
crypto/asymmetric_keys/asymmetric_type.c:66:6: note: 'id_0' is null
if (id_0) {
^~~~
crypto/asymmetric_keys/asymmetric_type.c:66:2: note: Taking false branch
if (id_0) {
^
crypto/asymmetric_keys/asymmetric_type.c:69:13: note: 'id_1' is null
} else if (id_1) {
^~~~
crypto/asymmetric_keys/asymmetric_type.c:69:9: note: Taking false branch
} else if (id_1) {
^
crypto/asymmetric_keys/asymmetric_type.c:74:9: note: Access to field 'len' results in a dereference of a null pointer (loaded from variable 'id_2')
len = id_2->len;
^~~~
crypto/asymmetric_keys/asymmetric_type.c:160:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(kid->data, val_1, len_1);
^~~~~~
crypto/asymmetric_keys/asymmetric_type.c:160:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(kid->data, val_1, len_1);
^~~~~~
crypto/asymmetric_keys/asymmetric_type.c:161:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(kid->data + len_1, val_2, len_2);
^~~~~~
crypto/asymmetric_keys/asymmetric_type.c:161:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(kid->data + len_1, val_2, len_2);
^~~~~~
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
9 warnings generated.
Suppressed 9 warnings (9 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
96 warnings generated.
init/do_mounts.c:117:7: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(slash + 1, "PARTNROFF=%d%c", &offset, &c) != 1)
^~~~~~
init/do_mounts.c:117:7: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(slash + 1, "PARTNROFF=%d%c", &offset, &c) != 1)
^~~~~~
init/do_mounts.c:194:2: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(s, name);
^~~~~~
init/do_mounts.c:194:2: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(s, name);
^~~~~~
init/do_mounts.c:234:6: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(name, "%u:%u%c", &maj, &min, &dummy) == 2 ||
^~~~~~
init/do_mounts.c:234:6: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(name, "%u:%u%c", &maj, &min, &dummy) == 2 ||
^~~~~~
init/do_mounts.c:235:6: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sscanf(name, "%u:%u:%u:%c", &maj, &min, &offset, &dummy) == 3) {
^~~~~~
init/do_mounts.c:235:6: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
sscanf(name, "%u:%u:%u:%c", &maj, &min, &offset, &dummy) == 3) {
^~~~~~
init/do_mounts.c:373:3: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(data_page, data, PAGE_SIZE);
^~~~~~~
init/do_mounts.c:373:3: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(data_page, data, PAGE_SIZE);
^~~~~~~
Suppressed 91 warnings (91 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
50 warnings generated.
>> fs/erofs/xattr.c:329:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(it->buffer + processed, buf, len);
^~~~~~
fs/erofs/xattr.c:329:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(it->buffer + processed, buf, len);
^~~~~~
fs/erofs/xattr.c:517:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(it->buffer + it->buffer_ofs, prefix, prefix_len);
^~~~~~
fs/erofs/xattr.c:517:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(it->buffer + it->buffer_ofs, prefix, prefix_len);
^~~~~~
fs/erofs/xattr.c:528:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(it->buffer + it->buffer_ofs, buf, len);
^~~~~~
fs/erofs/xattr.c:528:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(it->buffer + it->buffer_ofs, buf, len);
^~~~~~
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
52 warnings generated.
>> fs/erofs/decompressor.c:175:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(tmp, inpage + *inputmargin, page_copycnt);
^~~~~~
fs/erofs/decompressor.c:175:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(tmp, inpage + *inputmargin, page_copycnt);
^~~~~~
>> fs/erofs/decompressor.c:255:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(out + ret, 0, rq->outputsize - ret);
^~~~~~
fs/erofs/decompressor.c:255:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(out + ret, 0, rq->outputsize - ret);
^~~~~~
fs/erofs/decompressor.c:340:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dst + rq->pageofs_out, src, righthalf);
^~~~~~
fs/erofs/decompressor.c:340:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dst + rq->pageofs_out, src, righthalf);
^~~~~~
>> fs/erofs/decompressor.c:347:4: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(src, src + righthalf, rq->pageofs_out);
^~~~~~~
fs/erofs/decompressor.c:347:4: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(src, src + righthalf, rq->pageofs_out);
^~~~~~~
fs/erofs/decompressor.c:350:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dst, src + righthalf, rq->pageofs_out);
^~~~~~
fs/erofs/decompressor.c:350:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dst, src + righthalf, rq->pageofs_out);
^~~~~~
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
50 warnings generated.
fs/udf/misc.c:73:4: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(&ad[size], ad, iinfo->i_lenAlloc);
^~~~~~~
fs/udf/misc.c:73:4: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(&ad[size], ad, iinfo->i_lenAlloc);
^~~~~~~
fs/udf/misc.c:107:5: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(&ea[offset - aal + size],
^~~~~~~
fs/udf/misc.c:107:5: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(&ea[offset - aal + size],
^~~~~~~
fs/udf/misc.c:117:5: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(&ea[offset - ial + size],
^~~~~~~
fs/udf/misc.c:117:5: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(&ea[offset - ial + size],
^~~~~~~
fs/udf/misc.c:128:5: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(&ea[offset - aal + size],
^~~~~~~
fs/udf/misc.c:128:5: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(&ea[offset - aal + size],
^~~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
51 warnings generated.
fs/udf/unicode.c:176:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(str_o, 0, str_max_len);
^~~~~~
fs/udf/unicode.c:176:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(str_o, 0, str_max_len);
^~~~~~
fs/udf/unicode.c:187:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(str_o, 0, str_max_len);
^~~~~~
fs/udf/unicode.c:187:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(str_o, 0, str_max_len);
^~~~~~
fs/udf/unicode.c:262:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&str_o[str_o_len], crc, len);
^~~~~~
fs/udf/unicode.c:262:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&str_o[str_o_len], crc, len);
^~~~~~
fs/udf/unicode.c:267:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&str_o[str_o_len], ext, ext_o_len);
^~~~~~
fs/udf/unicode.c:267:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&str_o[str_o_len], ext, ext_o_len);
^~~~~~
fs/udf/unicode.c:293:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ocu, 0, ocu_max_len);
^~~~~~
fs/udf/unicode.c:293:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(ocu, 0, ocu_max_len);
^~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
21 warnings generated.
block/badblocks.c:68:3: warning: Value stored to 'sectors' is never read [clang-analyzer-deadcode.DeadStores]
sectors = target - s;
^ ~~~~~~~~~~
block/badblocks.c:68:3: note: Value stored to 'sectors' is never read
sectors = target - s;
^ ~~~~~~~~~~
block/badblocks.c:278:4: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(p + hi, p + hi + 1,
^~~~~~~
block/badblocks.c:278:4: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(p + hi, p + hi + 1,
^~~~~~~
block/badblocks.c:294:4: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(p + hi + 1, p + hi,
^~~~~~~
block/badblocks.c:294:4: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(p + hi + 1, p + hi,
^~~~~~~
block/badblocks.c:348:3: warning: Value stored to 'sectors' is never read [clang-analyzer-deadcode.DeadStores]
sectors = target - s;
--
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
36 warnings generated.
Suppressed 36 warnings (34 in non-user code, 2 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
24 warnings generated.
kernel/time/clockevents.c:680:11: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
count = snprintf(buf, PAGE_SIZE, "%s\n", td->evtdev->name);
^~~~~~~~
kernel/time/clockevents.c:680:11: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
count = snprintf(buf, PAGE_SIZE, "%s\n", td->evtdev->name);
^~~~~~~~
Suppressed 23 warnings (23 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
14 warnings generated.
lib/zstd/compress/zstd_compress_literals.c:38:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ZSTD_memcpy(ostart + flSize, src, srcSize);
^
lib/zstd/compress/../common/zstd_deps.h:32:28: note: expanded from macro 'ZSTD_memcpy'
#define ZSTD_memcpy(d,s,n) __builtin_memcpy((d),(s),(n))
^~~~~~~~~~~~~~~~
lib/zstd/compress/zstd_compress_literals.c:38:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
ZSTD_memcpy(ostart + flSize, src, srcSize);
^
lib/zstd/compress/../common/zstd_deps.h:32:28: note: expanded from macro 'ZSTD_memcpy'
#define ZSTD_memcpy(d,s,n) __builtin_memcpy((d),(s),(n))
^~~~~~~~~~~~~~~~
lib/zstd/compress/zstd_compress_literals.c:89:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ZSTD_memcpy(nextHuf, prevHuf, sizeof(*prevHuf));
^
lib/zstd/compress/../common/zstd_deps.h:32:28: note: expanded from macro 'ZSTD_memcpy'
#define ZSTD_memcpy(d,s,n) __builtin_memcpy((d),(s),(n))
^~~~~~~~~~~~~~~~
lib/zstd/compress/zstd_compress_literals.c:89:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
ZSTD_memcpy(nextHuf, prevHuf, sizeof(*prevHuf));
^
lib/zstd/compress/../common/zstd_deps.h:32:28: note: expanded from macro 'ZSTD_memcpy'
#define ZSTD_memcpy(d,s,n) __builtin_memcpy((d),(s),(n))
^~~~~~~~~~~~~~~~
lib/zstd/compress/zstd_compress_literals.c:121:9: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ZSTD_memcpy(nextHuf, prevHuf, sizeof(*prevHuf));
^
lib/zstd/compress/../common/zstd_deps.h:32:28: note: expanded from macro 'ZSTD_memcpy'
#define ZSTD_memcpy(d,s,n) __builtin_memcpy((d),(s),(n))
^~~~~~~~~~~~~~~~
lib/zstd/compress/zstd_compress_literals.c:121:9: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
ZSTD_memcpy(nextHuf, prevHuf, sizeof(*prevHuf));
^
lib/zstd/compress/../common/zstd_deps.h:32:28: note: expanded from macro 'ZSTD_memcpy'
#define ZSTD_memcpy(d,s,n) __builtin_memcpy((d),(s),(n))
^~~~~~~~~~~~~~~~
lib/zstd/compress/zstd_compress_literals.c:125:9: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ZSTD_memcpy(nextHuf, prevHuf, sizeof(*prevHuf));
^
lib/zstd/compress/../common/zstd_deps.h:32:28: note: expanded from macro 'ZSTD_memcpy'
#define ZSTD_memcpy(d,s,n) __builtin_memcpy((d),(s),(n))
^~~~~~~~~~~~~~~~
lib/zstd/compress/zstd_compress_literals.c:125:9: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
ZSTD_memcpy(nextHuf, prevHuf, sizeof(*prevHuf));
^
lib/zstd/compress/../common/zstd_deps.h:32:28: note: expanded from macro 'ZSTD_memcpy'
#define ZSTD_memcpy(d,s,n) __builtin_memcpy((d),(s),(n))
^~~~~~~~~~~~~~~~
Suppressed 10 warnings (10 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
56 warnings generated.
fs/erofs/inode.c:50:3: warning: Value stored to 'err' is never read [clang-analyzer-deadcode.DeadStores]
err = -EOPNOTSUPP;
^ ~~~~~~~~~~~
fs/erofs/inode.c:50:3: note: Value stored to 'err' is never read
err = -EOPNOTSUPP;
^ ~~~~~~~~~~~
fs/erofs/inode.c:58:3: warning: Value stored to 'err' is never read [clang-analyzer-deadcode.DeadStores]
err = -EOPNOTSUPP;
^ ~~~~~~~~~~~
fs/erofs/inode.c:58:3: note: Value stored to 'err' is never read
err = -EOPNOTSUPP;
^ ~~~~~~~~~~~
fs/erofs/inode.c:74:5: warning: Value stored to 'err' is never read [clang-analyzer-deadcode.DeadStores]
err = -ENOMEM;
^ ~~~~~~~
fs/erofs/inode.c:74:5: note: Value stored to 'err' is never read
err = -ENOMEM;
^ ~~~~~~~
>> fs/erofs/inode.c:77:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(copied, dic, gotten);
^~~~~~
fs/erofs/inode.c:77:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(copied, dic, gotten);
^~~~~~
fs/erofs/inode.c:87:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy((u8 *)copied + gotten, kaddr, *ofs);
^~~~~~
fs/erofs/inode.c:87:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy((u8 *)copied + gotten, kaddr, *ofs);
^~~~~~
fs/erofs/inode.c:172:3: warning: Value stored to 'err' is never read [clang-analyzer-deadcode.DeadStores]
err = -EOPNOTSUPP;
^ ~~~~~~~~~~~
fs/erofs/inode.c:172:3: note: Value stored to 'err' is never read
err = -EOPNOTSUPP;
^ ~~~~~~~~~~~
fs/erofs/inode.c:181:4: warning: Value stored to 'err' is never read [clang-analyzer-deadcode.DeadStores]
err = -EOPNOTSUPP;
^ ~~~~~~~~~~~
fs/erofs/inode.c:181:4: note: Value stored to 'err' is never read
err = -EOPNOTSUPP;
^ ~~~~~~~~~~~
fs/erofs/inode.c:206:2: warning: Value stored to 'err' is never read [clang-analyzer-deadcode.DeadStores]
err = -EFSCORRUPTED;
^ ~~~~~~~~~~~~~
fs/erofs/inode.c:206:2: note: Value stored to 'err' is never read
err = -EFSCORRUPTED;
^ ~~~~~~~~~~~~~
fs/erofs/inode.c:241:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(lnk, kaddr + m_pofs, inode->i_size);
^~~~~~
fs/erofs/inode.c:241:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(lnk, kaddr + m_pofs, inode->i_size);
^~~~~~
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
8 warnings generated.
lib/crypto/chacha.c:81:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(x, state, 64);
^~~~~~
lib/crypto/chacha.c:81:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(x, state, 64);
^~~~~~
lib/crypto/chacha.c:107:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(x, state, 64);
^~~~~~
lib/crypto/chacha.c:107:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(x, state, 64);
^~~~~~
lib/crypto/chacha.c:111:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&stream[0], &x[0], 16);
^~~~~~
lib/crypto/chacha.c:111:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&stream[0], &x[0], 16);
^~~~~~
lib/crypto/chacha.c:112:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&stream[4], &x[12], 16);
^~~~~~
lib/crypto/chacha.c:112:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&stream[4], &x[12], 16);
^~~~~~
Suppressed 4 warnings (4 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
19 warnings generated.
Suppressed 19 warnings (19 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
57 warnings generated.
crypto/aegis128-core.c:189:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dst, tmp.bytes, AEGIS_BLOCK_SIZE);
^~~~~~
crypto/aegis128-core.c:189:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dst, tmp.bytes, AEGIS_BLOCK_SIZE);
^~~~~~
crypto/aegis128-core.c:199:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(msg.bytes, src, size);
^~~~~~
crypto/aegis128-core.c:199:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(msg.bytes, src, size);
^~~~~~
crypto/aegis128-core.c:210:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dst, msg.bytes, size);
^~~~~~
crypto/aegis128-core.c:210:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dst, msg.bytes, size);
^~~~~~
crypto/aegis128-core.c:250:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dst, tmp.bytes, AEGIS_BLOCK_SIZE);
^~~~~~
crypto/aegis128-core.c:250:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dst, tmp.bytes, AEGIS_BLOCK_SIZE);
^~~~~~
crypto/aegis128-core.c:260:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(msg.bytes, src, size);
^~~~~~
crypto/aegis128-core.c:260:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(msg.bytes, src, size);
^~~~~~
crypto/aegis128-core.c:268:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(msg.bytes + size, 0, AEGIS_BLOCK_SIZE - size);
^~~~~~
crypto/aegis128-core.c:268:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(msg.bytes + size, 0, AEGIS_BLOCK_SIZE - size);
^~~~~~
crypto/aegis128-core.c:272:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dst, msg.bytes, size);
^~~~~~
crypto/aegis128-core.c:272:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dst, msg.bytes, size);
^~~~~~
crypto/aegis128-core.c:295:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf.bytes + pos, src, fill);
^~~~~~
crypto/aegis128-core.c:295:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf.bytes + pos, src, fill);
^~~~~~
crypto/aegis128-core.c:307:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf.bytes + pos, src, left);
^~~~~~
crypto/aegis128-core.c:307:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf.bytes + pos, src, left);
^~~~~~
crypto/aegis128-core.c:317:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buf.bytes + pos, 0, AEGIS_BLOCK_SIZE - pos);
^~~~~~
crypto/aegis128-core.c:317:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(buf.bytes + pos, 0, AEGIS_BLOCK_SIZE - pos);
^~~~~~
crypto/aegis128-core.c:374:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ctx->key.bytes, key, AEGIS128_KEY_SIZE);
^~~~~~
crypto/aegis128-core.c:374:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ctx->key.bytes, key, AEGIS128_KEY_SIZE);
^~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
20 warnings generated.
>> arch/riscv/kernel/cpufeature.c:135:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(print_str, 0, sizeof(print_str));
^~~~~~
arch/riscv/kernel/cpufeature.c:135:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(print_str, 0, sizeof(print_str));
^~~~~~
arch/riscv/kernel/cpufeature.c:141:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(print_str, 0, sizeof(print_str));
^~~~~~
arch/riscv/kernel/cpufeature.c:141:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(print_str, 0, sizeof(print_str));
^~~~~~
Suppressed 18 warnings (18 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
36 warnings generated.
>> arch/riscv/kernel/process.c:130:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(childregs, 0, sizeof(struct pt_regs));
^~~~~~
arch/riscv/kernel/process.c:130:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(childregs, 0, sizeof(struct pt_regs));
^~~~~~
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
51 warnings generated.
Suppressed 51 warnings (51 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
10 warnings generated.
Suppressed 10 warnings (10 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
crypto/asymmetric_keys/public_key.c:79:8: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
n = snprintf(alg_name, CRYPTO_MAX_ALG_NAME,
^~~~~~~~
crypto/asymmetric_keys/public_key.c:79:8: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
n = snprintf(alg_name, CRYPTO_MAX_ALG_NAME,
^~~~~~~~
crypto/asymmetric_keys/public_key.c:83:8: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
n = snprintf(alg_name, CRYPTO_MAX_ALG_NAME,
^~~~~~~~
crypto/asymmetric_keys/public_key.c:83:8: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
n = snprintf(alg_name, CRYPTO_MAX_ALG_NAME,
^~~~~~~~
crypto/asymmetric_keys/public_key.c:91:3: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(alg_name, pkey->pkey_algo);
^~~~~~
crypto/asymmetric_keys/public_key.c:91:3: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(alg_name, pkey->pkey_algo);
^~~~~~
crypto/asymmetric_keys/public_key.c:100:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dst, &val, sizeof(val));
^~~~~~
crypto/asymmetric_keys/public_key.c:100:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dst, &val, sizeof(val));
^~~~~~
crypto/asymmetric_keys/public_key.c:131:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(key, pkey->key, pkey->keylen);
^~~~~~
crypto/asymmetric_keys/public_key.c:131:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(key, pkey->key, pkey->keylen);
^~~~~~
crypto/asymmetric_keys/public_key.c:135:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ptr, pkey->params, pkey->paramlen);
^~~~~~
crypto/asymmetric_keys/public_key.c:135:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ptr, pkey->params, pkey->paramlen);
^~~~~~
crypto/asymmetric_keys/public_key.c:202:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(key, pkey->key, pkey->keylen);
^~~~~~
crypto/asymmetric_keys/public_key.c:202:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(key, pkey->key, pkey->keylen);
^~~~~~
crypto/asymmetric_keys/public_key.c:206:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ptr, pkey->params, pkey->paramlen);
^~~~~~
crypto/asymmetric_keys/public_key.c:206:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ptr, pkey->params, pkey->paramlen);
^~~~~~
crypto/asymmetric_keys/public_key.c:348:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(key, pkey->key, pkey->keylen);
^~~~~~
crypto/asymmetric_keys/public_key.c:348:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(key, pkey->key, pkey->keylen);
^~~~~~
crypto/asymmetric_keys/public_key.c:352:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ptr, pkey->params, pkey->paramlen);
^~~~~~
crypto/asymmetric_keys/public_key.c:352:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ptr, pkey->params, pkey->paramlen);
^~~~~~
Suppressed 38 warnings (38 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
72 warnings generated.
crypto/authencesn.c:424:6: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (snprintf(inst->alg.base.cra_name, CRYPTO_MAX_ALG_NAME,
^~~~~~~~
crypto/authencesn.c:424:6: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
if (snprintf(inst->alg.base.cra_name, CRYPTO_MAX_ALG_NAME,
^~~~~~~~
crypto/authencesn.c:429:6: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (snprintf(inst->alg.base.cra_driver_name, CRYPTO_MAX_ALG_NAME,
^~~~~~~~
crypto/authencesn.c:429:6: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
if (snprintf(inst->alg.base.cra_driver_name, CRYPTO_MAX_ALG_NAME,
^~~~~~~~
Suppressed 70 warnings (70 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
15 warnings generated.
crypto/crypto_engine.c:534:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(engine->name, sizeof(engine->name),
^~~~~~~~
crypto/crypto_engine.c:534:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(engine->name, sizeof(engine->name),
^~~~~~~~
crypto/crypto_engine.c:545:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
kthread_init_work(&engine->pump_requests, crypto_pump_work);
^
include/linux/kthread.h:195:3: note: expanded from macro 'kthread_init_work'
memset((work), 0, sizeof(struct kthread_work)); \
^~~~~~
crypto/crypto_engine.c:545:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
kthread_init_work(&engine->pump_requests, crypto_pump_work);
^
include/linux/kthread.h:195:3: note: expanded from macro 'kthread_init_work'
memset((work), 0, sizeof(struct kthread_work)); \
^~~~~~
Suppressed 13 warnings (13 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
>> mm/kmemleak.c:610:3: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(object->comm, "hardirq", sizeof(object->comm));
^~~~~~~
mm/kmemleak.c:610:3: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(object->comm, "hardirq", sizeof(object->comm));
^~~~~~~
mm/kmemleak.c:613:3: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(object->comm, "softirq", sizeof(object->comm));
^~~~~~~
mm/kmemleak.c:613:3: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(object->comm, "softirq", sizeof(object->comm));
^~~~~~~
mm/kmemleak.c:622:3: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(object->comm, current->comm, sizeof(object->comm));
^~~~~~~
mm/kmemleak.c:622:3: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(object->comm, current->comm, sizeof(object->comm));
^~~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
>> lib/test_meminit.c:55:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&p[i], GARBAGE_BYTE, size);
^~~~~~
lib/test_meminit.c:55:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&p[i], GARBAGE_BYTE, size);
^~~~~~
>> lib/test_meminit.c:245:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf_copy, buf, size);
^~~~~~
lib/test_meminit.c:245:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf_copy, buf, size);
^~~~~~
lib/test_meminit.c:292:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf_contents, buf, size);
^~~~~~
lib/test_meminit.c:292:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf_contents, buf, size);
^~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
2 warnings generated.
Suppressed 2 warnings (2 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
2 warnings generated.
Suppressed 2 warnings (2 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
2 warnings generated.
Suppressed 2 warnings (2 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
10 warnings generated.
Suppressed 10 warnings (10 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
>> arch/riscv/kernel/crash_dump.c:42:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, vaddr + offset, csize);
^~~~~~
arch/riscv/kernel/crash_dump.c:42:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, vaddr + offset, csize);
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
36 warnings generated.
arch/riscv/kernel/efi.c:67:3: warning: Value stored to 'val' is never read [clang-analyzer-deadcode.DeadStores]
val = pte_val(pte) & ~_PAGE_WRITE;
^
arch/riscv/kernel/efi.c:67:3: note: Value stored to 'val' is never read
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
50 warnings generated.
>> arch/riscv/mm/init.c:506:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(nextp, 0, PAGE_SIZE);
^~~~~~
arch/riscv/mm/init.c:506:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(nextp, 0, PAGE_SIZE);
^~~~~~
Suppressed 49 warnings (46 in non-user code, 3 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
14 warnings generated.
Suppressed 14 warnings (14 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
2 warnings generated.
Suppressed 2 warnings (2 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
38 warnings generated.
lib/string_helpers.c:112:12: warning: Assigned value is garbage or undefined [clang-analyzer-core.uninitialized.Assign]
remainder += rounding[j];
^ ~~~~~~~~~~~
lib/string_helpers.c:60:6: note: Assuming 'blk_size' is not equal to 0
if (blk_size == 0)
^~~~~~~~~~~~~
lib/string_helpers.c:60:2: note: Taking false branch
if (blk_size == 0)
^
lib/string_helpers.c:62:6: note: Assuming 'size' is not equal to 0
if (size == 0)
^~~~~~~~~
lib/string_helpers.c:62:2: note: Taking false branch
if (size == 0)
^
lib/string_helpers.c:76:2: note: Loop condition is false. Execution continues on line 81
while (blk_size >> 32) {
^
lib/string_helpers.c:81:2: note: Loop condition is false. Execution continues on line 88
while (size >> 32) {
^
lib/string_helpers.c:91:2: note: Loop condition is false. Execution continues on line 98
while (size >= divisor[units]) {
^
lib/string_helpers.c:99:14: note: Assuming the condition is true
for (j = 0; sf_cap*10 < 1000; j++)
^~~~~~~~~~~~~~~~
lib/string_helpers.c:99:2: note: Loop condition is true. Entering loop body
for (j = 0; sf_cap*10 < 1000; j++)
^
lib/string_helpers.c:99:14: note: Assuming the condition is true
for (j = 0; sf_cap*10 < 1000; j++)
^~~~~~~~~~~~~~~~
lib/string_helpers.c:99:2: note: Loop condition is true. Entering loop body
for (j = 0; sf_cap*10 < 1000; j++)
^
lib/string_helpers.c:99:14: note: Assuming the condition is true
for (j = 0; sf_cap*10 < 1000; j++)
^~~~~~~~~~~~~~~~
lib/string_helpers.c:99:2: note: Loop condition is true. Entering loop body
for (j = 0; sf_cap*10 < 1000; j++)
^
lib/string_helpers.c:99:32: note: The value 3 is assigned to 'j'
for (j = 0; sf_cap*10 < 1000; j++)
^~~
lib/string_helpers.c:99:14: note: Assuming the condition is false
for (j = 0; sf_cap*10 < 1000; j++)
^~~~~~~~~~~~~~~~
lib/string_helpers.c:99:2: note: Loop condition is false. Execution continues on line 102
for (j = 0; sf_cap*10 < 1000; j++)
^
lib/string_helpers.c:102:6: note: Assuming 'units' is not equal to STRING_UNITS_2
if (units == STRING_UNITS_2) {
^~~~~~~~~~~~~~~~~~~~~~~
lib/string_helpers.c:102:2: note: Taking false branch
if (units == STRING_UNITS_2) {
--
60 warnings generated.
block/partitions/core.c:140:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(state->name, BDEVNAME_SIZE, "%s", hd->disk_name);
^~~~~~~~
block/partitions/core.c:140:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(state->name, BDEVNAME_SIZE, "%s", hd->disk_name);
^~~~~~~~
block/partitions/core.c:141:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(state->pp_buf, PAGE_SIZE, " %s:", state->name);
^~~~~~~~
block/partitions/core.c:141:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(state->pp_buf, PAGE_SIZE, " %s:", state->name);
^~~~~~~~
block/partitions/core.c:143:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(state->name, "p");
^~~~~~~
block/partitions/core.c:143:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(state->name, "p");
^~~~~~~
block/partitions/core.c:147:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(state->parts, 0, state->limit * sizeof(state->parts[0]));
^~~~~~
block/partitions/core.c:147:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(state->parts, 0, state->limit * sizeof(state->parts[0]));
^~~~~~
block/partitions/core.c:186:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", dev_to_bdev(dev)->bd_partno);
^~~~~~~
block/partitions/core.c:186:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", dev_to_bdev(dev)->bd_partno);
^~~~~~~
block/partitions/core.c:192:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%llu\n", dev_to_bdev(dev)->bd_start_sect);
^~~~~~~
block/partitions/core.c:192:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%llu\n", dev_to_bdev(dev)->bd_start_sect);
^~~~~~~
block/partitions/core.c:198:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", bdev_read_only(dev_to_bdev(dev)));
^~~~~~~
block/partitions/core.c:198:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", bdev_read_only(dev_to_bdev(dev)));
^~~~~~~
block/partitions/core.c:206:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n",
^~~~~~~
block/partitions/core.c:206:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n",
^~~~~~~
block/partitions/core.c:216:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n",
^~~~~~~
block/partitions/core.c:216:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n",
^~~~~~~
Suppressed 51 warnings (51 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
49 warnings generated.
include/asm-generic/unaligned.h:32:2: warning: Undefined or garbage value returned to caller [clang-analyzer-core.uninitialized.UndefReturn]
return le32_to_cpu(__get_unaligned_t(__le32, p));
^
lib/crypto/chacha20poly1305.c:183:2: note: Calling 'chacha_init'
chacha_init(chacha_state, k, (u8 *)iv);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/crypto/chacha.h:85:2: note: Taking false branch
if (IS_ENABLED(CONFIG_CRYPTO_ARCH_HAVE_LIB_CHACHA))
^
include/crypto/chacha.h:88:3: note: Calling 'chacha_init_generic'
chacha_init_generic(state, key, iv);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/crypto/chacha.h:78:14: note: Calling 'get_unaligned_le32'
state[13] = get_unaligned_le32(iv + 4);
^~~~~~~~~~~~~~~~~~~~~~~~~~~
include/asm-generic/unaligned.h:32:2: note: Undefined or garbage value returned to caller
return le32_to_cpu(__get_unaligned_t(__le32, p));
^
lib/crypto/chacha20poly1305.c:41:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(iv, 0, 8);
^~~~~~
lib/crypto/chacha20poly1305.c:41:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(iv, 0, 8);
^~~~~~
lib/crypto/chacha20poly1305.c:42:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(iv + 8, nonce + 16, 8);
^~~~~~
lib/crypto/chacha20poly1305.c:42:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(iv + 8, nonce + 16, 8);
^~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
13 warnings generated.
Suppressed 13 warnings (13 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
50 warnings generated.
>> block/blk-mq-debugfs.c:751:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(name, sizeof(name), "cpu%u", ctx->cpu);
^~~~~~~~
block/blk-mq-debugfs.c:751:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(name, sizeof(name), "cpu%u", ctx->cpu);
^~~~~~~~
block/blk-mq-debugfs.c:764:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(name, sizeof(name), "hctx%u", hctx->queue_num);
^~~~~~~~
block/blk-mq-debugfs.c:764:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(name, sizeof(name), "hctx%u", hctx->queue_num);
^~~~~~~~
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
86 warnings generated.
fs/file.c:61:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(nfdt->open_fds, ofdt->open_fds, cpy);
^~~~~~
fs/file.c:61:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(nfdt->open_fds, ofdt->open_fds, cpy);
^~~~~~
fs/file.c:62:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset((char *)nfdt->open_fds + cpy, 0, set);
^~~~~~
fs/file.c:62:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset((char *)nfdt->open_fds + cpy, 0, set);
^~~~~~
fs/file.c:63:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(nfdt->close_on_exec, ofdt->close_on_exec, cpy);
^~~~~~
fs/file.c:63:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(nfdt->close_on_exec, ofdt->close_on_exec, cpy);
^~~~~~
fs/file.c:64:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset((char *)nfdt->close_on_exec + cpy, 0, set);
^~~~~~
fs/file.c:64:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset((char *)nfdt->close_on_exec + cpy, 0, set);
^~~~~~
fs/file.c:68:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(nfdt->full_fds_bits, ofdt->full_fds_bits, cpy);
^~~~~~
fs/file.c:68:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(nfdt->full_fds_bits, ofdt->full_fds_bits, cpy);
^~~~~~
fs/file.c:69:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset((char *)nfdt->full_fds_bits + cpy, 0, set);
^~~~~~
fs/file.c:69:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset((char *)nfdt->full_fds_bits + cpy, 0, set);
^~~~~~
fs/file.c:84:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(nfdt->fd, ofdt->fd, cpy);
^~~~~~
fs/file.c:84:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(nfdt->fd, ofdt->fd, cpy);
^~~~~~
fs/file.c:85:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset((char *)nfdt->fd + cpy, 0, set);
^~~~~~
fs/file.c:85:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset((char *)nfdt->fd + cpy, 0, set);
^~~~~~
fs/file.c:371:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(new_fds, 0, (new_fdt->max_fds - open_files) * sizeof(struct file *));
^~~~~~
fs/file.c:371:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(new_fds, 0, (new_fdt->max_fds - open_files) * sizeof(struct file *));
^~~~~~
include/linux/log2.h:57:13: warning: The result of the left shift is undefined due to shifting by '32', which is greater or equal to the width of type 'unsigned long' [clang-analyzer-core.UndefinedBinaryOperatorResult]
return 1UL << fls_long(n - 1);
^
fs/file.c:296:6: note: Assuming 'newf' is non-null
if (!newf)
^~~~~
fs/file.c:296:2: note: Taking false branch
if (!newf)
^
fs/file.c:301:2: note: Loop condition is false. Exiting loop
spin_lock_init(&newf->file_lock);
^
include/linux/spinlock.h:329:35: note: expanded from macro 'spin_lock_init'
# define spin_lock_init(lock) \
^
fs/file.c:303:2: note: Loop condition is false. Exiting loop
init_waitqueue_head(&newf->resize_wait);
^
include/linux/wait.h:67:2: note: expanded from macro 'init_waitqueue_head'
do { \
^
fs/file.c:313:12: note: Left side of '||' is false
old_fdt = files_fdtable(oldf);
--
^~~~~~
lib/bitmap.c:222:2: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(dst, src, len * sizeof(*dst));
^~~~~~~
lib/bitmap.c:222:2: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(dst, src, len * sizeof(*dst));
^~~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
54 warnings generated.
include/linux/scatterlist.h:76:9: warning: Access to field 'page_link' results in a dereference of a null pointer (loaded from variable 'sg') [clang-analyzer-core.NullDereference]
return sg->page_link & SG_PAGE_LINK_MASK;
^
lib/scatterlist.c:103:27: note: 'ret' initialized to a null pointer value
struct scatterlist *sg, *ret = NULL;
^~~
lib/scatterlist.c:106:30: note: Assuming 'i' is >= 'nents'
for_each_sg(sgl, sg, nents, i)
^
include/linux/scatterlist.h:169:31: note: expanded from macro 'for_each_sg'
for (__i = 0, sg = (sglist); __i < (nr); __i++, sg = sg_next(sg))
^~~~~~~~~~
lib/scatterlist.c:106:2: note: Loop condition is false. Execution continues on line 109
for_each_sg(sgl, sg, nents, i)
^
include/linux/scatterlist.h:169:2: note: expanded from macro 'for_each_sg'
for (__i = 0, sg = (sglist); __i < (nr); __i++, sg = sg_next(sg))
^
lib/scatterlist.c:109:21: note: Passing null pointer value via 1st parameter 'sg'
BUG_ON(!sg_is_last(ret));
^
include/asm-generic/bug.h:161:45: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^~~~~~~~~
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
lib/scatterlist.c:109:10: note: Calling 'sg_is_last'
BUG_ON(!sg_is_last(ret));
^
include/asm-generic/bug.h:161:45: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^~~~~~~~~
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
include/linux/scatterlist.h:91:20: note: Passing null pointer value via 1st parameter 'sg'
return __sg_flags(sg) & SG_END;
^~
include/linux/scatterlist.h:91:9: note: Calling '__sg_flags'
return __sg_flags(sg) & SG_END;
^~~~~~~~~~~~~~
include/linux/scatterlist.h:76:9: note: Access to field 'page_link' results in a dereference of a null pointer (loaded from variable 'sg')
return sg->page_link & SG_PAGE_LINK_MASK;
^~
lib/scatterlist.c:126:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(sgl, 0, sizeof(*sgl) * nents);
^~~~~~
lib/scatterlist.c:126:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(sgl, 0, sizeof(*sgl) * nents);
^~~~~~
lib/scatterlist.c:292:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(table, 0, sizeof(*table));
^~~~~~
lib/scatterlist.c:292:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(table, 0, sizeof(*table));
^~~~~~
lib/scatterlist.c:579:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(sgt, &append.sgt, sizeof(*sgt));
^~~~~~
lib/scatterlist.c:579:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(sgt, &append.sgt, sizeof(*sgt));
^~~~~~
lib/scatterlist.c:789:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(miter, 0, sizeof(struct sg_mapping_iter));
^~~~~~
lib/scatterlist.c:789:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(miter, 0, sizeof(struct sg_mapping_iter));
^~~~~~
lib/scatterlist.c:971:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf + offset, miter.addr, len);
^~~~~~
lib/scatterlist.c:971:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf + offset, miter.addr, len);
^~~~~~
lib/scatterlist.c:973:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(miter.addr, buf + offset, len);
^~~~~~
lib/scatterlist.c:973:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(miter.addr, buf + offset, len);
^~~~~~
lib/scatterlist.c:1079:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(miter.addr, 0, len);
^~~~~~
lib/scatterlist.c:1079:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(miter.addr, 0, len);
^~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
>> arch/riscv/kvm/mmu.c:352:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&pcache, 0, sizeof(pcache));
^~~~~~
arch/riscv/kvm/mmu.c:352:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&pcache, 0, sizeof(pcache));
^~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
36 warnings generated.
>> arch/riscv/kvm/vcpu.c:68:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(csr, reset_csr, sizeof(*csr));
^~~~~~
arch/riscv/kvm/vcpu.c:68:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(csr, reset_csr, sizeof(*csr));
^~~~~~
arch/riscv/kvm/vcpu.c:70:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(cntx, reset_cntx, sizeof(*cntx));
^~~~~~
arch/riscv/kvm/vcpu.c:70:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(cntx, reset_cntx, sizeof(*cntx));
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
>> arch/riscv/kvm/vcpu_exit.c:287:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(run->mmio.data, data_buf, len);
^~~~~~
arch/riscv/kvm/vcpu_exit.c:287:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(run->mmio.data, data_buf, len);
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
49 warnings generated.
fs/udf/file.c:53:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(kaddr, iinfo->i_data + iinfo->i_lenEAttr, isize);
^~~~~~
fs/udf/file.c:53:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(kaddr, iinfo->i_data + iinfo->i_lenEAttr, isize);
^~~~~~
fs/udf/file.c:54:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(kaddr + isize, 0, PAGE_SIZE - isize);
^~~~~~
fs/udf/file.c:54:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(kaddr + isize, 0, PAGE_SIZE - isize);
^~~~~~
fs/udf/file.c:79:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(iinfo->i_data + iinfo->i_lenEAttr, kaddr, i_size_read(inode));
^~~~~~
fs/udf/file.c:79:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(iinfo->i_data + iinfo->i_lenEAttr, kaddr, i_size_read(inode));
^~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
78 warnings generated.
fs/udf/inode.c:103:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(pos, &iinfo->cached_extent.epos,
^~~~~~
fs/udf/inode.c:103:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(pos, &iinfo->cached_extent.epos,
^~~~~~
fs/udf/inode.c:124:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&iinfo->cached_extent.epos, pos, sizeof(*pos));
^~~~~~
fs/udf/inode.c:124:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&iinfo->cached_extent.epos, pos, sizeof(*pos));
^~~~~~
fs/udf/inode.c:286:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(kaddr + iinfo->i_lenAlloc, 0x00,
^~~~~~
fs/udf/inode.c:286:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(kaddr + iinfo->i_lenAlloc, 0x00,
^~~~~~
fs/udf/inode.c:288:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(kaddr, iinfo->i_data + iinfo->i_lenEAttr,
^~~~~~
fs/udf/inode.c:288:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(kaddr, iinfo->i_data + iinfo->i_lenEAttr,
^~~~~~
fs/udf/inode.c:295:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(iinfo->i_data + iinfo->i_lenEAttr, 0x00,
^~~~~~
fs/udf/inode.c:295:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(iinfo->i_data + iinfo->i_lenEAttr, 0x00,
^~~~~~
fs/udf/inode.c:313:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(iinfo->i_data + iinfo->i_lenEAttr, kaddr, inode->i_size);
^~~~~~
fs/udf/inode.c:313:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(iinfo->i_data + iinfo->i_lenEAttr, kaddr, inode->i_size);
^~~~~~
fs/udf/inode.c:368:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(dbh->b_data, 0x00, inode->i_sb->s_blocksize);
^~~~~~
fs/udf/inode.c:368:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(dbh->b_data, 0x00, inode->i_sb->s_blocksize);
^~~~~~
fs/udf/inode.c:400:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(iinfo->i_data + iinfo->i_lenEAttr, 0, iinfo->i_lenAlloc);
^~~~~~
fs/udf/inode.c:400:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(iinfo->i_data + iinfo->i_lenEAttr, 0, iinfo->i_lenAlloc);
^~~~~~
fs/udf/inode.c:468:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(bh->b_data, 0x00, inode->i_sb->s_blocksize);
^~~~~~
fs/udf/inode.c:468:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(bh->b_data, 0x00, inode->i_sb->s_blocksize);
^~~~~~
fs/udf/inode.c:790:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&laarr[0].extLocation, 0x00,
^~~~~~
fs/udf/inode.c:790:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&laarr[0].extLocation, 0x00,
^~~~~~
fs/udf/inode.c:817:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&laarr[c].extLocation, 0x00,
^~~~~~
fs/udf/inode.c:817:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&laarr[c].extLocation, 0x00,
--
^~~~~~~~~~~~~~~~
lib/zstd/decompress/huf_decompress.c:717:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
ZSTD_memcpy(op, dt+val, 2);
^
lib/zstd/decompress/../common/zstd_deps.h:32:28: note: expanded from macro 'ZSTD_memcpy'
#define ZSTD_memcpy(d,s,n) __builtin_memcpy((d),(s),(n))
^~~~~~~~~~~~~~~~
lib/zstd/decompress/huf_decompress.c:726:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ZSTD_memcpy(op, dt+val, 1);
^
lib/zstd/decompress/../common/zstd_deps.h:32:28: note: expanded from macro 'ZSTD_memcpy'
#define ZSTD_memcpy(d,s,n) __builtin_memcpy((d),(s),(n))
^~~~~~~~~~~~~~~~
lib/zstd/decompress/huf_decompress.c:726:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
ZSTD_memcpy(op, dt+val, 1);
^
lib/zstd/decompress/../common/zstd_deps.h:32:28: note: expanded from macro 'ZSTD_memcpy'
#define ZSTD_memcpy(d,s,n) __builtin_memcpy((d),(s),(n))
^~~~~~~~~~~~~~~~
lib/zstd/decompress/huf_decompress.c:1113:32: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (cSrcSize == dstSize) { ZSTD_memcpy(dst, cSrc, dstSize); return dstSize; } /* not compressed */
^
lib/zstd/decompress/../common/zstd_deps.h:32:28: note: expanded from macro 'ZSTD_memcpy'
#define ZSTD_memcpy(d,s,n) __builtin_memcpy((d),(s),(n))
^~~~~~~~~~~~~~~~
lib/zstd/decompress/huf_decompress.c:1113:32: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
if (cSrcSize == dstSize) { ZSTD_memcpy(dst, cSrc, dstSize); return dstSize; } /* not compressed */
^
lib/zstd/decompress/../common/zstd_deps.h:32:28: note: expanded from macro 'ZSTD_memcpy'
#define ZSTD_memcpy(d,s,n) __builtin_memcpy((d),(s),(n))
^~~~~~~~~~~~~~~~
lib/zstd/decompress/huf_decompress.c:1114:26: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (cSrcSize == 1) { ZSTD_memset(dst, *(const BYTE*)cSrc, dstSize); return dstSize; } /* RLE */
^
lib/zstd/decompress/../common/zstd_deps.h:34:28: note: expanded from macro 'ZSTD_memset'
#define ZSTD_memset(d,s,n) __builtin_memset((d),(s),(n))
^~~~~~~~~~~~~~~~
lib/zstd/decompress/huf_decompress.c:1114:26: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
if (cSrcSize == 1) { ZSTD_memset(dst, *(const BYTE*)cSrc, dstSize); return dstSize; } /* RLE */
^
lib/zstd/decompress/../common/zstd_deps.h:34:28: note: expanded from macro 'ZSTD_memset'
#define ZSTD_memset(d,s,n) __builtin_memset((d),(s),(n))
^~~~~~~~~~~~~~~~
Suppressed 1 warnings (1 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
21 warnings generated.
lib/crypto/blake2s-generic.c:56:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(m, block, BLAKE2S_BLOCK_SIZE);
^~~~~~
lib/crypto/blake2s-generic.c:56:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(m, block, BLAKE2S_BLOCK_SIZE);
^~~~~~
lib/crypto/blake2s-generic.c:58:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(v, state->h, 32);
^~~~~~
lib/crypto/blake2s-generic.c:58:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(v, state->h, 32);
^~~~~~
Suppressed 19 warnings (19 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
40 warnings generated.
lib/mpi/mpicoder.c:290:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(p, (u8 *)&alimb + lzeros, BYTES_PER_MPI_LIMB - lzeros);
^~~~~~
lib/mpi/mpicoder.c:290:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(p, (u8 *)&alimb + lzeros, BYTES_PER_MPI_LIMB - lzeros);
^~~~~~
lib/mpi/mpicoder.c:387:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(p2, 0, i);
^~~~~~
lib/mpi/mpicoder.c:387:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(p2, 0, i);
^~~~~~
lib/mpi/mpicoder.c:615:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(s, tmp, n-!!extra);
^~~~~~
lib/mpi/mpicoder.c:615:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(s, tmp, n-!!extra);
^~~~~~
lib/mpi/mpicoder.c:636:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buffer, tmp, n);
^~~~~~
lib/mpi/mpicoder.c:636:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buffer, tmp, n);
^~~~~~
lib/mpi/mpicoder.c:661:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(s+2, tmp, n);
^~~~~~
lib/mpi/mpicoder.c:661:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(s+2, tmp, n);
^~~~~~
lib/mpi/mpicoder.c:703:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(s, tmp, n-!!extra);
^~~~~~
lib/mpi/mpicoder.c:703:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(s, tmp, n-!!extra);
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
>> fs/freevxfs/vxfs_inode.c:127:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&vip->vii_org, &dip->vdi_org, sizeof(vip->vii_org));
^~~~~~
fs/freevxfs/vxfs_inode.c:127:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&vip->vii_org, &dip->vdi_org, sizeof(vip->vii_org));
^~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
fs/exportfs/expfs.c:260:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf->name, name, len);
^~~~~~
fs/exportfs/expfs.c:260:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf->name, name, len);
^~~~~~
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
13 warnings generated.
fs/nls/nls_base.c:227:10: warning: Dereference of null pointer [clang-analyzer-core.NullDereference]
*op++ = (u8) u;
~~~~~~^~~~~~~~
fs/nls/nls_base.c:194:9: note: Assuming 'inlen' is > 0
while (inlen > 0 && maxout > 0) {
^~~~~~~~~
fs/nls/nls_base.c:194:9: note: Left side of '&&' is true
fs/nls/nls_base.c:194:22: note: Assuming 'maxout' is > 0
while (inlen > 0 && maxout > 0) {
^~~~~~~~~~
fs/nls/nls_base.c:194:2: note: Loop condition is true. Entering loop body
while (inlen > 0 && maxout > 0) {
^
fs/nls/nls_base.c:195:7: note: Calling 'get_utf16'
u = get_utf16(*pwcs, endian);
^~~~~~~~~~~~~~~~~~~~~~~~
fs/nls/nls_base.c:176:2: note: Control jumps to the 'default' case at line 177
switch (endian) {
^
fs/nls/nls_base.c:178:3: note: Returning value (loaded from 'c'), which participates in a condition later
return c;
^~~~~~~~
fs/nls/nls_base.c:195:7: note: Returning from 'get_utf16'
u = get_utf16(*pwcs, endian);
^~~~~~~~~~~~~~~~~~~~~~~~
fs/nls/nls_base.c:196:7: note: Assuming 'u' is not equal to 0
if (!u)
^~
fs/nls/nls_base.c:196:3: note: Taking false branch
if (!u)
^
fs/nls/nls_base.c:200:7: note: Assuming 'u' is > 127
if (u > 0x7f) {
^~~~~~~~
fs/nls/nls_base.c:200:3: note: Taking true branch
if (u > 0x7f) {
^
fs/nls/nls_base.c:201:8: note: Assuming the condition is false
if ((u & SURROGATE_MASK) == SURROGATE_PAIR) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/nls/nls_base.c:201:4: note: Taking false branch
if ((u & SURROGATE_MASK) == SURROGATE_PAIR) {
^
fs/nls/nls_base.c:220:4: note: Taking false branch
if (size == -1) {
^
fs/nls/nls_base.c:194:9: note: Assuming 'inlen' is > 0
while (inlen > 0 && maxout > 0) {
^~~~~~~~~
fs/nls/nls_base.c:194:9: note: Left side of '&&' is true
fs/nls/nls_base.c:194:22: note: 'maxout' is > 0
while (inlen > 0 && maxout > 0) {
^~~~~~
fs/nls/nls_base.c:194:2: note: Loop condition is true. Entering loop body
while (inlen > 0 && maxout > 0) {
^
fs/nls/nls_base.c:195:7: note: Calling 'get_utf16'
u = get_utf16(*pwcs, endian);
^~~~~~~~~~~~~~~~~~~~~~~~
fs/nls/nls_base.c:176:2: note: Control jumps to the 'default' case at line 177
switch (endian) {
^
fs/nls/nls_base.c:178:3: note: Returning value (loaded from 'c'), which participates in a condition later
return c;
^~~~~~~~
fs/nls/nls_base.c:195:7: note: Returning from 'get_utf16'
u = get_utf16(*pwcs, endian);
^~~~~~~~~~~~~~~~~~~~~~~~
fs/nls/nls_base.c:196:7: note: Assuming 'u' is not equal to 0
if (!u)
^~
--
47 warnings generated.
crypto/scatterwalk.c:23:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dst, src, nbytes);
^~~~~~
crypto/scatterwalk.c:23:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dst, src, nbytes);
^~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
16 warnings generated.
lib/xz/xz_dec_bcj.c:404:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(b->out + b->out_pos, s->temp.buf, copy_size);
^~~~~~
lib/xz/xz_dec_bcj.c:404:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(b->out + b->out_pos, s->temp.buf, copy_size);
^~~~~~
lib/xz/xz_dec_bcj.c:409:2: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(s->temp.buf, s->temp.buf + copy_size, s->temp.size);
^~~~~~~
lib/xz/xz_dec_bcj.c:409:2: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(s->temp.buf, s->temp.buf + copy_size, s->temp.size);
^~~~~~~
lib/xz/xz_dec_bcj.c:451:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(b->out + b->out_pos, s->temp.buf, s->temp.size);
^~~~~~
lib/xz/xz_dec_bcj.c:451:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(b->out + b->out_pos, s->temp.buf, s->temp.size);
^~~~~~
lib/xz/xz_dec_bcj.c:471:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(s->temp.buf, b->out + b->out_pos, s->temp.size);
^~~~~~
lib/xz/xz_dec_bcj.c:471:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(s->temp.buf, b->out + b->out_pos, s->temp.size);
^~~~~~
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
13 warnings generated.
Suppressed 13 warnings (13 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
33 warnings generated.
lib/seq_buf.c:64:9: warning: Call to function 'vsnprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'vsnprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len = vsnprintf(s->buffer + s->len, s->size - s->len, fmt, args);
^~~~~~~~~
lib/seq_buf.c:64:9: note: Call to function 'vsnprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'vsnprintf_s' in case of C11
len = vsnprintf(s->buffer + s->len, s->size - s->len, fmt, args);
^~~~~~~~~
lib/seq_buf.c:152:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(s->buffer + s->len, str, len);
^~~~~~
lib/seq_buf.c:152:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(s->buffer + s->len, str, len);
^~~~~~
lib/seq_buf.c:199:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(s->buffer + s->len, mem, len);
^~~~~~
lib/seq_buf.c:199:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(s->buffer + s->len, mem, len);
^~~~~~
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
4 warnings generated.
Suppressed 4 warnings (4 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
2 warnings generated.
Suppressed 2 warnings (2 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
lib/dump_stack.c:35:2: warning: Call to function 'vsnprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'vsnprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
vsnprintf(dump_stack_arch_desc_str, sizeof(dump_stack_arch_desc_str),
^~~~~~~~~
lib/dump_stack.c:35:2: note: Call to function 'vsnprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'vsnprintf_s' in case of C11
vsnprintf(dump_stack_arch_desc_str, sizeof(dump_stack_arch_desc_str),
^~~~~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
4 warnings generated.
Suppressed 4 warnings (4 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
>> fs/efs/symlink.c:32:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(link, bh->b_data, (size > EFS_BLOCKSIZE) ? EFS_BLOCKSIZE : size);
^~~~~~
fs/efs/symlink.c:32:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(link, bh->b_data, (size > EFS_BLOCKSIZE) ? EFS_BLOCKSIZE : size);
^~~~~~
fs/efs/symlink.c:38:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(link + EFS_BLOCKSIZE, bh->b_data, size - EFS_BLOCKSIZE);
^~~~~~
fs/efs/symlink.c:38:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(link + EFS_BLOCKSIZE, bh->b_data, size - EFS_BLOCKSIZE);
^~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
66 warnings generated.
kernel/cred.c:267:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(new, old, sizeof(struct cred));
^~~~~~
kernel/cred.c:267:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(new, old, sizeof(struct cred));
^~~~~~
Suppressed 65 warnings (65 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
kernel/reboot.c:721:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", val);
^~~~~~~
kernel/reboot.c:721:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", val);
^~~~~~~
kernel/reboot.c:831:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", reboot_cpu);
^~~~~~~
kernel/reboot.c:831:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", reboot_cpu);
^~~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
15 warnings generated.
kernel/async.c:125:2: warning: Value stored to 'calltime' is never read [clang-analyzer-deadcode.DeadStores]
calltime = ktime_get();
^ ~~~~~~~~~~~
kernel/async.c:125:2: note: Value stored to 'calltime' is never read
calltime = ktime_get();
^ ~~~~~~~~~~~
kernel/async.c:272:2: warning: Value stored to 'starttime' is never read [clang-analyzer-deadcode.DeadStores]
starttime = ktime_get();
^ ~~~~~~~~~~~
kernel/async.c:272:2: note: Value stored to 'starttime' is never read
starttime = ktime_get();
^ ~~~~~~~~~~~
Suppressed 13 warnings (13 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
62 warnings generated.
fs/ext4/resize.c:383:3: warning: Value stored to 'group' is never read [clang-analyzer-deadcode.DeadStores]
group = group_data[0].group;
^ ~~~~~~~~~~~~~~~~~~~
fs/ext4/resize.c:383:3: note: Value stored to 'group' is never read
group = group_data[0].group;
^ ~~~~~~~~~~~~~~~~~~~
fs/ext4/resize.c:417:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(bh->b_data, 0, sb->s_blocksize);
^~~~~~
fs/ext4/resize.c:417:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(bh->b_data, 0, sb->s_blocksize);
^~~~~~
fs/ext4/resize.c:449:7: warning: Value stored to 'count2' is never read [clang-analyzer-deadcode.DeadStores]
for (count2 = count; count > 0;
^ ~~~~~
fs/ext4/resize.c:449:7: note: Value stored to 'count2' is never read
for (count2 = count; count > 0;
^ ~~~~~
fs/ext4/resize.c:580:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(gdb->b_data, sbi_array_rcu_deref(sbi,
^~~~~~
fs/ext4/resize.c:580:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(gdb->b_data, sbi_array_rcu_deref(sbi,
^~~~~~
fs/ext4/resize.c:903:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(gdb_bh->b_data, 0, sb->s_blocksize);
^~~~~~
fs/ext4/resize.c:903:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(gdb_bh->b_data, 0, sb->s_blocksize);
^~~~~~
fs/ext4/resize.c:914:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(n_group_desc, o_group_desc,
--
^
lib/rhashtable.c:1031:20: note: '?' condition is false
ht->p.min_size = roundup_pow_of_two(params->min_size);
^
include/linux/log2.h:176:2: note: expanded from macro 'roundup_pow_of_two'
__builtin_constant_p(n) ? ( \
^
lib/rhashtable.c:1031:20: note: Calling '__roundup_pow_of_two'
ht->p.min_size = roundup_pow_of_two(params->min_size);
^
include/linux/log2.h:180:2: note: expanded from macro 'roundup_pow_of_two'
__roundup_pow_of_two(n) \
^~~~~~~~~~~~~~~~~~~~~~~
include/linux/log2.h:57:16: note: Calling 'fls_long'
return 1UL << fls_long(n - 1);
^~~~~~~~~~~~~~~
include/linux/bitops.h:154:2: note: Taking true branch
if (sizeof(l) == 4)
^
include/linux/bitops.h:155:10: note: Calling 'fls'
return fls(l);
^~~~~~
include/asm-generic/bitops/fls.h:15:2: note: 'r' initialized to 32
int r = 32;
^~~~~
include/asm-generic/bitops/fls.h:17:6: note: Assuming 'x' is not equal to 0, which participates in a condition later
if (!x)
^~
include/asm-generic/bitops/fls.h:17:2: note: Taking false branch
if (!x)
^
include/asm-generic/bitops/fls.h:19:6: note: Assuming the condition is false
if (!(x & 0xffff0000u)) {
^~~~~~~~~~~~~~~~~~
include/asm-generic/bitops/fls.h:19:2: note: Taking false branch
if (!(x & 0xffff0000u)) {
^
include/asm-generic/bitops/fls.h:23:6: note: Assuming the condition is false
if (!(x & 0xff000000u)) {
^~~~~~~~~~~~~~~~~~
include/asm-generic/bitops/fls.h:23:2: note: Taking false branch
if (!(x & 0xff000000u)) {
^
include/asm-generic/bitops/fls.h:27:6: note: Assuming the condition is false
if (!(x & 0xf0000000u)) {
^~~~~~~~~~~~~~~~~~
include/asm-generic/bitops/fls.h:27:2: note: Taking false branch
if (!(x & 0xf0000000u)) {
^
include/asm-generic/bitops/fls.h:31:6: note: Assuming the condition is false
if (!(x & 0xc0000000u)) {
^~~~~~~~~~~~~~~~~~
include/asm-generic/bitops/fls.h:31:2: note: Taking false branch
if (!(x & 0xc0000000u)) {
^
include/asm-generic/bitops/fls.h:35:6: note: Assuming the condition is false
if (!(x & 0x80000000u)) {
^~~~~~~~~~~~~~~~~~
include/asm-generic/bitops/fls.h:35:2: note: Taking false branch
if (!(x & 0x80000000u)) {
^
include/asm-generic/bitops/fls.h:39:2: note: Returning the value 32 (loaded from 'r')
return r;
^~~~~~~~
include/linux/bitops.h:155:10: note: Returning from 'fls'
return fls(l);
^~~~~~
include/linux/bitops.h:155:3: note: Returning the value 32
return fls(l);
^~~~~~~~~~~~~
include/linux/log2.h:57:16: note: Returning from 'fls_long'
return 1UL << fls_long(n - 1);
^~~~~~~~~~~~~~~
include/linux/log2.h:57:13: note: The result of the left shift is undefined due to shifting by '32', which is greater or equal to the width of type 'unsigned long'
return 1UL << fls_long(n - 1);
^ ~~~~~~~~~~~~~~~
lib/rhashtable.c:792:21: warning: Value stored to 'p' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct rhash_head *p = iter->p;
^ ~~~~~~~
lib/rhashtable.c:792:21: note: Value stored to 'p' during its initialization is never read
struct rhash_head *p = iter->p;
^ ~~~~~~~
lib/rhashtable.c:1025:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ht, 0, sizeof(*ht));
^~~~~~
lib/rhashtable.c:1025:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(ht, 0, sizeof(*ht));
^~~~~~
lib/rhashtable.c:1028:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&ht->p, params, sizeof(*params));
^~~~~~
lib/rhashtable.c:1028:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&ht->p, params, sizeof(*params));
^~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
>> arch/riscv/kvm/vcpu_sbi_v01.c:27:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&run->system_event, 0, sizeof(run->system_event));
^~~~~~
arch/riscv/kvm/vcpu_sbi_v01.c:27:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&run->system_event, 0, sizeof(run->system_event));
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
Suppressed 48 warnings (47 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
37 warnings generated.
lib/mpi/mpih-div.c:127:18: warning: Assigned value is garbage or undefined [clang-analyzer-core.uninitialized.Assign]
divisor_limb <<= normalization_steps;
^ ~~~~~~~~~~~~~~~~~~~
lib/mpi/mpih-div.c:37:6: note: Assuming 'dividend_size' is not equal to 0
if (!dividend_size)
^~~~~~~~~~~~~~
lib/mpi/mpih-div.c:37:2: note: Taking false branch
if (!dividend_size)
^
lib/mpi/mpih-div.c:49:4: note: Left side of '&&' is false
&& (UDIV_TIME - (2 * UMUL_TIME + 6)) * dividend_size > UDIV_TIME) {
^
lib/mpi/mpih-div.c:122:3: note: Taking true branch
if (UDIV_NEEDS_NORMALIZATION) {
^
lib/mpi/mpih-div.c:125:26: note: Calling 'count_leading_zeros'
normalization_steps = count_leading_zeros(divisor_limb);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/count_zeros.h:25:2: note: Taking true branch
if (sizeof(x) == 4)
^
include/linux/count_zeros.h:26:3: note: Returning the value 32, which participates in a condition later
return BITS_PER_LONG - fls(x);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/count_zeros.h:26:3: note: Returning the value 32
return BITS_PER_LONG - fls(x);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
lib/mpi/mpih-div.c:125:26: note: Returning from 'count_leading_zeros'
normalization_steps = count_leading_zeros(divisor_limb);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
lib/mpi/mpih-div.c:125:4: note: The value 32 is assigned to 'normalization_steps'
normalization_steps = count_leading_zeros(divisor_limb);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
lib/mpi/mpih-div.c:126:8: note: 'normalization_steps' is 32
if (normalization_steps) {
^~~~~~~~~~~~~~~~~~~
lib/mpi/mpih-div.c:126:4: note: Taking true branch
if (normalization_steps) {
^
lib/mpi/mpih-div.c:127:18: note: Assigned value is garbage or undefined
divisor_limb <<= normalization_steps;
^ ~~~~~~~~~~~~~~~~~~~
lib/mpi/mpih-div.c:202:12: warning: Division by zero [clang-analyzer-core.DivideZero]
return 1 / dsize;
~~^~~~~~~
lib/mpi/mpih-div.c:194:2: note: Control jumps to 'case 0:' at line 195
switch (dsize) {
^
lib/mpi/mpih-div.c:202:12: note: Division by zero
return 1 / dsize;
~~^~~~~~~
lib/mpi/mpih-div.c:475:18: warning: Assigned value is garbage or undefined [clang-analyzer-core.uninitialized.Assign]
divisor_limb <<= normalization_steps;
^ ~~~~~~~~~~~~~~~~~~~
lib/mpi/mpih-div.c:387:6: note: Assuming 'dividend_size' is not equal to 0
if (!dividend_size)
^~~~~~~~~~~~~~
lib/mpi/mpih-div.c:387:2: note: Taking false branch
if (!dividend_size)
^
lib/mpi/mpih-div.c:399:4: note: Left side of '&&' is false
&& (UDIV_TIME - (2 * UMUL_TIME + 6)) * dividend_size > UDIV_TIME) {
^
lib/mpi/mpih-div.c:470:3: note: Taking true branch
if (UDIV_NEEDS_NORMALIZATION) {
^
lib/mpi/mpih-div.c:473:26: note: Calling 'count_leading_zeros'
normalization_steps = count_leading_zeros(divisor_limb);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/count_zeros.h:25:2: note: Taking true branch
if (sizeof(x) == 4)
^
include/linux/count_zeros.h:26:3: note: Returning the value 32, which participates in a condition later
return BITS_PER_LONG - fls(x);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/count_zeros.h:26:3: note: Returning the value 32
return BITS_PER_LONG - fls(x);
--
^
mm/percpu.c:2526:6: note: Taking true branch
pr_cont("%s ", empty_str);
^
include/linux/printk.h:531:2: note: expanded from macro 'pr_cont'
printk(KERN_CONT fmt, ##__VA_ARGS__)
^
include/linux/printk.h:446:26: note: expanded from macro 'printk'
#define printk(fmt, ...) printk_index_wrap(_printk, fmt, ##__VA_ARGS__)
^
include/linux/printk.h:417:3: note: expanded from macro 'printk_index_wrap'
__printk_index_emit(_fmt, NULL, NULL); \
^
include/linux/printk.h:370:3: note: expanded from macro '__printk_index_emit'
if (__builtin_constant_p(_fmt) && __builtin_constant_p(_level)) { \
^
mm/percpu.c:2526:6: note: '?' condition is true
pr_cont("%s ", empty_str);
^
include/linux/printk.h:531:2: note: expanded from macro 'pr_cont'
printk(KERN_CONT fmt, ##__VA_ARGS__)
^
include/linux/printk.h:446:26: note: expanded from macro 'printk'
#define printk(fmt, ...) printk_index_wrap(_printk, fmt, ##__VA_ARGS__)
^
include/linux/printk.h:417:3: note: expanded from macro 'printk_index_wrap'
__printk_index_emit(_fmt, NULL, NULL); \
^
include/linux/printk.h:379:12: note: expanded from macro '__printk_index_emit'
.fmt = __builtin_constant_p(_fmt) ? (_fmt) : NULL, \
^
mm/percpu.c:2526:6: note: '?' condition is true
pr_cont("%s ", empty_str);
^
include/linux/printk.h:531:2: note: expanded from macro 'pr_cont'
printk(KERN_CONT fmt, ##__VA_ARGS__)
^
include/linux/printk.h:446:26: note: expanded from macro 'printk'
#define printk(fmt, ...) printk_index_wrap(_printk, fmt, ##__VA_ARGS__)
^
include/linux/printk.h:417:3: note: expanded from macro 'printk_index_wrap'
__printk_index_emit(_fmt, NULL, NULL); \
^
include/linux/printk.h:383:14: note: expanded from macro '__printk_index_emit'
.level = __builtin_constant_p(_level) ? (_level) : NULL, \
^
mm/percpu.c:2526:6: note: Loop condition is false. Exiting loop
pr_cont("%s ", empty_str);
^
include/linux/printk.h:531:2: note: expanded from macro 'pr_cont'
printk(KERN_CONT fmt, ##__VA_ARGS__)
^
include/linux/printk.h:446:26: note: expanded from macro 'printk'
#define printk(fmt, ...) printk_index_wrap(_printk, fmt, ##__VA_ARGS__)
^
include/linux/printk.h:417:3: note: expanded from macro 'printk_index_wrap'
__printk_index_emit(_fmt, NULL, NULL); \
^
include/linux/printk.h:369:2: note: expanded from macro '__printk_index_emit'
do { \
^
mm/percpu.c:2521:26: note: Assuming 'unit' is >= 'unit_end'
for (unit_end += upa; unit < unit_end; unit++)
^~~~~~~~~~~~~~~
mm/percpu.c:2521:4: note: Loop condition is false. Execution continues on line 2514
for (unit_end += upa; unit < unit_end; unit++)
^
mm/percpu.c:2514:8: note: Assuming 'alloc' is >= 'alloc_end'
alloc < alloc_end; alloc++) {
^~~~~~~~~~~~~~~~~
mm/percpu.c:2513:3: note: Loop condition is false. Execution continues on line 2508
for (alloc_end += gi->nr_units / upa;
^
mm/percpu.c:2508:18: note: Assuming 'group' is < field 'nr_groups'
for (group = 0; group < ai->nr_groups; group++) {
^~~~~~~~~~~~~~~~~~~~~
mm/percpu.c:2508:2: note: Loop condition is true. Entering loop body
for (group = 0; group < ai->nr_groups; group++) {
^
mm/percpu.c:2512:23: note: Division by zero
BUG_ON(gi->nr_units % upa);
^
include/asm-generic/bug.h:161:45: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^~~~~~~~~
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
mm/percpu.c:2869:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(group_map, 0, sizeof(group_map));
^~~~~~
mm/percpu.c:2869:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(group_map, 0, sizeof(group_map));
^~~~~~
mm/percpu.c:2870:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(group_cnt, 0, sizeof(group_cnt));
^~~~~~
mm/percpu.c:2870:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(group_cnt, 0, sizeof(group_cnt));
^~~~~~
>> mm/percpu.c:3143:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ptr, __per_cpu_load, ai->static_size);
^~~~~~
mm/percpu.c:3143:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ptr, __per_cpu_load, ai->static_size);
^~~~~~
Suppressed 48 warnings (47 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
49 warnings generated.
drivers/video/backlight/pwm_bl.c:206:12: warning: Division by zero [clang-analyzer-core.DivideZero]
min((int)DIV_ROUND_UP(period, fls(period)), 4096);
^
include/linux/math.h:36:22: note: expanded from macro 'DIV_ROUND_UP'
#define DIV_ROUND_UP __KERNEL_DIV_ROUND_UP
^
include/uapi/linux/const.h:34:54: note: expanded from macro '__KERNEL_DIV_ROUND_UP'
#define __KERNEL_DIV_ROUND_UP(n, d) (((n) + (d) - 1) / (d))
^
drivers/video/backlight/pwm_bl.c:465:6: note: Assuming 'data' is non-null
if (!data) {
^~~~~
drivers/video/backlight/pwm_bl.c:465:2: note: Taking false branch
if (!data) {
^
drivers/video/backlight/pwm_bl.c:475:6: note: Assuming field 'init' is null
if (data->init) {
^~~~~~~~~~
drivers/video/backlight/pwm_bl.c:475:2: note: Taking false branch
if (data->init) {
^
drivers/video/backlight/pwm_bl.c:482:6: note: Assuming 'pb' is non-null
if (!pb) {
^~~
drivers/video/backlight/pwm_bl.c:482:2: note: Taking false branch
if (!pb) {
^
drivers/video/backlight/pwm_bl.c:498:6: note: Calling 'IS_ERR'
if (IS_ERR(pb->enable_gpio)) {
^~~~~~~~~~~~~~~~~~~~~~~
include/linux/err.h:36:9: note: Assuming the condition is false
return IS_ERR_VALUE((unsigned long)ptr);
^
include/linux/err.h:22:34: note: expanded from macro 'IS_ERR_VALUE'
#define IS_ERR_VALUE(x) unlikely((unsigned long)(void *)(x) >= (unsigned long)-MAX_ERRNO)
~~~~~~~~~^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
include/linux/err.h:36:2: note: Returning zero, which participates in a condition later
return IS_ERR_VALUE((unsigned long)ptr);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/video/backlight/pwm_bl.c:498:6: note: Returning from 'IS_ERR'
if (IS_ERR(pb->enable_gpio)) {
^~~~~~~~~~~~~~~~~~~~~~~
drivers/video/backlight/pwm_bl.c:498:2: note: Taking false branch
if (IS_ERR(pb->enable_gpio)) {
^
drivers/video/backlight/pwm_bl.c:504:6: note: Calling 'IS_ERR'
if (IS_ERR(pb->power_supply)) {
^~~~~~~~~~~~~~~~~~~~~~~~
include/linux/err.h:36:9: note: Assuming the condition is false
return IS_ERR_VALUE((unsigned long)ptr);
^
include/linux/err.h:22:34: note: expanded from macro 'IS_ERR_VALUE'
#define IS_ERR_VALUE(x) unlikely((unsigned long)(void *)(x) >= (unsigned long)-MAX_ERRNO)
~~~~~~~~~^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
include/linux/err.h:36:2: note: Returning zero, which participates in a condition later
return IS_ERR_VALUE((unsigned long)ptr);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/video/backlight/pwm_bl.c:504:6: note: Returning from 'IS_ERR'
if (IS_ERR(pb->power_supply)) {
^~~~~~~~~~~~~~~~~~~~~~~~
drivers/video/backlight/pwm_bl.c:504:2: note: Taking false branch
if (IS_ERR(pb->power_supply)) {
^
drivers/video/backlight/pwm_bl.c:510:22: note: Left side of '&&' is false
if (IS_ERR(pb->pwm) && PTR_ERR(pb->pwm) != -EPROBE_DEFER && !node) {
^
drivers/video/backlight/pwm_bl.c:516:6: note: Calling 'IS_ERR'
if (IS_ERR(pb->pwm)) {
^~~~~~~~~~~~~~~
include/linux/err.h:36:2: note: Returning zero, which participates in a condition later
return IS_ERR_VALUE((unsigned long)ptr);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/video/backlight/pwm_bl.c:516:6: note: Returning from 'IS_ERR'
if (IS_ERR(pb->pwm)) {
^~~~~~~~~~~~~~~
drivers/video/backlight/pwm_bl.c:516:2: note: Taking false branch
if (IS_ERR(pb->pwm)) {
^
drivers/video/backlight/pwm_bl.c:523:2: note: Taking false branch
dev_dbg(&pdev->dev, "got pwm for backlight\n");
^
include/linux/dev_printk.h:162:2: note: expanded from macro 'dev_dbg'
if (0) \
^
drivers/video/backlight/pwm_bl.c:526:2: note: Calling 'pwm_init_state'
pwm_init_state(pb->pwm, &state);
--
^
include/linux/minmax.h:38:14: note: expanded from macro '__careful_cmp'
__cmp_once(x, y, __UNIQUE_ID(__x), __UNIQUE_ID(__y), op))
^
include/linux/minmax.h:31:25: note: expanded from macro '__cmp_once'
typeof(x) unique_x = (x); \
^
drivers/video/backlight/pwm_bl.c:206:33: note: Calling 'fls'
min((int)DIV_ROUND_UP(period, fls(period)), 4096);
^
include/linux/math.h:36:22: note: expanded from macro 'DIV_ROUND_UP'
#define DIV_ROUND_UP __KERNEL_DIV_ROUND_UP
^
include/uapi/linux/const.h:34:57: note: expanded from macro '__KERNEL_DIV_ROUND_UP'
#define __KERNEL_DIV_ROUND_UP(n, d) (((n) + (d) - 1) / (d))
^
include/linux/minmax.h:45:33: note: expanded from macro 'min'
#define min(x, y) __careful_cmp(x, y, <)
^
include/linux/minmax.h:38:14: note: expanded from macro '__careful_cmp'
__cmp_once(x, y, __UNIQUE_ID(__x), __UNIQUE_ID(__y), op))
^
include/linux/minmax.h:31:25: note: expanded from macro '__cmp_once'
typeof(x) unique_x = (x); \
^
include/asm-generic/bitops/fls.h:17:7: note: 'x' is 0
if (!x)
^
include/asm-generic/bitops/fls.h:17:2: note: Taking true branch
if (!x)
^
include/asm-generic/bitops/fls.h:18:3: note: Returning zero
return 0;
^~~~~~~~
drivers/video/backlight/pwm_bl.c:206:33: note: Returning from 'fls'
min((int)DIV_ROUND_UP(period, fls(period)), 4096);
^
include/linux/math.h:36:22: note: expanded from macro 'DIV_ROUND_UP'
#define DIV_ROUND_UP __KERNEL_DIV_ROUND_UP
^
include/uapi/linux/const.h:34:57: note: expanded from macro '__KERNEL_DIV_ROUND_UP'
#define __KERNEL_DIV_ROUND_UP(n, d) (((n) + (d) - 1) / (d))
^
include/linux/minmax.h:45:33: note: expanded from macro 'min'
#define min(x, y) __careful_cmp(x, y, <)
^
include/linux/minmax.h:38:14: note: expanded from macro '__careful_cmp'
__cmp_once(x, y, __UNIQUE_ID(__x), __UNIQUE_ID(__y), op))
^
include/linux/minmax.h:31:25: note: expanded from macro '__cmp_once'
typeof(x) unique_x = (x); \
^
drivers/video/backlight/pwm_bl.c:206:12: note: Division by zero
min((int)DIV_ROUND_UP(period, fls(period)), 4096);
^
include/linux/math.h:36:22: note: expanded from macro 'DIV_ROUND_UP'
#define DIV_ROUND_UP __KERNEL_DIV_ROUND_UP
^
include/uapi/linux/const.h:34:54: note: expanded from macro '__KERNEL_DIV_ROUND_UP'
#define __KERNEL_DIV_ROUND_UP(n, d) (((n) + (d) - 1) / (d))
^
include/linux/minmax.h:45:33: note: expanded from macro 'min'
#define min(x, y) __careful_cmp(x, y, <)
~~~~~~~~~~~~~~^~~~~~~~
include/linux/minmax.h:38:14: note: expanded from macro '__careful_cmp'
__cmp_once(x, y, __UNIQUE_ID(__x), __UNIQUE_ID(__y), op))
~~~~~~~~~~~^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/minmax.h:31:25: note: expanded from macro '__cmp_once'
typeof(x) unique_x = (x); \
^
drivers/video/backlight/pwm_bl.c:244:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(data, 0, sizeof(*data));
^~~~~~
drivers/video/backlight/pwm_bl.c:244:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(data, 0, sizeof(*data));
^~~~~~
drivers/video/backlight/pwm_bl.c:544:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&props, 0, sizeof(struct backlight_properties));
^~~~~~
drivers/video/backlight/pwm_bl.c:544:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&props, 0, sizeof(struct backlight_properties));
^~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
>> lib/irq_poll.c:181:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(iop, 0, sizeof(*iop));
^~~~~~
lib/irq_poll.c:181:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(iop, 0, sizeof(*iop));
^~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
lib/stackdepot.c:139:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(stack->entries, entries, flex_array_size(stack, entries, size));
^~~~~~
lib/stackdepot.c:139:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(stack->entries, entries, flex_array_size(stack, entries, size));
^~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
33 warnings generated.
lib/syscall.c:15:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(info, 0, sizeof(*info));
^~~~~~
lib/syscall.c:15:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(info, 0, sizeof(*info));
^~~~~~
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
3 warnings generated.
Suppressed 3 warnings (2 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
15 warnings generated.
Suppressed 15 warnings (15 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
9 warnings generated.
Suppressed 9 warnings (9 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
13 warnings generated.
lib/glob.c:48:32: warning: Assigned value is garbage or undefined [clang-analyzer-core.uninitialized.Assign]
char const *back_pat = NULL, *back_str = back_str;
^ ~~~~~~~~
lib/glob.c:48:32: note: Assigned value is garbage or undefined
char const *back_pat = NULL, *back_str = back_str;
^ ~~~~~~~~
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
36 warnings generated.
drivers/char/ipmi/ipmi_si_platform.c:158:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&io, 0, sizeof(io));
^~~~~~
drivers/char/ipmi/ipmi_si_platform.c:158:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&io, 0, sizeof(io));
^~~~~~
drivers/char/ipmi/ipmi_si_platform.c:271:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&io, 0, sizeof(io));
^~~~~~
drivers/char/ipmi/ipmi_si_platform.c:271:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&io, 0, sizeof(io));
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
lib/mpi/ec.c:209:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(n, 0, sizeof(n));
^~~~~~
lib/mpi/ec.c:209:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(n, 0, sizeof(n));
^~~~~~
lib/mpi/ec.c:231:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(n, 0, sizeof(n));
^~~~~~
lib/mpi/ec.c:231:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(n, 0, sizeof(n));
^~~~~~
lib/mpi/ec.c:260:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(wp, n, wsize * BYTES_PER_MPI_LIMB);
^~~~~~
lib/mpi/ec.c:260:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(wp, n, wsize * BYTES_PER_MPI_LIMB);
^~~~~~
lib/mpi/ec.c:263:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(m, n+LIMB_SIZE_25519-1, (wsize+1) * BYTES_PER_MPI_LIMB);
--
#define FSE_BUILD_CTABLE_WORKSPACE_SIZE_U32(maxSymbolValue, tableLog) (maxSymbolValue + 2 + (1ull << (tableLog - 2)))
^ ~~~~~~~~~~~~~~
lib/zstd/compress/fse_compress.c:75:56: note: Assuming 'tableLog' is 0
void* const FSCT = ((U32*)ptr) + 1 /* header */ + (tableLog ? tableSize>>1 : 1) ;
^~~~~~~~
lib/zstd/compress/fse_compress.c:75:56: note: '?' condition is false
lib/zstd/compress/fse_compress.c:84:9: note: Assuming the condition is false
if ((size_t)workSpace & 3) return ERROR(GENERIC); /* Must be 4 byte aligned */
^~~~~~~~~~~~~~~~~~~~~
lib/zstd/compress/fse_compress.c:84:5: note: Taking false branch
if ((size_t)workSpace & 3) return ERROR(GENERIC); /* Must be 4 byte aligned */
^
lib/zstd/compress/fse_compress.c:85:9: note: The result of the left shift is undefined due to shifting by '4294967294', which is greater or equal to the width of type 'unsigned long long'
if (FSE_BUILD_CTABLE_WORKSPACE_SIZE(maxSymbolValue, tableLog) > wkspSize) return ERROR(tableLog_tooLarge);
^
lib/zstd/compress/../common/fse.h:338:87: note: expanded from macro 'FSE_BUILD_CTABLE_WORKSPACE_SIZE'
#define FSE_BUILD_CTABLE_WORKSPACE_SIZE(maxSymbolValue, tableLog) (sizeof(unsigned) * FSE_BUILD_CTABLE_WORKSPACE_SIZE_U32(maxSymbolValue, tableLog))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
lib/zstd/compress/../common/fse.h:337:99: note: expanded from macro 'FSE_BUILD_CTABLE_WORKSPACE_SIZE_U32'
#define FSE_BUILD_CTABLE_WORKSPACE_SIZE_U32(maxSymbolValue, tableLog) (maxSymbolValue + 2 + (1ull << (tableLog - 2)))
^ ~~~~~~~~~~~~~~
lib/zstd/compress/fse_compress.c:95:6: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ZSTD_memset(tableSymbol, 0, sizeof(*tableSymbol) * tableSize); /* useless initialization, just to keep scan-build happy */
^
lib/zstd/compress/../common/zstd_deps.h:34:28: note: expanded from macro 'ZSTD_memset'
#define ZSTD_memset(d,s,n) __builtin_memset((d),(s),(n))
^~~~~~~~~~~~~~~~
lib/zstd/compress/fse_compress.c:95:6: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
ZSTD_memset(tableSymbol, 0, sizeof(*tableSymbol) * tableSize); /* useless initialization, just to keep scan-build happy */
^
lib/zstd/compress/../common/zstd_deps.h:34:28: note: expanded from macro 'ZSTD_memset'
#define ZSTD_memset(d,s,n) __builtin_memset((d),(s),(n))
^~~~~~~~~~~~~~~~
lib/zstd/compress/fse_compress.c:579:5: warning: Value stored to 'srcSize' is never read [clang-analyzer-deadcode.DeadStores]
srcSize -= 2;
^ ~
lib/zstd/compress/fse_compress.c:579:5: note: Value stored to 'srcSize' is never read
srcSize -= 2;
^ ~
Suppressed 3 warnings (3 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
4 warnings generated.
lib/zstd/compress/hist.c:37:5: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ZSTD_memset(count, 0, (maxSymbolValue+1) * sizeof(*count));
^
lib/zstd/compress/../common/zstd_deps.h:34:28: note: expanded from macro 'ZSTD_memset'
#define ZSTD_memset(d,s,n) __builtin_memset((d),(s),(n))
^~~~~~~~~~~~~~~~
lib/zstd/compress/hist.c:37:5: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
ZSTD_memset(count, 0, (maxSymbolValue+1) * sizeof(*count));
^
lib/zstd/compress/../common/zstd_deps.h:34:28: note: expanded from macro 'ZSTD_memset'
#define ZSTD_memset(d,s,n) __builtin_memset((d),(s),(n))
^~~~~~~~~~~~~~~~
lib/zstd/compress/hist.c:84:9: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ZSTD_memset(count, 0, countSize);
^
lib/zstd/compress/../common/zstd_deps.h:34:28: note: expanded from macro 'ZSTD_memset'
#define ZSTD_memset(d,s,n) __builtin_memset((d),(s),(n))
^~~~~~~~~~~~~~~~
lib/zstd/compress/hist.c:84:9: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
ZSTD_memset(count, 0, countSize);
^
lib/zstd/compress/../common/zstd_deps.h:34:28: note: expanded from macro 'ZSTD_memset'
#define ZSTD_memset(d,s,n) __builtin_memset((d),(s),(n))
^~~~~~~~~~~~~~~~
lib/zstd/compress/hist.c:88:5: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ZSTD_memset(workSpace, 0, 4*256*sizeof(unsigned));
^
lib/zstd/compress/../common/zstd_deps.h:34:28: note: expanded from macro 'ZSTD_memset'
#define ZSTD_memset(d,s,n) __builtin_memset((d),(s),(n))
^~~~~~~~~~~~~~~~
lib/zstd/compress/hist.c:88:5: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
ZSTD_memset(workSpace, 0, 4*256*sizeof(unsigned));
^
lib/zstd/compress/../common/zstd_deps.h:34:28: note: expanded from macro 'ZSTD_memset'
#define ZSTD_memset(d,s,n) __builtin_memset((d),(s),(n))
^~~~~~~~~~~~~~~~
lib/zstd/compress/hist.c:130:9: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ZSTD_memmove(count, Counting1, countSize); /* in case count & Counting1 are overlapping */
^
lib/zstd/compress/../common/zstd_deps.h:33:29: note: expanded from macro 'ZSTD_memmove'
#define ZSTD_memmove(d,s,n) __builtin_memmove((d),(s),(n))
^~~~~~~~~~~~~~~~~
lib/zstd/compress/hist.c:130:9: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
ZSTD_memmove(count, Counting1, countSize); /* in case count & Counting1 are overlapping */
^
lib/zstd/compress/../common/zstd_deps.h:33:29: note: expanded from macro 'ZSTD_memmove'
#define ZSTD_memmove(d,s,n) __builtin_memmove((d),(s),(n))
^~~~~~~~~~~~~~~~~
35 warnings generated.
kernel/dma/coherent.c:158:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ret, 0, size);
^~~~~~
kernel/dma/coherent.c:158:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(ret, 0, size);
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
36 warnings generated.
>> kernel/dma/debug.c:599:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(entry, 0, sizeof(*entry));
^~~~~~
kernel/dma/debug.c:599:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(entry, 0, sizeof(*entry));
^~~~~~
kernel/dma/debug.c:1062:4: warning: Value stored to 'addr' is never read [clang-analyzer-deadcode.DeadStores]
addr = (u8 *)current->stack + i * PAGE_SIZE + offset;
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/dma/debug.c:1062:4: note: Value stored to 'addr' is never read
addr = (u8 *)current->stack + i * PAGE_SIZE + offset;
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
49 warnings generated.
>> init/do_mounts_rd.c:80:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buf, 0xe5, size);
^~~~~~
init/do_mounts_rd.c:80:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(buf, 0xe5, size);
^~~~~~
init/do_mounts_rd.c:252:4: warning: Value stored to 'rotate' is never read [clang-analyzer-deadcode.DeadStores]
rotate = 0;
^ ~
init/do_mounts_rd.c:252:4: note: Value stored to 'rotate' is never read
rotate = 0;
^ ~
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
10 warnings generated.
Suppressed 10 warnings (9 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
65 warnings generated.
Suppressed 65 warnings (65 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
18 warnings generated.
Suppressed 18 warnings (18 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
38 warnings generated.
drivers/pinctrl/pinctrl-single.c:732:41: warning: Division by zero [clang-analyzer-core.DivideZero]
nr_pins = (pcs->size * BITS_PER_BYTE) / pcs->bits_per_pin;
^
drivers/pinctrl/pinctrl-single.c:1786:14: note: Assuming 'soc' is non-null
if (WARN_ON(!soc))
^
include/asm-generic/bug.h:166:25: note: expanded from macro 'WARN_ON'
int __ret_warn_on = !!(condition); \
^~~~~~~~~
drivers/pinctrl/pinctrl-single.c:1786:2: note: Taking false branch
if (WARN_ON(!soc))
^
drivers/pinctrl/pinctrl-single.c:1790:6: note: Assuming 'pcs' is non-null
if (!pcs)
^~~~
drivers/pinctrl/pinctrl-single.c:1790:2: note: Taking false branch
if (!pcs)
^
drivers/pinctrl/pinctrl-single.c:1795:2: note: Loop condition is false. Exiting loop
raw_spin_lock_init(&pcs->lock);
^
include/linux/spinlock.h:102:39: note: expanded from macro 'raw_spin_lock_init'
# define raw_spin_lock_init(lock) \
^
drivers/pinctrl/pinctrl-single.c:1796:2: note: Loop condition is false. Exiting loop
mutex_init(&pcs->mutex);
^
include/linux/mutex.h:101:32: note: expanded from macro 'mutex_init'
#define mutex_init(mutex) \
^
drivers/pinctrl/pinctrl-single.c:1801:8: note: Calling 'of_property_read_u32'
ret = of_property_read_u32(np, "pinctrl-single,register-width",
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/of.h:1323:9: note: Calling 'of_property_read_u32_array'
return of_property_read_u32_array(np, propname, out_value, 1);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/of.h:1269:6: note: Assuming 'ret' is >= 0
if (ret >= 0)
^~~~~~~~
include/linux/of.h:1269:2: note: Taking true branch
if (ret >= 0)
^
include/linux/of.h:1270:3: note: Returning zero, which participates in a condition later
return 0;
^~~~~~~~
include/linux/of.h:1323:9: note: Returning from 'of_property_read_u32_array'
return of_property_read_u32_array(np, propname, out_value, 1);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/of.h:1323:2: note: Returning zero, which participates in a condition later
return of_property_read_u32_array(np, propname, out_value, 1);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/pinctrl/pinctrl-single.c:1801:8: note: Returning from 'of_property_read_u32'
ret = of_property_read_u32(np, "pinctrl-single,register-width",
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/pinctrl/pinctrl-single.c:1803:6: note: 'ret' is 0
if (ret) {
^~~
drivers/pinctrl/pinctrl-single.c:1803:2: note: Taking false branch
if (ret) {
^
drivers/pinctrl/pinctrl-single.c:1811:7: note: 'ret' is not equal to 0
if (!ret) {
^~~
drivers/pinctrl/pinctrl-single.c:1811:2: note: Taking false branch
if (!ret) {
^
drivers/pinctrl/pinctrl-single.c:1823:6: note: 'ret' is not equal to 0
if (ret)
^~~
drivers/pinctrl/pinctrl-single.c:1823:2: note: Taking true branch
if (ret)
^
drivers/pinctrl/pinctrl-single.c:1826:22: note: Calling 'of_property_read_bool'
pcs->bits_per_mux = of_property_read_bool(np,
--
include/linux/platform_device.h:243:2: note: Calling 'dev_set_drvdata'
dev_set_drvdata(&pdev->dev, data);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/device.h:699:1: note: Returning without writing to 'data->bits_per_mux', which participates in a condition later
}
^
include/linux/device.h:699:1: note: Returning without writing to 'data->fmask', which participates in a condition later
include/linux/device.h:699:1: note: Returning without writing to 'data->bits_per_pin'
include/linux/platform_device.h:243:2: note: Returning from 'dev_set_drvdata'
dev_set_drvdata(&pdev->dev, data);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/platform_device.h:244:1: note: Returning without writing to 'data->bits_per_mux', which participates in a condition later
}
^
include/linux/platform_device.h:244:1: note: Returning without writing to 'data->fmask', which participates in a condition later
include/linux/platform_device.h:244:1: note: Returning without writing to 'data->bits_per_pin'
drivers/pinctrl/pinctrl-single.c:1856:2: note: Returning from 'platform_set_drvdata'
platform_set_drvdata(pdev, pcs);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/pinctrl/pinctrl-single.c:1858:2: note: Control jumps to the 'default' case at line 1871
switch (pcs->width) {
^
drivers/pinctrl/pinctrl-single.c:1872:3: note: Execution continues on line 1875
break;
^
drivers/pinctrl/pinctrl-single.c:1878:6: note: Assuming the condition is false
if (PCS_HAS_PINCONF)
^
drivers/pinctrl/pinctrl-single.c:212:27: note: expanded from macro 'PCS_HAS_PINCONF'
#define PCS_HAS_PINCONF (pcs->flags & PCS_FEAT_PINCONF)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/pinctrl/pinctrl-single.c:1878:2: note: Taking false branch
if (PCS_HAS_PINCONF)
^
drivers/pinctrl/pinctrl-single.c:1882:8: note: Calling 'pcs_allocate_pin_table'
ret = pcs_allocate_pin_table(pcs);
^~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/pinctrl/pinctrl-single.c:730:11: note: Field 'bits_per_mux' is true
if (pcs->bits_per_mux) {
^
drivers/pinctrl/pinctrl-single.c:730:2: note: Taking true branch
if (pcs->bits_per_mux) {
^
drivers/pinctrl/pinctrl-single.c:731:23: note: Calling 'fls'
pcs->bits_per_pin = fls(pcs->fmask);
^~~~~~~~~~~~~~~
include/asm-generic/bitops/fls.h:17:6: note: Assuming 'x' is 0, which participates in a condition later
if (!x)
^~
include/asm-generic/bitops/fls.h:17:2: note: Taking true branch
if (!x)
^
include/asm-generic/bitops/fls.h:18:3: note: Returning zero
return 0;
^~~~~~~~
drivers/pinctrl/pinctrl-single.c:731:23: note: Returning from 'fls'
pcs->bits_per_pin = fls(pcs->fmask);
^~~~~~~~~~~~~~~
drivers/pinctrl/pinctrl-single.c:731:3: note: The value 0 is assigned to field 'bits_per_pin'
pcs->bits_per_pin = fls(pcs->fmask);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/pinctrl/pinctrl-single.c:732:41: note: Division by zero
nr_pins = (pcs->size * BITS_PER_BYTE) / pcs->bits_per_pin;
~~~~~~~~~~~~~~~~~~~~~~~~~~~~^~~~~~~~~~~~~~~~~~~
drivers/pinctrl/pinctrl-single.c:882:40: warning: The result of the right shift is undefined due to shifting by '4294967295', which is greater or equal to the width of type 'unsigned int' [clang-analyzer-core.UndefinedBinaryOperatorResult]
add_setting(settings, param, value[0] >> shift);
^ ~~~~~
drivers/pinctrl/pinctrl-single.c:874:8: note: Calling 'of_property_read_u32_array'
ret = of_property_read_u32_array(np, name, value, 2);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/of.h:1269:6: note: Assuming 'ret' is >= 0
if (ret >= 0)
^~~~~~~~
include/linux/of.h:1269:2: note: Taking true branch
if (ret >= 0)
^
include/linux/of.h:1270:3: note: Returning zero, which participates in a condition later
return 0;
^~~~~~~~
drivers/pinctrl/pinctrl-single.c:874:8: note: Returning from 'of_property_read_u32_array'
ret = of_property_read_u32_array(np, name, value, 2);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/pinctrl/pinctrl-single.c:875:6: note: 'ret' is 0
if (ret)
^~~
drivers/pinctrl/pinctrl-single.c:875:2: note: Taking false branch
if (ret)
^
drivers/pinctrl/pinctrl-single.c:879:2: note: The value 4294967295 is assigned to 'shift'
shift = ffs(value[1]) - 1;
^~~~~~~~~~~~~~~~~~~~~~~~~
drivers/pinctrl/pinctrl-single.c:882:40: note: The result of the right shift is undefined due to shifting by '4294967295', which is greater or equal to the width of type 'unsigned int'
add_setting(settings, param, value[0] >> shift);
^ ~~~~~
drivers/pinctrl/pinctrl-single.c:1417:3: warning: Value stored to 'mask' is never read [clang-analyzer-deadcode.DeadStores]
mask = pcs->read(pcswi->reg);
^ ~~~~~~~~~~~~~~~~~~~~~
drivers/pinctrl/pinctrl-single.c:1417:3: note: Value stored to 'mask' is never read
mask = pcs->read(pcswi->reg);
^ ~~~~~~~~~~~~~~~~~~~~~
>> drivers/pinctrl/pinctrl-single.c:1799:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&pcs->socdata, soc, sizeof(*soc));
^~~~~~
drivers/pinctrl/pinctrl-single.c:1799:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&pcs->socdata, soc, sizeof(*soc));
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
13 warnings generated.
Suppressed 13 warnings (13 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
9 warnings generated.
Suppressed 9 warnings (9 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
49 warnings generated.
mm/filemap.c:2705:4: warning: 1st function call argument is an uninitialized value [clang-analyzer-core.CallAndMessage]
folio_mark_accessed(fbatch.folios[0]);
^
mm/filemap.c:2777:6: note: Assuming 'count' is not equal to 0
if (!count)
^~~~~~
mm/filemap.c:2777:2: note: Taking false branch
if (!count)
^
mm/filemap.c:2780:6: note: Assuming the condition is false
if (iocb->ki_flags & IOCB_DIRECT) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
mm/filemap.c:2780:2: note: Taking false branch
if (iocb->ki_flags & IOCB_DIRECT) {
^
mm/filemap.c:2822:9: note: Calling 'filemap_read'
return filemap_read(iocb, iter, retval);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
mm/filemap.c:2654:15: note: Assuming field 'ki_pos' is < field 's_maxbytes'
if (unlikely(iocb->ki_pos >= inode->i_sb->s_maxbytes))
^
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
mm/filemap.c:2654:2: note: Taking false branch
if (unlikely(iocb->ki_pos >= inode->i_sb->s_maxbytes))
^
mm/filemap.c:2656:2: note: Taking false branch
if (unlikely(!iov_iter_count(iter)))
^
mm/filemap.c:2660:2: note: Calling 'folio_batch_init'
folio_batch_init(&fbatch);
^~~~~~~~~~~~~~~~~~~~~~~~~
mm/filemap.c:2660:2: note: Returning from 'folio_batch_init'
folio_batch_init(&fbatch);
^~~~~~~~~~~~~~~~~~~~~~~~~
mm/filemap.c:2670:8: note: Assuming the condition is false
if ((iocb->ki_flags & IOCB_WAITQ) && already_read)
^~~~~~~~~~~~~~~~~~~~~~~~~~~
mm/filemap.c:2670:37: note: Left side of '&&' is false
if ((iocb->ki_flags & IOCB_WAITQ) && already_read)
^
mm/filemap.c:2673:16: note: Assuming the condition is false
if (unlikely(iocb->ki_pos >= i_size_read(inode)))
^
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
mm/filemap.c:2673:3: note: Taking false branch
if (unlikely(iocb->ki_pos >= i_size_read(inode)))
^
mm/filemap.c:2676:11: note: Calling 'filemap_get_pages'
error = filemap_get_pages(iocb, iter, &fbatch);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
mm/filemap.c:2582:2: note: Taking false branch
if (fatal_signal_pending(current))
^
mm/filemap.c:2585:2: note: Calling 'filemap_get_read_batch'
filemap_get_read_batch(mapping, index, last_index, fbatch);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
mm/filemap.c:2380:2: note: Loop condition is false. Execution continues on line 2404
for (folio = xas_load(&xas); folio; folio = xas_next(&xas)) {
^
mm/filemap.c:2585:2: note: Returning from 'filemap_get_read_batch'
filemap_get_read_batch(mapping, index, last_index, fbatch);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
mm/filemap.c:2586:7: note: Calling 'folio_batch_count'
if (!folio_batch_count(fbatch)) {
^~~~~~~~~~~~~~~~~~~~~~~~~
mm/filemap.c:2586:7: note: Returning from 'folio_batch_count'
if (!folio_batch_count(fbatch)) {
^~~~~~~~~~~~~~~~~~~~~~~~~
mm/filemap.c:2586:2: note: Taking true branch
if (!folio_batch_count(fbatch)) {
^
mm/filemap.c:2587:7: note: Assuming the condition is false
if (iocb->ki_flags & IOCB_NOIO)
^~~~~~~~~~~~~~~~~~~~~~~~~~
mm/filemap.c:2587:3: note: Taking false branch
if (iocb->ki_flags & IOCB_NOIO)
^
mm/filemap.c:2591:3: note: Calling 'filemap_get_read_batch'
filemap_get_read_batch(mapping, index, last_index, fbatch);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
mm/filemap.c:2380:2: note: Loop condition is false. Execution continues on line 2404
for (folio = xas_load(&xas); folio; folio = xas_next(&xas)) {
--
^~~~~~~~~~~~~~~~
lib/zstd/decompress/zstd_decompress_block.c:1215:13: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
ZSTD_memcpy(op, litPtr, lastLLSize);
^
lib/zstd/decompress/../common/zstd_deps.h:32:28: note: expanded from macro 'ZSTD_memcpy'
#define ZSTD_memcpy(d,s,n) __builtin_memcpy((d),(s),(n))
^~~~~~~~~~~~~~~~
lib/zstd/decompress/zstd_decompress_block.c:1320:13: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ZSTD_memcpy(op, litPtr, lastLLSize);
^
lib/zstd/decompress/../common/zstd_deps.h:32:28: note: expanded from macro 'ZSTD_memcpy'
#define ZSTD_memcpy(d,s,n) __builtin_memcpy((d),(s),(n))
^~~~~~~~~~~~~~~~
lib/zstd/decompress/zstd_decompress_block.c:1320:13: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
ZSTD_memcpy(op, litPtr, lastLLSize);
^
lib/zstd/decompress/../common/zstd_deps.h:32:28: note: expanded from macro 'ZSTD_memcpy'
#define ZSTD_memcpy(d,s,n) __builtin_memcpy((d),(s),(n))
^~~~~~~~~~~~~~~~
Suppressed 4 warnings (4 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
15 warnings generated.
lib/kobject.c:156:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(path + length, kobject_name(parent), cur);
^~~~~~
lib/kobject.c:156:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(path + length, kobject_name(parent), cur);
^~~~~~
lib/kobject.c:516:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(devpath_string, "DEVPATH_OLD=%s", devpath);
^~~~~~~
lib/kobject.c:516:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(devpath_string, "DEVPATH_OLD=%s", devpath);
^~~~~~~
lib/kobject.c:582:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(devpath_string, "DEVPATH_OLD=%s", devpath);
^~~~~~~
lib/kobject.c:582:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(devpath_string, "DEVPATH_OLD=%s", devpath);
^~~~~~~
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
23 warnings generated.
Suppressed 23 warnings (23 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
36 warnings generated.
kernel/locking/mutex-debug.c:30:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(waiter, MUTEX_DEBUG_INIT, sizeof(*waiter));
^~~~~~
kernel/locking/mutex-debug.c:30:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(waiter, MUTEX_DEBUG_INIT, sizeof(*waiter));
^~~~~~
kernel/locking/mutex-debug.c:47:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(waiter, MUTEX_DEBUG_FREE, sizeof(*waiter));
^~~~~~
kernel/locking/mutex-debug.c:47:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(waiter, MUTEX_DEBUG_FREE, sizeof(*waiter));
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
41 warnings generated.
kernel/locking/lockdep.c:5911:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(current->held_locks, 0, MAX_LOCK_DEPTH*sizeof(struct held_lock));
^~~~~~
kernel/locking/lockdep.c:5911:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(current->held_locks, 0, MAX_LOCK_DEPTH*sizeof(struct held_lock));
^~~~~~
kernel/locking/lockdep.c:6020:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(p + offset, 0, sizeof(*class) - offset);
^~~~~~
kernel/locking/lockdep.c:6020:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(p + offset, 0, sizeof(*class) - offset);
^~~~~~
Suppressed 39 warnings (38 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
lib/842/842_decompress.c:205:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(p->out, &p->ostart[offset], size);
^~~~~~
lib/842/842_decompress.c:205:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(p->out, &p->ostart[offset], size);
^~~~~~
lib/842/842_decompress.c:319:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(p.out, p.out - 8, 8);
^~~~~~
lib/842/842_decompress.c:319:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(p.out, p.out - 8, 8);
^~~~~~
lib/842/842_decompress.c:332:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(p.out, 0, 8);
^~~~~~
lib/842/842_decompress.c:332:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(p.out, 0, 8);
^~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
24 warnings generated.
Suppressed 24 warnings (24 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
17 warnings generated.
>> lib/reed_solomon/test_rslib.c:169:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(c + dlen, 0, nroots * sizeof(*c));
^~~~~~
lib/reed_solomon/test_rslib.c:169:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(c + dlen, 0, nroots * sizeof(*c));
^~~~~~
>> lib/reed_solomon/test_rslib.c:173:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(r, c, len * sizeof(*r));
^~~~~~
lib/reed_solomon/test_rslib.c:173:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(r, c, len * sizeof(*r));
^~~~~~
lib/reed_solomon/test_rslib.c:174:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(errlocs, 0, len * sizeof(*errlocs));
^~~~~~
lib/reed_solomon/test_rslib.c:174:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(errlocs, 0, len * sizeof(*errlocs));
^~~~~~
lib/reed_solomon/test_rslib.c:175:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(derrlocs, 0, nroots * sizeof(*derrlocs));
^~~~~~
lib/reed_solomon/test_rslib.c:175:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(derrlocs, 0, nroots * sizeof(*derrlocs));
^~~~~~
lib/reed_solomon/test_rslib.c:395:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(corr, 0, nroots * sizeof(*corr));
^~~~~~
lib/reed_solomon/test_rslib.c:395:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(corr, 0, nroots * sizeof(*corr));
^~~~~~
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
6 warnings generated.
Suppressed 6 warnings (4 in non-user code, 2 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
58 warnings generated.
>> arch/riscv/kvm/../../../virt/kvm/kvm_main.c:964:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(dir_name, sizeof(dir_name), "%d-%d", task_pid_nr(current), fd);
^~~~~~~~
arch/riscv/kvm/../../../virt/kvm/kvm_main.c:964:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(dir_name, sizeof(dir_name), "%d-%d", task_pid_nr(current), fd);
^~~~~~~~
>> arch/riscv/kvm/../../../virt/kvm/kvm_main.c:2055:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(dirty_bitmap_buffer, 0, n);
^~~~~~
arch/riscv/kvm/../../../virt/kvm/kvm_main.c:2055:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(dirty_bitmap_buffer, 0, n);
^~~~~~
arch/riscv/kvm/../../../virt/kvm/kvm_main.c:3687:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(name, sizeof(name), "kvm-vcpu:%d", vcpu->vcpu_id);
^~~~~~~~
arch/riscv/kvm/../../../virt/kvm/kvm_main.c:3687:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(name, sizeof(name), "kvm-vcpu:%d", vcpu->vcpu_id);
^~~~~~~~
arch/riscv/kvm/../../../virt/kvm/kvm_main.c:3773:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(vcpu->stats_id, sizeof(vcpu->stats_id), "kvm-%d/vcpu-%d",
^~~~~~~~
arch/riscv/kvm/../../../virt/kvm/kvm_main.c:3773:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(vcpu->stats_id, sizeof(vcpu->stats_id), "kvm-%d/vcpu-%d",
^~~~~~~~
arch/riscv/kvm/../../../virt/kvm/kvm_main.c:3845:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(name, sizeof(name), "kvm-vcpu-stats:%d", vcpu->vcpu_id);
^~~~~~~~
arch/riscv/kvm/../../../virt/kvm/kvm_main.c:3845:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(name, sizeof(name), "kvm-vcpu-stats:%d", vcpu->vcpu_id);
^~~~~~~~
arch/riscv/kvm/../../../virt/kvm/kvm_main.c:4754:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(kvm->stats_id, sizeof(kvm->stats_id),
^~~~~~~~
arch/riscv/kvm/../../../virt/kvm/kvm_main.c:4754:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(kvm->stats_id, sizeof(kvm->stats_id),
^~~~~~~~
>> arch/riscv/kvm/../../../virt/kvm/kvm_main.c:5150:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(new_bus, bus, sizeof(*bus) + i * sizeof(struct kvm_io_range));
^~~~~~
arch/riscv/kvm/../../../virt/kvm/kvm_main.c:5150:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(new_bus, bus, sizeof(*bus) + i * sizeof(struct kvm_io_range));
^~~~~~
arch/riscv/kvm/../../../virt/kvm/kvm_main.c:5153:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(new_bus->range + i + 1, bus->range + i,
^~~~~~
arch/riscv/kvm/../../../virt/kvm/kvm_main.c:5153:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(new_bus->range + i + 1, bus->range + i,
^~~~~~
arch/riscv/kvm/../../../virt/kvm/kvm_main.c:5186:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(new_bus, bus, struct_size(bus, range, i));
^~~~~~
arch/riscv/kvm/../../../virt/kvm/kvm_main.c:5186:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(new_bus, bus, struct_size(bus, range, i));
^~~~~~
arch/riscv/kvm/../../../virt/kvm/kvm_main.c:5188:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(new_bus->range + i, bus->range + i + 1,
^~~~~~
arch/riscv/kvm/../../../virt/kvm/kvm_main.c:5188:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(new_bus->range + i, bus->range + i + 1,
^~~~~~
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
21 warnings generated.
Suppressed 21 warnings (21 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
36 warnings generated.
kernel/time/tick-sched.c:1492:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ts, 0, sizeof(*ts));
^~~~~~
kernel/time/tick-sched.c:1492:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(ts, 0, sizeof(*ts));
^~~~~~
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
16 warnings generated.
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
25 warnings generated.
Suppressed 25 warnings (25 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
36 warnings generated.
drivers/dma-buf/dma-buf.c:1196:14: warning: Access to field 'resv' results in a dereference of a null pointer (loaded from variable 'dmabuf') [clang-analyzer-core.NullDereference]
might_lock(&dmabuf->resv->lock.base);
^
drivers/dma-buf/dma-buf.c:336:2: note: Value assigned to 'dmabuf'
dmabuf = file->private_data;
^~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/dma-buf/dma-buf.c:338:2: note: Control jumps to 'case 1074291200:' at line 339
switch (cmd) {
^
drivers/dma-buf/dma-buf.c:340:7: note: Calling 'copy_from_user'
if (copy_from_user(&sync, (void __user *) arg, sizeof(sync)))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/uaccess.h:191:2: note: Taking true branch
if (likely(check_copy_size(to, n, false)))
^
include/linux/uaccess.h:193:2: note: Returning value (loaded from 'n'), which participates in a condition later
return n;
^~~~~~~~
drivers/dma-buf/dma-buf.c:340:7: note: Returning from 'copy_from_user'
if (copy_from_user(&sync, (void __user *) arg, sizeof(sync)))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/dma-buf/dma-buf.c:340:7: note: Assuming the condition is false
if (copy_from_user(&sync, (void __user *) arg, sizeof(sync)))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/dma-buf/dma-buf.c:340:3: note: Taking false branch
if (copy_from_user(&sync, (void __user *) arg, sizeof(sync)))
^
drivers/dma-buf/dma-buf.c:343:7: note: Assuming the condition is false
if (sync.flags & ~DMA_BUF_SYNC_VALID_FLAGS_MASK)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/dma-buf/dma-buf.c:343:3: note: Taking false branch
if (sync.flags & ~DMA_BUF_SYNC_VALID_FLAGS_MASK)
^
drivers/dma-buf/dma-buf.c:346:3: note: Control jumps to 'case 3:' at line 353
switch (sync.flags & DMA_BUF_SYNC_RW) {
^
drivers/dma-buf/dma-buf.c:355:4: note: Execution continues on line 360
break;
^
drivers/dma-buf/dma-buf.c:360:7: note: Assuming the condition is true
if (sync.flags & DMA_BUF_SYNC_END)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/dma-buf/dma-buf.c:360:3: note: Taking true branch
if (sync.flags & DMA_BUF_SYNC_END)
--
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/math64.h:92:15: note: '__base' initialized to 0
*remainder = do_div(dividend, divisor);
^
include/asm-generic/div64.h:220:2: note: expanded from macro 'do_div'
uint32_t __base = (base); \
^~~~~~~~~~~~~~~
include/linux/math64.h:92:15: note: Left side of '&&' is false
*remainder = do_div(dividend, divisor);
^
include/asm-generic/div64.h:223:35: note: expanded from macro 'do_div'
if (__builtin_constant_p(__base) && \
^
include/linux/math64.h:92:15: note: Left side of '&&' is false
*remainder = do_div(dividend, divisor);
^
include/asm-generic/div64.h:227:42: note: expanded from macro 'do_div'
} else if (__builtin_constant_p(__base) && \
^
include/linux/math64.h:92:15: note: Assuming the condition is true
*remainder = do_div(dividend, divisor);
^
include/asm-generic/div64.h:234:20: note: expanded from macro 'do_div'
} else if (likely(((n) >> 32) == 0)) { \
~~~~~~~^~~~~~~~~~~~~~~~~
include/linux/compiler.h:77:40: note: expanded from macro 'likely'
# define likely(x) __builtin_expect(!!(x), 1)
^
include/linux/math64.h:92:15: note: Taking true branch
*remainder = do_div(dividend, divisor);
^
include/asm-generic/div64.h:234:9: note: expanded from macro 'do_div'
} else if (likely(((n) >> 32) == 0)) { \
^
include/linux/math64.h:92:15: note: Division by zero
*remainder = do_div(dividend, divisor);
^
include/asm-generic/div64.h:235:25: note: expanded from macro 'do_div'
__rem = (uint32_t)(n) % __base; \
~~~~~~~~~~~~~~^~~~~~~~
Suppressed 2 warnings (2 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
24 warnings generated.
drivers/base/cpu.c:364:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&cpu->dev, 0x00, sizeof(struct device));
^~~~~~
drivers/base/cpu.c:364:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&cpu->dev, 0x00, sizeof(struct device));
^~~~~~
Suppressed 23 warnings (23 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
13 warnings generated.
Suppressed 13 warnings (13 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
19 warnings generated.
Suppressed 19 warnings (19 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
37 warnings generated.
drivers/base/devres.c:120:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(dr, 0, offsetof(struct devres, data));
^~~~~~
drivers/base/devres.c:120:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(dr, 0, offsetof(struct devres, data));
^~~~~~
drivers/base/devres.c:921:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(new_dr->data, old_dr->data,
^~~~~~
drivers/base/devres.c:921:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(new_dr->data, old_dr->data,
^~~~~~
drivers/base/devres.c:955:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, s, size);
^~~~~~
drivers/base/devres.c:955:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, s, size);
^~~~~~
drivers/base/devres.c:1001:8: warning: Call to function 'vsnprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'vsnprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len = vsnprintf(NULL, 0, fmt, aq);
^~~~~~~~~
drivers/base/devres.c:1001:8: note: Call to function 'vsnprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'vsnprintf_s' in case of C11
len = vsnprintf(NULL, 0, fmt, aq);
^~~~~~~~~
drivers/base/devres.c:1008:2: warning: Call to function 'vsnprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'vsnprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
vsnprintf(p, len+1, fmt, ap);
^~~~~~~~~
drivers/base/devres.c:1008:2: note: Call to function 'vsnprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'vsnprintf_s' in case of C11
vsnprintf(p, len+1, fmt, ap);
^~~~~~~~~
drivers/base/devres.c:1077:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(p, src, len);
^~~~~~
drivers/base/devres.c:1077:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(p, src, len);
^~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
>> drivers/clk/sifive/sifive-prci.c:158:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&pwd->c, c, sizeof(*c));
^~~~~~
drivers/clk/sifive/sifive-prci.c:158:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&pwd->c, c, sizeof(*c));
^~~~~~
drivers/clk/sifive/sifive-prci.c:199:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&c, &pwd->c, sizeof(c));
^~~~~~
drivers/clk/sifive/sifive-prci.c:199:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&c, &pwd->c, sizeof(c));
^~~~~~
drivers/clk/sifive/sifive-prci.c:326:2: warning: Value stored to 'r' is never read [clang-analyzer-deadcode.DeadStores]
r = __prci_readl(pd, PRCI_CORECLKSEL_OFFSET); /* barrier */
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/clk/sifive/sifive-prci.c:326:2: note: Value stored to 'r' is never read
r = __prci_readl(pd, PRCI_CORECLKSEL_OFFSET); /* barrier */
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/clk/sifive/sifive-prci.c:347:2: warning: Value stored to 'r' is never read [clang-analyzer-deadcode.DeadStores]
r = __prci_readl(pd, PRCI_CORECLKSEL_OFFSET); /* barrier */
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/clk/sifive/sifive-prci.c:347:2: note: Value stored to 'r' is never read
r = __prci_readl(pd, PRCI_CORECLKSEL_OFFSET); /* barrier */
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/clk/sifive/sifive-prci.c:369:2: warning: Value stored to 'r' is never read [clang-analyzer-deadcode.DeadStores]
r = __prci_readl(pd, PRCI_CORECLKSEL_OFFSET); /* barrier */
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/clk/sifive/sifive-prci.c:369:2: note: Value stored to 'r' is never read
r = __prci_readl(pd, PRCI_CORECLKSEL_OFFSET); /* barrier */
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/clk/sifive/sifive-prci.c:390:2: warning: Value stored to 'r' is never read [clang-analyzer-deadcode.DeadStores]
r = __prci_readl(pd, PRCI_COREPLLSEL_OFFSET); /* barrier */
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/clk/sifive/sifive-prci.c:390:2: note: Value stored to 'r' is never read
r = __prci_readl(pd, PRCI_COREPLLSEL_OFFSET); /* barrier */
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/clk/sifive/sifive-prci.c:411:2: warning: Value stored to 'r' is never read [clang-analyzer-deadcode.DeadStores]
r = __prci_readl(pd, PRCI_COREPLLSEL_OFFSET); /* barrier */
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/clk/sifive/sifive-prci.c:411:2: note: Value stored to 'r' is never read
r = __prci_readl(pd, PRCI_COREPLLSEL_OFFSET); /* barrier */
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/clk/sifive/sifive-prci.c:432:2: warning: Value stored to 'r' is never read [clang-analyzer-deadcode.DeadStores]
r = __prci_readl(pd, PRCI_HFPCLKPLLSEL_OFFSET); /* barrier */
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/clk/sifive/sifive-prci.c:432:2: note: Value stored to 'r' is never read
r = __prci_readl(pd, PRCI_HFPCLKPLLSEL_OFFSET); /* barrier */
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/clk/sifive/sifive-prci.c:453:2: warning: Value stored to 'r' is never read [clang-analyzer-deadcode.DeadStores]
r = __prci_readl(pd, PRCI_HFPCLKPLLSEL_OFFSET); /* barrier */
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/clk/sifive/sifive-prci.c:453:2: note: Value stored to 'r' is never read
r = __prci_readl(pd, PRCI_HFPCLKPLLSEL_OFFSET); /* barrier */
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Suppressed 22 warnings (22 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
fs/fs-writeback.c:148:3: warning: Argument to kfree() is the address of the local variable 'work', which is not memory allocated by malloc() [clang-analyzer-unix.Malloc]
kfree(work);
^
fs/fs-writeback.c:2702:6: note: Assuming the condition is false
if (bdi == &noop_backing_dev_info)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/fs-writeback.c:2702:2: note: Taking false branch
if (bdi == &noop_backing_dev_info)
^
fs/fs-writeback.c:2708:2: note: Calling 'bdi_split_work_to_wbs'
bdi_split_work_to_wbs(bdi, &work, false);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/fs-writeback.c:1204:2: note: Loop condition is false. Exiting loop
might_sleep();
^
include/linux/kernel.h:180:29: note: expanded from macro 'might_sleep'
# define might_sleep() do { might_resched(); } while (0)
^
include/linux/kernel.h:115:26: note: expanded from macro 'might_resched'
# define might_resched() do { } while (0)
^
fs/fs-writeback.c:1204:2: note: Loop condition is false. Exiting loop
might_sleep();
^
include/linux/kernel.h:180:24: note: expanded from macro 'might_sleep'
# define might_sleep() do { might_resched(); } while (0)
^
fs/fs-writeback.c:1206:7: note: 'skip_if_busy' is false
if (!skip_if_busy || !writeback_in_progress(&bdi->wb)) {
^~~~~~~~~~~~
fs/fs-writeback.c:1206:20: note: Left side of '||' is true
if (!skip_if_busy || !writeback_in_progress(&bdi->wb)) {
^
fs/fs-writeback.c:1208:3: note: Calling 'wb_queue_work'
wb_queue_work(&bdi->wb, base_work);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/fs-writeback.c:163:6: note: Assuming field 'done' is null
if (work->done)
^~~~~~~~~~
fs/fs-writeback.c:163:2: note: Taking false branch
if (work->done)
^
fs/fs-writeback.c:168:6: note: Assuming the condition is false
if (test_bit(WB_registered, &wb->state)) {
^
include/asm-generic/bitops/non-atomic.h:120:18: note: expanded from macro 'test_bit'
#define test_bit arch_test_bit
^
fs/fs-writeback.c:168:2: note: Taking false branch
if (test_bit(WB_registered, &wb->state)) {
^
fs/fs-writeback.c:172:3: note: Calling 'finish_writeback_work'
finish_writeback_work(wb, work);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/fs-writeback.c:147:6: note: Assuming field 'auto_free' is not equal to 0
if (work->auto_free)
^~~~~~~~~~~~~~~
fs/fs-writeback.c:147:2: note: Taking true branch
if (work->auto_free)
^
fs/fs-writeback.c:148:3: note: Argument to kfree() is the address of the local variable 'work', which is not memory allocated by malloc()
kfree(work);
^ ~~~~
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
65 warnings generated.
Suppressed 65 warnings (65 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
fs/configfs/file.c:270:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(tbuf, buffer->bin_buffer,
^~~~~~
fs/configfs/file.c:270:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(tbuf, buffer->bin_buffer,
^~~~~~
fs/configfs/file.c:276:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(tbuf + buffer->bin_buffer_size, 0,
^~~~~~
fs/configfs/file.c:276:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(tbuf + buffer->bin_buffer_size, 0,
^~~~~~
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
fs/configfs/dir.c:1315:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(name, dentry->d_name.len + 1, "%s", dentry->d_name.name);
^~~~~~~~
fs/configfs/dir.c:1315:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(name, dentry->d_name.len + 1, "%s", dentry->d_name.name);
^~~~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
49 warnings generated.
>> fs/erofs/zdata.c:51:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(pcs->name, "erofs_pcluster-%u", pcs->maxpages);
^~~~~~~
fs/erofs/zdata.c:51:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(pcs->name, "erofs_pcluster-%u", pcs->maxpages);
^~~~~~~
fs/erofs/zdata.c:1167:4: warning: Value stored to 'justfound' is never read [clang-analyzer-deadcode.DeadStores]
justfound = 0;
^ ~
fs/erofs/zdata.c:1167:4: note: Value stored to 'justfound' is never read
justfound = 0;
^ ~
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
51 warnings generated.
fs/zonefs/super.c:724:16: warning: Assigned value is garbage or undefined [clang-analyzer-core.uninitialized.Assign]
iocb->ki_pos += size;
^
fs/zonefs/super.c:914:6: note: Assuming the condition is true
if (unlikely(IS_IMMUTABLE(inode)))
^
include/linux/compiler.h:78:40: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^~~~
fs/zonefs/super.c:914:2: note: Taking false branch
if (unlikely(IS_IMMUTABLE(inode)))
^
fs/zonefs/super.c:917:6: note: Assuming the condition is false
if (sb_rdonly(inode->i_sb))
^~~~~~~~~~~~~~~~~~~~~~
fs/zonefs/super.c:917:2: note: Taking false branch
if (sb_rdonly(inode->i_sb))
^
fs/zonefs/super.c:921:6: note: Assuming field 'ki_pos' is < field 'i_max_size'
if (iocb->ki_pos >= ZONEFS_I(inode)->i_max_size)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/zonefs/super.c:921:2: note: Taking false branch
if (iocb->ki_pos >= ZONEFS_I(inode)->i_max_size)
^
fs/zonefs/super.c:924:6: note: Assuming the condition is true
if (iocb->ki_flags & IOCB_DIRECT) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/zonefs/super.c:924:2: note: Taking true branch
if (iocb->ki_flags & IOCB_DIRECT) {
^
fs/zonefs/super.c:925:17: note: Calling 'zonefs_file_dio_write'
ssize_t ret = zonefs_file_dio_write(iocb, from);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/zonefs/super.c:817:6: note: Assuming field 'i_ztype' is not equal to ZONEFS_ZTYPE_SEQ
if (zi->i_ztype == ZONEFS_ZTYPE_SEQ && !sync &&
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/zonefs/super.c:817:38: note: Left side of '&&' is false
if (zi->i_ztype == ZONEFS_ZTYPE_SEQ && !sync &&
^
fs/zonefs/super.c:821:6: note: Assuming the condition is true
if (iocb->ki_flags & IOCB_NOWAIT) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/zonefs/super.c:821:2: note: Taking true branch
if (iocb->ki_flags & IOCB_NOWAIT) {
^
fs/zonefs/super.c:822:7: note: Assuming the condition is false
if (!inode_trylock(inode))
^~~~~~~~~~~~~~~~~~~~~
fs/zonefs/super.c:822:3: note: Taking false branch
if (!inode_trylock(inode))
^
fs/zonefs/super.c:829:6: note: 'count' is > 0
if (count <= 0) {
^~~~~
fs/zonefs/super.c:829:2: note: Taking false branch
if (count <= 0) {
^
fs/zonefs/super.c:834:6: note: Assuming the condition is false
if ((iocb->ki_pos | count) & (sb->s_blocksize - 1)) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/zonefs/super.c:834:2: note: Taking false branch
if ((iocb->ki_pos | count) & (sb->s_blocksize - 1)) {
^
fs/zonefs/super.c:840:6: note: Assuming field 'i_ztype' is equal to ZONEFS_ZTYPE_SEQ
if (zi->i_ztype == ZONEFS_ZTYPE_SEQ) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/zonefs/super.c:840:2: note: Taking true branch
if (zi->i_ztype == ZONEFS_ZTYPE_SEQ) {
^
fs/zonefs/super.c:842:7: note: Assuming field 'ki_pos' is equal to field 'i_wpoffset'
if (iocb->ki_pos != zi->i_wpoffset) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/zonefs/super.c:842:3: note: Taking false branch
if (iocb->ki_pos != zi->i_wpoffset) {
^
fs/zonefs/super.c:851:6: note: 'append' is true
if (append)
^~~~~~
fs/zonefs/super.c:851:2: note: Taking true branch
if (append)
^
fs/zonefs/super.c:852:9: note: Calling 'zonefs_file_dio_append'
ret = zonefs_file_dio_append(iocb, from);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/zonefs/super.c:683:2: note: 'size' declared without an initial value
ssize_t size;
--
drivers/dma-buf/udmabuf.c:204:3: note: Taking false branch
if (!memfd)
^
drivers/dma-buf/udmabuf.c:207:8: note: Calling 'shmem_mapping'
if (!shmem_mapping(mapping) && !is_file_hugepages(memfd))
^~~~~~~~~~~~~~~~~~~~~~
include/linux/shmem_fs.h:79:2: note: Returning zero, which participates in a condition later
return false;
^~~~~~~~~~~~
drivers/dma-buf/udmabuf.c:207:8: note: Returning from 'shmem_mapping'
if (!shmem_mapping(mapping) && !is_file_hugepages(memfd))
^~~~~~~~~~~~~~~~~~~~~~
drivers/dma-buf/udmabuf.c:207:7: note: Left side of '&&' is true
if (!shmem_mapping(mapping) && !is_file_hugepages(memfd))
^
drivers/dma-buf/udmabuf.c:207:35: note: Calling 'is_file_hugepages'
if (!shmem_mapping(mapping) && !is_file_hugepages(memfd))
^~~~~~~~~~~~~~~~~~~~~~~~
include/linux/hugetlb.h:484:6: note: Assuming the condition is true
if (file->f_op == &hugetlbfs_file_operations)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/hugetlb.h:484:2: note: Taking true branch
if (file->f_op == &hugetlbfs_file_operations)
^
include/linux/hugetlb.h:485:3: note: Returning the value 1, which participates in a condition later
return true;
^~~~~~~~~~~
drivers/dma-buf/udmabuf.c:207:35: note: Returning from 'is_file_hugepages'
if (!shmem_mapping(mapping) && !is_file_hugepages(memfd))
^~~~~~~~~~~~~~~~~~~~~~~~
drivers/dma-buf/udmabuf.c:207:3: note: Taking false branch
if (!shmem_mapping(mapping) && !is_file_hugepages(memfd))
^
drivers/dma-buf/udmabuf.c:210:7: note: Assuming the condition is false
if (seals == -EINVAL)
^~~~~~~~~~~~~~~~
drivers/dma-buf/udmabuf.c:210:3: note: Taking false branch
if (seals == -EINVAL)
^
drivers/dma-buf/udmabuf.c:213:7: note: Assuming the condition is false
if ((seals & SEALS_WANTED) != SEALS_WANTED ||
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/dma-buf/udmabuf.c:213:7: note: Left side of '||' is false
drivers/dma-buf/udmabuf.c:214:7: note: Assuming the condition is false
(seals & SEALS_DENIED) != 0)
^~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/dma-buf/udmabuf.c:213:3: note: Taking false branch
if ((seals & SEALS_WANTED) != SEALS_WANTED ||
^
drivers/dma-buf/udmabuf.c:218:3: note: Taking false branch
if (is_file_hugepages(memfd)) {
^
drivers/dma-buf/udmabuf.c:225:19: note: Assuming 'pgidx' is < 'pgcnt'
for (pgidx = 0; pgidx < pgcnt; pgidx++) {
^~~~~~~~~~~~~
drivers/dma-buf/udmabuf.c:225:3: note: Loop condition is true. Entering loop body
for (pgidx = 0; pgidx < pgcnt; pgidx++) {
^
drivers/dma-buf/udmabuf.c:226:8: note: Calling 'is_file_hugepages'
if (is_file_hugepages(memfd)) {
^~~~~~~~~~~~~~~~~~~~~~~~
include/linux/hugetlb.h:484:6: note: Assuming the condition is true
if (file->f_op == &hugetlbfs_file_operations)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/hugetlb.h:484:2: note: Taking true branch
if (file->f_op == &hugetlbfs_file_operations)
^
include/linux/hugetlb.h:485:3: note: Returning the value 1, which participates in a condition later
return true;
^~~~~~~~~~~
drivers/dma-buf/udmabuf.c:226:8: note: Returning from 'is_file_hugepages'
if (is_file_hugepages(memfd)) {
^~~~~~~~~~~~~~~~~~~~~~~~
drivers/dma-buf/udmabuf.c:226:4: note: Taking true branch
if (is_file_hugepages(memfd)) {
^
drivers/dma-buf/udmabuf.c:227:10: note: 'hpage' is null
if (!hpage) {
^~~~~
drivers/dma-buf/udmabuf.c:227:5: note: Taking true branch
if (!hpage) {
^
drivers/dma-buf/udmabuf.c:230:10: note: Assuming 'hpage' is non-null
if (!hpage) {
^~~~~~
drivers/dma-buf/udmabuf.c:230:6: note: Taking false branch
if (!hpage) {
^
drivers/dma-buf/udmabuf.c:235:18: note: The right operand of '+' is a garbage value
page = hpage + subpgoff;
^ ~~~~~~~~
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
>> fs/freevxfs/vxfs_fshead.c:87:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(fhp, bp->b_data, sizeof(*fhp));
^~~~~~
fs/freevxfs/vxfs_fshead.c:87:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(fhp, bp->b_data, sizeof(*fhp));
^~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
>> fs/freevxfs/vxfs_immed.c:73:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(kaddr, vip->vii_immed.vi_immed + offset, PAGE_SIZE);
^~~~~~
fs/freevxfs/vxfs_immed.c:73:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(kaddr, vip->vii_immed.vi_immed + offset, PAGE_SIZE);
^~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
22 warnings generated.
Suppressed 22 warnings (22 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
19 warnings generated.
drivers/pps/sysfs.c:26:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%lld.%09d#%d\n",
^~~~~~~
drivers/pps/sysfs.c:26:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%lld.%09d#%d\n",
^~~~~~~
drivers/pps/sysfs.c:40:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%lld.%09d#%d\n",
^~~~~~~
drivers/pps/sysfs.c:40:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%lld.%09d#%d\n",
^~~~~~~
drivers/pps/sysfs.c:51:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%4x\n", pps->info.mode);
^~~~~~~
drivers/pps/sysfs.c:51:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%4x\n", pps->info.mode);
^~~~~~~
drivers/pps/sysfs.c:60:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", !!pps->info.echo);
^~~~~~~
drivers/pps/sysfs.c:60:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", !!pps->info.echo);
^~~~~~~
drivers/pps/sysfs.c:69:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", pps->info.name);
^~~~~~~
drivers/pps/sysfs.c:69:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", pps->info.name);
^~~~~~~
drivers/pps/sysfs.c:78:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", pps->info.path);
^~~~~~~
drivers/pps/sysfs.c:78:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", pps->info.path);
^~~~~~~
Suppressed 13 warnings (13 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
9 warnings generated.
Suppressed 9 warnings (9 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
15 warnings generated.
lib/usercopy.c:19:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(to + (n - res), 0, res);
^~~~~~
lib/usercopy.c:19:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(to + (n - res), 0, res);
^~~~~~
Suppressed 14 warnings (14 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
drivers/regulator/helpers.c:963:6: warning: Assigned value is garbage or undefined [clang-analyzer-core.uninitialized.Assign]
sel <<= ffs(rdev->desc->ramp_mask) - 1;
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/regulator/helpers.c:951:14: note: Assuming field 'n_ramp_values' is not equal to 0
if (WARN_ON(!rdev->desc->n_ramp_values || !rdev->desc->ramp_delay_table))
^
include/asm-generic/bug.h:166:25: note: expanded from macro 'WARN_ON'
int __ret_warn_on = !!(condition); \
^~~~~~~~~
drivers/regulator/helpers.c:951:14: note: Left side of '||' is false
if (WARN_ON(!rdev->desc->n_ramp_values || !rdev->desc->ramp_delay_table))
^
drivers/regulator/helpers.c:951:44: note: Assuming field 'ramp_delay_table' is non-null
if (WARN_ON(!rdev->desc->n_ramp_values || !rdev->desc->ramp_delay_table))
^
include/asm-generic/bug.h:166:25: note: expanded from macro 'WARN_ON'
int __ret_warn_on = !!(condition); \
^~~~~~~~~
drivers/regulator/helpers.c:951:2: note: Taking false branch
if (WARN_ON(!rdev->desc->n_ramp_values || !rdev->desc->ramp_delay_table))
^
drivers/regulator/helpers.c:957:6: note: 'ret' is 0
if (ret) {
^~~
drivers/regulator/helpers.c:957:2: note: Taking false branch
if (ret) {
^
drivers/regulator/helpers.c:963:6: note: Assigned value is garbage or undefined
sel <<= ffs(rdev->desc->ramp_mask) - 1;
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
>> drivers/leds/trigger/ledtrig-backlight.c:65:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", n->invert);
^~~~~~~
drivers/leds/trigger/ledtrig-backlight.c:65:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", n->invert);
^~~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
39 warnings generated.
drivers/leds/trigger/ledtrig-gpio.c:53:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", gpio_data->desired_brightness);
^~~~~~~
drivers/leds/trigger/ledtrig-gpio.c:53:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", gpio_data->desired_brightness);
^~~~~~~
drivers/leds/trigger/ledtrig-gpio.c:63:8: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = sscanf(buf, "%u", &desired_brightness);
^~~~~~
drivers/leds/trigger/ledtrig-gpio.c:63:8: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
ret = sscanf(buf, "%u", &desired_brightness);
^~~~~~
drivers/leds/trigger/ledtrig-gpio.c:81:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", gpio_data->inverted);
^~~~~~~
drivers/leds/trigger/ledtrig-gpio.c:81:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", gpio_data->inverted);
^~~~~~~
drivers/leds/trigger/ledtrig-gpio.c:115:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", gpio_data->gpio);
^~~~~~~
drivers/leds/trigger/ledtrig-gpio.c:115:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", gpio_data->gpio);
^~~~~~~
drivers/leds/trigger/ledtrig-gpio.c:126:8: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = sscanf(buf, "%u", &gpio);
^~~~~~
drivers/leds/trigger/ledtrig-gpio.c:126:8: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
ret = sscanf(buf, "%u", &gpio);
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
16 warnings generated.
lib/lz4/lz4hc_compress.c:63:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset((void *)hc4->hashTable, 0, sizeof(hc4->hashTable));
^~~~~~
lib/lz4/lz4hc_compress.c:63:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset((void *)hc4->hashTable, 0, sizeof(hc4->hashTable));
^~~~~~
lib/lz4/lz4hc_compress.c:64:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(hc4->chainTable, 0xFF, sizeof(hc4->chainTable));
^~~~~~
lib/lz4/lz4hc_compress.c:64:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(hc4->chainTable, 0xFF, sizeof(hc4->chainTable));
^~~~~~
lib/lz4/lz4hc_compress.c:573:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
LZ4_memcpy(op, anchor, iend - anchor);
^
lib/lz4/lz4defs.h:150:36: note: expanded from macro 'LZ4_memcpy'
#define LZ4_memcpy(dst, src, size) __builtin_memcpy(dst, src, size)
^~~~~~~~~~~~~~~~
lib/lz4/lz4hc_compress.c:573:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
LZ4_memcpy(op, anchor, iend - anchor);
^
lib/lz4/lz4defs.h:150:36: note: expanded from macro 'LZ4_memcpy'
#define LZ4_memcpy(dst, src, size) __builtin_memcpy(dst, src, size)
^~~~~~~~~~~~~~~~
lib/lz4/lz4hc_compress.c:750:2: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(safeBuffer, streamPtr->end - dictSize, dictSize);
^~~~~~~
lib/lz4/lz4hc_compress.c:750:2: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(safeBuffer, streamPtr->end - dictSize, dictSize);
^~~~~~~
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
23 warnings generated.
lib/lz4/lz4_decompress.c:156:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
LZ4_memcpy(op, ip, endOnInput ? 16 : 8);
^
lib/lz4/lz4defs.h:150:36: note: expanded from macro 'LZ4_memcpy'
#define LZ4_memcpy(dst, src, size) __builtin_memcpy(dst, src, size)
^~~~~~~~~~~~~~~~
lib/lz4/lz4_decompress.c:156:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
LZ4_memcpy(op, ip, endOnInput ? 16 : 8);
^
lib/lz4/lz4defs.h:150:36: note: expanded from macro 'LZ4_memcpy'
#define LZ4_memcpy(dst, src, size) __builtin_memcpy(dst, src, size)
^~~~~~~~~~~~~~~~
lib/lz4/lz4_decompress.c:175:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
LZ4_memcpy(op + 0, match + 0, 8);
^
lib/lz4/lz4defs.h:150:36: note: expanded from macro 'LZ4_memcpy'
#define LZ4_memcpy(dst, src, size) __builtin_memcpy(dst, src, size)
^~~~~~~~~~~~~~~~
lib/lz4/lz4_decompress.c:175:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
LZ4_memcpy(op + 0, match + 0, 8);
^
lib/lz4/lz4defs.h:150:36: note: expanded from macro 'LZ4_memcpy'
#define LZ4_memcpy(dst, src, size) __builtin_memcpy(dst, src, size)
^~~~~~~~~~~~~~~~
lib/lz4/lz4_decompress.c:176:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
LZ4_memcpy(op + 8, match + 8, 8);
--
drivers/mfd/wm831x-irq.c:517:7: note: Assuming 'primary' is equal to WM831X_GP_INT
if (primary == WM831X_GP_INT &&
^~~~~~~~~~~~~~~~~~~~~~~~
drivers/mfd/wm831x-irq.c:517:7: note: Left side of '&&' is true
drivers/mfd/wm831x-irq.c:518:7: note: Assuming the condition is true
wm831x->gpio_level_high[i - WM831X_IRQ_GPIO_1]) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/mfd/wm831x-irq.c:517:3: note: Taking true branch
if (primary == WM831X_GP_INT &&
^
drivers/mfd/wm831x-irq.c:520:19: note: The result of the left shift is undefined due to shifting by '4294967295', which is greater or equal to the width of type 'int'
while (ret & 1 << (i - WM831X_IRQ_GPIO_1)) {
^ ~~~~~~~~~~~~~~~~~~~~~~~
drivers/mfd/wm831x-irq.c:531:21: warning: The result of the left shift is undefined due to shifting by '4294967295', which is greater or equal to the width of type 'int' [clang-analyzer-core.UndefinedBinaryOperatorResult]
while (!(ret & 1 << (i - WM831X_IRQ_GPIO_1))) {
^ ~~~~~~~~~~~~~~~~~~~~~~~
drivers/mfd/wm831x-irq.c:459:6: note: Assuming 'primary' is >= 0
if (primary < 0) {
^~~~~~~~~~~
drivers/mfd/wm831x-irq.c:459:2: note: Taking false branch
if (primary < 0) {
^
drivers/mfd/wm831x-irq.c:470:6: note: Assuming the condition is false
if (primary & WM831X_TCHPD_INT)
^~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/mfd/wm831x-irq.c:470:2: note: Taking false branch
if (primary & WM831X_TCHPD_INT)
^
drivers/mfd/wm831x-irq.c:473:6: note: Assuming the condition is false
if (primary & WM831X_TCHDATA_INT)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/mfd/wm831x-irq.c:473:2: note: Taking false branch
if (primary & WM831X_TCHDATA_INT)
^
drivers/mfd/wm831x-irq.c:478:2: note: Loop condition is true. Entering loop body
for (i = 0; i < ARRAY_SIZE(wm831x_irqs); i++) {
^
drivers/mfd/wm831x-irq.c:481:7: note: Assuming the condition is false
if (!(primary & wm831x_irqs[i].primary))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/mfd/wm831x-irq.c:481:3: note: Taking false branch
if (!(primary & wm831x_irqs[i].primary))
^
drivers/mfd/wm831x-irq.c:488:7: note: Assuming the condition is false
if (!read[offset]) {
^~~~~~~~~~~~~
drivers/mfd/wm831x-irq.c:488:3: note: Taking false branch
if (!read[offset]) {
^
drivers/mfd/wm831x-irq.c:510:7: note: Assuming the condition is false
if (*status & wm831x_irqs[i].mask)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/mfd/wm831x-irq.c:510:3: note: Taking false branch
if (*status & wm831x_irqs[i].mask)
^
drivers/mfd/wm831x-irq.c:517:7: note: Assuming 'primary' is equal to WM831X_GP_INT
if (primary == WM831X_GP_INT &&
^~~~~~~~~~~~~~~~~~~~~~~~
drivers/mfd/wm831x-irq.c:517:7: note: Left side of '&&' is true
drivers/mfd/wm831x-irq.c:518:7: note: Assuming the condition is false
wm831x->gpio_level_high[i - WM831X_IRQ_GPIO_1]) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/mfd/wm831x-irq.c:517:3: note: Taking false branch
if (primary == WM831X_GP_INT &&
^
drivers/mfd/wm831x-irq.c:528:7: note: 'primary' is equal to WM831X_GP_INT
if (primary == WM831X_GP_INT &&
^~~~~~~
drivers/mfd/wm831x-irq.c:528:7: note: Left side of '&&' is true
drivers/mfd/wm831x-irq.c:529:7: note: Assuming the condition is true
wm831x->gpio_level_low[i - WM831X_IRQ_GPIO_1]) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/mfd/wm831x-irq.c:528:3: note: Taking true branch
if (primary == WM831X_GP_INT &&
^
drivers/mfd/wm831x-irq.c:531:21: note: The result of the left shift is undefined due to shifting by '4294967295', which is greater or equal to the width of type 'int'
while (!(ret & 1 << (i - WM831X_IRQ_GPIO_1))) {
^ ~~~~~~~~~~~~~~~~~~~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
36 warnings generated.
fs/locks.c:325:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(fl, 0, sizeof(struct file_lock));
^~~~~~
fs/locks.c:325:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(fl, 0, sizeof(struct file_lock));
^~~~~~
fs/locks.c:2415:3: warning: Value stored to 'cmd' is never read [clang-analyzer-deadcode.DeadStores]
cmd = F_GETLK64;
^
fs/locks.c:2415:3: note: Value stored to 'cmd' is never read
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
fs/binfmt_flat.c:908:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&bprm, 0, sizeof(bprm));
^~~~~~
fs/binfmt_flat.c:908:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&bprm, 0, sizeof(bprm));
^~~~~~
>> fs/binfmt_flat.c:911:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(buf, "/lib/lib%d.so", id);
^~~~~~~
fs/binfmt_flat.c:911:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(buf, "/lib/lib%d.so", id);
^~~~~~~
fs/binfmt_flat.c:948:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&libinfo, 0, sizeof(libinfo));
^~~~~~
fs/binfmt_flat.c:948:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&libinfo, 0, sizeof(libinfo));
^~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
25 warnings generated.
drivers/pwm/sysfs.c:45:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%llu\n", state.period);
^~~~~~~
drivers/pwm/sysfs.c:45:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%llu\n", state.period);
^~~~~~~
drivers/pwm/sysfs.c:80:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%llu\n", state.duty_cycle);
^~~~~~~
drivers/pwm/sysfs.c:80:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%llu\n", state.duty_cycle);
^~~~~~~
drivers/pwm/sysfs.c:115:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", state.enabled);
^~~~~~~
drivers/pwm/sysfs.c:115:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", state.enabled);
^~~~~~~
drivers/pwm/sysfs.c:174:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", polarity);
^~~~~~~
drivers/pwm/sysfs.c:174:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", polarity);
^~~~~~~
drivers/pwm/sysfs.c:215:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u %u\n", result.period, result.duty_cycle);
^~~~~~~
drivers/pwm/sysfs.c:215:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u %u\n", result.period, result.duty_cycle);
^~~~~~~
drivers/pwm/sysfs.c:364:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", chip->npwm);
^~~~~~~
drivers/pwm/sysfs.c:364:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", chip->npwm);
^~~~~~~
Suppressed 19 warnings (19 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
fs/iomap/direct-io.c:405:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(iomap_inline_data(iomap, size), 0, pos - size);
^~~~~~
fs/iomap/direct-io.c:405:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(iomap_inline_data(iomap, size), 0, pos - size);
^~~~~~
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (46 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
33 warnings generated.
fs/kernfs/symlink.c:76:3: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(s, "../");
^~~~~~
fs/kernfs/symlink.c:76:3: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(s, "../");
^~~~~~
fs/kernfs/symlink.c:101:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(s + len, kn->name, slen);
^~~~~~
fs/kernfs/symlink.c:101:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(s + len, kn->name, slen);
^~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
59 warnings generated.
kernel/workqueue.c:1962:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(id_buf, sizeof(id_buf), "%d:%d%s", pool->cpu, id,
--
^~~~~~~~
kernel/trace/trace.c:6129:6: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
r = sprintf(buf, "%s\n", tr->current_trace->name);
^~~~~~~
kernel/trace/trace.c:6129:6: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
r = sprintf(buf, "%s\n", tr->current_trace->name);
^~~~~~~
kernel/trace/trace.c:6470:6: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
r = snprintf(buf, sizeof(buf), "%ld\n",
^~~~~~~~
kernel/trace/trace.c:6470:6: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
r = snprintf(buf, sizeof(buf), "%ld\n",
^~~~~~~~
kernel/trace/trace.c:6958:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
r = sprintf(buf, "%lu (expanded: %lu)\n",
^~~~~~~
kernel/trace/trace.c:6958:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
r = sprintf(buf, "%lu (expanded: %lu)\n",
^~~~~~~
kernel/trace/trace.c:6962:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
r = sprintf(buf, "%lu\n", size >> 10);
^~~~~~~
kernel/trace/trace.c:6962:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
r = sprintf(buf, "%lu\n", size >> 10);
^~~~~~~
kernel/trace/trace.c:6964:8: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
r = sprintf(buf, "X\n");
^~~~~~~
kernel/trace/trace.c:6964:8: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
r = sprintf(buf, "X\n");
^~~~~~~
kernel/trace/trace.c:6966:7: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
r = sprintf(buf, "%lu\n", per_cpu_ptr(tr->array_buffer.data, cpu)->entries >> 10);
^~~~~~~
kernel/trace/trace.c:6966:7: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
r = sprintf(buf, "%lu\n", per_cpu_ptr(tr->array_buffer.data, cpu)->entries >> 10);
^~~~~~~
kernel/trace/trace.c:7018:7: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
r = sprintf(buf, "%lu\n", size);
^~~~~~~
kernel/trace/trace.c:7018:7: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
r = sprintf(buf, "%lu\n", size);
^~~~~~~
kernel/trace/trace.c:7020:7: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
r = sprintf(buf, "%lu (expanded: %lu)\n", size, expanded_size);
^~~~~~~
kernel/trace/trace.c:7020:7: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
r = sprintf(buf, "%lu (expanded: %lu)\n", size, expanded_size);
^~~~~~~
kernel/trace/trace.c:7102:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&entry->buf, FAULTED_STR, FAULTED_SIZE);
^~~~~~
kernel/trace/trace.c:7102:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&entry->buf, FAULTED_STR, FAULTED_SIZE);
^~~~~~
kernel/trace/trace.c:7178:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&entry->buf, FAULTED_STR, FAULTED_SIZE);
^~~~~~
kernel/trace/trace.c:7178:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&entry->buf, FAULTED_STR, FAULTED_SIZE);
^~~~~~
kernel/trace/trace.c:7703:8: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len = snprintf(buf, sizeof(buf), "%llu\n", val);
^~~~~~~~
kernel/trace/trace.c:7703:8: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
len = snprintf(buf, sizeof(buf), "%llu\n", val);
^~~~~~~~
kernel/trace/trace.c:7824:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(err->loc, TRACING_LOG_LOC_MAX, "%s: error: ", loc);
^~~~~~~~
kernel/trace/trace.c:7824:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(err->loc, TRACING_LOG_LOC_MAX, "%s: error: ", loc);
^~~~~~~~
kernel/trace/trace.c:7825:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(err->cmd, MAX_FILTER_STR_VAL,"\n" CMD_PREFIX "%s\n", cmd);
^~~~~~~~
kernel/trace/trace.c:7825:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(err->cmd, MAX_FILTER_STR_VAL,"\n" CMD_PREFIX "%s\n", cmd);
^~~~~~~~
kernel/trace/trace.c:8590:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(cpu_dir, 30, "cpu%ld", cpu);
^~~~~~~~
kernel/trace/trace.c:8590:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(cpu_dir, 30, "cpu%ld", cpu);
^~~~~~~~
kernel/trace/trace.c:8931:6: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
r = sprintf(buf, "%d\n", r);
^~~~~~~
kernel/trace/trace.c:8931:6: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
r = sprintf(buf, "%d\n", r);
^~~~~~~
kernel/trace/trace.c:8987:6: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
r = sprintf(buf, "%d\n", r);
^~~~~~~
kernel/trace/trace.c:8987:6: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
r = sprintf(buf, "%d\n", r);
^~~~~~~
Suppressed 48 warnings (47 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
>> kernel/module_decompress.c:26:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(new_pages, info->pages, info->max_pages * sizeof(info->pages));
^~~~~~
kernel/module_decompress.c:26:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(new_pages, info->pages, info->max_pages * sizeof(info->pages));
^~~~~~
kernel/module_decompress.c:215:2: warning: Value stored to 'error' is never read [clang-analyzer-deadcode.DeadStores]
error = module_extend_max_pages(info, n_pages);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/module_decompress.c:215:2: note: Value stored to 'error' is never read
error = module_extend_max_pages(info, n_pages);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
13 warnings generated.
>> kernel/module_signing.c:31:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&ms, mod + (modlen - sizeof(ms)), sizeof(ms));
^~~~~~
kernel/module_signing.c:31:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&ms, mod + (modlen - sizeof(ms)), sizeof(ms));
^~~~~~
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
89 warnings generated.
kernel/kallsyms.c:454:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buffer, "0x%lx", address - symbol_offset);
^~~~~~~
kernel/kallsyms.c:454:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buffer, "0x%lx", address - symbol_offset);
^~~~~~~
kernel/kallsyms.c:457:3: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(buffer, name);
^~~~~~
kernel/kallsyms.c:457:3: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(buffer, name);
^~~~~~
kernel/kallsyms.c:462:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += sprintf(buffer + len, "+%#lx/%#lx", offset, size);
^~~~~~~
kernel/kallsyms.c:462:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
len += sprintf(buffer + len, "+%#lx/%#lx", offset, size);
^~~~~~~
kernel/kallsyms.c:465:10: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += sprintf(buffer + len, " [%s", modname);
^~~~~~~
kernel/kallsyms.c:465:10: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
len += sprintf(buffer + len, " [%s", modname);
^~~~~~~
kernel/kallsyms.c:475:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += sprintf(buffer + len, "]");
^~~~~~~
kernel/kallsyms.c:475:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
len += sprintf(buffer + len, "]");
^~~~~~~
Suppressed 84 warnings (83 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
36 warnings generated.
drivers/char/ipmi/ipmi_plat_data.c:21:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(pr, 0, sizeof(pr));
^~~~~~
drivers/char/ipmi/ipmi_plat_data.c:21:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(pr, 0, sizeof(pr));
^~~~~~
drivers/char/ipmi/ipmi_plat_data.c:22:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(r, 0, sizeof(r));
^~~~~~
drivers/char/ipmi/ipmi_plat_data.c:22:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(r, 0, sizeof(r));
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
13 warnings generated.
Suppressed 13 warnings (13 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
19 warnings generated.
Suppressed 19 warnings (19 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
19 warnings generated.
Suppressed 19 warnings (19 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
>> drivers/firmware/efi/efi-pstore.c:60:6: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(name, "dump-type%u-%u-%d-%llu-%c",
^~~~~~
drivers/firmware/efi/efi-pstore.c:60:6: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(name, "dump-type%u-%u-%d-%llu-%c",
^~~~~~
drivers/firmware/efi/efi-pstore.c:72:13: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
} else if (sscanf(name, "dump-type%u-%u-%d-%llu",
^~~~~~
drivers/firmware/efi/efi-pstore.c:72:13: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
} else if (sscanf(name, "dump-type%u-%u-%d-%llu",
^~~~~~
drivers/firmware/efi/efi-pstore.c:81:13: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
} else if (sscanf(name, "dump-type%u-%u-%llu",
^~~~~~
drivers/firmware/efi/efi-pstore.c:81:13: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
} else if (sscanf(name, "dump-type%u-%u-%llu",
^~~~~~
>> drivers/firmware/efi/efi-pstore.c:102:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(record->buf, entry->var.Data,
^~~~~~
drivers/firmware/efi/efi-pstore.c:102:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(record->buf, entry->var.Data,
^~~~~~
>> drivers/firmware/efi/efi-pstore.c:258:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(name, 0, sizeof(name));
^~~~~~
drivers/firmware/efi/efi-pstore.c:258:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(name, 0, sizeof(name));
^~~~~~
>> drivers/firmware/efi/efi-pstore.c:260:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(name, sizeof(name), "dump-type%u-%u-%d-%lld-%c",
^~~~~~~~
drivers/firmware/efi/efi-pstore.c:260:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(name, sizeof(name), "dump-type%u-%u-%d-%lld-%c",
^~~~~~~~
drivers/firmware/efi/efi-pstore.c:338:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(name, sizeof(name), "dump-type%u-%u-%d-%lld",
^~~~~~~~
drivers/firmware/efi/efi-pstore.c:338:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(name, sizeof(name), "dump-type%u-%u-%d-%lld",
^~~~~~~~
drivers/firmware/efi/efi-pstore.c:345:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(name, sizeof(name), "dump-type%u-%u-%lld",
^~~~~~~~
drivers/firmware/efi/efi-pstore.c:345:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(name, sizeof(name), "dump-type%u-%u-%lld",
^~~~~~~~
drivers/firmware/efi/efi-pstore.c:373:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(entry->var.VariableName, name, name_size);
^~~~~~
drivers/firmware/efi/efi-pstore.c:373:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(entry->var.VariableName, name, name_size);
^~~~~~
drivers/firmware/efi/efi-pstore.c:391:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(entry->var.VariableName, name, name_size);
^~~~~~
drivers/firmware/efi/efi-pstore.c:391:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(entry->var.VariableName, name, name_size);
^~~~~~
drivers/firmware/efi/efi-pstore.c:392:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&(entry->var.VendorGuid), &vendor, sizeof(efi_guid_t));
^~~~~~
drivers/firmware/efi/efi-pstore.c:392:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&(entry->var.VendorGuid), &vendor, sizeof(efi_guid_t));
^~~~~~
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
50 warnings generated.
Suppressed 50 warnings (50 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
50 warnings generated.
Suppressed 50 warnings (50 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
49 warnings generated.
fs/jbd2/transaction.c:951:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(jh->b_frozen_data, source + offset, bh->b_size);
^~~~~~
fs/jbd2/transaction.c:951:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(jh->b_frozen_data, source + offset, bh->b_size);
^~~~~~
fs/jbd2/transaction.c:1409:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(jh->b_committed_data, bh->b_data, bh->b_size);
^~~~~~
fs/jbd2/transaction.c:1409:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(jh->b_committed_data, bh->b_data, bh->b_size);
^~~~~~
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
49 warnings generated.
fs/jbd2/commit.c:606:2: warning: Value stored to 'err' is never read [clang-analyzer-deadcode.DeadStores]
err = 0;
^ ~
fs/jbd2/commit.c:606:2: note: Value stored to 'err' is never read
err = 0;
^ ~
fs/jbd2/commit.c:723:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy (tagp, journal->j_uuid, 16);
^~~~~~
fs/jbd2/commit.c:723:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy (tagp, journal->j_uuid, 16);
^~~~~~
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
52 warnings generated.
fs/jbd2/recovery.c:209:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&tag, tagp, sizeof(tag));
^~~~~~
fs/jbd2/recovery.c:209:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&tag, tagp, sizeof(tag));
^~~~~~
fs/jbd2/recovery.c:290:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&info, 0, sizeof(info));
^~~~~~
fs/jbd2/recovery.c:290:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&info, 0, sizeof(info));
^~~~~~
fs/jbd2/recovery.c:354:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset (&info, 0, sizeof(info));
^~~~~~
fs/jbd2/recovery.c:354:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset (&info, 0, sizeof(info));
^~~~~~
fs/jbd2/recovery.c:616:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&tag, tagp, sizeof(tag));
^~~~~~
fs/jbd2/recovery.c:616:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&tag, tagp, sizeof(tag));
^~~~~~
fs/jbd2/recovery.c:678:6: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(nbh->b_data, obh->b_data,
^~~~~~
fs/jbd2/recovery.c:678:6: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(nbh->b_data, obh->b_data,
^~~~~~
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
>> drivers/firmware/efi/efi.c:127:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
str += sprintf(str, "ACPI20=0x%lx\n", efi.acpi20);
^~~~~~~
drivers/firmware/efi/efi.c:127:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
str += sprintf(str, "ACPI20=0x%lx\n", efi.acpi20);
^~~~~~~
drivers/firmware/efi/efi.c:129:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
str += sprintf(str, "ACPI=0x%lx\n", efi.acpi);
^~~~~~~
drivers/firmware/efi/efi.c:129:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
str += sprintf(str, "ACPI=0x%lx\n", efi.acpi);
^~~~~~~
drivers/firmware/efi/efi.c:136:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
str += sprintf(str, "SMBIOS3=0x%lx\n", efi.smbios3);
^~~~~~~
drivers/firmware/efi/efi.c:136:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
str += sprintf(str, "SMBIOS3=0x%lx\n", efi.smbios3);
^~~~~~~
drivers/firmware/efi/efi.c:138:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
str += sprintf(str, "SMBIOS=0x%lx\n", efi.smbios);
^~~~~~~
drivers/firmware/efi/efi.c:138:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
str += sprintf(str, "SMBIOS=0x%lx\n", efi.smbios);
^~~~~~~
drivers/firmware/efi/efi.c:151:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", efi_enabled(EFI_64BIT) ? 64 : 32);
^~~~~~~
drivers/firmware/efi/efi.c:151:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", efi_enabled(EFI_64BIT) ? 64 : 32);
^~~~~~~
>> drivers/firmware/efi/efi.c:322:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(name, sizeof(name), "boot_services_code%d",
^~~~~~~~
drivers/firmware/efi/efi.c:322:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(name, sizeof(name), "boot_services_code%d",
^~~~~~~~
drivers/firmware/efi/efi.c:326:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(name, sizeof(name), "boot_services_data%d",
^~~~~~~~
drivers/firmware/efi/efi.c:326:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(name, sizeof(name), "boot_services_data%d",
^~~~~~~~
>> drivers/firmware/efi/efi.c:468:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(out_md, md, sizeof(*out_md));
^~~~~~
drivers/firmware/efi/efi.c:468:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(out_md, md, sizeof(*out_md));
^~~~~~
drivers/firmware/efi/efi.c:761:14: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
type_len = snprintf(pos, size, "[type=%u", md->type);
^~~~~~~~
drivers/firmware/efi/efi.c:761:14: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
type_len = snprintf(pos, size, "[type=%u", md->type);
^~~~~~~~
drivers/firmware/efi/efi.c:763:14: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
type_len = snprintf(pos, size, "[%-*s",
^~~~~~~~
drivers/firmware/efi/efi.c:763:14: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
type_len = snprintf(pos, size, "[%-*s",
^~~~~~~~
drivers/firmware/efi/efi.c:778:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(pos, size, "|attr=0x%016llx]",
^~~~~~~~
drivers/firmware/efi/efi.c:778:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(pos, size, "|attr=0x%016llx]",
^~~~~~~~
drivers/firmware/efi/efi.c:781:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(pos, size,
^~~~~~~~
drivers/firmware/efi/efi.c:781:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(pos, size,
^~~~~~~~
Suppressed 36 warnings (35 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
15 warnings generated.
lib/xz/xz_dec_stream.c:162:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(s->temp.buf + s->temp.pos, b->in + b->in_pos, copy_size);
^~~~~~
lib/xz/xz_dec_stream.c:162:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(s->temp.buf + s->temp.pos, b->in + b->in_pos, copy_size);
^~~~~~
lib/xz/xz_dec_stream.c:822:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memzero(&s->block, sizeof(s->block));
^
lib/xz/xz_private.h:44:30: note: expanded from macro 'memzero'
# define memzero(buf, size) memset(buf, 0, size)
^~~~~~
lib/xz/xz_dec_stream.c:822:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memzero(&s->block, sizeof(s->block));
^
lib/xz/xz_private.h:44:30: note: expanded from macro 'memzero'
# define memzero(buf, size) memset(buf, 0, size)
^~~~~~
lib/xz/xz_dec_stream.c:823:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memzero(&s->index, sizeof(s->index));
^
lib/xz/xz_private.h:44:30: note: expanded from macro 'memzero'
# define memzero(buf, size) memset(buf, 0, size)
^~~~~~
lib/xz/xz_dec_stream.c:823:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memzero(&s->index, sizeof(s->index));
^
lib/xz/xz_private.h:44:30: note: expanded from macro 'memzero'
# define memzero(buf, size) memset(buf, 0, size)
^~~~~~
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
19 warnings generated.
lib/xz/xz_dec_lzma2.c:401:3: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(dict->buf + dict->pos, b->in + b->in_pos, copy_size);
^~~~~~~
lib/xz/xz_dec_lzma2.c:401:3: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(dict->buf + dict->pos, b->in + b->in_pos, copy_size);
^~~~~~~
lib/xz/xz_dec_lzma2.c:415:4: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(b->out + b->out_pos, b->in + b->in_pos,
^~~~~~~
lib/xz/xz_dec_lzma2.c:415:4: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(b->out + b->out_pos, b->in + b->in_pos,
^~~~~~~
lib/xz/xz_dec_lzma2.c:456:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(b->out + b->out_pos, dict->buf + dict->start,
^~~~~~
lib/xz/xz_dec_lzma2.c:456:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(b->out + b->out_pos, dict->buf + dict->start,
^~~~~~
lib/xz/xz_dec_lzma2.c:892:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(s->temp.buf + s->temp.size, b->in + b->in_pos, tmp);
^~~~~~
lib/xz/xz_dec_lzma2.c:892:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(s->temp.buf + s->temp.size, b->in + b->in_pos, tmp);
^~~~~~
lib/xz/xz_dec_lzma2.c:895:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memzero(s->temp.buf + s->temp.size + tmp,
^
lib/xz/xz_private.h:44:30: note: expanded from macro 'memzero'
# define memzero(buf, size) memset(buf, 0, size)
^~~~~~
lib/xz/xz_dec_lzma2.c:895:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memzero(s->temp.buf + s->temp.size + tmp,
--
kernel/time/clocksource.c:1359:9: note: Calling 'clocksource_unbind'
ret = clocksource_unbind(cs);
^~~~~~~~~~~~~~~~~~~~~~
kernel/time/clocksource.c:1219:2: note: Taking false branch
if (clocksource_is_watchdog(cs)) {
^
kernel/time/clocksource.c:1226:6: note: Assuming 'cs' is equal to 'curr_clocksource'
if (cs == curr_clocksource) {
^~~~~~~~~~~~~~~~~~~~~~
kernel/time/clocksource.c:1226:2: note: Taking true branch
if (cs == curr_clocksource) {
^
kernel/time/clocksource.c:1229:7: note: Assuming 'curr_clocksource' is not equal to 'cs'
if (curr_clocksource == cs)
^~~~~~~~~~~~~~~~~~~~~~
kernel/time/clocksource.c:1229:3: note: Taking false branch
if (curr_clocksource == cs)
^
kernel/time/clocksource.c:1233:6: note: Assuming the condition is true
if (clocksource_is_suspend(cs)) {
^~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/time/clocksource.c:1233:2: note: Taking true branch
if (clocksource_is_suspend(cs)) {
^
kernel/time/clocksource.c:1239:3: note: Calling 'clocksource_suspend_select'
clocksource_suspend_select(true);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/time/clocksource.c:713:6: note: 'fallback' is true
if (fallback)
^~~~~~~~
kernel/time/clocksource.c:713:2: note: Taking true branch
if (fallback)
^
kernel/time/clocksource.c:716:22: note: Null pointer value stored to 'cs'
list_for_each_entry(cs, &clocksource_list, list) {
^
include/linux/list.h:638:7: note: expanded from macro 'list_for_each_entry'
for (pos = list_first_entry(head, typeof(*pos), member); \
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/time/clocksource.c:716:2: note: Loop condition is true. Entering loop body
list_for_each_entry(cs, &clocksource_list, list) {
^
include/linux/list.h:638:2: note: expanded from macro 'list_for_each_entry'
for (pos = list_first_entry(head, typeof(*pos), member); \
^
kernel/time/clocksource.c:718:7: note: 'fallback' is true
if (fallback && cs == old_suspend)
^~~~~~~~
kernel/time/clocksource.c:718:7: note: Left side of '&&' is true
kernel/time/clocksource.c:718:19: note: Assuming 'cs' is equal to 'old_suspend'
if (fallback && cs == old_suspend)
^~~~~~~~~~~~~~~~~
kernel/time/clocksource.c:718:3: note: Taking true branch
if (fallback && cs == old_suspend)
^
kernel/time/clocksource.c:719:4: note: Execution continues on line 716
continue;
^
kernel/time/clocksource.c:716:2: note: Dereference of null pointer
list_for_each_entry(cs, &clocksource_list, list) {
^
include/linux/list.h:640:13: note: expanded from macro 'list_for_each_entry'
pos = list_next_entry(pos, member))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/list.h:564:2: note: expanded from macro 'list_next_entry'
list_entry((pos)->member.next, typeof(*(pos)), member)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/list.h:520:2: note: expanded from macro 'list_entry'
container_of(ptr, type, member)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/container_of.h:18:25: note: expanded from macro 'container_of'
void *__mptr = (void *)(ptr); \
^~~~~
kernel/time/clocksource.c:1282:10: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
count = snprintf(buf, PAGE_SIZE, "%s\n", curr_clocksource->name);
^~~~~~~~
kernel/time/clocksource.c:1282:10: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
count = snprintf(buf, PAGE_SIZE, "%s\n", curr_clocksource->name);
^~~~~~~~
kernel/time/clocksource.c:1300:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dst, buf, cnt);
^~~~~~
kernel/time/clocksource.c:1300:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dst, buf, cnt);
^~~~~~
kernel/time/clocksource.c:1391:13: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
count += snprintf(buf + count,
^~~~~~~~
kernel/time/clocksource.c:1391:13: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
count += snprintf(buf + count,
^~~~~~~~
kernel/time/clocksource.c:1397:11: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
count += snprintf(buf + count,
^~~~~~~~
kernel/time/clocksource.c:1397:11: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
count += snprintf(buf + count,
^~~~~~~~
Suppressed 23 warnings (23 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
58 warnings generated.
>> drivers/crypto/ccree/cc_cipher.c:321:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&hki, key, keylen);
^~~~~~
drivers/crypto/ccree/cc_cipher.c:321:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&hki, key, keylen);
^~~~~~
drivers/crypto/ccree/cc_cipher.c:472:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ctx_p->user.key, key, keylen);
^~~~~~
drivers/crypto/ccree/cc_cipher.c:472:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ctx_p->user.key, key, keylen);
^~~~~~
drivers/crypto/ccree/cc_cipher.c:777:17: warning: Value stored to 'dev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct device *dev = drvdata_to_dev(ctx_p->drvdata);
^~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/crypto/ccree/cc_cipher.c:777:17: note: Value stored to 'dev' during its initialization is never read
struct device *dev = drvdata_to_dev(ctx_p->drvdata);
^~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/crypto/ccree/cc_cipher.c:804:17: warning: Value stored to 'dev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct device *dev = drvdata_to_dev(ctx_p->drvdata);
^~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/crypto/ccree/cc_cipher.c:804:17: note: Value stored to 'dev' during its initialization is never read
struct device *dev = drvdata_to_dev(ctx_p->drvdata);
^~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/crypto/ccree/cc_cipher.c:870:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(req->iv, req_ctx->iv, ivsize);
^~~~~~
drivers/crypto/ccree/cc_cipher.c:870:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(req->iv, req_ctx->iv, ivsize);
^~~~~~
>> drivers/crypto/ccree/cc_cipher.c:994:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(req_ctx, 0, sizeof(*req_ctx));
^~~~~~
drivers/crypto/ccree/cc_cipher.c:994:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(req_ctx, 0, sizeof(*req_ctx));
^~~~~~
drivers/crypto/ccree/cc_cipher.c:1003:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(req_ctx, 0, sizeof(*req_ctx));
^~~~~~
drivers/crypto/ccree/cc_cipher.c:1003:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(req_ctx, 0, sizeof(*req_ctx));
^~~~~~
drivers/crypto/ccree/cc_cipher.c:1428:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(alg, &tmpl->template_skcipher, sizeof(*alg));
^~~~~~
drivers/crypto/ccree/cc_cipher.c:1428:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(alg, &tmpl->template_skcipher, sizeof(*alg));
^~~~~~
>> drivers/crypto/ccree/cc_cipher.c:1430:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(alg->base.cra_name, CRYPTO_MAX_ALG_NAME, "%s", tmpl->name);
^~~~~~~~
drivers/crypto/ccree/cc_cipher.c:1430:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(alg->base.cra_name, CRYPTO_MAX_ALG_NAME, "%s", tmpl->name);
^~~~~~~~
drivers/crypto/ccree/cc_cipher.c:1431:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(alg->base.cra_driver_name, CRYPTO_MAX_ALG_NAME, "%s",
^~~~~~~~
drivers/crypto/ccree/cc_cipher.c:1431:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(alg->base.cra_driver_name, CRYPTO_MAX_ALG_NAME, "%s",
^~~~~~~~
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
50 warnings generated.
>> block/blk-crypto-fallback.c:308:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(curr_dun, bc->bc_dun, sizeof(curr_dun));
^~~~~~
block/blk-crypto-fallback.c:308:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(curr_dun, bc->bc_dun, sizeof(curr_dun));
^~~~~~
block/blk-crypto-fallback.c:411:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(curr_dun, bc->bc_dun, sizeof(curr_dun));
^~~~~~
block/blk-crypto-fallback.c:411:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(curr_dun, bc->bc_dun, sizeof(curr_dun));
^~~~~~
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
22 warnings generated.
Suppressed 22 warnings (22 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
drivers/base/regmap/regmap-mmio.c:52:3: warning: Value stored to 'min_stride' is never read [clang-analyzer-deadcode.DeadStores]
min_stride = 0;
^ ~
drivers/base/regmap/regmap-mmio.c:52:3: note: Value stored to 'min_stride' is never read
min_stride = 0;
^ ~
Suppressed 33 warnings (33 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
drivers/base/regmap/regmap-irq.c:444:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(data->status_buf, 0, size);
^~~~~~
drivers/base/regmap/regmap-irq.c:444:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(data->status_buf, 0, size);
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
40 warnings generated.
drivers/virtio/virtio_ring.c:577:2: warning: Array subscript is undefined [clang-analyzer-core.uninitialized.ArraySubscript]
desc[prev].flags &= cpu_to_virtio16(_vq->vdev, ~VRING_DESC_F_NEXT);
^ ~~~~
drivers/virtio/virtio_ring.c:490:40: note: 'prev' declared without an initial value
unsigned int i, n, avail, descs_used, prev, err_idx;
^~~~
drivers/virtio/virtio_ring.c:496:9: note: Assuming 'data' is not equal to null
BUG_ON(data == NULL);
^
include/asm-generic/bug.h:161:45: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
~~~~~~~~~^~~~~~~~~~
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
drivers/virtio/virtio_ring.c:496:2: note: Taking false branch
BUG_ON(data == NULL);
^
include/asm-generic/bug.h:161:32: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^
drivers/virtio/virtio_ring.c:496:2: note: Loop condition is false. Exiting loop
BUG_ON(data == NULL);
^
include/asm-generic/bug.h:161:27: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^
drivers/virtio/virtio_ring.c:497:9: note: Assuming 'ctx' is null
BUG_ON(ctx && vq->indirect);
^
include/asm-generic/bug.h:161:45: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^~~~~~~~~
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
drivers/virtio/virtio_ring.c:497:13: note: Left side of '&&' is false
BUG_ON(ctx && vq->indirect);
^
drivers/virtio/virtio_ring.c:497:2: note: Taking false branch
BUG_ON(ctx && vq->indirect);
^
include/asm-generic/bug.h:161:32: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^
drivers/virtio/virtio_ring.c:497:2: note: Loop condition is false. Exiting loop
BUG_ON(ctx && vq->indirect);
^
include/asm-generic/bug.h:161:27: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^
drivers/virtio/virtio_ring.c:499:6: note: Assuming field 'broken' is false
if (unlikely(vq->broken)) {
^
include/linux/compiler.h:78:40: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^~~~
drivers/virtio/virtio_ring.c:499:2: note: Taking false branch
if (unlikely(vq->broken)) {
--
^~~~~~
kernel/printk/printk_ringbuffer.c:1729:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&buf[0], data, data_size); /* LMM(copy_data:A) */
^~~~~~
kernel/printk/printk_ringbuffer.c:1729:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&buf[0], data, data_size); /* LMM(copy_data:A) */
^~~~~~
kernel/printk/printk_ringbuffer.c:1811:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(r->info, info, sizeof(*(r->info)));
^~~~~~
kernel/printk/printk_ringbuffer.c:1811:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(r->info, info, sizeof(*(r->info)));
^~~~~~
kernel/printk/printk_ringbuffer.c:2039:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(descs, 0, _DESCS_COUNT(descbits) * sizeof(descs[0]));
^~~~~~
kernel/printk/printk_ringbuffer.c:2039:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(descs, 0, _DESCS_COUNT(descbits) * sizeof(descs[0]));
^~~~~~
kernel/printk/printk_ringbuffer.c:2040:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(infos, 0, _DESCS_COUNT(descbits) * sizeof(infos[0]));
^~~~~~
kernel/printk/printk_ringbuffer.c:2040:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(infos, 0, _DESCS_COUNT(descbits) * sizeof(infos[0]));
^~~~~~
Suppressed 10 warnings (10 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
23 warnings generated.
Suppressed 23 warnings (23 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
22 warnings generated.
Suppressed 22 warnings (22 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
53 warnings generated.
drivers/fpga/fpga-mgr.c:447:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", mgr->name);
^~~~~~~
drivers/fpga/fpga-mgr.c:447:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", mgr->name);
^~~~~~~
drivers/fpga/fpga-mgr.c:455:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", state_str[mgr->state]);
^~~~~~~
drivers/fpga/fpga-mgr.c:455:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", state_str[mgr->state]);
^~~~~~~
drivers/fpga/fpga-mgr.c:468:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += sprintf(buf + len, "reconfig operation error\n");
^~~~~~~
drivers/fpga/fpga-mgr.c:468:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
len += sprintf(buf + len, "reconfig operation error\n");
^~~~~~~
drivers/fpga/fpga-mgr.c:470:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += sprintf(buf + len, "reconfig CRC error\n");
^~~~~~~
drivers/fpga/fpga-mgr.c:470:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
len += sprintf(buf + len, "reconfig CRC error\n");
^~~~~~~
drivers/fpga/fpga-mgr.c:472:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += sprintf(buf + len, "reconfig incompatible image\n");
^~~~~~~
drivers/fpga/fpga-mgr.c:472:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
len += sprintf(buf + len, "reconfig incompatible image\n");
^~~~~~~
drivers/fpga/fpga-mgr.c:474:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += sprintf(buf + len, "reconfig IP protocol error\n");
^~~~~~~
drivers/fpga/fpga-mgr.c:474:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
len += sprintf(buf + len, "reconfig IP protocol error\n");
^~~~~~~
drivers/fpga/fpga-mgr.c:476:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += sprintf(buf + len, "reconfig fifo overflow error\n");
^~~~~~~
drivers/fpga/fpga-mgr.c:476:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
len += sprintf(buf + len, "reconfig fifo overflow error\n");
^~~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
39 warnings generated.
kernel/panic.c:408:13: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
s = buf + sprintf(buf, "Tainted: ");
^~~~~~~
kernel/panic.c:408:13: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
s = buf + sprintf(buf, "Tainted: ");
^~~~~~~
kernel/panic.c:416:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(buf, sizeof(buf), "Not tainted");
^~~~~~~~
kernel/panic.c:416:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(buf, sizeof(buf), "Not tainted");
^~~~~~~~
Suppressed 37 warnings (34 in non-user code, 3 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
55 warnings generated.
>> kernel/cpu.c:2271:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", st->state);
^~~~~~~
kernel/cpu.c:2271:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", st->state);
^~~~~~~
kernel/cpu.c:2319:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", st->target);
^~~~~~~
kernel/cpu.c:2319:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", st->target);
^~~~~~~
kernel/cpu.c:2378:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", st->fail);
^~~~~~~
kernel/cpu.c:2378:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", st->fail);
^~~~~~~
>> kernel/cpu.c:2407:10: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
cur = sprintf(buf, "%3d: %s\n", i, sp->name);
^~~~~~~
kernel/cpu.c:2407:10: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
cur = sprintf(buf, "%3d: %s\n", i, sp->name);
^~~~~~~
>> kernel/cpu.c:2493:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(buf, PAGE_SIZE - 2, "%s\n", state);
^~~~~~~~
kernel/cpu.c:2493:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(buf, PAGE_SIZE - 2, "%s\n", state);
^~~~~~~~
kernel/cpu.c:2506:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(buf, PAGE_SIZE - 2, "%d\n", sched_smt_active());
^~~~~~~~
kernel/cpu.c:2506:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(buf, PAGE_SIZE - 2, "%d\n", sched_smt_active());
^~~~~~~~
Suppressed 49 warnings (49 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
66 warnings generated.
drivers/bus/mhi/core/init.c:98:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(buf, PAGE_SIZE, "Serial Number: %u\n",
^~~~~~~~
drivers/bus/mhi/core/init.c:98:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(buf, PAGE_SIZE, "Serial Number: %u\n",
^~~~~~~~
drivers/bus/mhi/core/init.c:112:10: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
cnt += snprintf(buf + cnt, PAGE_SIZE - cnt,
^~~~~~~~
drivers/bus/mhi/core/init.c:112:10: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
cnt += snprintf(buf + cnt, PAGE_SIZE - cnt,
^~~~~~~~
Suppressed 64 warnings (64 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
fs/debugfs/file.c:1006:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len = snprintf(buf, bufsize, "%u%c", *array++, term);
^~~~~~~~
fs/debugfs/file.c:1006:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
len = snprintf(buf, bufsize, "%u%c", *array++, term);
^~~~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
fs/tracefs/inode.c:65:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(name, dname, len);
^~~~~~
fs/tracefs/inode.c:65:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(name, dname, len);
^~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
62 warnings generated.
drivers/char/ipmi/ipmi_msghandler.c:98:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buffer, "%s\n", event_str);
^~~~~~~
drivers/char/ipmi/ipmi_msghandler.c:98:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buffer, "%s\n", event_str);
^~~~~~~
drivers/char/ipmi/ipmi_msghandler.c:718:2: warning: Attempt to free released memory [clang-analyzer-unix.Malloc]
kfree(intf);
^
drivers/char/ipmi/ipmi_msghandler.c:3479:6: note: Assuming field 'in_shutdown' is false
if (!intf->in_shutdown)
^~~~~~~~~~~~~~~~~~
drivers/char/ipmi/ipmi_msghandler.c:3479:2: note: Taking true branch
if (!intf->in_shutdown)
^
drivers/char/ipmi/ipmi_msghandler.c:3480:3: note: Calling 'bmc_get_device_id'
bmc_get_device_id(intf, NULL, NULL, NULL, NULL);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/char/ipmi/ipmi_msghandler.c:2706:9: note: Calling '__bmc_get_device_id'
return __bmc_get_device_id(intf, bmc, id, guid_set, guid, -1);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/char/ipmi/ipmi_msghandler.c:2575:18: note: 'intf' is not equal to NULL
bool intf_set = intf != NULL;
^~~~
drivers/char/ipmi/ipmi_msghandler.c:2577:7: note: 'intf' is non-null
if (!intf) {
^~~~
drivers/char/ipmi/ipmi_msghandler.c:2577:2: note: Taking false branch
if (!intf) {
^
drivers/char/ipmi/ipmi_msghandler.c:2604:6: note: Assuming field 'in_bmc_register' is false
if (intf->in_bmc_register ||
^~~~~~~~~~~~~~~~~~~~~
drivers/char/ipmi/ipmi_msghandler.c:2604:6: note: Left side of '||' is false
drivers/char/ipmi/ipmi_msghandler.c:2605:7: note: Assuming field 'dyn_id_set' is 0
(bmc->dyn_id_set && time_is_after_jiffies(bmc->dyn_id_expiry)))
^~~~~~~~~~~~~~~
drivers/char/ipmi/ipmi_msghandler.c:2605:23: note: Left side of '&&' is false
(bmc->dyn_id_set && time_is_after_jiffies(bmc->dyn_id_expiry)))
^
drivers/char/ipmi/ipmi_msghandler.c:2613:6: note: Assuming 'rv' is not equal to 0
if (rv)
^~
drivers/char/ipmi/ipmi_msghandler.c:2613:2: note: Taking true branch
if (rv)
^
drivers/char/ipmi/ipmi_msghandler.c:2614:3: note: Control jumps to line 2668
goto out;
^
drivers/char/ipmi/ipmi_msghandler.c:2668:6: note: 'rv' is not equal to 0
--
^~~~
lib/iov_iter.c:782:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(addr + off, base, len)
^
lib/iov_iter.c:147:57: note: expanded from macro 'iterate_and_advance'
__iterate_and_advance(i, n, base, len, off, I, ((void)(K),0))
^
lib/iov_iter.c:126:14: note: expanded from macro '__iterate_and_advance'
bvec, (K)) \
^
lib/iov_iter.c:52:11: note: expanded from macro 'iterate_bvec'
left = (STEP); \
^~~~
lib/iov_iter.c:782:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(addr + off, base, len)
^
lib/iov_iter.c:147:57: note: expanded from macro 'iterate_and_advance'
__iterate_and_advance(i, n, base, len, off, I, ((void)(K),0))
^
lib/iov_iter.c:126:14: note: expanded from macro '__iterate_and_advance'
bvec, (K)) \
^
lib/iov_iter.c:52:11: note: expanded from macro 'iterate_bvec'
left = (STEP); \
^~~~
lib/iov_iter.c:929:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(p + off, 0, chunk);
^~~~~~
lib/iov_iter.c:929:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(p + off, 0, chunk);
^~~~~~
lib/iov_iter.c:947:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(base, 0, len)
^
lib/iov_iter.c:147:57: note: expanded from macro 'iterate_and_advance'
__iterate_and_advance(i, n, base, len, off, I, ((void)(K),0))
^
lib/iov_iter.c:126:14: note: expanded from macro '__iterate_and_advance'
bvec, (K)) \
^
lib/iov_iter.c:52:11: note: expanded from macro 'iterate_bvec'
left = (STEP); \
^~~~
lib/iov_iter.c:947:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(base, 0, len)
^
lib/iov_iter.c:147:57: note: expanded from macro 'iterate_and_advance'
__iterate_and_advance(i, n, base, len, off, I, ((void)(K),0))
^
lib/iov_iter.c:126:14: note: expanded from macro '__iterate_and_advance'
bvec, (K)) \
^
lib/iov_iter.c:52:11: note: expanded from macro 'iterate_bvec'
left = (STEP); \
^~~~
lib/iov_iter.c:969:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(p + off, base, len)
^
lib/iov_iter.c:147:57: note: expanded from macro 'iterate_and_advance'
__iterate_and_advance(i, n, base, len, off, I, ((void)(K),0))
^
lib/iov_iter.c:126:14: note: expanded from macro '__iterate_and_advance'
bvec, (K)) \
^
lib/iov_iter.c:52:11: note: expanded from macro 'iterate_bvec'
left = (STEP); \
^~~~
lib/iov_iter.c:969:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(p + off, base, len)
^
lib/iov_iter.c:147:57: note: expanded from macro 'iterate_and_advance'
__iterate_and_advance(i, n, base, len, off, I, ((void)(K),0))
^
lib/iov_iter.c:126:14: note: expanded from macro '__iterate_and_advance'
bvec, (K)) \
^
lib/iov_iter.c:52:11: note: expanded from macro 'iterate_bvec'
left = (STEP); \
^~~~
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
38 warnings generated.
>> drivers/staging/pi433/rf69.c:867:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&transfer, 0, sizeof(transfer));
^~~~~~
drivers/staging/pi433/rf69.c:867:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&transfer, 0, sizeof(transfer));
^~~~~~
>> drivers/staging/pi433/rf69.c:879:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buffer, &local_buffer[1], size);
^~~~~~
drivers/staging/pi433/rf69.c:879:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buffer, &local_buffer[1], size);
^~~~~~
drivers/staging/pi433/rf69.c:898:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&local_buffer[1], buffer, size);
^~~~~~
drivers/staging/pi433/rf69.c:898:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&local_buffer[1], buffer, size);
^~~~~~
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
38 warnings generated.
>> drivers/staging/axis-fifo/axis-fifo.c:174:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len = snprintf(tmp, sizeof(tmp), "0x%x\n", read_val);
^~~~~~~~
drivers/staging/axis-fifo/axis-fifo.c:174:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
len = snprintf(tmp, sizeof(tmp), "0x%x\n", read_val);
^~~~~~~~
>> drivers/staging/axis-fifo/axis-fifo.c:175:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, tmp, len);
^~~~~~
drivers/staging/axis-fifo/axis-fifo.c:175:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, tmp, len);
^~~~~~
drivers/staging/axis-fifo/axis-fifo.c:562:4: warning: 1st function call argument is an uninitialized value [clang-analyzer-core.CallAndMessage]
iowrite32(tmp_buf[i], fifo->base_addr +
^ ~~~~~~~~~~
include/asm-generic/io.h:759:19: note: expanded from macro 'iowrite32'
#define iowrite32 iowrite32
^
drivers/staging/axis-fifo/axis-fifo.c:488:6: note: Assuming the condition is false
if (len % sizeof(u32)) {
^~~~~~~~~~~~~~~~~
drivers/staging/axis-fifo/axis-fifo.c:488:2: note: Taking false branch
if (len % sizeof(u32)) {
^
drivers/staging/axis-fifo/axis-fifo.c:496:6: note: Assuming 'words_to_write' is not equal to 0
if (!words_to_write) {
^~~~~~~~~~~~~~~
drivers/staging/axis-fifo/axis-fifo.c:496:2: note: Taking false branch
if (!words_to_write) {
^
drivers/staging/axis-fifo/axis-fifo.c:502:6: note: Assuming 'words_to_write' is <= field 'tx_fifo_depth'
if (words_to_write > fifo->tx_fifo_depth) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/staging/axis-fifo/axis-fifo.c:502:2: note: Taking false branch
if (words_to_write > fifo->tx_fifo_depth) {
^
drivers/staging/axis-fifo/axis-fifo.c:508:6: note: Assuming the condition is true
if (fifo->write_flags & O_NONBLOCK) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/staging/axis-fifo/axis-fifo.c:508:2: note: Taking true branch
if (fifo->write_flags & O_NONBLOCK) {
^
drivers/staging/axis-fifo/axis-fifo.c:513:7: note: Assuming the condition is false
if (!mutex_trylock(&fifo->write_lock))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/staging/axis-fifo/axis-fifo.c:513:3: note: Taking false branch
if (!mutex_trylock(&fifo->write_lock))
^
drivers/staging/axis-fifo/axis-fifo.c:516:7: note: Assuming the condition is false
if (words_to_write > ioread32(fifo->base_addr +
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/staging/axis-fifo/axis-fifo.c:516:3: note: Taking false branch
if (words_to_write > ioread32(fifo->base_addr +
^
drivers/staging/axis-fifo/axis-fifo.c:551:9: note: 'words_to_write' is > 0
while (words_to_write > 0) {
^~~~~~~~~~~~~~
drivers/staging/axis-fifo/axis-fifo.c:551:2: note: Loop condition is true. Entering loop body
while (words_to_write > 0) {
^
drivers/staging/axis-fifo/axis-fifo.c:552:10: note: Assuming '__UNIQUE_ID___x242' is < '__UNIQUE_ID___y243'
copy = min(words_to_write, WRITE_BUF_SIZE);
^
include/linux/minmax.h:45:19: note: expanded from macro 'min'
#define min(x, y) __careful_cmp(x, y, <)
^~~~~~~~~~~~~~~~~~~~~~
include/linux/minmax.h:38:3: note: expanded from macro '__careful_cmp'
__cmp_once(x, y, __UNIQUE_ID(__x), __UNIQUE_ID(__y), op))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/minmax.h:33:3: note: expanded from macro '__cmp_once'
__cmp(unique_x, unique_y, op); })
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/minmax.h:28:26: note: expanded from macro '__cmp'
#define __cmp(x, y, op) ((x) op (y) ? (x) : (y))
^~~~~~~~~~
drivers/staging/axis-fifo/axis-fifo.c:552:10: note: '?' condition is true
copy = min(words_to_write, WRITE_BUF_SIZE);
^
include/linux/minmax.h:45:19: note: expanded from macro 'min'
#define min(x, y) __careful_cmp(x, y, <)
^
include/linux/minmax.h:38:3: note: expanded from macro '__careful_cmp'
__cmp_once(x, y, __UNIQUE_ID(__x), __UNIQUE_ID(__y), op))
^
include/linux/minmax.h:33:3: note: expanded from macro '__cmp_once'
__cmp(unique_x, unique_y, op); })
^
include/linux/minmax.h:28:26: note: expanded from macro '__cmp'
#define __cmp(x, y, op) ((x) op (y) ? (x) : (y))
^
drivers/staging/axis-fifo/axis-fifo.c:554:7: note: Calling 'copy_from_user'
if (copy_from_user(tmp_buf, buf + copied * sizeof(u32),
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/uaccess.h:191:13: note: Calling 'check_copy_size'
if (likely(check_copy_size(to, n, false)))
^
include/linux/compiler.h:77:40: note: expanded from macro 'likely'
# define likely(x) __builtin_expect(!!(x), 1)
^
include/linux/thread_info.h:221:15: note: Assuming 'sz' is >= 0
if (unlikely(sz >= 0 && sz < bytes)) {
^
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
include/linux/thread_info.h:221:15: note: Left side of '&&' is true
if (unlikely(sz >= 0 && sz < bytes)) {
--
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/hugetlb_cgroup.h:243:2: note: Returning without writing to '*ptr'
return 0;
^
include/linux/hugetlb_cgroup.h:243:2: note: Returning zero, which participates in a condition later
return 0;
^~~~~~~~
mm/hugetlb.c:2892:9: note: Returning from 'hugetlb_cgroup_charge_cgroup_rsvd'
ret = hugetlb_cgroup_charge_cgroup_rsvd(
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
mm/hugetlb.c:2894:7: note: 'ret' is 0
if (ret)
^~~
mm/hugetlb.c:2894:3: note: Taking false branch
if (ret)
^
mm/hugetlb.c:2898:8: note: Calling 'hugetlb_cgroup_charge_cgroup'
ret = hugetlb_cgroup_charge_cgroup(idx, pages_per_huge_page(h), &h_cg);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/hugetlb_cgroup.h:236:2: note: Returning without writing to '*ptr'
return 0;
^
include/linux/hugetlb_cgroup.h:236:2: note: Returning zero, which participates in a condition later
return 0;
^~~~~~~~
mm/hugetlb.c:2898:8: note: Returning from 'hugetlb_cgroup_charge_cgroup'
ret = hugetlb_cgroup_charge_cgroup(idx, pages_per_huge_page(h), &h_cg);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
mm/hugetlb.c:2899:6: note: 'ret' is 0
if (ret)
^~~
mm/hugetlb.c:2899:2: note: Taking false branch
if (ret)
^
mm/hugetlb.c:2909:6: note: Assuming 'page' is null
if (!page) {
^~~~~
mm/hugetlb.c:2909:2: note: Taking true branch
if (!page) {
^
mm/hugetlb.c:2911:10: note: Calling 'alloc_buddy_huge_page_with_mpol'
page = alloc_buddy_huge_page_with_mpol(h, vma, addr);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
mm/hugetlb.c:2260:2: note: Taking false branch
if (mpol_is_preferred_many(mpol)) {
^
mm/hugetlb.c:2270:7: note: 'page' is null
if (!page)
^~~~
mm/hugetlb.c:2270:2: note: Taking true branch
if (!page)
^
mm/hugetlb.c:2273:2: note: Returning pointer (loaded from 'page'), which participates in a condition later
return page;
^~~~~~~~~~~
mm/hugetlb.c:2911:10: note: Returning from 'alloc_buddy_huge_page_with_mpol'
page = alloc_buddy_huge_page_with_mpol(h, vma, addr);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
mm/hugetlb.c:2912:7: note: Assuming 'page' is null
if (!page)
^~~~~
mm/hugetlb.c:2912:3: note: Taking true branch
if (!page)
^
mm/hugetlb.c:2913:4: note: Control jumps to line 2957
goto out_uncharge_cgroup;
^
mm/hugetlb.c:2957:2: note: 3rd function call argument is an uninitialized value
hugetlb_cgroup_uncharge_cgroup(idx, pages_per_huge_page(h), h_cg);
^ ~~~~
mm/hugetlb.c:3005:12: warning: Access to field 'hstate' results in a dereference of a null pointer (loaded from variable 'm') [clang-analyzer-core.NullDereference]
m->hstate = h;
~ ^
mm/hugetlb.c:2973:2: note: 'm' initialized to a null pointer value
struct huge_bootmem_page *m = NULL; /* initialize for clang */
^~~~~~~~~~~~~~~~~~~~~~~~~~~
mm/hugetlb.c:2976:6: note: Assuming the condition is false
if (nid != NUMA_NO_NODE && nid >= nr_online_nodes)
^~~~~~~~~~~~~~~~~~~
mm/hugetlb.c:2976:26: note: Left side of '&&' is false
if (nid != NUMA_NO_NODE && nid >= nr_online_nodes)
^
mm/hugetlb.c:2979:2: note: Taking false branch
if (nid != NUMA_NO_NODE) {
^
mm/hugetlb.c:2987:33: note: Assuming 'nr_nodes' is <= 0
for_each_node_mask_to_alloc(h, nr_nodes, node, &node_states[N_MEMORY]) {
^
mm/hugetlb.c:1294:3: note: expanded from macro 'for_each_node_mask_to_alloc'
nr_nodes > 0 && \
^~~~~~~~~~~~
mm/hugetlb.c:2987:2: note: Left side of '&&' is false
for_each_node_mask_to_alloc(h, nr_nodes, node, &node_states[N_MEMORY]) {
^
mm/hugetlb.c:1294:16: note: expanded from macro 'for_each_node_mask_to_alloc'
nr_nodes > 0 && \
^
mm/hugetlb.c:3005:12: note: Access to field 'hstate' results in a dereference of a null pointer (loaded from variable 'm')
m->hstate = h;
~ ^
>> mm/hugetlb.c:4103:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(h->name, HSTATE_NAME_LEN, "hugepages-%lukB",
^~~~~~~~
mm/hugetlb.c:4103:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(h->name, HSTATE_NAME_LEN, "hugepages-%lukB",
^~~~~~~~
>> mm/hugetlb.c:4154:7: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(p, "%lu%n", &tmp, &count) != 1)
^~~~~~
mm/hugetlb.c:4154:7: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(p, "%lu%n", &tmp, &count) != 1)
^~~~~~
mm/hugetlb.c:4167:8: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(p, "%lu%n", &tmp, &count) != 1)
^~~~~~
mm/hugetlb.c:4167:8: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(p, "%lu%n", &tmp, &count) != 1)
^~~~~~
mm/hugetlb.c:6889:7: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(s, "%lu%n", &tmp, &count) != 1)
^~~~~~
mm/hugetlb.c:6889:7: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(s, "%lu%n", &tmp, &count) != 1)
^~~~~~
mm/hugetlb.c:6990:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(name, sizeof(name), "hugetlb%d", nid);
^~~~~~~~
mm/hugetlb.c:6990:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(name, sizeof(name), "hugetlb%d", nid);
^~~~~~~~
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
54 warnings generated.
fs/buffer.c:1923:15: warning: Access to field 'bdev' results in a dereference of a null pointer (loaded from variable 'iomap') [clang-analyzer-core.NullDereference]
bh->b_bdev = iomap->bdev;
^
fs/buffer.c:2602:6: note: Assuming 'page' is non-null
if (!page)
^~~~~
fs/buffer.c:2602:2: note: Taking false branch
if (!page)
^
fs/buffer.c:2607:6: note: Assuming the condition is true
if (page_has_buffers(page)) {
^
include/linux/buffer_head.h:146:32: note: expanded from macro 'page_has_buffers'
#define page_has_buffers(page) PagePrivate(page)
^~~~~~~~~~~~~~~~~
fs/buffer.c:2607:2: note: Taking true branch
if (page_has_buffers(page)) {
^
fs/buffer.c:2608:9: note: Calling '__block_write_begin'
ret = __block_write_begin(page, pos, len, get_block);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/buffer.c:2061:12: note: Passing null pointer value via 5th parameter 'iomap'
NULL);
^
include/linux/stddef.h:8:14: note: expanded from macro 'NULL'
#define NULL ((void *)0)
^~~~~~~~~~~
fs/buffer.c:2060:9: note: Calling '__block_write_begin_int'
return __block_write_begin_int(page_folio(page), pos, len, get_block,
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/buffer.c:1984:9: note: Assuming the condition is false
BUG_ON(!folio_test_locked(folio));
^
include/asm-generic/bug.h:161:45: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^~~~~~~~~
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
fs/buffer.c:1984:2: note: Taking false branch
BUG_ON(!folio_test_locked(folio));
^
include/asm-generic/bug.h:161:32: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^
fs/buffer.c:1984:2: note: Loop condition is false. Exiting loop
BUG_ON(!folio_test_locked(folio));
^
include/asm-generic/bug.h:161:27: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^
fs/buffer.c:1985:2: note: Taking false branch
BUG_ON(from > PAGE_SIZE);
^
include/asm-generic/bug.h:161:32: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^
fs/buffer.c:1985:2: note: Loop condition is false. Exiting loop
BUG_ON(from > PAGE_SIZE);
^
include/asm-generic/bug.h:161:27: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^
fs/buffer.c:1986:9: note: Assuming the condition is false
BUG_ON(to > PAGE_SIZE);
^
include/asm-generic/bug.h:161:45: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
--
^~~~~~~~~~
include/linux/sched.h:1633:2: note: Returning the value 32
return fls(state);
^~~~~~~~~~~~~~~~~
include/linux/sched.h:1647:28: note: Returning from 'task_state_index'
return task_index_to_char(task_state_index(tsk));
^~~~~~~~~~~~~~~~~~~~~
include/linux/sched.h:1647:28: note: Passing the value 32 via 1st parameter 'state'
return task_index_to_char(task_state_index(tsk));
^~~~~~~~~~~~~~~~~~~~~
include/linux/sched.h:1647:9: note: Calling 'task_index_to_char'
return task_index_to_char(task_state_index(tsk));
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/sched.h:1640:19: note: '?' condition is true
BUILD_BUG_ON(1 + ilog2(TASK_REPORT_MAX) != sizeof(state_char) - 1);
^
include/linux/log2.h:158:2: note: expanded from macro 'ilog2'
__builtin_constant_p(n) ? \
^
include/linux/sched.h:1640:19: note: '?' condition is false
BUILD_BUG_ON(1 + ilog2(TASK_REPORT_MAX) != sizeof(state_char) - 1);
^
include/linux/log2.h:159:3: note: expanded from macro 'ilog2'
((n) < 2 ? 0 : \
^
include/linux/sched.h:1640:15: note: Assuming the condition is false
BUILD_BUG_ON(1 + ilog2(TASK_REPORT_MAX) != sizeof(state_char) - 1);
^
include/linux/build_bug.h:50:19: note: expanded from macro 'BUILD_BUG_ON'
BUILD_BUG_ON_MSG(condition, "BUILD_BUG_ON failed: " #condition)
~~~~~~~~~~~~~~~~~^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/build_bug.h:39:58: note: expanded from macro 'BUILD_BUG_ON_MSG'
#define BUILD_BUG_ON_MSG(cond, msg) compiletime_assert(!(cond), msg)
~~~~~~~~~~~~~~~~~~~~~^~~~~~~~~~~
include/linux/compiler_types.h:346:22: note: expanded from macro 'compiletime_assert'
_compiletime_assert(condition, msg, __compiletime_assert_, __COUNTER__)
~~~~~~~~~~~~~~~~~~~~^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/compiler_types.h:334:23: note: expanded from macro '_compiletime_assert'
__compiletime_assert(condition, msg, prefix, suffix)
~~~~~~~~~~~~~~~~~~~~~^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/compiler_types.h:326:9: note: expanded from macro '__compiletime_assert'
if (!(condition)) \
^~~~~~~~~
include/linux/sched.h:1640:2: note: Taking false branch
BUILD_BUG_ON(1 + ilog2(TASK_REPORT_MAX) != sizeof(state_char) - 1);
^
include/linux/build_bug.h:50:2: note: expanded from macro 'BUILD_BUG_ON'
BUILD_BUG_ON_MSG(condition, "BUILD_BUG_ON failed: " #condition)
^
include/linux/build_bug.h:39:37: note: expanded from macro 'BUILD_BUG_ON_MSG'
#define BUILD_BUG_ON_MSG(cond, msg) compiletime_assert(!(cond), msg)
^
include/linux/compiler_types.h:346:2: note: expanded from macro 'compiletime_assert'
_compiletime_assert(condition, msg, __compiletime_assert_, __COUNTER__)
^
include/linux/compiler_types.h:334:2: note: expanded from macro '_compiletime_assert'
__compiletime_assert(condition, msg, prefix, suffix)
^
include/linux/compiler_types.h:326:3: note: expanded from macro '__compiletime_assert'
if (!(condition)) \
^
include/linux/sched.h:1640:2: note: Loop condition is false. Exiting loop
BUILD_BUG_ON(1 + ilog2(TASK_REPORT_MAX) != sizeof(state_char) - 1);
^
include/linux/build_bug.h:50:2: note: expanded from macro 'BUILD_BUG_ON'
BUILD_BUG_ON_MSG(condition, "BUILD_BUG_ON failed: " #condition)
^
include/linux/build_bug.h:39:37: note: expanded from macro 'BUILD_BUG_ON_MSG'
#define BUILD_BUG_ON_MSG(cond, msg) compiletime_assert(!(cond), msg)
^
include/linux/compiler_types.h:346:2: note: expanded from macro 'compiletime_assert'
_compiletime_assert(condition, msg, __compiletime_assert_, __COUNTER__)
^
include/linux/compiler_types.h:334:2: note: expanded from macro '_compiletime_assert'
__compiletime_assert(condition, msg, prefix, suffix)
^
include/linux/compiler_types.h:318:2: note: expanded from macro '__compiletime_assert'
do { \
^
include/linux/sched.h:1642:2: note: Undefined or garbage value returned to caller
return state_char[state];
^ ~~~~~~~~~~~~~~~~~
kernel/sched/core.c:5510:16: warning: Value stored to 'preempt_disable_ip' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
unsigned long preempt_disable_ip = get_preempt_disable_ip(current);
^~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/sched/core.c:5510:16: note: Value stored to 'preempt_disable_ip' during its initialization is never read
unsigned long preempt_disable_ip = get_preempt_disable_ip(current);
^~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/sched/core.c:6295:3: warning: Value stored to 'rq' is never read [clang-analyzer-deadcode.DeadStores]
rq = context_switch(rq, prev, next, &rf);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/sched/core.c:6295:3: note: Value stored to 'rq' is never read
rq = context_switch(rq, prev, next, &rf);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/sched/core.c:7651:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(attr, 0, sizeof(*attr));
^~~~~~
kernel/sched/core.c:7651:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(attr, 0, sizeof(*attr));
^~~~~~
>> kernel/sched/core.c:8692:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(idle->comm, "%s/%d", INIT_TASK_COMM, cpu);
^~~~~~~
kernel/sched/core.c:8692:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(idle->comm, "%s/%d", INIT_TASK_COMM, cpu);
^~~~~~~
kernel/sched/core.c:9319:3: warning: Value stored to 'ptr' is never read [clang-analyzer-deadcode.DeadStores]
ptr += nr_cpu_ids * sizeof(void **);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/sched/core.c:9319:3: note: Value stored to 'ptr' is never read
ptr += nr_cpu_ids * sizeof(void **);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/sched/core.c:10759:6: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(buf, "%20s %llu", tok, periodp) < 1)
^~~~~~
kernel/sched/core.c:10759:6: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(buf, "%20s %llu", tok, periodp) < 1)
^~~~~~
kernel/sched/core.c:10764:6: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(tok, "%llu", quotap))
^~~~~~
kernel/sched/core.c:10764:6: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(tok, "%llu", quotap))
^~~~~~
Suppressed 97 warnings (95 in non-user code, 2 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
39 warnings generated.
drivers/of/address.c:89:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(addr, 0, na * 4);
^~~~~~
drivers/of/address.c:89:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(addr, 0, na * 4);
^~~~~~
drivers/of/address.c:430:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(addr, 0, pna * 4);
^~~~~~
drivers/of/address.c:430:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(addr, 0, pna * 4);
^~~~~~
drivers/of/address.c:449:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(addr, ranges + na, 4 * pna);
^~~~~~
drivers/of/address.c:449:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(addr, ranges + na, 4 * pna);
^~~~~~
drivers/of/address.c:502:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(addr, in_addr, na * 4);
^~~~~~
drivers/of/address.c:502:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(addr, in_addr, na * 4);
^~~~~~
drivers/of/address.c:820:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(r, 0, sizeof(struct resource));
^~~~~~
drivers/of/address.c:820:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(r, 0, sizeof(struct resource));
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
36 warnings generated.
drivers/of/irq.c:404:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(r, 0, sizeof(*r));
^~~~~~
drivers/of/irq.c:404:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(r, 0, sizeof(*r));
^~~~~~
drivers/of/irq.c:610:2: warning: Dereference of null pointer [clang-analyzer-core.NullDereference]
list_for_each_entry_safe(desc, temp_desc, &intc_parent_list, list) {
^
include/linux/list.h:726:7: note: expanded from macro 'list_for_each_entry_safe'
n = list_next_entry(pos, member); \
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/list.h:564:2: note: expanded from macro 'list_next_entry'
list_entry((pos)->member.next, typeof(*(pos)), member)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/list.h:520:2: note: expanded from macro 'list_entry'
container_of(ptr, type, member)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/container_of.h:18:25: note: expanded from macro 'container_of'
void *__mptr = (void *)(ptr); \
^~~~~
drivers/of/irq.c:532:2: note: Loop condition is true. Entering loop body
for_each_matching_node_and_match(np, matches, &match) {
^
include/linux/of.h:1364:2: note: expanded from macro 'for_each_matching_node_and_match'
for (dn = of_find_matching_node_and_match(NULL, matches, match); \
^
drivers/of/irq.c:533:8: note: Calling 'of_property_read_bool'
if (!of_property_read_bool(np, "interrupt-controller") ||
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/of.h:1178:9: note: Assuming 'prop' is null
return prop ? true : false;
^~~~
include/linux/of.h:1178:9: note: '?' condition is false
include/linux/of.h:1178:2: note: Returning zero, which participates in a condition later
return prop ? true : false;
^~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/of/irq.c:533:8: note: Returning from 'of_property_read_bool'
if (!of_property_read_bool(np, "interrupt-controller") ||
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/of/irq.c:533:58: note: Left side of '||' is true
--
^
drivers/of/irq.c:602:4: note: Taking true branch
pr_err("of_irq_init: children remain, but no parents\n");
^
include/linux/printk.h:489:2: note: expanded from macro 'pr_err'
printk(KERN_ERR pr_fmt(fmt), ##__VA_ARGS__)
^
include/linux/printk.h:446:26: note: expanded from macro 'printk'
#define printk(fmt, ...) printk_index_wrap(_printk, fmt, ##__VA_ARGS__)
^
include/linux/printk.h:417:3: note: expanded from macro 'printk_index_wrap'
__printk_index_emit(_fmt, NULL, NULL); \
^
include/linux/printk.h:370:3: note: expanded from macro '__printk_index_emit'
if (__builtin_constant_p(_fmt) && __builtin_constant_p(_level)) { \
^
drivers/of/irq.c:602:4: note: '?' condition is true
pr_err("of_irq_init: children remain, but no parents\n");
^
include/linux/printk.h:489:2: note: expanded from macro 'pr_err'
printk(KERN_ERR pr_fmt(fmt), ##__VA_ARGS__)
^
include/linux/printk.h:446:26: note: expanded from macro 'printk'
#define printk(fmt, ...) printk_index_wrap(_printk, fmt, ##__VA_ARGS__)
^
include/linux/printk.h:417:3: note: expanded from macro 'printk_index_wrap'
__printk_index_emit(_fmt, NULL, NULL); \
^
include/linux/printk.h:379:12: note: expanded from macro '__printk_index_emit'
.fmt = __builtin_constant_p(_fmt) ? (_fmt) : NULL, \
^
drivers/of/irq.c:602:4: note: '?' condition is true
pr_err("of_irq_init: children remain, but no parents\n");
^
include/linux/printk.h:489:2: note: expanded from macro 'pr_err'
printk(KERN_ERR pr_fmt(fmt), ##__VA_ARGS__)
^
include/linux/printk.h:446:26: note: expanded from macro 'printk'
#define printk(fmt, ...) printk_index_wrap(_printk, fmt, ##__VA_ARGS__)
^
include/linux/printk.h:417:3: note: expanded from macro 'printk_index_wrap'
__printk_index_emit(_fmt, NULL, NULL); \
^
include/linux/printk.h:383:14: note: expanded from macro '__printk_index_emit'
.level = __builtin_constant_p(_level) ? (_level) : NULL, \
^
drivers/of/irq.c:602:4: note: Loop condition is false. Exiting loop
pr_err("of_irq_init: children remain, but no parents\n");
^
include/linux/printk.h:489:2: note: expanded from macro 'pr_err'
printk(KERN_ERR pr_fmt(fmt), ##__VA_ARGS__)
^
include/linux/printk.h:446:26: note: expanded from macro 'printk'
#define printk(fmt, ...) printk_index_wrap(_printk, fmt, ##__VA_ARGS__)
^
include/linux/printk.h:417:3: note: expanded from macro 'printk_index_wrap'
__printk_index_emit(_fmt, NULL, NULL); \
^
include/linux/printk.h:369:2: note: expanded from macro '__printk_index_emit'
do { \
^
drivers/of/irq.c:603:4: note: Execution continues on line 610
break;
^
drivers/of/irq.c:610:27: note: Null pointer value stored to 'desc'
list_for_each_entry_safe(desc, temp_desc, &intc_parent_list, list) {
^
include/linux/list.h:725:7: note: expanded from macro 'list_for_each_entry_safe'
for (pos = list_first_entry(head, typeof(*pos), member), \
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/of/irq.c:610:2: note: Dereference of null pointer
list_for_each_entry_safe(desc, temp_desc, &intc_parent_list, list) {
^
include/linux/list.h:726:7: note: expanded from macro 'list_for_each_entry_safe'
n = list_next_entry(pos, member); \
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/list.h:564:2: note: expanded from macro 'list_next_entry'
list_entry((pos)->member.next, typeof(*(pos)), member)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/list.h:520:2: note: expanded from macro 'list_entry'
container_of(ptr, type, member)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/container_of.h:18:25: note: expanded from macro 'container_of'
void *__mptr = (void *)(ptr); \
^~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
kernel/locking/lock_events.c:78:8: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len = snprintf(buf, sizeof(buf) - 1, "%llu\n", sum);
^~~~~~~~
kernel/locking/lock_events.c:78:8: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
len = snprintf(buf, sizeof(buf) - 1, "%llu\n", sum);
^~~~~~~~
Suppressed 31 warnings (30 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
56 warnings generated.
>> fs/hpfs/buffer.c:147:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data + 0 * 512, qbh->bh[0]->b_data, 512);
^~~~~~
fs/hpfs/buffer.c:147:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data + 0 * 512, qbh->bh[0]->b_data, 512);
^~~~~~
fs/hpfs/buffer.c:148:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data + 1 * 512, qbh->bh[1]->b_data, 512);
^~~~~~
fs/hpfs/buffer.c:148:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data + 1 * 512, qbh->bh[1]->b_data, 512);
^~~~~~
fs/hpfs/buffer.c:149:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data + 2 * 512, qbh->bh[2]->b_data, 512);
^~~~~~
fs/hpfs/buffer.c:149:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data + 2 * 512, qbh->bh[2]->b_data, 512);
^~~~~~
fs/hpfs/buffer.c:150:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data + 3 * 512, qbh->bh[3]->b_data, 512);
^~~~~~
fs/hpfs/buffer.c:150:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data + 3 * 512, qbh->bh[3]->b_data, 512);
^~~~~~
fs/hpfs/buffer.c:223:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(qbh->bh[0]->b_data, qbh->data + 0 * 512, 512);
^~~~~~
fs/hpfs/buffer.c:223:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(qbh->bh[0]->b_data, qbh->data + 0 * 512, 512);
^~~~~~
fs/hpfs/buffer.c:224:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(qbh->bh[1]->b_data, qbh->data + 1 * 512, 512);
^~~~~~
fs/hpfs/buffer.c:224:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(qbh->bh[1]->b_data, qbh->data + 1 * 512, 512);
^~~~~~
fs/hpfs/buffer.c:225:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(qbh->bh[2]->b_data, qbh->data + 2 * 512, 512);
^~~~~~
fs/hpfs/buffer.c:225:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(qbh->bh[2]->b_data, qbh->data + 2 * 512, 512);
^~~~~~
fs/hpfs/buffer.c:226:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(qbh->bh[3]->b_data, qbh->data + 3 * 512, 512);
^~~~~~
fs/hpfs/buffer.c:226:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(qbh->bh[3]->b_data, qbh->data + 3 * 512, 512);
^~~~~~
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
38 warnings generated.
drivers/auxdisplay/panel.c:1452:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(key->u.kbd.press_str, press, sizeof(key->u.kbd.press_str));
^~~~~~~
drivers/auxdisplay/panel.c:1452:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(key->u.kbd.press_str, press, sizeof(key->u.kbd.press_str));
^~~~~~~
drivers/auxdisplay/panel.c:1453:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(key->u.kbd.repeat_str, repeat, sizeof(key->u.kbd.repeat_str));
^~~~~~~
drivers/auxdisplay/panel.c:1453:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(key->u.kbd.repeat_str, repeat, sizeof(key->u.kbd.repeat_str));
^~~~~~~
drivers/auxdisplay/panel.c:1454:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(key->u.kbd.release_str, release,
^~~~~~~
drivers/auxdisplay/panel.c:1454:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(key->u.kbd.release_str, release,
^~~~~~~
drivers/auxdisplay/panel.c:1534:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&panel_cb, 0, sizeof(panel_cb));
^~~~~~
drivers/auxdisplay/panel.c:1534:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&panel_cb, 0, sizeof(panel_cb));
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
15 warnings generated.
>> crypto/des_generic.c:33:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(dctx, 0, sizeof(*dctx));
^~~~~~
crypto/des_generic.c:33:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(dctx, 0, sizeof(*dctx));
^~~~~~
crypto/des_generic.c:65:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(dctx, 0, sizeof(*dctx));
^~~~~~
crypto/des_generic.c:65:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(dctx, 0, sizeof(*dctx));
^~~~~~
Suppressed 13 warnings (13 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
13 warnings generated.
lib/xarray.c:2029:18: warning: Value stored to 'node' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct xa_node *node = xas->xa_node;
^~~~ ~~~~~~~~~~~~
lib/xarray.c:2029:18: note: Value stored to 'node' during its initialization is never read
struct xa_node *node = xas->xa_node;
^~~~ ~~~~~~~~~~~~
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
9 warnings generated.
Suppressed 9 warnings (9 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
19 warnings generated.
Suppressed 19 warnings (19 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
70 warnings generated.
fs/namei.c:247:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy((char *)result->name, filename, len);
^~~~~~
fs/namei.c:247:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy((char *)result->name, filename, len);
^~~~~~
fs/namei.c:635:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(p, nd->internal, sizeof(nd->internal));
^~~~~~
fs/namei.c:635:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(p, nd->internal, sizeof(nd->internal));
^~~~~~
fs/namei.c:3423:8: warning: 4th function call argument is an uninitialized value [clang-analyzer-core.CallAndMessage]
res = step_into(nd, WALK_TRAILING, dentry, inode, seq);
^
fs/namei.c:3636:9: note: Calling 'path_openat'
filp = path_openat(&nd, op, flags | LOOKUP_RCU);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/namei.c:3595:41: note: Left side of '&&' is false
file = alloc_empty_file(op->open_flag, current_cred());
^
include/linux/cred.h:299:2: note: expanded from macro 'current_cred'
rcu_dereference_protected(current->cred, 1)
^
include/linux/rcupdate.h:594:2: note: expanded from macro 'rcu_dereference_protected'
__rcu_dereference_protected((p), __UNIQUE_ID(rcu), (c), __rcu)
^
include/linux/rcupdate.h:398:2: note: expanded from macro '__rcu_dereference_protected'
RCU_LOCKDEP_WARN(!(c), "suspicious rcu_dereference_protected() usage"); \
^
include/linux/rcupdate.h:319:11: note: expanded from macro 'RCU_LOCKDEP_WARN'
if ((c) && debug_lockdep_rcu_enabled() && !__warned) { \
^
fs/namei.c:3595:41: note: Loop condition is false. Exiting loop
file = alloc_empty_file(op->open_flag, current_cred());
^
include/linux/cred.h:299:2: note: expanded from macro 'current_cred'
rcu_dereference_protected(current->cred, 1)
^
include/linux/rcupdate.h:594:2: note: expanded from macro 'rcu_dereference_protected'
__rcu_dereference_protected((p), __UNIQUE_ID(rcu), (c), __rcu)
^
include/linux/rcupdate.h:398:2: note: expanded from macro '__rcu_dereference_protected'
RCU_LOCKDEP_WARN(!(c), "suspicious rcu_dereference_protected() usage"); \
^
include/linux/rcupdate.h:317:2: note: expanded from macro 'RCU_LOCKDEP_WARN'
do { \
^
fs/namei.c:3596:2: note: Taking false branch
if (IS_ERR(file))
^
fs/namei.c:3599:6: note: Assuming the condition is true
if (unlikely(file->f_flags & __O_TMPFILE)) {
--
^
include/asm-generic/bug.h:166:23: note: expanded from macro 'WARN_ON'
int __ret_warn_on = !!(condition); \
^~~~~~~~~~~~
drivers/spi/spi-nxp-fspi.c:876:2: note: Calling 'nxp_fspi_prepare_lut'
nxp_fspi_prepare_lut(f, op);
^~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/spi/spi-nxp-fspi.c:538:6: note: Assuming field 'nbytes' is not equal to 0
if (op->addr.nbytes) {
^~~~~~~~~~~~~~~
drivers/spi/spi-nxp-fspi.c:538:2: note: Taking true branch
if (op->addr.nbytes) {
^
drivers/spi/spi-nxp-fspi.c:539:25: note: The result of the left shift is undefined because the left operand is negative
lutval[lutidx / 2] |= LUT_DEF(lutidx, LUT_ADDR,
^
drivers/spi/spi-nxp-fspi.c:311:36: note: expanded from macro 'LUT_DEF'
((((ins) << INSTR_SHIFT) | ((pad) << PAD_SHIFT) | \
~~~~~ ^
drivers/spi/spi-nxp-fspi.c:547:25: warning: The result of the left shift is undefined because the left operand is negative [clang-analyzer-core.UndefinedBinaryOperatorResult]
lutval[lutidx / 2] |= LUT_DEF(lutidx, LUT_DUMMY,
^
drivers/spi/spi-nxp-fspi.c:311:36: note: expanded from macro 'LUT_DEF'
((((ins) << INSTR_SHIFT) | ((pad) << PAD_SHIFT) | \
^
drivers/spi/spi-nxp-fspi.c:872:2: note: Assuming 'err' is not equal to 0
WARN_ON(err);
^
include/asm-generic/bug.h:166:23: note: expanded from macro 'WARN_ON'
int __ret_warn_on = !!(condition); \
^~~~~~~~~~~~
drivers/spi/spi-nxp-fspi.c:876:2: note: Calling 'nxp_fspi_prepare_lut'
nxp_fspi_prepare_lut(f, op);
^~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/spi/spi-nxp-fspi.c:538:6: note: Assuming field 'nbytes' is 0
if (op->addr.nbytes) {
^~~~~~~~~~~~~~~
drivers/spi/spi-nxp-fspi.c:538:2: note: Taking false branch
if (op->addr.nbytes) {
^
drivers/spi/spi-nxp-fspi.c:546:6: note: Assuming field 'nbytes' is not equal to 0
if (op->dummy.nbytes) {
^~~~~~~~~~~~~~~~
drivers/spi/spi-nxp-fspi.c:546:2: note: Taking true branch
if (op->dummy.nbytes) {
^
drivers/spi/spi-nxp-fspi.c:547:25: note: The result of the left shift is undefined because the left operand is negative
lutval[lutidx / 2] |= LUT_DEF(lutidx, LUT_DUMMY,
^
drivers/spi/spi-nxp-fspi.c:311:36: note: expanded from macro 'LUT_DEF'
((((ins) << INSTR_SHIFT) | ((pad) << PAD_SHIFT) | \
~~~~~ ^
drivers/spi/spi-nxp-fspi.c:560:25: warning: The result of the left shift is undefined because the left operand is negative [clang-analyzer-core.UndefinedBinaryOperatorResult]
lutval[lutidx / 2] |= LUT_DEF(lutidx,
^
drivers/spi/spi-nxp-fspi.c:311:36: note: expanded from macro 'LUT_DEF'
((((ins) << INSTR_SHIFT) | ((pad) << PAD_SHIFT) | \
^
drivers/spi/spi-nxp-fspi.c:872:2: note: Assuming 'err' is not equal to 0
WARN_ON(err);
^
include/asm-generic/bug.h:166:23: note: expanded from macro 'WARN_ON'
int __ret_warn_on = !!(condition); \
^~~~~~~~~~~~
drivers/spi/spi-nxp-fspi.c:876:2: note: Calling 'nxp_fspi_prepare_lut'
nxp_fspi_prepare_lut(f, op);
^~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/spi/spi-nxp-fspi.c:538:6: note: Assuming field 'nbytes' is 0
if (op->addr.nbytes) {
^~~~~~~~~~~~~~~
drivers/spi/spi-nxp-fspi.c:538:2: note: Taking false branch
if (op->addr.nbytes) {
^
drivers/spi/spi-nxp-fspi.c:546:6: note: Assuming field 'nbytes' is 0
if (op->dummy.nbytes) {
^~~~~~~~~~~~~~~~
drivers/spi/spi-nxp-fspi.c:546:2: note: Taking false branch
if (op->dummy.nbytes) {
^
drivers/spi/spi-nxp-fspi.c:559:6: note: Assuming field 'nbytes' is not equal to 0
if (op->data.nbytes) {
^~~~~~~~~~~~~~~
drivers/spi/spi-nxp-fspi.c:559:2: note: Taking true branch
if (op->data.nbytes) {
^
drivers/spi/spi-nxp-fspi.c:561:12: note: Assuming field 'dir' is not equal to SPI_MEM_DATA_IN
op->data.dir == SPI_MEM_DATA_IN ?
^
drivers/spi/spi-nxp-fspi.c:311:6: note: expanded from macro 'LUT_DEF'
((((ins) << INSTR_SHIFT) | ((pad) << PAD_SHIFT) | \
^~~
drivers/spi/spi-nxp-fspi.c:561:12: note: '?' condition is false
op->data.dir == SPI_MEM_DATA_IN ?
^
drivers/spi/spi-nxp-fspi.c:560:25: note: The result of the left shift is undefined because the left operand is negative
lutval[lutidx / 2] |= LUT_DEF(lutidx,
^
drivers/spi/spi-nxp-fspi.c:311:36: note: expanded from macro 'LUT_DEF'
((((ins) << INSTR_SHIFT) | ((pad) << PAD_SHIFT) | \
~~~~~ ^
>> drivers/spi/spi-nxp-fspi.c:764:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&data, buf + i + j, 4);
^~~~~~
drivers/spi/spi-nxp-fspi.c:764:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&data, buf + i + j, 4);
^~~~~~
drivers/spi/spi-nxp-fspi.c:811:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf + j, &tmp, size);
^~~~~~
drivers/spi/spi-nxp-fspi.c:811:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf + j, &tmp, size);
^~~~~~
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
64 warnings generated.
fs/ext4/super.c:890:8: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (snprintf(nbuf, 16, "error %d", -errno) >= 0)
^~~~~~~~
fs/ext4/super.c:890:8: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
if (snprintf(nbuf, 16, "error %d", -errno) >= 0)
^~~~~~~~
fs/ext4/super.c:3190:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(new_groups, old_groups,
^~~~~~
fs/ext4/super.c:3190:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(new_groups, old_groups,
^~~~~~
fs/ext4/super.c:4227:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buf, 0, PAGE_SIZE);
^~~~~~
fs/ext4/super.c:4227:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(buf, 0, PAGE_SIZE);
^~~~~~
fs/ext4/super.c:5072:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&sb->s_uuid, es->s_uuid, sizeof(es->s_uuid));
^~~~~~
fs/ext4/super.c:5072:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&sb->s_uuid, es->s_uuid, sizeof(es->s_uuid));
^~~~~~
fs/ext4/super.c:5087:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&sbi->s_fc_stats, 0, sizeof(sbi->s_fc_stats));
^~~~~~
fs/ext4/super.c:5087:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&sbi->s_fc_stats, 0, sizeof(sbi->s_fc_stats));
^~~~~~
fs/ext4/super.c:5838:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(save, ((char *) es) +
^~~~~~
fs/ext4/super.c:5838:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(save, ((char *) es) +
^~~~~~
fs/ext4/super.c:5842:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(((char *) es) + EXT4_S_ERR_START,
^~~~~~
fs/ext4/super.c:5842:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(((char *) es) + EXT4_S_ERR_START,
^~~~~~
fs/ext4/super.c:5915:4: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(es->s_first_error_func, sbi->s_first_error_func,
^~~~~~~
fs/ext4/super.c:5915:4: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(es->s_first_error_func, sbi->s_first_error_func,
^~~~~~~
fs/ext4/super.c:5929:3: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(es->s_last_error_func, sbi->s_last_error_func,
^~~~~~~
fs/ext4/super.c:5929:3: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(es->s_last_error_func, sbi->s_last_error_func,
^~~~~~~
Suppressed 55 warnings (51 in non-user code, 4 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
fs/filesystems.c:227:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, p->name, len);
^~~~~~
fs/filesystems.c:227:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, p->name, len);
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
38 warnings generated.
drivers/remoteproc/remoteproc_elf_loader.c:225:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ptr, elf_data + offset, filesz);
^~~~~~
drivers/remoteproc/remoteproc_elf_loader.c:225:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ptr, elf_data + offset, filesz);
^~~~~~
drivers/remoteproc/remoteproc_elf_loader.c:239:5: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ptr + filesz, 0, memsz - filesz);
^~~~~~
drivers/remoteproc/remoteproc_elf_loader.c:239:5: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(ptr + filesz, 0, memsz - filesz);
^~~~~~
Suppressed 36 warnings (36 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
41 warnings generated.
drivers/extcon/extcon.c:339:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(cable->usb_propval, 0, sizeof(cable->usb_propval));
--
^~~~~~ ~~~~~~~~~
drivers/crypto/amlogic/amlogic-gxl-cipher.c:95:22: note: Value stored to 'dst_sg' during its initialization is never read
struct scatterlist *dst_sg = areq->dst;
^~~~~~ ~~~~~~~~~
drivers/crypto/amlogic/amlogic-gxl-cipher.c:126:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(bkeyiv, op->key, op->keylen);
^~~~~~
drivers/crypto/amlogic/amlogic-gxl-cipher.c:126:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(bkeyiv, op->key, op->keylen);
^~~~~~
drivers/crypto/amlogic/amlogic-gxl-cipher.c:136:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(bkeyiv + 32, areq->iv, ivsize);
^~~~~~
drivers/crypto/amlogic/amlogic-gxl-cipher.c:136:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(bkeyiv + 32, areq->iv, ivsize);
^~~~~~
drivers/crypto/amlogic/amlogic-gxl-cipher.c:165:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(desc, 0, sizeof(struct meson_desc));
^~~~~~
drivers/crypto/amlogic/amlogic-gxl-cipher.c:165:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(desc, 0, sizeof(struct meson_desc));
^~~~~~
drivers/crypto/amlogic/amlogic-gxl-cipher.c:185:3: warning: Value stored to 'nr_sgd' is never read [clang-analyzer-deadcode.DeadStores]
nr_sgd = nr_sgs;
^ ~~~~~~
drivers/crypto/amlogic/amlogic-gxl-cipher.c:185:3: note: Value stored to 'nr_sgd' is never read
nr_sgd = nr_sgs;
^ ~~~~~~
drivers/crypto/amlogic/amlogic-gxl-cipher.c:208:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(desc, 0, sizeof(struct meson_desc));
^~~~~~
drivers/crypto/amlogic/amlogic-gxl-cipher.c:208:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(desc, 0, sizeof(struct meson_desc));
^~~~~~
drivers/crypto/amlogic/amlogic-gxl-cipher.c:247:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(areq->iv, backup_iv, ivsize);
^~~~~~
drivers/crypto/amlogic/amlogic-gxl-cipher.c:247:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(areq->iv, backup_iv, ivsize);
^~~~~~
drivers/crypto/amlogic/amlogic-gxl-cipher.c:317:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(op, 0, sizeof(struct meson_cipher_tfm_ctx));
^~~~~~
drivers/crypto/amlogic/amlogic-gxl-cipher.c:317:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(op, 0, sizeof(struct meson_cipher_tfm_ctx));
^~~~~~
drivers/crypto/amlogic/amlogic-gxl-cipher.c:351:20: warning: Value stored to 'mc' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct meson_dev *mc = op->mc;
^~ ~~~~~~
drivers/crypto/amlogic/amlogic-gxl-cipher.c:351:20: note: Value stored to 'mc' during its initialization is never read
struct meson_dev *mc = op->mc;
^~ ~~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
14 warnings generated.
Suppressed 14 warnings (14 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
3 warnings generated.
Suppressed 3 warnings (3 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
2 warnings generated.
Suppressed 2 warnings (2 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
2 warnings generated.
Suppressed 2 warnings (2 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
3 warnings generated.
Suppressed 3 warnings (3 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
14 warnings generated.
Suppressed 14 warnings (14 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
2 warnings generated.
Suppressed 2 warnings (2 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
11 warnings generated.
Suppressed 11 warnings (11 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
drivers/pinctrl/pinctrl-utils.c:48:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(new_map + old_num, 0, (new_num - old_num) * sizeof(*new_map));
^~~~~~
drivers/pinctrl/pinctrl-utils.c:48:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(new_map + old_num, 0, (new_num - old_num) * sizeof(*new_map));
^~~~~~
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
64 warnings generated.
>> fs/ecryptfs/crypto.c:92:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf((*algified_name), algified_name_len, "%s(%s)",
^~~~~~~~
fs/ecryptfs/crypto.c:92:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf((*algified_name), algified_name_len, "%s(%s)",
^~~~~~~~
>> fs/ecryptfs/crypto.c:125:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(src, crypt_stat->root_iv, crypt_stat->iv_bytes);
^~~~~~
fs/ecryptfs/crypto.c:125:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(src, crypt_stat->root_iv, crypt_stat->iv_bytes);
^~~~~~
>> fs/ecryptfs/crypto.c:126:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset((src + crypt_stat->iv_bytes), 0, 16);
^~~~~~
fs/ecryptfs/crypto.c:126:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset((src + crypt_stat->iv_bytes), 0, 16);
^~~~~~
fs/ecryptfs/crypto.c:127:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf((src + crypt_stat->iv_bytes), 16, "%lld", offset);
^~~~~~~~
fs/ecryptfs/crypto.c:127:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf((src + crypt_stat->iv_bytes), 16, "%lld", offset);
^~~~~~~~
fs/ecryptfs/crypto.c:139:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(iv, dst, crypt_stat->iv_bytes);
^~~~~~
fs/ecryptfs/crypto.c:139:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(iv, dst, crypt_stat->iv_bytes);
^~~~~~
fs/ecryptfs/crypto.c:168:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset((void *)crypt_stat, 0, sizeof(struct ecryptfs_crypt_stat));
^~~~~~
fs/ecryptfs/crypto.c:168:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset((void *)crypt_stat, 0, sizeof(struct ecryptfs_crypt_stat));
^~~~~~
fs/ecryptfs/crypto.c:196:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(crypt_stat, 0, sizeof(struct ecryptfs_crypt_stat));
^~~~~~
fs/ecryptfs/crypto.c:196:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(crypt_stat, 0, sizeof(struct ecryptfs_crypt_stat));
^~~~~~
fs/ecryptfs/crypto.c:216:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(mount_crypt_stat, 0, sizeof(struct ecryptfs_mount_crypt_stat));
^~~~~~
fs/ecryptfs/crypto.c:216:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(mount_crypt_stat, 0, sizeof(struct ecryptfs_mount_crypt_stat));
^~~~~~
fs/ecryptfs/crypto.c:651:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(crypt_stat->root_iv, dst, crypt_stat->iv_bytes);
^~~~~~
fs/ecryptfs/crypto.c:651:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(crypt_stat->root_iv, dst, crypt_stat->iv_bytes);
^~~~~~
fs/ecryptfs/crypto.c:654:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(crypt_stat->root_iv, 0, crypt_stat->iv_bytes);
^~~~~~
fs/ecryptfs/crypto.c:654:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(crypt_stat->root_iv, 0, crypt_stat->iv_bytes);
^~~~~~
fs/ecryptfs/crypto.c:790:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(crypt_stat->cipher,
^~~~~~
fs/ecryptfs/crypto.c:790:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(crypt_stat->cipher,
^~~~~~
fs/ecryptfs/crypto.c:969:4: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(str, ecryptfs_cipher_code_str_map[i].cipher_str);
^~~~~~
fs/ecryptfs/crypto.c:969:4: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(str, ecryptfs_cipher_code_str_map[i].cipher_str);
^~~~~~
fs/ecryptfs/crypto.c:1407:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(page_virt, 0, PAGE_SIZE);
^~~~~~
fs/ecryptfs/crypto.c:1407:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(page_virt, 0, PAGE_SIZE);
^~~~~~
fs/ecryptfs/crypto.c:1440:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(page_virt, 0, PAGE_SIZE);
^~~~~~
fs/ecryptfs/crypto.c:1440:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(page_virt, 0, PAGE_SIZE);
^~~~~~
fs/ecryptfs/crypto.c:1523:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy((void *)(*copied_name), (void *)name, name_size);
^~~~~~
fs/ecryptfs/crypto.c:1523:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy((void *)(*copied_name), (void *)name, name_size);
^~~~~~
>> fs/ecryptfs/crypto.c:1633:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(tmp_tfm->cipher_name, cipher_name,
^~~~~~~
fs/ecryptfs/crypto.c:1633:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(tmp_tfm->cipher_name, cipher_name,
^~~~~~~
fs/ecryptfs/crypto.c:1767:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(last_block, (&src[src_size - 3]), 3);
^~~~~~
fs/ecryptfs/crypto.c:1767:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(last_block, (&src[src_size - 3]), 3);
^~~~~~
fs/ecryptfs/crypto.c:1941:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy((*encoded_name),
^~~~~~
fs/ecryptfs/crypto.c:1941:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy((*encoded_name),
^~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
22 warnings generated.
Suppressed 22 warnings (22 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
>> fs/pstore/ram.c:149:6: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(buffer, RAMOOPS_KERNMSG_HDR "%lld.%lu-%c\n%n",
^~~~~~
fs/pstore/ram.c:149:6: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(buffer, RAMOOPS_KERNMSG_HDR "%lld.%lu-%c\n%n",
^~~~~~
fs/pstore/ram.c:157:13: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
} else if (sscanf(buffer, RAMOOPS_KERNMSG_HDR "%lld.%lu\n%n",
^~~~~~
fs/pstore/ram.c:157:13: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
} else if (sscanf(buffer, RAMOOPS_KERNMSG_HDR "%lld.%lu\n%n",
^~~~~~
>> fs/pstore/ram.c:276:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(record->buf, (char *)persistent_ram_old(prz) + header_length,
^~~~~~
fs/pstore/ram.c:276:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(record->buf, (char *)persistent_ram_old(prz) + header_length,
^~~~~~
>> fs/pstore/ram.c:728:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(pdata, 0, sizeof(*pdata));
^~~~~~
fs/pstore/ram.c:728:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(pdata, 0, sizeof(*pdata));
^~~~~~
fs/pstore/ram.c:920:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&pdata, 0, sizeof(pdata));
^~~~~~
fs/pstore/ram.c:920:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&pdata, 0, sizeof(pdata));
^~~~~~
Suppressed 22 warnings (22 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
36 warnings generated.
drivers/parport/share.c:459:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(tmp->probe_info, 0, 5 * sizeof(struct parport_device_info));
^~~~~~
drivers/parport/share.c:459:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(tmp->probe_info, 0, 5 * sizeof(struct parport_device_info));
^~~~~~
drivers/parport/share.c:490:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(name, "parport%d", tmp->portnum = tmp->number);
^~~~~~~
drivers/parport/share.c:490:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(name, "parport%d", tmp->portnum = tmp->number);
^~~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
drivers/parport/ieee1284_ops.c:599:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset (buf, byte, rle_count);
^~~~~~
drivers/parport/ieee1284_ops.c:599:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset (buf, byte, rle_count);
^~~~~~
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
drivers/video/fbdev/core/modedb.c:728:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&cvt_mode, 0, sizeof(cvt_mode));
^~~~~~
drivers/video/fbdev/core/modedb.c:728:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&cvt_mode, 0, sizeof(cvt_mode));
^~~~~~
drivers/video/fbdev/core/modedb.c:1180:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&var, 0, sizeof(struct fb_var_screeninfo));
^~~~~~
drivers/video/fbdev/core/modedb.c:1180:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&var, 0, sizeof(struct fb_var_screeninfo));
^~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
58 warnings generated.
drivers/video/fbdev/core/fbcvt.c:227:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
read = snprintf(buf+offset, cnt, "fbcvt: %dx%d@%d: CVT Name - ",
^~~~~~~~
drivers/video/fbdev/core/fbcvt.c:227:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
read = snprintf(buf+offset, cnt, "fbcvt: %dx%d@%d: CVT Name - ",
^~~~~~~~
drivers/video/fbdev/core/fbcvt.c:233:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(buf+offset, cnt, "Not a CVT standard - %d.%03d Mega "
^~~~~~~~
drivers/video/fbdev/core/fbcvt.c:233:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(buf+offset, cnt, "Not a CVT standard - %d.%03d Mega "
^~~~~~~~
drivers/video/fbdev/core/fbcvt.c:237:11: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
read = snprintf(buf+offset, cnt, "%d", pixcount);
^~~~~~~~
drivers/video/fbdev/core/fbcvt.c:237:11: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
read = snprintf(buf+offset, cnt, "%d", pixcount);
^~~~~~~~
drivers/video/fbdev/core/fbcvt.c:242:10: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
read = snprintf(buf+offset, cnt, ".%03dM", pixcount_mod);
^~~~~~~~
drivers/video/fbdev/core/fbcvt.c:242:10: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
read = snprintf(buf+offset, cnt, ".%03dM", pixcount_mod);
^~~~~~~~
drivers/video/fbdev/core/fbcvt.c:247:11: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
read = snprintf(buf+offset, cnt, "3");
^~~~~~~~
drivers/video/fbdev/core/fbcvt.c:247:11: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
read = snprintf(buf+offset, cnt, "3");
^~~~~~~~
drivers/video/fbdev/core/fbcvt.c:249:11: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
read = snprintf(buf+offset, cnt, "4");
^~~~~~~~
drivers/video/fbdev/core/fbcvt.c:249:11: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
read = snprintf(buf+offset, cnt, "4");
^~~~~~~~
drivers/video/fbdev/core/fbcvt.c:251:11: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
read = snprintf(buf+offset, cnt, "9");
^~~~~~~~
drivers/video/fbdev/core/fbcvt.c:251:11: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
read = snprintf(buf+offset, cnt, "9");
^~~~~~~~
drivers/video/fbdev/core/fbcvt.c:253:11: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
read = snprintf(buf+offset, cnt, "A");
^~~~~~~~
drivers/video/fbdev/core/fbcvt.c:253:11: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
read = snprintf(buf+offset, cnt, "A");
^~~~~~~~
drivers/video/fbdev/core/fbcvt.c:260:11: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
read = snprintf(buf+offset, cnt, "-R");
^~~~~~~~
drivers/video/fbdev/core/fbcvt.c:260:11: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
read = snprintf(buf+offset, cnt, "-R");
^~~~~~~~
drivers/video/fbdev/core/fbcvt.c:261:4: warning: Value stored to 'cnt' is never read [clang-analyzer-deadcode.DeadStores]
cnt -= read;
^ ~~~~
drivers/video/fbdev/core/fbcvt.c:261:4: note: Value stored to 'cnt' is never read
cnt -= read;
^ ~~~~
drivers/video/fbdev/core/fbcvt.c:262:4: warning: Value stored to 'offset' is never read [clang-analyzer-deadcode.DeadStores]
offset += read;
^ ~~~~
drivers/video/fbdev/core/fbcvt.c:262:4: note: Value stored to 'offset' is never read
offset += read;
^ ~~~~
drivers/video/fbdev/core/fbcvt.c:309:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&cvt, 0, sizeof(cvt));
^~~~~~
drivers/video/fbdev/core/fbcvt.c:309:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&cvt, 0, sizeof(cvt));
^~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
>> kernel/stop_machine.c:72:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(done, 0, sizeof(*done));
^~~~~~
kernel/stop_machine.c:72:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(done, 0, sizeof(*done));
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
42 warnings generated.
>> kernel/kcov.c:943:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dst_entries, src_entries, bytes_to_move);
^~~~~~
kernel/kcov.c:943:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dst_entries, src_entries, bytes_to_move);
^~~~~~
Suppressed 41 warnings (31 in non-user code, 10 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
23 warnings generated.
Suppressed 23 warnings (23 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
41 warnings generated.
kernel/trace/ring_buffer.c:2297:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(iter->event, event, length);
^~~~~~
kernel/trace/ring_buffer.c:2297:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(iter->event, event, length);
^~~~~~
kernel/trace/ring_buffer.c:3509:25: warning: The right operand of '!=' is a garbage value [clang-analyzer-core.UndefinedBinaryOperatorResult]
if (unlikely(info->ts != save_before)) {
^
kernel/trace/ring_buffer.c:3823:2: note: Loop condition is false. Exiting loop
preempt_disable_notrace();
^
include/linux/preempt.h:254:35: note: expanded from macro 'preempt_disable_notrace'
#define preempt_disable_notrace() \
^
kernel/trace/ring_buffer.c:3825:6: note: Assuming the condition is false
if (atomic_read(&buffer->record_disabled))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/trace/ring_buffer.c:3825:2: note: Taking false branch
if (atomic_read(&buffer->record_disabled))
^
kernel/trace/ring_buffer.c:3830:6: note: Assuming the condition is false
if (!cpumask_test_cpu(cpu, buffer->cpumask))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/trace/ring_buffer.c:3830:2: note: Taking false branch
if (!cpumask_test_cpu(cpu, buffer->cpumask))
^
kernel/trace/ring_buffer.c:3835:6: note: Assuming the condition is false
if (atomic_read(&cpu_buffer->record_disabled))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/trace/ring_buffer.c:3835:2: note: Taking false branch
if (atomic_read(&cpu_buffer->record_disabled))
^
kernel/trace/ring_buffer.c:3838:6: note: Assuming the condition is false
if (length > BUF_MAX_DATA_SIZE)
^~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/trace/ring_buffer.c:3838:2: note: Taking false branch
if (length > BUF_MAX_DATA_SIZE)
^
kernel/trace/ring_buffer.c:3841:2: note: Taking false branch
if (unlikely(trace_recursive_lock(cpu_buffer)))
^
kernel/trace/ring_buffer.c:3844:10: note: Calling 'rb_reserve_next_event'
event = rb_reserve_next_event(buffer, cpu_buffer, length);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/trace/ring_buffer.c:3612:6: note: Assuming the condition is false
if (ring_buffer_time_stamp_abs(cpu_buffer->buffer)) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/trace/ring_buffer.c:3612:2: note: Taking false branch
if (ring_buffer_time_stamp_abs(cpu_buffer->buffer)) {
^
kernel/trace/ring_buffer.c:3632:6: note: '_____ret' is 0
if (RB_WARN_ON(cpu_buffer, ++nr_loops > 1000))
^
kernel/trace/ring_buffer.c:1054:7: note: expanded from macro 'RB_WARN_ON'
if (_____ret) { \
^~~~~~~~
kernel/trace/ring_buffer.c:3632:6: note: Taking false branch
if (RB_WARN_ON(cpu_buffer, ++nr_loops > 1000))
^
kernel/trace/ring_buffer.c:1054:3: note: expanded from macro 'RB_WARN_ON'
if (_____ret) { \
^
kernel/trace/ring_buffer.c:3632:2: note: Taking false branch
if (RB_WARN_ON(cpu_buffer, ++nr_loops > 1000))
^
kernel/trace/ring_buffer.c:3635:10: note: Calling '__rb_reserve_next'
event = __rb_reserve_next(cpu_buffer, &info);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/trace/ring_buffer.c:3440:32: note: Left side of '||' is false
tail_page = info->tail_page = READ_ONCE(cpu_buffer->tail_page);
^
include/asm-generic/rwonce.h:49:2: note: expanded from macro 'READ_ONCE'
compiletime_assert_rwonce_type(x); \
^
include/asm-generic/rwonce.h:36:21: note: expanded from macro 'compiletime_assert_rwonce_type'
compiletime_assert(__native_word(t) || sizeof(t) == sizeof(long long), \
--
^~~~~~
kernel/trace/ring_buffer.c:5129:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(cpu_buffer->event_stamp, 0, sizeof(cpu_buffer->event_stamp));
^~~~~~
kernel/trace/ring_buffer.c:5596:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(bpage->data + pos, rpage->data + rpos, size);
^~~~~~
kernel/trace/ring_buffer.c:5596:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(bpage->data + pos, rpage->data + rpos, size);
^~~~~~
kernel/trace/ring_buffer.c:5653:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&bpage->data[commit], &missed_events,
^~~~~~
kernel/trace/ring_buffer.c:5653:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&bpage->data[commit], &missed_events,
^~~~~~
kernel/trace/ring_buffer.c:5665:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&bpage->data[commit], 0, BUF_PAGE_SIZE - commit);
^~~~~~
kernel/trace/ring_buffer.c:5665:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&bpage->data[commit], 0, BUF_PAGE_SIZE - commit);
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
50 warnings generated.
drivers/siox/siox-core.c:150:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(smaster->buf, 0, smaster->setbuf_len);
^~~~~~
drivers/siox/siox-core.c:150:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(smaster->buf, 0, smaster->setbuf_len);
^~~~~~
drivers/siox/siox-core.c:240:4: warning: Value stored to 'status' is never read [clang-analyzer-deadcode.DeadStores]
status &= ~SIOX_STATUS_WDG;
^ ~~~~~~~~~~~~~~~~
drivers/siox/siox-core.c:240:4: note: Value stored to 'status' is never read
status &= ~SIOX_STATUS_WDG;
^ ~~~~~~~~~~~~~~~~
drivers/siox/siox-core.c:389:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", sdev->type);
^~~~~~~
drivers/siox/siox-core.c:389:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", sdev->type);
^~~~~~~
drivers/siox/siox-core.c:399:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%zu\n", sdev->inbytes);
^~~~~~~
drivers/siox/siox-core.c:399:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%zu\n", sdev->inbytes);
^~~~~~~
drivers/siox/siox-core.c:409:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%zu\n", sdev->outbytes);
^~~~~~~
drivers/siox/siox-core.c:409:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%zu\n", sdev->outbytes);
^~~~~~~
drivers/siox/siox-core.c:426:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", status_errors);
^~~~~~~
drivers/siox/siox-core.c:426:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", status_errors);
^~~~~~~
drivers/siox/siox-core.c:443:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", connected);
^~~~~~~
drivers/siox/siox-core.c:443:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", connected);
^~~~~~~
drivers/siox/siox-core.c:460:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", status & SIOX_STATUS_WDG);
^~~~~~~
drivers/siox/siox-core.c:460:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", status & SIOX_STATUS_WDG);
^~~~~~~
drivers/siox/siox-core.c:477:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", watchdog_errors);
^~~~~~~
drivers/siox/siox-core.c:477:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", watchdog_errors);
^~~~~~~
drivers/siox/siox-core.c:559:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", smaster->active);
^~~~~~~
drivers/siox/siox-core.c:559:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", smaster->active);
^~~~~~~
drivers/siox/siox-core.c:601:8: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = sscanf(buf, "%19s %zu %zu %hhu", type, &inbytes,
^~~~~~
drivers/siox/siox-core.c:601:8: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
ret = sscanf(buf, "%19s %zu %zu %hhu", type, &inbytes,
^~~~~~
drivers/siox/siox-core.c:637:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%lld\n", jiffies_to_nsecs(smaster->poll_interval));
^~~~~~~
drivers/siox/siox-core.c:637:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%lld\n", jiffies_to_nsecs(smaster->poll_interval));
^~~~~~~
Suppressed 38 warnings (38 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
>> drivers/watchdog/watchdog_dev.c:1015:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
kthread_init_work(&wd_data->work, watchdog_ping_work);
^
include/linux/kthread.h:195:3: note: expanded from macro 'kthread_init_work'
memset((work), 0, sizeof(struct kthread_work)); \
^~~~~~
drivers/watchdog/watchdog_dev.c:1015:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
kthread_init_work(&wd_data->work, watchdog_ping_work);
^
include/linux/kthread.h:195:3: note: expanded from macro 'kthread_init_work'
memset((work), 0, sizeof(struct kthread_work)); \
^~~~~~
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
49 warnings generated.
Suppressed 49 warnings (49 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
25 warnings generated.
drivers/leds/led-core.c:442:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(led_classdev_name, LED_MAX_NAME_SIZE, "%s:%s",
^~~~~~~~
drivers/leds/led-core.c:442:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(led_classdev_name, LED_MAX_NAME_SIZE, "%s:%s",
^~~~~~~~
drivers/leds/led-core.c:449:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(tmp_buf, LED_MAX_NAME_SIZE, "%s:%s-%d",
^~~~~~~~
drivers/leds/led-core.c:449:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(tmp_buf, LED_MAX_NAME_SIZE, "%s:%s-%d",
^~~~~~~~
drivers/leds/led-core.c:453:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(tmp_buf, LED_MAX_NAME_SIZE, "%s:%s",
^~~~~~~~
drivers/leds/led-core.c:453:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(tmp_buf, LED_MAX_NAME_SIZE, "%s:%s",
^~~~~~~~
drivers/leds/led-core.c:458:4: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(led_classdev_name, LED_MAX_NAME_SIZE, "%s:%s",
^~~~~~~~
drivers/leds/led-core.c:458:4: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(led_classdev_name, LED_MAX_NAME_SIZE, "%s:%s",
^~~~~~~~
drivers/leds/led-core.c:469:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(led_classdev_name, LED_MAX_NAME_SIZE, "%s:%s",
^~~~~~~~
drivers/leds/led-core.c:469:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(led_classdev_name, LED_MAX_NAME_SIZE, "%s:%s",
^~~~~~~~
drivers/leds/led-core.c:472:30: warning: Access to field 'name' results in a dereference of a null pointer [clang-analyzer-core.NullDereference]
strscpy(led_classdev_name, to_of_node(fwnode)->name,
^
include/linux/of.h:161:2: note: expanded from macro 'to_of_node'
({ \
^
drivers/leds/led-core.c:424:2: note: Taking false branch
BUG_ON(props.color == LED_COLOR_ID_MULTI);
^
include/asm-generic/bug.h:161:32: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^
drivers/leds/led-core.c:424:2: note: Loop condition is false. Exiting loop
BUG_ON(props.color == LED_COLOR_ID_MULTI);
^
include/asm-generic/bug.h:161:27: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^
drivers/leds/led-core.c:426:6: note: Assuming 'led_classdev_name' is non-null
if (!led_classdev_name)
^~~~~~~~~~~~~~~~~~
drivers/leds/led-core.c:426:2: note: Taking false branch
if (!led_classdev_name)
^
drivers/leds/led-core.c:429:2: note: Calling 'led_parse_fwnode_props'
led_parse_fwnode_props(dev, fwnode, &props);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/leds/led-core.c:370:6: note: Assuming 'fwnode' is non-null
if (!fwnode)
^~~~~~~
drivers/leds/led-core.c:370:2: note: Taking false branch
if (!fwnode)
^
drivers/leds/led-core.c:373:6: note: Assuming the condition is false
if (fwnode_property_present(fwnode, "label")) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/leds/led-core.c:373:2: note: Taking false branch
if (fwnode_property_present(fwnode, "label")) {
^
drivers/leds/led-core.c:380:6: note: Assuming the condition is false
if (fwnode_property_present(fwnode, "color")) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/leds/led-core.c:380:2: note: Taking false branch
if (fwnode_property_present(fwnode, "color")) {
^
drivers/leds/led-core.c:391:6: note: Assuming the condition is true
if (!fwnode_property_present(fwnode, "function"))
--
^~~~~~
drivers/staging/fieldbus/anybuss/host.c:1074:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, t->area_pd.buf, count);
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
53 warnings generated.
block/blk-mq-sysfs.c:98:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(page, "%u\n", hctx->tags->nr_tags);
^~~~~~~
block/blk-mq-sysfs.c:98:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(page, "%u\n", hctx->tags->nr_tags);
^~~~~~~
block/blk-mq-sysfs.c:104:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(page, "%u\n", hctx->tags->nr_reserved_tags);
^~~~~~~
block/blk-mq-sysfs.c:104:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(page, "%u\n", hctx->tags->nr_reserved_tags);
^~~~~~~
block/blk-mq-sysfs.c:115:10: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = snprintf(pos + page, size - pos, "%u", i);
^~~~~~~~
block/blk-mq-sysfs.c:115:10: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
ret = snprintf(pos + page, size - pos, "%u", i);
^~~~~~~~
block/blk-mq-sysfs.c:117:10: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = snprintf(pos + page, size - pos, ", %u", i);
^~~~~~~~
block/blk-mq-sysfs.c:117:10: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
ret = snprintf(pos + page, size - pos, ", %u", i);
^~~~~~~~
block/blk-mq-sysfs.c:126:8: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = snprintf(pos + page, size + 1 - pos, "\n");
^~~~~~~~
block/blk-mq-sysfs.c:126:8: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
ret = snprintf(pos + page, size + 1 - pos, "\n");
^~~~~~~~
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
22 warnings generated.
Suppressed 22 warnings (22 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
61 warnings generated.
fs/hpfs/hpfs_fn.h:180:4: warning: Assigned value is garbage or undefined [clang-analyzer-core.uninitialized.Assign]
a = dst->down;
^
fs/hpfs/namei.c:533:6: note: Assuming the condition is false
if (flags & ~RENAME_NOREPLACE)
^~~~~~~~~~~~~~~~~~~~~~~~~
fs/hpfs/namei.c:533:2: note: Taking false branch
if (flags & ~RENAME_NOREPLACE)
^
fs/hpfs/namei.c:536:7: note: Assuming 'err' is 0
if ((err = hpfs_chk_name(new_name, &new_len))) return err;
^~~
fs/hpfs/namei.c:536:2: note: Taking false branch
if ((err = hpfs_chk_name(new_name, &new_len))) return err;
^
fs/hpfs/namei.c:544:6: note: Assuming 'new_inode' is null
if (new_inode && S_ISDIR(new_inode->i_mode)) {
^~~~~~~~~
fs/hpfs/namei.c:544:16: note: Left side of '&&' is false
if (new_inode && S_ISDIR(new_inode->i_mode)) {
^
fs/hpfs/namei.c:549:8: note: Assuming 'dep' is non-null
if (!(dep = map_dirent(old_dir, hpfs_i(old_dir)->i_dno, old_name, old_len, &dno, &qbh))) {
^~~
fs/hpfs/namei.c:549:2: note: Taking false branch
if (!(dep = map_dirent(old_dir, hpfs_i(old_dir)->i_dno, old_name, old_len, &dno, &qbh))) {
^
fs/hpfs/namei.c:554:2: note: Calling 'copy_de'
copy_de(&de, dep);
^~~~~~~~~~~~~~~~~
fs/hpfs/hpfs_fn.h:179:7: note: 'dst' is non-null
if (!dst || !src) return;
^~~
fs/hpfs/hpfs_fn.h:179:6: note: Left side of '||' is false
if (!dst || !src) return;
^
fs/hpfs/hpfs_fn.h:179:15: note: 'src' is non-null
if (!dst || !src) return;
^~~
fs/hpfs/hpfs_fn.h:179:2: note: Taking false branch
if (!dst || !src) return;
^
fs/hpfs/hpfs_fn.h:180:4: note: Assigned value is garbage or undefined
a = dst->down;
^ ~~~~~~~~~
>> fs/hpfs/namei.c:48:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&dee, 0, sizeof dee);
^~~~~~
fs/hpfs/namei.c:48:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&dee, 0, sizeof dee);
^~~~~~
>> fs/hpfs/namei.c:84:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(fnode->name, name, len > 15 ? 15 : len);
^~~~~~
fs/hpfs/namei.c:84:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(fnode->name, name, len > 15 ? 15 : len);
^~~~~~
fs/hpfs/namei.c:151:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&dee, 0, sizeof dee);
^~~~~~
fs/hpfs/namei.c:151:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&dee, 0, sizeof dee);
^~~~~~
fs/hpfs/namei.c:190:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(fnode->name, name, len > 15 ? 15 : len);
^~~~~~
fs/hpfs/namei.c:190:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(fnode->name, name, len > 15 ? 15 : len);
^~~~~~
fs/hpfs/namei.c:239:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&dee, 0, sizeof dee);
^~~~~~
fs/hpfs/namei.c:239:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&dee, 0, sizeof dee);
^~~~~~
fs/hpfs/namei.c:273:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(fnode->name, name, len > 15 ? 15 : len);
^~~~~~
fs/hpfs/namei.c:273:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(fnode->name, name, len > 15 ? 15 : len);
^~~~~~
fs/hpfs/namei.c:317:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&dee, 0, sizeof dee);
^~~~~~
fs/hpfs/namei.c:317:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&dee, 0, sizeof dee);
^~~~~~
fs/hpfs/namei.c:352:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(fnode->name, name, len > 15 ? 15 : len);
^~~~~~
fs/hpfs/namei.c:352:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(fnode->name, name, len > 15 ? 15 : len);
^~~~~~
fs/hpfs/namei.c:559:8: warning: Although the value stored to 'r' is used in the enclosing expression, the value is never actually read from 'r' [clang-analyzer-deadcode.DeadStores]
if ((r = hpfs_remove_dirent(old_dir, dno, dep, &qbh, 1)) != 2) {
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/hpfs/namei.c:559:8: note: Although the value stored to 'r' is used in the enclosing expression, the value is never actually read from 'r'
if ((r = hpfs_remove_dirent(old_dir, dno, dep, &qbh, 1)) != 2) {
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/hpfs/namei.c:563:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(nde->name, new_name, new_len);
^~~~~~
fs/hpfs/namei.c:563:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(nde->name, new_name, new_len);
^~~~~~
fs/hpfs/namei.c:607:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(fnode->name, new_name, new_len>15?15:new_len);
^~~~~~
fs/hpfs/namei.c:607:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(fnode->name, new_name, new_len>15?15:new_len);
^~~~~~
fs/hpfs/namei.c:608:21: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (new_len < 15) memset(&fnode->name[new_len], 0, 15 - new_len);
^~~~~~
fs/hpfs/namei.c:608:21: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
if (new_len < 15) memset(&fnode->name[new_len], 0, 15 - new_len);
^~~~~~
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
55 warnings generated.
drivers/thermal/thermal_core.c:675:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(dev->name, "cdev%d", dev->id);
^~~~~~~
drivers/thermal/thermal_core.c:675:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(dev->name, "cdev%d", dev->id);
^~~~~~~
drivers/thermal/thermal_core.c:681:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(dev->attr_name, "cdev%d_trip_point", dev->id);
^~~~~~~
drivers/thermal/thermal_core.c:681:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(dev->attr_name, "cdev%d_trip_point", dev->id);
^~~~~~~
drivers/thermal/thermal_core.c:690:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(dev->weight_attr_name, "cdev%d_weight", dev->id);
^~~~~~~
drivers/thermal/thermal_core.c:690:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(dev->weight_attr_name, "cdev%d_weight", dev->id);
^~~~~~~
Suppressed 52 warnings (52 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
63 warnings generated.
drivers/thermal/thermal_sysfs.c:31:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", tz->type);
^~~~~~~
drivers/thermal/thermal_sysfs.c:31:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", tz->type);
^~~~~~~
drivers/thermal/thermal_sysfs.c:45:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", temperature);
--
^
drivers/thermal/thermal_sysfs.c:317:10: note: expanded from macro 'create_s32_tzp_attr'
return sprintf(buf, "%d\n", tz->tzp->name); \
^~~~~~~
drivers/thermal/thermal_sysfs.c:344:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
create_s32_tzp_attr(k_d);
^
drivers/thermal/thermal_sysfs.c:317:10: note: expanded from macro 'create_s32_tzp_attr'
return sprintf(buf, "%d\n", tz->tzp->name); \
^~~~~~~
drivers/thermal/thermal_sysfs.c:345:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
create_s32_tzp_attr(integral_cutoff);
^
drivers/thermal/thermal_sysfs.c:317:10: note: expanded from macro 'create_s32_tzp_attr'
return sprintf(buf, "%d\n", tz->tzp->name); \
^~~~~~~
drivers/thermal/thermal_sysfs.c:345:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
create_s32_tzp_attr(integral_cutoff);
^
drivers/thermal/thermal_sysfs.c:317:10: note: expanded from macro 'create_s32_tzp_attr'
return sprintf(buf, "%d\n", tz->tzp->name); \
^~~~~~~
drivers/thermal/thermal_sysfs.c:346:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
create_s32_tzp_attr(slope);
^
drivers/thermal/thermal_sysfs.c:317:10: note: expanded from macro 'create_s32_tzp_attr'
return sprintf(buf, "%d\n", tz->tzp->name); \
^~~~~~~
drivers/thermal/thermal_sysfs.c:346:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
create_s32_tzp_attr(slope);
^
drivers/thermal/thermal_sysfs.c:317:10: note: expanded from macro 'create_s32_tzp_attr'
return sprintf(buf, "%d\n", tz->tzp->name); \
^~~~~~~
drivers/thermal/thermal_sysfs.c:347:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
create_s32_tzp_attr(offset);
^
drivers/thermal/thermal_sysfs.c:317:10: note: expanded from macro 'create_s32_tzp_attr'
return sprintf(buf, "%d\n", tz->tzp->name); \
^~~~~~~
drivers/thermal/thermal_sysfs.c:347:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
create_s32_tzp_attr(offset);
^
drivers/thermal/thermal_sysfs.c:317:10: note: expanded from macro 'create_s32_tzp_attr'
return sprintf(buf, "%d\n", tz->tzp->name); \
^~~~~~~
drivers/thermal/thermal_sysfs.c:456:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(tz->trip_type_attrs[indx].name, THERMAL_NAME_LENGTH,
^~~~~~~~
drivers/thermal/thermal_sysfs.c:456:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(tz->trip_type_attrs[indx].name, THERMAL_NAME_LENGTH,
^~~~~~~~
drivers/thermal/thermal_sysfs.c:467:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(tz->trip_temp_attrs[indx].name, THERMAL_NAME_LENGTH,
^~~~~~~~
drivers/thermal/thermal_sysfs.c:467:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(tz->trip_temp_attrs[indx].name, THERMAL_NAME_LENGTH,
^~~~~~~~
drivers/thermal/thermal_sysfs.c:486:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(tz->trip_hyst_attrs[indx].name, THERMAL_NAME_LENGTH,
^~~~~~~~
drivers/thermal/thermal_sysfs.c:486:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(tz->trip_hyst_attrs[indx].name, THERMAL_NAME_LENGTH,
^~~~~~~~
drivers/thermal/thermal_sysfs.c:576:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", cdev->type);
^~~~~~~
drivers/thermal/thermal_sysfs.c:576:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", cdev->type);
^~~~~~~
drivers/thermal/thermal_sysfs.c:589:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%ld\n", state);
^~~~~~~
drivers/thermal/thermal_sysfs.c:589:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%ld\n", state);
^~~~~~~
drivers/thermal/thermal_sysfs.c:602:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%ld\n", state);
^~~~~~~
drivers/thermal/thermal_sysfs.c:602:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%ld\n", state);
^~~~~~~
drivers/thermal/thermal_sysfs.c:616:6: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(buf, "%ld\n", &state) != 1)
^~~~~~
drivers/thermal/thermal_sysfs.c:616:6: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(buf, "%ld\n", &state) != 1)
^~~~~~
drivers/thermal/thermal_sysfs.c:705:8: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = sprintf(buf, "%u\n", stats->total_trans);
^~~~~~~
drivers/thermal/thermal_sysfs.c:705:8: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
ret = sprintf(buf, "%u\n", stats->total_trans);
^~~~~~~
drivers/thermal/thermal_sysfs.c:724:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += sprintf(buf + len, "state%u\t%llu\n", i,
^~~~~~~
drivers/thermal/thermal_sysfs.c:724:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
len += sprintf(buf + len, "state%u\t%llu\n", i,
^~~~~~~
>> drivers/thermal/thermal_sysfs.c:744:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(stats->trans_table, 0,
^~~~~~
drivers/thermal/thermal_sysfs.c:744:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(stats->trans_table, 0,
^~~~~~
drivers/thermal/thermal_sysfs.c:763:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += snprintf(buf + len, PAGE_SIZE - len, " From : To\n");
^~~~~~~~
drivers/thermal/thermal_sysfs.c:763:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
len += snprintf(buf + len, PAGE_SIZE - len, " From : To\n");
^~~~~~~~
drivers/thermal/thermal_sysfs.c:764:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += snprintf(buf + len, PAGE_SIZE - len, " : ");
^~~~~~~~
drivers/thermal/thermal_sysfs.c:764:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
len += snprintf(buf + len, PAGE_SIZE - len, " : ");
^~~~~~~~
drivers/thermal/thermal_sysfs.c:768:10: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += snprintf(buf + len, PAGE_SIZE - len, "state%2u ", i);
^~~~~~~~
drivers/thermal/thermal_sysfs.c:768:10: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
len += snprintf(buf + len, PAGE_SIZE - len, "state%2u ", i);
^~~~~~~~
drivers/thermal/thermal_sysfs.c:773:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += snprintf(buf + len, PAGE_SIZE - len, "\n");
^~~~~~~~
drivers/thermal/thermal_sysfs.c:773:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
len += snprintf(buf + len, PAGE_SIZE - len, "\n");
^~~~~~~~
drivers/thermal/thermal_sysfs.c:779:10: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += snprintf(buf + len, PAGE_SIZE - len, "state%2u:", i);
^~~~~~~~
drivers/thermal/thermal_sysfs.c:779:10: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
len += snprintf(buf + len, PAGE_SIZE - len, "state%2u:", i);
^~~~~~~~
drivers/thermal/thermal_sysfs.c:784:11: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += snprintf(buf + len, PAGE_SIZE - len, "%8u ",
^~~~~~~~
drivers/thermal/thermal_sysfs.c:784:11: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
len += snprintf(buf + len, PAGE_SIZE - len, "%8u ",
^~~~~~~~
drivers/thermal/thermal_sysfs.c:789:10: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += snprintf(buf + len, PAGE_SIZE - len, "\n");
^~~~~~~~
drivers/thermal/thermal_sysfs.c:789:10: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
len += snprintf(buf + len, PAGE_SIZE - len, "\n");
^~~~~~~~
drivers/thermal/thermal_sysfs.c:884:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", instance->trip);
^~~~~~~
drivers/thermal/thermal_sysfs.c:884:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", instance->trip);
^~~~~~~
drivers/thermal/thermal_sysfs.c:894:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", instance->weight);
^~~~~~~
drivers/thermal/thermal_sysfs.c:894:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", instance->weight);
^~~~~~~
Suppressed 19 warnings (19 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
55 warnings generated.
fs/ext4/ioctl.c:42:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(es->s_volume_name, (char *)arg, EXT4_LABEL_MAX);
^~~~~~
fs/ext4/ioctl.c:42:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(es->s_volume_name, (char *)arg, EXT4_LABEL_MAX);
^~~~~~
fs/ext4/ioctl.c:433:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ei_bl->i_data, 0, sizeof(ei_bl->i_data));
^~~~~~
fs/ext4/ioctl.c:433:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(ei_bl->i_data, 0, sizeof(ei_bl->i_data));
^~~~~~
fs/ext4/ioctl.c:1117:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(new_label + len, 0, EXT4_LABEL_MAX - len);
^~~~~~
fs/ext4/ioctl.c:1117:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(new_label + len, 0, EXT4_LABEL_MAX - len);
^~~~~~
fs/ext4/ioctl.c:1140:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(label, 0, sizeof(label));
^~~~~~
fs/ext4/ioctl.c:1140:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(label, 0, sizeof(label));
^~~~~~
fs/ext4/ioctl.c:1142:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(label, sbi->s_es->s_volume_name, EXT4_LABEL_MAX);
^~~~~~~
fs/ext4/ioctl.c:1142:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(label, sbi->s_es->s_volume_name, EXT4_LABEL_MAX);
^~~~~~~
Suppressed 50 warnings (50 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
49 warnings generated.
Suppressed 49 warnings (49 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
40 warnings generated.
>> drivers/firmware/efi/memmap.c:319:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(new, old, old_memmap->desc_size);
^~~~~~
drivers/firmware/efi/memmap.c:319:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(new, old, old_memmap->desc_size);
^~~~~~
drivers/firmware/efi/memmap.c:335:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(new, old, old_memmap->desc_size);
^~~~~~
drivers/firmware/efi/memmap.c:335:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(new, old, old_memmap->desc_size);
^~~~~~
drivers/firmware/efi/memmap.c:348:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(new, old, old_memmap->desc_size);
^~~~~~
drivers/firmware/efi/memmap.c:348:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(new, old, old_memmap->desc_size);
^~~~~~
drivers/firmware/efi/memmap.c:356:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(new, old, old_memmap->desc_size);
^~~~~~
drivers/firmware/efi/memmap.c:356:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(new, old, old_memmap->desc_size);
^~~~~~
drivers/firmware/efi/memmap.c:370:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(new, old, old_memmap->desc_size);
^~~~~~
drivers/firmware/efi/memmap.c:370:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(new, old, old_memmap->desc_size);
^~~~~~
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
15 warnings generated.
drivers/auxdisplay/line-display.c:91:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(linedisp->buf, ' ', linedisp->num_chars);
^~~~~~
drivers/auxdisplay/line-display.c:91:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(linedisp->buf, ' ', linedisp->num_chars);
^~~~~~
drivers/auxdisplay/line-display.c:212:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(linedisp, 0, sizeof(*linedisp));
^~~~~~
drivers/auxdisplay/line-display.c:212:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(linedisp, 0, sizeof(*linedisp));
^~~~~~
Suppressed 13 warnings (13 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
36 warnings generated.
Suppressed 36 warnings (36 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
10 warnings generated.
kernel/rcu/sync.c:23:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(rsp, 0, sizeof(*rsp));
^~~~~~
kernel/rcu/sync.c:23:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(rsp, 0, sizeof(*rsp));
^~~~~~
Suppressed 9 warnings (9 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
13 warnings generated.
Suppressed 13 warnings (13 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
53 warnings generated.
kernel/rcu/tree.c:3057:3: warning: 2nd function call argument is an uninitialized value [clang-analyzer-core.CallAndMessage]
__call_rcu_nocb_wake(rdp, was_alldone, flags); /* unlocks */
^
kernel/rcu/tree.c:3106:2: note: Calling '__call_rcu'
__call_rcu(head, func);
^~~~~~~~~~~~~~~~~~~~~~
kernel/rcu/tree.c:3005:2: note: 'was_alldone' declared without an initial value
bool was_alldone;
^~~~~~~~~~~~~~~~
kernel/rcu/tree.c:3008:2: note: Assuming '__ret_warn_on' is not equal to 0
WARN_ON_ONCE((unsigned long)head & (sizeof(void *) - 1));
^
include/asm-generic/bug.h:179:33: note: expanded from macro 'WARN_ON_ONCE'
#define WARN_ON_ONCE(condition) WARN_ON(condition)
^~~~~~~~~~~~~~~~~~
include/asm-generic/bug.h:167:2: note: expanded from macro 'WARN_ON'
unlikely(__ret_warn_on); \
^~~~~~~~~~~~~~~~~~~~~~~
include/linux/compiler.h:78:40: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^~~~
kernel/rcu/tree.c:3010:6: note: Calling 'debug_rcu_head_queue'
if (debug_rcu_head_queue(head)) {
^~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/rcu/rcu.h:193:2: note: Returning zero, which participates in a condition later
return 0;
^~~~~~~~
kernel/rcu/tree.c:3010:6: note: Returning from 'debug_rcu_head_queue'
if (debug_rcu_head_queue(head)) {
^~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/rcu/tree.c:3010:2: note: Taking false branch
if (debug_rcu_head_queue(head)) {
^
kernel/rcu/tree.c:3025:2: note: Loop condition is false. Exiting loop
local_irq_save(flags);
^
include/linux/irqflags.h:221:3: note: expanded from macro 'local_irq_save'
raw_local_irq_save(flags); \
--
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/udf/balloc.c:527:2: note: Loop condition is false. Execution continues on line 534
while (first_block != eloc.logicalBlockNum &&
^
fs/udf/balloc.c:534:6: note: Assuming 'first_block' is equal to field 'logicalBlockNum'
if (first_block == eloc.logicalBlockNum) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/udf/balloc.c:534:2: note: Taking true branch
if (first_block == eloc.logicalBlockNum) {
^
fs/udf/balloc.c:538:7: note: Assuming 'alloc_count' is > 'block_count'
if (alloc_count > block_count) {
^~~~~~~~~~~~~~~~~~~~~~~~~
fs/udf/balloc.c:538:3: note: Taking true branch
if (alloc_count > block_count) {
^
fs/udf/balloc.c:543:13: note: The result of the left shift is undefined because the left operand is negative
(etype << 30) | elen, 1);
~~~~~ ^
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
76 warnings generated.
Suppressed 76 warnings (76 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
83 warnings generated.
Suppressed 83 warnings (83 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
fs/jffs2/nodelist.c:600:9: warning: Access to field 'flash_offset' results in a dereference of a null pointer (loaded from variable 'ref') [clang-analyzer-core.NullDereference]
while (ref->flash_offset != REF_EMPTY_NODE) {
^
fs/jffs2/nodelist.c:665:6: note: Assuming 'size' is not equal to 0
if (!size)
^~~~~
fs/jffs2/nodelist.c:665:2: note: Taking false branch
if (!size)
^
fs/jffs2/nodelist.c:667:15: note: Assuming 'size' is <= field 'free_size'
if (unlikely(size > jeb->free_size)) {
^
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
fs/jffs2/nodelist.c:667:2: note: Taking false branch
if (unlikely(size > jeb->free_size)) {
^
fs/jffs2/nodelist.c:673:6: note: Assuming field 'last_node' is null
if (jeb->last_node && ref_obsolete(jeb->last_node)) {
^~~~~~~~~~~~~~
fs/jffs2/nodelist.c:673:21: note: Left side of '&&' is false
if (jeb->last_node && ref_obsolete(jeb->last_node)) {
^
fs/jffs2/nodelist.c:685:3: note: Calling 'jffs2_link_node_ref'
jffs2_link_node_ref(c, jeb, ofs, size, NULL);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/jffs2/nodelist.c:592:9: note: Assuming field 'allocated_refs' is not equal to 0
BUG_ON(!jeb->allocated_refs);
^
include/asm-generic/bug.h:161:45: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^~~~~~~~~
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
fs/jffs2/nodelist.c:592:2: note: Taking false branch
BUG_ON(!jeb->allocated_refs);
^
include/asm-generic/bug.h:161:32: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^
fs/jffs2/nodelist.c:592:2: note: Loop condition is false. Exiting loop
BUG_ON(!jeb->allocated_refs);
^
include/asm-generic/bug.h:161:27: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^
fs/jffs2/nodelist.c:595:2: note: Null pointer value stored to 'ref'
ref = jeb->last_node;
^~~~~~~~~~~~~~~~~~~~
fs/jffs2/nodelist.c:597:2: note: Taking false branch
dbg_noderef("Last node at %p is (%08x,%p)\n", ref, ref->flash_offset,
^
fs/jffs2/debug.h:134:31: note: expanded from macro 'dbg_noderef'
#define dbg_noderef(fmt, ...) no_printk(fmt, ##__VA_ARGS__)
^
include/linux/printk.h:131:2: note: expanded from macro 'no_printk'
if (0) \
^
fs/jffs2/nodelist.c:600:9: note: Access to field 'flash_offset' results in a dereference of a null pointer (loaded from variable 'ref')
while (ref->flash_offset != REF_EMPTY_NODE) {
^~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
51 warnings generated.
>> fs/jffs2/read.c:80:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buf, 0, len);
^~~~~~
fs/jffs2/read.c:80:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(buf, 0, len);
^~~~~~
>> fs/jffs2/read.c:143:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, decomprbuf+ofs, len);
^~~~~~
fs/jffs2/read.c:143:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, decomprbuf+ofs, len);
^~~~~~
fs/jffs2/read.c:187:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buf, 0, holesize);
^~~~~~
fs/jffs2/read.c:187:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(buf, 0, holesize);
^~~~~~
fs/jffs2/read.c:196:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buf, 0, holeend - offset);
^~~~~~
fs/jffs2/read.c:196:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(buf, 0, holeend - offset);
^~~~~~
fs/jffs2/read.c:217:5: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buf, 0, readlen);
^~~~~~
fs/jffs2/read.c:217:5: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(buf, 0, readlen);
^~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
36 warnings generated.
kernel/resource.c:91:2: warning: The expression is an uninitialized value. The computed value will also be garbage [clang-analyzer-core.uninitialized.Assign]
(*pos)++;
^
kernel/resource.c:1679:2: note: 'l' declared without an initial value
loff_t l;
^~~~~~~~
kernel/resource.c:1682:2: note: Loop condition is true. Entering loop body
for (p = p->child; p ; p = r_next(NULL, p, &l)) {
^
kernel/resource.c:1687:7: note: Assuming the condition is true
if (p->start >= addr + size)
^~~~~~~~~~~~~~~~~~~~~~~
kernel/resource.c:1687:3: note: Taking true branch
if (p->start >= addr + size)
^
kernel/resource.c:1688:4: note: Execution continues on line 1682
continue;
^
kernel/resource.c:1682:29: note: Calling 'r_next'
for (p = p->child; p ; p = r_next(NULL, p, &l)) {
^~~~~~~~~~~~~~~~~~~
kernel/resource.c:91:2: note: The expression is an uninitialized value. The computed value will also be garbage
(*pos)++;
^~~~~~
kernel/resource.c:188:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(res, 0, sizeof(struct resource));
^~~~~~
kernel/resource.c:188:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(res, 0, sizeof(struct resource));
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
103 warnings generated.
Suppressed 103 warnings (103 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
50 warnings generated.
Suppressed 50 warnings (50 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
54 warnings generated.
block/bfq-iosched.c:7185:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(page, "%u\n", var);
^~~~~~~
block/bfq-iosched.c:7185:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(page, "%u\n", var);
^~~~~~~
Suppressed 53 warnings (53 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
53 warnings generated.
block/bfq-wf2q.c:263:7: warning: Access to field 'my_sched_data' results in a dereference of a null pointer (loaded from variable 'entity') [clang-analyzer-core.NullDereference]
if (!entity->my_sched_data)
^
block/bfq-wf2q.c:1508:2: note: 'entity' initialized to a null pointer value
struct bfq_entity *entity = NULL;
^~~~~~~~~~~~~~~~~~~~~~~~~
block/bfq-wf2q.c:1512:6: note: Assuming the condition is false
if (bfq_tot_busy_queues(bfqd) == 0)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
block/bfq-wf2q.c:1512:2: note: Taking false branch
if (bfq_tot_busy_queues(bfqd) == 0)
^
block/bfq-wf2q.c:1521:2: note: Loop condition is false. Execution continues on line 1582
for (; sd ; sd = entity->my_sched_data) {
^
block/bfq-wf2q.c:1582:28: note: Passing null pointer value via 1st parameter 'entity'
bfqq = bfq_entity_to_bfqq(entity);
^~~~~~
block/bfq-wf2q.c:1582:9: note: Calling 'bfq_entity_to_bfqq'
bfqq = bfq_entity_to_bfqq(entity);
^~~~~~~~~~~~~~~~~~~~~~~~~~
block/bfq-wf2q.c:263:7: note: Access to field 'my_sched_data' results in a dereference of a null pointer (loaded from variable 'entity')
if (!entity->my_sched_data)
^~~~~~
Suppressed 52 warnings (52 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
53 warnings generated.
Suppressed 53 warnings (52 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
>> arch/riscv/kvm/../../../virt/kvm/coalesced_mmio.c:88:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ring->coalesced_mmio[insert].data, val, len);
^~~~~~
arch/riscv/kvm/../../../virt/kvm/coalesced_mmio.c:88:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ring->coalesced_mmio[insert].data, val, len);
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
50 warnings generated.
Suppressed 50 warnings (50 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
61 warnings generated.
drivers/crypto/ccree/cc_hash.c:83:8: warning: Excessive padding in 'struct cc_hash_ctx' (103 padding bytes, where 39 is optimal).
Optimal fields order:
opad_tmp_keys_dma_addr,
drvdata,
digest_buff_dma_addr,
hash_mode,
hw_mode,
inter_digestsize,
hash_len,
key_params,
setkey_comp,
is_hmac,
digest_buff,
opad_tmp_keys_buff,
consider reordering the fields or adding explicit padding members [clang-analyzer-optin.performance.Padding]
struct cc_hash_ctx {
~~~~~~~^~~~~~~~~~~~~
drivers/crypto/ccree/cc_hash.c:83:8: note: Excessive padding in 'struct cc_hash_ctx' (103 padding bytes, where 39 is optimal). Optimal fields order: opad_tmp_keys_dma_addr, drvdata, digest_buff_dma_addr, hash_mode, hw_mode, inter_digestsize, hash_len, key_params, setkey_comp, is_hmac, digest_buff, opad_tmp_keys_buff, consider reordering the fields or adding explicit padding members
struct cc_hash_ctx {
~~~~~~~^~~~~~~~~~~~~
>> drivers/crypto/ccree/cc_hash.c:140:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(state, 0, sizeof(*state));
^~~~~~
drivers/crypto/ccree/cc_hash.c:140:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(state, 0, sizeof(*state));
^~~~~~
>> drivers/crypto/ccree/cc_hash.c:149:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(state->digest_buff, ctx->digest_buff,
^~~~~~
drivers/crypto/ccree/cc_hash.c:149:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(state->digest_buff, ctx->digest_buff,
^~~~~~
drivers/crypto/ccree/cc_hash.c:153:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(state->digest_bytes_len,
^~~~~~
drivers/crypto/ccree/cc_hash.c:153:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(state->digest_bytes_len,
^~~~~~
drivers/crypto/ccree/cc_hash.c:157:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(state->digest_bytes_len,
^~~~~~
drivers/crypto/ccree/cc_hash.c:157:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(state->digest_bytes_len,
^~~~~~
drivers/crypto/ccree/cc_hash.c:167:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(state->opad_digest_buff,
^~~~~~
drivers/crypto/ccree/cc_hash.c:167:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(state->opad_digest_buff,
^~~~~~
drivers/crypto/ccree/cc_hash.c:174:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(state->digest_buff, larval, ctx->inter_digestsize);
^~~~~~
drivers/crypto/ccree/cc_hash.c:174:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(state->digest_buff, larval, ctx->inter_digestsize);
^~~~~~
drivers/crypto/ccree/cc_hash.c:278:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(result, state->digest_result_buff, digestsize);
^~~~~~
drivers/crypto/ccree/cc_hash.c:278:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(result, state->digest_result_buff, digestsize);
^~~~~~
drivers/crypto/ccree/cc_hash.c:1033:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ctx->opad_tmp_keys_buff, key, keylen);
^~~~~~
drivers/crypto/ccree/cc_hash.c:1033:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ctx->opad_tmp_keys_buff, key, keylen);
^~~~~~
drivers/crypto/ccree/cc_hash.c:1035:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ctx->opad_tmp_keys_buff + 24, 0,
^~~~~~
drivers/crypto/ccree/cc_hash.c:1035:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(ctx->opad_tmp_keys_buff + 24, 0,
^~~~~~
drivers/crypto/ccree/cc_hash.c:1144:17: warning: Value stored to 'dev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct device *dev = drvdata_to_dev(ctx->drvdata);
^~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/crypto/ccree/cc_hash.c:1144:17: note: Value stored to 'dev' during its initialization is never read
struct device *dev = drvdata_to_dev(ctx->drvdata);
^~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/crypto/ccree/cc_hash.c:1508:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(out, &tmp, sizeof(u32));
^~~~~~
drivers/crypto/ccree/cc_hash.c:1508:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(out, &tmp, sizeof(u32));
^~~~~~
drivers/crypto/ccree/cc_hash.c:1511:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(out, state->digest_buff, ctx->inter_digestsize);
^~~~~~
drivers/crypto/ccree/cc_hash.c:1511:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(out, state->digest_buff, ctx->inter_digestsize);
^~~~~~
drivers/crypto/ccree/cc_hash.c:1514:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(out, state->digest_bytes_len, ctx->hash_len);
^~~~~~
drivers/crypto/ccree/cc_hash.c:1514:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(out, state->digest_bytes_len, ctx->hash_len);
^~~~~~
drivers/crypto/ccree/cc_hash.c:1517:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(out, &curr_buff_cnt, sizeof(u32));
^~~~~~
drivers/crypto/ccree/cc_hash.c:1517:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(out, &curr_buff_cnt, sizeof(u32));
^~~~~~
drivers/crypto/ccree/cc_hash.c:1520:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(out, curr_buff, curr_buff_cnt);
^~~~~~
drivers/crypto/ccree/cc_hash.c:1520:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(out, curr_buff, curr_buff_cnt);
^~~~~~
drivers/crypto/ccree/cc_hash.c:1533:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&tmp, in, sizeof(u32));
^~~~~~
drivers/crypto/ccree/cc_hash.c:1533:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&tmp, in, sizeof(u32));
^~~~~~
drivers/crypto/ccree/cc_hash.c:1540:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(state->digest_buff, in, ctx->inter_digestsize);
^~~~~~
drivers/crypto/ccree/cc_hash.c:1540:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(state->digest_buff, in, ctx->inter_digestsize);
^~~~~~
drivers/crypto/ccree/cc_hash.c:1543:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(state->digest_bytes_len, in, ctx->hash_len);
^~~~~~
drivers/crypto/ccree/cc_hash.c:1543:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(state->digest_bytes_len, in, ctx->hash_len);
^~~~~~
drivers/crypto/ccree/cc_hash.c:1547:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&tmp, in, sizeof(u32));
^~~~~~
drivers/crypto/ccree/cc_hash.c:1547:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&tmp, in, sizeof(u32));
^~~~~~
drivers/crypto/ccree/cc_hash.c:1553:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(state->buffers[0], in, tmp);
^~~~~~
drivers/crypto/ccree/cc_hash.c:1553:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(state->buffers[0], in, tmp);
^~~~~~
>> drivers/crypto/ccree/cc_hash.c:1837:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(alg->cra_name, CRYPTO_MAX_ALG_NAME, "%s",
^~~~~~~~
drivers/crypto/ccree/cc_hash.c:1837:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(alg->cra_name, CRYPTO_MAX_ALG_NAME, "%s",
^~~~~~~~
drivers/crypto/ccree/cc_hash.c:1839:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(alg->cra_driver_name, CRYPTO_MAX_ALG_NAME, "%s",
^~~~~~~~
drivers/crypto/ccree/cc_hash.c:1839:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(alg->cra_driver_name, CRYPTO_MAX_ALG_NAME, "%s",
^~~~~~~~
drivers/crypto/ccree/cc_hash.c:1843:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(alg->cra_name, CRYPTO_MAX_ALG_NAME, "%s",
^~~~~~~~
drivers/crypto/ccree/cc_hash.c:1843:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(alg->cra_name, CRYPTO_MAX_ALG_NAME, "%s",
^~~~~~~~
drivers/crypto/ccree/cc_hash.c:1845:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(alg->cra_driver_name, CRYPTO_MAX_ALG_NAME, "%s",
^~~~~~~~
drivers/crypto/ccree/cc_hash.c:1845:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(alg->cra_driver_name, CRYPTO_MAX_ALG_NAME, "%s",
^~~~~~~~
drivers/crypto/ccree/cc_hash.c:2168:17: warning: Value stored to 'dev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct device *dev = drvdata_to_dev(ctx->drvdata);
^~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/crypto/ccree/cc_hash.c:2168:17: note: Value stored to 'dev' during its initialization is never read
struct device *dev = drvdata_to_dev(ctx->drvdata);
^~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
50 warnings generated.
Suppressed 50 warnings (50 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
51 warnings generated.
fs/ext4/hash.c:221:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, hinfo->seed, sizeof(buf));
^~~~~~
fs/ext4/hash.c:221:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, hinfo->seed, sizeof(buf));
^~~~~~
Suppressed 50 warnings (50 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
53 warnings generated.
fs/ext4/ialloc.c:66:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(bitmap + (i >> 3), 0xff, (end_bit - i) >> 3);
^~~~~~
fs/ext4/ialloc.c:66:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(bitmap + (i >> 3), 0xff, (end_bit - i) >> 3);
^~~~~~
fs/ext4/ialloc.c:172:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(bh->b_data, 0, (EXT4_INODES_PER_GROUP(sb) + 7) / 8);
^~~~~~
fs/ext4/ialloc.c:172:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(bh->b_data, 0, (EXT4_INODES_PER_GROUP(sb) + 7) / 8);
^~~~~~
fs/ext4/ialloc.c:1255:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ei->i_data, 0, sizeof(ei->i_data));
^~~~~~
fs/ext4/ialloc.c:1255:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(ei->i_data, 0, sizeof(ei->i_data));
^~~~~~
Suppressed 50 warnings (50 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
53 warnings generated.
fs/ext4/indirect.c:155:47: warning: The right operand of '+' is a garbage value [clang-analyzer-core.UndefinedBinaryOperatorResult]
add_chain(chain, NULL, EXT4_I(inode)->i_data + *offsets);
^
fs/ext4/indirect.c:1236:6: note: Assuming 'end' is < 'max_block'
if (end >= max_block)
^~~~~~~~~~~~~~~~
fs/ext4/indirect.c:1236:2: note: Taking false branch
if (end >= max_block)
^
fs/ext4/indirect.c:1238:7: note: Assuming 'start' is < 'end'
if ((start >= end) || (start > max_block))
^~~~~~~~~~~~
fs/ext4/indirect.c:1238:6: note: Left side of '||' is false
if ((start >= end) || (start > max_block))
^
fs/ext4/indirect.c:1238:25: note: Assuming 'start' is <= 'max_block'
if ((start >= end) || (start > max_block))
^~~~~~~~~~~~~~~~~
fs/ext4/indirect.c:1238:2: note: Taking false branch
if ((start >= end) || (start > max_block))
^
fs/ext4/indirect.c:1241:6: note: Calling 'ext4_block_to_path'
n = ext4_block_to_path(inode, start, offsets, NULL);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/ext4/indirect.c:86:6: note: Assuming 'i_block' is >= 'direct_blocks'
if (i_block < direct_blocks) {
^~~~~~~~~~~~~~~~~~~~~~~
fs/ext4/indirect.c:86:2: note: Taking false branch
if (i_block < direct_blocks) {
^
fs/ext4/indirect.c:89:13: note: Assuming the condition is false
} else if ((i_block -= direct_blocks) < indirect_blocks) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/ext4/indirect.c:89:9: note: Taking false branch
} else if ((i_block -= direct_blocks) < indirect_blocks) {
--
^~~~~~
fs/ext4/indirect.c:364:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(bh->b_data, 0, bh->b_size);
^~~~~~
fs/ext4/indirect.c:603:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&ar, 0, sizeof(ar));
^~~~~~
fs/ext4/indirect.c:603:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&ar, 0, sizeof(ar));
^~~~~~
Suppressed 50 warnings (50 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
50 warnings generated.
block/blk-flush.c:440:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&rq->flush, 0, sizeof(rq->flush));
^~~~~~
block/blk-flush.c:440:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&rq->flush, 0, sizeof(rq->flush));
^~~~~~
Suppressed 49 warnings (49 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
51 warnings generated.
block/blk-map.c:32:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(bmd->iov, data->iov, sizeof(struct iovec) * data->nr_segs);
^~~~~~
block/blk-map.c:32:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(bmd->iov, data->iov, sizeof(struct iovec) * data->nr_segs);
^~~~~~
block/blk-map.c:264:4: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret = -EINVAL;
^ ~~~~~~~
block/blk-map.c:264:4: note: Value stored to 'ret' is never read
ret = -EINVAL;
^ ~~~~~~~
block/blk-map.c:454:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(page_address(page), p, bytes);
^~~~~~
block/blk-map.c:454:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(page_address(page), p, bytes);
^~~~~~
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
51 warnings generated.
Suppressed 51 warnings (51 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
50 warnings generated.
mm/vmscan.c:1524:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(stat, 0, sizeof(*stat));
^~~~~~
mm/vmscan.c:1524:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(stat, 0, sizeof(*stat));
^~~~~~
mm/vmscan.c:2954:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(targets, nr, sizeof(nr));
^~~~~~
mm/vmscan.c:2954:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(targets, nr, sizeof(nr));
^~~~~~
mm/vmscan.c:3200:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&sc->nr, 0, sizeof(sc->nr));
^~~~~~
mm/vmscan.c:3200:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&sc->nr, 0, sizeof(sc->nr));
^~~~~~
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
15 warnings generated.
drivers/leds/trigger/ledtrig-cpu.c:54:7: warning: Value stored to 'is_active' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
bool is_active = trig->is_active;
^~~~~~~~~ ~~~~~~~~~~~~~~~
drivers/leds/trigger/ledtrig-cpu.c:54:7: note: Value stored to 'is_active' during its initialization is never read
bool is_active = trig->is_active;
^~~~~~~~~ ~~~~~~~~~~~~~~~
drivers/leds/trigger/ledtrig-cpu.c:155:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(trig->name, MAX_NAME_LEN, "cpu%d", cpu);
^~~~~~~~
drivers/leds/trigger/ledtrig-cpu.c:155:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(trig->name, MAX_NAME_LEN, "cpu%d", cpu);
^~~~~~~~
Suppressed 13 warnings (13 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
>> drivers/leds/trigger/ledtrig-activity.c:159:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", activity_data->invert);
^~~~~~~
drivers/leds/trigger/ledtrig-activity.c:159:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", activity_data->invert);
^~~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
13 warnings generated.
Suppressed 13 warnings (13 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
22 warnings generated.
Suppressed 22 warnings (22 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
22 warnings generated.
Suppressed 22 warnings (22 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
>> drivers/firmware/efi/esrt.c:116:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
str += sprintf(str, "\n");
^~~~~~~
drivers/firmware/efi/esrt.c:116:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
str += sprintf(str, "\n");
^~~~~~~
drivers/firmware/efi/esrt.c:132:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
esre_attr_decl(fw_type, 32, "%u");
^
drivers/firmware/efi/esrt.c:126:9: note: expanded from macro 'esre_attr_decl'
return sprintf(buf, fmt "\n", \
^~~~~~~
drivers/firmware/efi/esrt.c:132:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
esre_attr_decl(fw_type, 32, "%u");
^
drivers/firmware/efi/esrt.c:126:9: note: expanded from macro 'esre_attr_decl'
return sprintf(buf, fmt "\n", \
^~~~~~~
drivers/firmware/efi/esrt.c:133:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
esre_attr_decl(fw_version, 32, "%u");
^
drivers/firmware/efi/esrt.c:126:9: note: expanded from macro 'esre_attr_decl'
return sprintf(buf, fmt "\n", \
^~~~~~~
drivers/firmware/efi/esrt.c:133:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
esre_attr_decl(fw_version, 32, "%u");
^
drivers/firmware/efi/esrt.c:126:9: note: expanded from macro 'esre_attr_decl'
return sprintf(buf, fmt "\n", \
^~~~~~~
drivers/firmware/efi/esrt.c:134:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
esre_attr_decl(lowest_supported_fw_version, 32, "%u");
^
drivers/firmware/efi/esrt.c:126:9: note: expanded from macro 'esre_attr_decl'
return sprintf(buf, fmt "\n", \
^~~~~~~
drivers/firmware/efi/esrt.c:134:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
esre_attr_decl(lowest_supported_fw_version, 32, "%u");
^
drivers/firmware/efi/esrt.c:126:9: note: expanded from macro 'esre_attr_decl'
return sprintf(buf, fmt "\n", \
^~~~~~~
drivers/firmware/efi/esrt.c:135:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
esre_attr_decl(capsule_flags, 32, "0x%x");
^
drivers/firmware/efi/esrt.c:126:9: note: expanded from macro 'esre_attr_decl'
return sprintf(buf, fmt "\n", \
^~~~~~~
drivers/firmware/efi/esrt.c:135:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
esre_attr_decl(capsule_flags, 32, "0x%x");
^
drivers/firmware/efi/esrt.c:126:9: note: expanded from macro 'esre_attr_decl'
return sprintf(buf, fmt "\n", \
^~~~~~~
drivers/firmware/efi/esrt.c:136:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
esre_attr_decl(last_attempt_version, 32, "%u");
^
drivers/firmware/efi/esrt.c:126:9: note: expanded from macro 'esre_attr_decl'
return sprintf(buf, fmt "\n", \
^~~~~~~
drivers/firmware/efi/esrt.c:136:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
esre_attr_decl(last_attempt_version, 32, "%u");
^
drivers/firmware/efi/esrt.c:126:9: note: expanded from macro 'esre_attr_decl'
return sprintf(buf, fmt "\n", \
^~~~~~~
drivers/firmware/efi/esrt.c:137:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
esre_attr_decl(last_attempt_status, 32, "%u");
^
drivers/firmware/efi/esrt.c:126:9: note: expanded from macro 'esre_attr_decl'
return sprintf(buf, fmt "\n", \
^~~~~~~
drivers/firmware/efi/esrt.c:137:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
esre_attr_decl(last_attempt_status, 32, "%u");
^
drivers/firmware/efi/esrt.c:126:9: note: expanded from macro 'esre_attr_decl'
return sprintf(buf, fmt "\n", \
^~~~~~~
drivers/firmware/efi/esrt.c:205:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
esrt_attr_decl(fw_resource_count, 32, "%u");
^
drivers/firmware/efi/esrt.c:200:9: note: expanded from macro 'esrt_attr_decl'
return sprintf(buf, fmt "\n", le##size##_to_cpu(esrt->name)); \
^~~~~~~
drivers/firmware/efi/esrt.c:205:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
esrt_attr_decl(fw_resource_count, 32, "%u");
^
drivers/firmware/efi/esrt.c:200:9: note: expanded from macro 'esrt_attr_decl'
return sprintf(buf, fmt "\n", le##size##_to_cpu(esrt->name)); \
^~~~~~~
drivers/firmware/efi/esrt.c:206:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
esrt_attr_decl(fw_resource_count_max, 32, "%u");
^
drivers/firmware/efi/esrt.c:200:9: note: expanded from macro 'esrt_attr_decl'
return sprintf(buf, fmt "\n", le##size##_to_cpu(esrt->name)); \
^~~~~~~
drivers/firmware/efi/esrt.c:206:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
esrt_attr_decl(fw_resource_count_max, 32, "%u");
^
drivers/firmware/efi/esrt.c:200:9: note: expanded from macro 'esrt_attr_decl'
return sprintf(buf, fmt "\n", le##size##_to_cpu(esrt->name)); \
^~~~~~~
drivers/firmware/efi/esrt.c:207:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
esrt_attr_decl(fw_resource_version, 64, "%llu");
^
drivers/firmware/efi/esrt.c:200:9: note: expanded from macro 'esrt_attr_decl'
return sprintf(buf, fmt "\n", le##size##_to_cpu(esrt->name)); \
^~~~~~~
drivers/firmware/efi/esrt.c:207:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
esrt_attr_decl(fw_resource_version, 64, "%llu");
^
drivers/firmware/efi/esrt.c:200:9: note: expanded from macro 'esrt_attr_decl'
return sprintf(buf, fmt "\n", le##size##_to_cpu(esrt->name)); \
^~~~~~~
>> drivers/firmware/efi/esrt.c:289:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&tmpesrt, va, sizeof(tmpesrt));
^~~~~~
drivers/firmware/efi/esrt.c:289:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&tmpesrt, va, sizeof(tmpesrt));
^~~~~~
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
49 warnings generated.
Suppressed 49 warnings (49 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
40 warnings generated.
drivers/crypto/ccree/cc_driver.c:105:17: warning: Value stored to 'dev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct device *dev = drvdata_to_dev(drvdata);
^~~ ~~~~~~~~~~~~~~~~~~~~~~~
drivers/crypto/ccree/cc_driver.c:105:17: note: Value stored to 'dev' during its initialization is never read
struct device *dev = drvdata_to_dev(drvdata);
^~~ ~~~~~~~~~~~~~~~~~~~~~~~
>> drivers/crypto/ccree/cc_driver.c:176:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(prefix, sizeof(prefix), "%s[%zu]: ", name, len);
^~~~~~~~
drivers/crypto/ccree/cc_driver.c:176:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(prefix, sizeof(prefix), "%s[%zu]: ", name, len);
^~~~~~~~
drivers/crypto/ccree/cc_driver.c:232:3: warning: Value stored to 'axi_err' is never read [clang-analyzer-deadcode.DeadStores]
axi_err = cc_ioread(drvdata, CC_REG(AXIM_MON_ERR));
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/crypto/ccree/cc_driver.c:232:3: note: Value stored to 'axi_err' is never read
axi_err = cc_ioread(drvdata, CC_REG(AXIM_MON_ERR));
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/crypto/ccree/cc_driver.c:276:17: warning: Value stored to 'dev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct device *dev = drvdata_to_dev(drvdata);
^~~ ~~~~~~~~~~~~~~~~~~~~~~~
drivers/crypto/ccree/cc_driver.c:276:17: note: Value stored to 'dev' during its initialization is never read
struct device *dev = drvdata_to_dev(drvdata);
^~~ ~~~~~~~~~~~~~~~~~~~~~~~
Suppressed 36 warnings (36 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
33 warnings generated.
drivers/of/base.c:1297:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(it, 0, sizeof(*it));
^~~~~~
drivers/of/base.c:1297:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(it, 0, sizeof(*it));
^~~~~~
drivers/of/base.c:1887:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(ap->stem, stem, stem_len);
^~~~~~~
drivers/of/base.c:1887:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(ap->stem, stem, stem_len);
^~~~~~~
drivers/of/base.c:1958:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ap, 0, sizeof(*ap) + len + 1);
^~~~~~
drivers/of/base.c:1958:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(ap, 0, sizeof(*ap) + len + 1);
^~~~~~
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
50 warnings generated.
>> fs/omfs/dir.c:94:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(bh->b_data, 0, sizeof(struct omfs_inode));
^~~~~~
fs/omfs/dir.c:94:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(bh->b_data, 0, sizeof(struct omfs_inode));
^~~~~~
fs/omfs/dir.c:97:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&bh->b_data[OMFS_DIR_START], 0xff,
^~~~~~
fs/omfs/dir.c:97:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&bh->b_data[OMFS_DIR_START], 0xff,
^~~~~~
>> fs/omfs/dir.c:139:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(oi->i_name, name, namelen);
^~~~~~
fs/omfs/dir.c:139:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(oi->i_name, name, namelen);
^~~~~~
fs/omfs/dir.c:140:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(oi->i_name + namelen, 0, OMFS_NAMELEN - namelen);
^~~~~~
fs/omfs/dir.c:140:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(oi->i_name + namelen, 0, OMFS_NAMELEN - namelen);
^~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
50 warnings generated.
fs/xfs/scrub/parent.c:196:13: warning: The left operand of '!=' is a garbage value [clang-analyzer-core.UndefinedBinaryOperatorResult]
if (nlink != expected_nlink)
^
fs/xfs/scrub/parent.c:276:7: note: Assuming the condition is true
if (!S_ISDIR(VFS_I(sc->ip)->i_mode))
^
include/uapi/linux/stat.h:23:21: note: expanded from macro 'S_ISDIR'
#define S_ISDIR(m) (((m) & S_IFMT) == S_IFDIR)
^~~~~~~~~~~~~~~~~~~~~~~~~
fs/xfs/scrub/parent.c:276:2: note: Taking false branch
if (!S_ISDIR(VFS_I(sc->ip)->i_mode))
^
fs/xfs/scrub/parent.c:280:6: note: Assuming the condition is false
if (!xfs_verify_dir_ino(mp, sc->ip->i_ino)) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/xfs/scrub/parent.c:280:2: note: Taking false branch
if (!xfs_verify_dir_ino(mp, sc->ip->i_ino)) {
^
fs/xfs/scrub/parent.c:297:6: note: Assuming the condition is false
if (!xchk_fblock_process_error(sc, XFS_DATA_FORK, 0, &error))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/xfs/scrub/parent.c:297:2: note: Taking false branch
if (!xchk_fblock_process_error(sc, XFS_DATA_FORK, 0, &error))
^
fs/xfs/scrub/parent.c:299:6: note: Assuming the condition is false
if (!xfs_verify_dir_ino(mp, dnum)) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/xfs/scrub/parent.c:299:2: note: Taking false branch
if (!xfs_verify_dir_ino(mp, dnum)) {
^
fs/xfs/scrub/parent.c:305:6: note: Assuming field 'ip' is not equal to field 'm_rootip'
if (sc->ip == mp->m_rootip) {
^~~~~~~~~~~~~~~~~~~~~~
fs/xfs/scrub/parent.c:305:2: note: Taking false branch
if (sc->ip == mp->m_rootip) {
^
fs/xfs/scrub/parent.c:313:11: note: Calling 'xchk_parent_validate'
error = xchk_parent_validate(sc, dnum, &try_again);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/xfs/scrub/parent.c:137:2: note: 'nlink' declared without an initial value
xfs_nlink_t nlink;
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/xfs/scrub/parent.c:142:6: note: Assuming the condition is false
if (sc->sm->sm_flags & XFS_SCRUB_OFLAG_CORRUPT)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/xfs/scrub/parent.c:142:2: note: Taking false branch
if (sc->sm->sm_flags & XFS_SCRUB_OFLAG_CORRUPT)
^
fs/xfs/scrub/parent.c:146:6: note: Assuming 'dnum' is not equal to field 'i_ino'
if (sc->ip->i_ino == dnum) {
^~~~~~~~~~~~~~~~~~~~~
fs/xfs/scrub/parent.c:146:2: note: Taking false branch
if (sc->ip->i_ino == dnum) {
^
fs/xfs/scrub/parent.c:155:19: note: Assuming field 'i_nlink' is not equal to 0
expected_nlink = VFS_I(sc->ip)->i_nlink == 0 ? 0 : 1;
^~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/xfs/scrub/parent.c:155:19: note: '?' condition is false
fs/xfs/scrub/parent.c:172:6: note: Assuming the condition is false
if (error == -EINVAL || error == -ENOENT) {
^~~~~~~~~~~~~~~~
fs/xfs/scrub/parent.c:172:6: note: Left side of '||' is false
fs/xfs/scrub/parent.c:172:26: note: Assuming the condition is false
if (error == -EINVAL || error == -ENOENT) {
^~~~~~~~~~~~~~~~
fs/xfs/scrub/parent.c:172:2: note: Taking false branch
if (error == -EINVAL || error == -ENOENT) {
^
fs/xfs/scrub/parent.c:177:6: note: Assuming the condition is false
if (!xchk_fblock_xref_process_error(sc, XFS_DATA_FORK, 0, &error))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/xfs/scrub/parent.c:177:2: note: Taking false branch
if (!xchk_fblock_xref_process_error(sc, XFS_DATA_FORK, 0, &error))
^
fs/xfs/scrub/parent.c:179:6: note: Assuming 'dp' is not equal to field 'ip'
if (dp == sc->ip || !S_ISDIR(VFS_I(dp)->i_mode)) {
^~~~~~~~~~~~
fs/xfs/scrub/parent.c:179:6: note: Left side of '||' is false
fs/xfs/scrub/parent.c:179:23: note: Assuming the condition is true
if (dp == sc->ip || !S_ISDIR(VFS_I(dp)->i_mode)) {
^
include/uapi/linux/stat.h:23:21: note: expanded from macro 'S_ISDIR'
#define S_ISDIR(m) (((m) & S_IFMT) == S_IFDIR)
--
#define VERBOSE_TOROUT_STRING(s) \
^
kernel/locking/locktorture.c:821:3: note: Calling 'lock_torture_stats_print'
lock_torture_stats_print();
^~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/locking/locktorture.c:781:6: note: Assuming field 'readlock' is null
if (cxt.cur_ops->readlock)
^~~~~~~~~~~~~~~~~~~~~
kernel/locking/locktorture.c:781:2: note: Taking false branch
if (cxt.cur_ops->readlock)
^
kernel/locking/locktorture.c:784:8: note: Calling 'kmalloc'
buf = kmalloc(size, GFP_KERNEL);
^~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/slab.h:569:2: note: Taking false branch
if (__builtin_constant_p(size)) {
^
include/linux/slab.h:586:9: note: Value assigned to 'cxt.lwsa'
return __kmalloc(size, flags);
^~~~~~~~~~~~~~~~~~~~~~
include/linux/slab.h:586:2: note: Returning pointer, which participates in a condition later
return __kmalloc(size, flags);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/locking/locktorture.c:784:8: note: Returning from 'kmalloc'
buf = kmalloc(size, GFP_KERNEL);
^~~~~~~~~~~~~~~~~~~~~~~~~
kernel/locking/locktorture.c:785:6: note: Assuming 'buf' is non-null
if (!buf) {
^~~~
kernel/locking/locktorture.c:785:2: note: Taking false branch
if (!buf) {
^
kernel/locking/locktorture.c:791:29: note: Passing value via 2nd parameter 'statp'
__torture_print_stats(buf, cxt.lwsa, true);
^~~~~~~~
kernel/locking/locktorture.c:791:2: note: Calling '__torture_print_stats'
__torture_print_stats(buf, cxt.lwsa, true);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/locking/locktorture.c:744:22: note: Assuming 'statp' is null
long max = 0, min = statp ? data_race(statp[0].n_lock_acquired) : 0;
^~~~~
kernel/locking/locktorture.c:744:22: note: '?' condition is false
kernel/locking/locktorture.c:747:13: note: 'write' is true
n_stress = write ? cxt.nrealwriters_stress : cxt.nrealreaders_stress;
^~~~~
kernel/locking/locktorture.c:747:13: note: '?' condition is true
kernel/locking/locktorture.c:748:14: note: Assuming 'i' is < 'n_stress'
for (i = 0; i < n_stress; i++) {
^~~~~~~~~~~~
kernel/locking/locktorture.c:748:2: note: Loop condition is true. Entering loop body
for (i = 0; i < n_stress; i++) {
^
kernel/locking/locktorture.c:749:17: note: Dereference of null pointer
if (data_race(statp[i].n_lock_fail))
^
include/linux/compiler.h:218:3: note: expanded from macro 'data_race'
expr; \
^~~~
kernel/locking/locktorture.c:758:2: warning: Value stored to 'page' is never read [clang-analyzer-deadcode.DeadStores]
page += sprintf(page,
^ ~~~~~~~~~~~~~
kernel/locking/locktorture.c:758:2: note: Value stored to 'page' is never read
page += sprintf(page,
^ ~~~~~~~~~~~~~
kernel/locking/locktorture.c:758:10: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
page += sprintf(page,
^~~~~~~
kernel/locking/locktorture.c:758:10: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
page += sprintf(page,
^~~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
16 warnings generated.
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
>> drivers/base/arch_topology.c:464:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(name, sizeof(name), "thread%d", i);
^~~~~~~~
drivers/base/arch_topology.c:464:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(name, sizeof(name), "thread%d", i);
^~~~~~~~
drivers/base/arch_topology.c:518:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(name, sizeof(name), "cluster%d", i);
^~~~~~~~
drivers/base/arch_topology.c:518:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(name, sizeof(name), "cluster%d", i);
^~~~~~~~
drivers/base/arch_topology.c:533:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(name, sizeof(name), "core%d", i);
^~~~~~~~
drivers/base/arch_topology.c:533:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(name, sizeof(name), "core%d", i);
^~~~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
36 warnings generated.
Suppressed 36 warnings (36 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
55 warnings generated.
drivers/block/brd.c:205:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dst + offset, src, copy);
^~~~~~
drivers/block/brd.c:205:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dst + offset, src, copy);
^~~~~~
drivers/block/brd.c:216:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dst, src, copy);
^~~~~~
drivers/block/brd.c:216:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dst, src, copy);
^~~~~~
drivers/block/brd.c:236:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dst, src + offset, copy);
^~~~~~
drivers/block/brd.c:236:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dst, src + offset, copy);
^~~~~~
drivers/block/brd.c:239:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(dst, 0, copy);
^~~~~~
drivers/block/brd.c:239:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(dst, 0, copy);
^~~~~~
drivers/block/brd.c:248:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dst, src, copy);
^~~~~~
drivers/block/brd.c:248:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dst, src, copy);
^~~~~~
drivers/block/brd.c:251:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(dst, 0, copy);
^~~~~~
drivers/block/brd.c:251:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(dst, 0, copy);
^~~~~~
drivers/block/brd.c:386:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(buf, DISK_NAME_LEN, "ram%d", i);
^~~~~~~~
drivers/block/brd.c:386:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(buf, DISK_NAME_LEN, "ram%d", i);
^~~~~~~~
drivers/block/brd.c:459:18: warning: The result of the left shift is undefined due to shifting by '32', which is greater or equal to the width of type 'unsigned long' [clang-analyzer-core.UndefinedBinaryOperatorResult]
max_part = 1UL << fls(max_part);
^
drivers/block/brd.c:472:2: note: Calling 'brd_check_and_reset_par'
brd_check_and_reset_par();
^~~~~~~~~~~~~~~~~~~~~~~~~
drivers/block/brd.c:451:15: note: Assuming 'max_part' is not equal to 0
if (unlikely(!max_part))
^
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
drivers/block/brd.c:451:2: note: Taking false branch
if (unlikely(!max_part))
^
drivers/block/brd.c:458:6: note: Assuming the condition is true
if ((1U << MINORBITS) % max_part != 0)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/block/brd.c:458:2: note: Taking true branch
if ((1U << MINORBITS) % max_part != 0)
^
drivers/block/brd.c:459:21: note: Calling 'fls'
max_part = 1UL << fls(max_part);
^~~~~~~~~~~~~
include/asm-generic/bitops/fls.h:15:2: note: 'r' initialized to 32
int r = 32;
^~~~~
include/asm-generic/bitops/fls.h:17:7: note: 'x' is not equal to 0, which participates in a condition later
if (!x)
^
include/asm-generic/bitops/fls.h:17:2: note: Taking false branch
if (!x)
^
include/asm-generic/bitops/fls.h:19:6: note: Assuming the condition is false
if (!(x & 0xffff0000u)) {
^~~~~~~~~~~~~~~~~~
include/asm-generic/bitops/fls.h:19:2: note: Taking false branch
if (!(x & 0xffff0000u)) {
^
include/asm-generic/bitops/fls.h:23:6: note: Assuming the condition is false
if (!(x & 0xff000000u)) {
^~~~~~~~~~~~~~~~~~
include/asm-generic/bitops/fls.h:23:2: note: Taking false branch
if (!(x & 0xff000000u)) {
^
include/asm-generic/bitops/fls.h:27:6: note: Assuming the condition is false
if (!(x & 0xf0000000u)) {
^~~~~~~~~~~~~~~~~~
include/asm-generic/bitops/fls.h:27:2: note: Taking false branch
if (!(x & 0xf0000000u)) {
^
include/asm-generic/bitops/fls.h:31:6: note: Assuming the condition is false
if (!(x & 0xc0000000u)) {
^~~~~~~~~~~~~~~~~~
include/asm-generic/bitops/fls.h:31:2: note: Taking false branch
if (!(x & 0xc0000000u)) {
^
include/asm-generic/bitops/fls.h:35:6: note: Assuming the condition is false
if (!(x & 0x80000000u)) {
^~~~~~~~~~~~~~~~~~
include/asm-generic/bitops/fls.h:35:2: note: Taking false branch
if (!(x & 0x80000000u)) {
^
include/asm-generic/bitops/fls.h:39:2: note: Returning the value 32 (loaded from 'r')
return r;
^~~~~~~~
drivers/block/brd.c:459:21: note: Returning from 'fls'
max_part = 1UL << fls(max_part);
^~~~~~~~~~~~~
drivers/block/brd.c:459:18: note: The result of the left shift is undefined due to shifting by '32', which is greater or equal to the width of type 'unsigned long'
max_part = 1UL << fls(max_part);
^ ~~~~~~~~~~~~~
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
13 warnings generated.
Suppressed 13 warnings (13 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
13 warnings generated.
Suppressed 13 warnings (13 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
58 warnings generated.
fs/ufs/inode.c:78:9: warning: Excessive padding in 'Indirect' (8 padding bytes, where 0 is optimal).
Optimal fields order:
,
p,
bh,
consider reordering the fields or adding explicit padding members [clang-analyzer-optin.performance.Padding]
typedef struct {
^~~~~~~~
fs/ufs/inode.c:78:9: note: Excessive padding in 'Indirect' (8 padding bytes, where 0 is optimal). Optimal fields order: , p, bh, consider reordering the fields or adding explicit padding members
typedef struct {
^~~~~~~~
>> fs/ufs/inode.c:596:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ufsi->i_u1.i_data, &ufs_inode->ui_u2.ui_addr,
^~~~~~
fs/ufs/inode.c:596:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ufsi->i_u1.i_data, &ufs_inode->ui_u2.ui_addr,
^~~~~~
fs/ufs/inode.c:599:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ufsi->i_u1.i_symlink, ufs_inode->ui_u2.ui_symlink,
^~~~~~
fs/ufs/inode.c:599:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ufsi->i_u1.i_symlink, ufs_inode->ui_u2.ui_symlink,
^~~~~~
fs/ufs/inode.c:643:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ufsi->i_u1.u2_i_data, &ufs2_inode->ui_u2.ui_addr,
^~~~~~
fs/ufs/inode.c:643:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ufsi->i_u1.u2_i_data, &ufs2_inode->ui_u2.ui_addr,
^~~~~~
fs/ufs/inode.c:646:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ufsi->i_u1.i_symlink, ufs2_inode->ui_u2.ui_symlink,
^~~~~~
fs/ufs/inode.c:646:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ufsi->i_u1.i_symlink, ufs2_inode->ui_u2.ui_symlink,
^~~~~~
fs/ufs/inode.c:746:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&ufs_inode->ui_u2.ui_addr, ufsi->i_u1.i_data,
^~~~~~
fs/ufs/inode.c:746:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&ufs_inode->ui_u2.ui_addr, ufsi->i_u1.i_data,
^~~~~~
fs/ufs/inode.c:750:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&ufs_inode->ui_u2.ui_symlink, ufsi->i_u1.i_symlink,
^~~~~~
fs/ufs/inode.c:750:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&ufs_inode->ui_u2.ui_symlink, ufsi->i_u1.i_symlink,
^~~~~~
>> fs/ufs/inode.c:755:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset (ufs_inode, 0, sizeof(struct ufs_inode));
^~~~~~
fs/ufs/inode.c:755:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset (ufs_inode, 0, sizeof(struct ufs_inode));
^~~~~~
fs/ufs/inode.c:786:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&ufs_inode->ui_u2.ui_addr, ufsi->i_u1.u2_i_data,
^~~~~~
fs/ufs/inode.c:786:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&ufs_inode->ui_u2.ui_addr, ufsi->i_u1.u2_i_data,
^~~~~~
fs/ufs/inode.c:789:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&ufs_inode->ui_u2.ui_symlink, ufsi->i_u1.i_symlink,
^~~~~~
fs/ufs/inode.c:789:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&ufs_inode->ui_u2.ui_symlink, ufsi->i_u1.i_symlink,
^~~~~~
fs/ufs/inode.c:794:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset (ufs_inode, 0, sizeof(struct ufs2_inode));
^~~~~~
fs/ufs/inode.c:794:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset (ufs_inode, 0, sizeof(struct ufs2_inode));
^~~~~~
fs/ufs/inode.c:1104:10: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(bh->b_data, 0, sb->s_blocksize);
^~~~~~
fs/ufs/inode.c:1104:10: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(bh->b_data, 0, sb->s_blocksize);
^~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
2 warnings generated.
Suppressed 2 warnings (2 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
9 warnings generated.
Suppressed 9 warnings (9 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
57 warnings generated.
fs/jffs2/nodelist.h:106:6: warning: Access to field 'flash_offset' results in a dereference of a null pointer (loaded from variable 'ref') [clang-analyzer-core.NullDereference]
if (ref->flash_offset == REF_LINK_NODE) {
^
fs/jffs2/wbuf.c:288:6: note: Assuming the condition is false
if (c->wbuf_ofs % c->mtd->erasesize)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/jffs2/wbuf.c:288:2: note: Taking false branch
if (c->wbuf_ofs % c->mtd->erasesize)
^
fs/jffs2/wbuf.c:294:10: note: Assuming the condition is true
BUG_ON(!ref_obsolete(jeb->last_node));
^
fs/jffs2/nodelist.h:138:28: note: expanded from macro 'ref_obsolete'
#define ref_obsolete(ref) (((ref)->flash_offset & 3) == REF_OBSOLETE)
^
include/asm-generic/bug.h:161:45: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
~~~~~~~~~^~~~~~~~~~
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
fs/jffs2/wbuf.c:294:2: note: Taking false branch
BUG_ON(!ref_obsolete(jeb->last_node));
^
include/asm-generic/bug.h:161:32: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^
fs/jffs2/wbuf.c:294:2: note: Loop condition is false. Exiting loop
BUG_ON(!ref_obsolete(jeb->last_node));
^
include/asm-generic/bug.h:161:27: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^
fs/jffs2/wbuf.c:298:2: note: Loop condition is true. Entering loop body
for (next = raw = jeb->first_node; next; raw = next) {
^
fs/jffs2/wbuf.c:301:7: note: Assuming the condition is false
if (ref_obsolete(raw) ||
^
fs/jffs2/nodelist.h:138:28: note: expanded from macro 'ref_obsolete'
#define ref_obsolete(ref) (((ref)->flash_offset & 3) == REF_OBSOLETE)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/jffs2/wbuf.c:301:7: note: Left side of '||' is false
if (ref_obsolete(raw) ||
^
fs/jffs2/nodelist.h:138:27: note: expanded from macro 'ref_obsolete'
#define ref_obsolete(ref) (((ref)->flash_offset & 3) == REF_OBSOLETE)
^
fs/jffs2/wbuf.c:302:8: note: 'next' is null
(next && ref_offset(next) <= c->wbuf_ofs)) {
^~~~
fs/jffs2/wbuf.c:302:13: note: Left side of '&&' is false
(next && ref_offset(next) <= c->wbuf_ofs)) {
^
fs/jffs2/wbuf.c:309:3: note: Taking false branch
dbg_noderef("First node to be recovered is at 0x%08x(%d)-0x%08x\n",
^
fs/jffs2/debug.h:134:31: note: expanded from macro 'dbg_noderef'
#define dbg_noderef(fmt, ...) no_printk(fmt, ##__VA_ARGS__)
^
include/linux/printk.h:131:2: note: expanded from macro 'no_printk'
if (0) \
^
fs/jffs2/wbuf.c:314:3: note: Execution continues on line 317
break;
^
fs/jffs2/wbuf.c:317:7: note: 'first_raw' is non-null
if (!first_raw) {
^~~~~~~~~
fs/jffs2/wbuf.c:317:2: note: Taking false branch
if (!first_raw) {
^
fs/jffs2/wbuf.c:329:2: note: Loop condition is true. Entering loop body
while ((raw = ref_next(raw)) != jeb->last_node)
^
fs/jffs2/wbuf.c:329:16: note: Calling 'ref_next'
while ((raw = ref_next(raw)) != jeb->last_node)
^~~~~~~~~~~~~
fs/jffs2/nodelist.h:103:2: note: Null pointer value stored to 'ref'
ref++;
^~~~~
fs/jffs2/nodelist.h:106:6: note: Access to field 'flash_offset' results in a dereference of a null pointer (loaded from variable 'ref')
if (ref->flash_offset == REF_LINK_NODE) {
^~~
>> fs/jffs2/wbuf.c:382:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf + (c->wbuf_ofs - start), c->wbuf, end - c->wbuf_ofs);
^~~~~~
fs/jffs2/wbuf.c:382:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf + (c->wbuf_ofs - start), c->wbuf, end - c->wbuf_ofs);
^~~~~~
>> fs/jffs2/wbuf.c:446:3: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(c->wbuf, rewrite_buf + towrite, c->wbuf_len);
^~~~~~~
fs/jffs2/wbuf.c:446:3: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(c->wbuf, rewrite_buf + towrite, c->wbuf_len);
^~~~~~~
fs/jffs2/wbuf.c:451:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(c->wbuf, buf, end-start);
^~~~~~
fs/jffs2/wbuf.c:451:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(c->wbuf, buf, end-start);
^~~~~~
fs/jffs2/wbuf.c:453:4: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(c->wbuf, c->wbuf + (start - c->wbuf_ofs), end - start);
^~~~~~~
fs/jffs2/wbuf.c:453:4: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(c->wbuf, c->wbuf + (start - c->wbuf_ofs), end - start);
^~~~~~~
>> fs/jffs2/wbuf.c:614:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(c->wbuf + c->wbuf_len, 0, c->wbuf_pagesize - c->wbuf_len);
^~~~~~
fs/jffs2/wbuf.c:614:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(c->wbuf + c->wbuf_len, 0, c->wbuf_pagesize - c->wbuf_len);
^~~~~~
fs/jffs2/wbuf.c:691:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(c->wbuf,0xff,c->wbuf_pagesize);
^~~~~~
fs/jffs2/wbuf.c:691:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(c->wbuf,0xff,c->wbuf_pagesize);
^~~~~~
fs/jffs2/wbuf.c:789:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(c->wbuf + c->wbuf_len, buf, len);
^~~~~~
fs/jffs2/wbuf.c:789:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(c->wbuf + c->wbuf_len, buf, len);
^~~~~~
fs/jffs2/wbuf.c:813:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(c->wbuf,0xff,c->wbuf_pagesize);
^~~~~~
fs/jffs2/wbuf.c:813:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(c->wbuf,0xff,c->wbuf_pagesize);
^~~~~~
fs/jffs2/wbuf.c:876:39: warning: Division by zero [clang-analyzer-core.DivideZero]
ret = mtd_write(c->mtd, outvec_to, PAGE_DIV(vlen),
^
fs/jffs2/wbuf.c:35:43: note: expanded from macro 'PAGE_DIV'
#define PAGE_DIV(x) ( ((unsigned long)(x) / (unsigned long)(c->wbuf_pagesize)) * (unsigned long)(c->wbuf_pagesize) )
^
fs/jffs2/wbuf.c:946:30: note: Assuming field 'wbuf' is not equal to null
if (!jffs2_is_writebuffered(c))
^
fs/jffs2/os-linux.h:103:36: note: expanded from macro 'jffs2_is_writebuffered'
#define jffs2_is_writebuffered(c) (c->wbuf != NULL)
^~~~~~~~~~~~~~~
fs/jffs2/wbuf.c:946:2: note: Taking false branch
if (!jffs2_is_writebuffered(c))
^
fs/jffs2/wbuf.c:951:9: note: Calling 'jffs2_flash_writev'
return jffs2_flash_writev(c, vecs, 1, ofs, retlen, 0);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/jffs2/wbuf.c:804:7: note: Field 'wbuf' is not equal to null
if (!jffs2_is_writebuffered(c))
^
fs/jffs2/os-linux.h:103:39: note: expanded from macro 'jffs2_is_writebuffered'
#define jffs2_is_writebuffered(c) (c->wbuf != NULL)
^
fs/jffs2/wbuf.c:804:2: note: Taking false branch
if (!jffs2_is_writebuffered(c))
^
fs/jffs2/wbuf.c:810:6: note: Assuming field 'wbuf_ofs' is not equal to -1
if (c->wbuf_ofs == 0xFFFFFFFF) {
^~~~~~~~~~~~~~~~~~~~~~~~~
fs/jffs2/wbuf.c:810:2: note: Taking false branch
if (c->wbuf_ofs == 0xFFFFFFFF) {
^
fs/jffs2/wbuf.c:823:6: note: Assuming the condition is false
if (SECTOR_ADDR(to) != SECTOR_ADDR(c->wbuf_ofs)) {
^
fs/jffs2/os-linux.h:65:24: note: expanded from macro 'SECTOR_ADDR'
#define SECTOR_ADDR(x) ( (((unsigned long)(x) / c->sector_size) * c->sector_size) )
^
fs/jffs2/wbuf.c:823:2: note: Taking false branch
if (SECTOR_ADDR(to) != SECTOR_ADDR(c->wbuf_ofs)) {
^
fs/jffs2/wbuf.c:837:6: note: Assuming the condition is false
if (to != PAD(c->wbuf_ofs + c->wbuf_len)) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/jffs2/wbuf.c:837:2: note: Taking false branch
if (to != PAD(c->wbuf_ofs + c->wbuf_len)) {
^
fs/jffs2/wbuf.c:848:6: note: Assuming the condition is false
if (c->wbuf_len != PAGE_MOD(to)) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/jffs2/wbuf.c:848:2: note: Taking false branch
if (c->wbuf_len != PAGE_MOD(to)) {
^
fs/jffs2/wbuf.c:859:2: note: Loop condition is true. Entering loop body
for (invec = 0; invec < count; invec++) {
^
fs/jffs2/wbuf.c:863:17: note: Calling 'jffs2_fill_wbuf'
wbuf_retlen = jffs2_fill_wbuf(c, v, vlen);
^~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/jffs2/wbuf.c:784:6: note: Assuming 'len' is 0
if (len && !c->wbuf_len && (len >= c->wbuf_pagesize))
^~~
fs/jffs2/wbuf.c:784:10: note: Left side of '&&' is false
if (len && !c->wbuf_len && (len >= c->wbuf_pagesize))
^
fs/jffs2/wbuf.c:787:2: note: Taking false branch
if (len > (c->wbuf_pagesize - c->wbuf_len))
^
fs/jffs2/wbuf.c:791:2: note: Returning without writing to 'c->wbuf_pagesize'
return len;
^
fs/jffs2/wbuf.c:863:17: note: Returning from 'jffs2_fill_wbuf'
wbuf_retlen = jffs2_fill_wbuf(c, v, vlen);
^~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/jffs2/wbuf.c:865:7: note: Assuming field 'wbuf_len' is equal to field 'wbuf_pagesize'
if (c->wbuf_len == c->wbuf_pagesize) {
--
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/sched/cpudeadline.c:122:2: note: Taking true branch
if (later_mask &&
^
kernel/sched/cpudeadline.c:127:8: note: Left side of '&&' is false
if (!static_branch_unlikely(&sched_asym_cpucapacity))
^
include/linux/jump_label.h:508:52: note: expanded from macro 'static_branch_unlikely'
#define static_branch_unlikely(x) unlikely_notrace(static_key_enabled(&(x)->key))
^
include/linux/jump_label.h:416:67: note: expanded from macro 'static_key_enabled'
if (!__builtin_types_compatible_p(typeof(*x), struct static_key) && \
^
kernel/sched/cpudeadline.c:127:8: note: Assuming the condition is true
if (!static_branch_unlikely(&sched_asym_cpucapacity))
^
include/linux/jump_label.h:508:52: note: expanded from macro 'static_branch_unlikely'
#define static_branch_unlikely(x) unlikely_notrace(static_key_enabled(&(x)->key))
~~~~~~~~~~~~~~~~~^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/jump_label.h:420:2: note: expanded from macro 'static_key_enabled'
static_key_count((struct static_key *)x) > 0; \
^
include/linux/compiler.h:80:39: note: expanded from macro 'unlikely_notrace'
# define unlikely_notrace(x) unlikely(x)
~~~~~~~~~^~
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
kernel/sched/cpudeadline.c:127:3: note: Taking false branch
if (!static_branch_unlikely(&sched_asym_cpucapacity))
^
kernel/sched/cpudeadline.c:131:3: note: Assuming 'cpu' is >= 'nr_cpu_ids'
for_each_cpu(cpu, later_mask) {
^
include/linux/cpumask.h:278:3: note: expanded from macro 'for_each_cpu'
(cpu) < nr_cpu_ids;)
^~~~~~~~~~~~~~~~~~
kernel/sched/cpudeadline.c:131:3: note: Loop condition is false. Execution continues on line 145
for_each_cpu(cpu, later_mask) {
^
include/linux/cpumask.h:276:2: note: expanded from macro 'for_each_cpu'
for ((cpu) = -1; \
^
kernel/sched/cpudeadline.c:145:3: note: Taking true branch
if (cpumask_empty(later_mask))
^
kernel/sched/cpudeadline.c:146:4: note: Calling 'cpumask_set_cpu'
cpumask_set_cpu(max_cpu, later_mask);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/cpumask.h:346:2: note: Calling 'set_bit'
set_bit(cpumask_check(cpu), cpumask_bits(dstp));
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
arch/riscv/include/asm/bitops.h:115:2: note: The result of the left shift is undefined because the right operand is negative
__op_bit(or, __NOP, nr, addr);
^
arch/riscv/include/asm/bitops.h:58:2: note: expanded from macro '__op_bit'
__op_bit_ord(op, mod, nr, addr, )
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
arch/riscv/include/asm/bitops.h:52:14: note: expanded from macro '__op_bit_ord'
: "r" (mod(BIT_MASK(nr))) \
~~~~^~~~~~~~~~~~~
include/linux/bits.h:10:30: note: expanded from macro 'BIT_MASK'
#define BIT_MASK(nr) (UL(1) << ((nr) % BITS_PER_LONG))
^
arch/riscv/include/asm/bitops.h:61:19: note: expanded from macro '__NOP'
#define __NOP(x) (x)
^
Suppressed 68 warnings (68 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
38 warnings generated.
fs/d_path.c:50:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(dst, 'x', len);
^~~~~~
fs/d_path.c:50:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(dst, 'x', len);
^~~~~~
fs/d_path.c:308:7: warning: Call to function 'vsnprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'vsnprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sz = vsnprintf(temp, sizeof(temp), fmt, args) + 1;
^~~~~~~~~
fs/d_path.c:308:7: note: Call to function 'vsnprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'vsnprintf_s' in case of C11
sz = vsnprintf(temp, sizeof(temp), fmt, args) + 1;
^~~~~~~~~
fs/d_path.c:315:9: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return memcpy(buffer, temp, sz);
^~~~~~
fs/d_path.c:315:9: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
return memcpy(buffer, temp, sz);
^~~~~~
Suppressed 35 warnings (34 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
50 warnings generated.
Suppressed 50 warnings (50 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
63 warnings generated.
>> fs/orangefs/namei.c:44:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(new_op->upcall.req.create.d_name,
^~~~~~~
fs/orangefs/namei.c:44:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(new_op->upcall.req.create.d_name,
^~~~~~~
>> fs/orangefs/namei.c:86:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&iattr, 0, sizeof iattr);
^~~~~~
fs/orangefs/namei.c:86:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&iattr, 0, sizeof iattr);
^~~~~~
fs/orangefs/namei.c:140:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(new_op->upcall.req.lookup.d_name, dentry->d_name.name,
^~~~~~~
fs/orangefs/namei.c:140:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(new_op->upcall.req.lookup.d_name, dentry->d_name.name,
^~~~~~~
fs/orangefs/namei.c:195:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(new_op->upcall.req.remove.d_name, dentry->d_name.name,
^~~~~~~
fs/orangefs/namei.c:195:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(new_op->upcall.req.remove.d_name, dentry->d_name.name,
^~~~~~~
fs/orangefs/namei.c:211:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&iattr, 0, sizeof iattr);
^~~~~~
fs/orangefs/namei.c:211:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&iattr, 0, sizeof iattr);
^~~~~~
fs/orangefs/namei.c:250:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(new_op->upcall.req.sym.entry_name,
^~~~~~~
fs/orangefs/namei.c:250:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(new_op->upcall.req.sym.entry_name,
^~~~~~~
fs/orangefs/namei.c:253:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(new_op->upcall.req.sym.target, symname, ORANGEFS_NAME_MAX - 1);
^~~~~~~
fs/orangefs/namei.c:253:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(new_op->upcall.req.sym.target, symname, ORANGEFS_NAME_MAX - 1);
^~~~~~~
fs/orangefs/namei.c:298:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&iattr, 0, sizeof iattr);
^~~~~~
fs/orangefs/namei.c:298:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&iattr, 0, sizeof iattr);
^~~~~~
fs/orangefs/namei.c:327:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(new_op->upcall.req.mkdir.d_name,
^~~~~~~
fs/orangefs/namei.c:327:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(new_op->upcall.req.mkdir.d_name,
^~~~~~~
fs/orangefs/namei.c:369:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&iattr, 0, sizeof iattr);
^~~~~~
fs/orangefs/namei.c:369:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&iattr, 0, sizeof iattr);
^~~~~~
fs/orangefs/namei.c:396:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&iattr, 0, sizeof iattr);
^~~~~~
fs/orangefs/namei.c:396:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&iattr, 0, sizeof iattr);
^~~~~~
fs/orangefs/namei.c:408:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(new_op->upcall.req.rename.d_old_name,
^~~~~~~
fs/orangefs/namei.c:408:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(new_op->upcall.req.rename.d_old_name,
^~~~~~~
fs/orangefs/namei.c:411:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(new_op->upcall.req.rename.d_new_name,
^~~~~~~
fs/orangefs/namei.c:411:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(new_op->upcall.req.rename.d_new_name,
^~~~~~~
Suppressed 50 warnings (50 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
81 warnings generated.
>> fs/ecryptfs/keystore.c:179:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&message[i], signature, ECRYPTFS_SIG_SIZE_HEX);
^~~~~~
fs/ecryptfs/keystore.c:179:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&message[i], signature, ECRYPTFS_SIG_SIZE_HEX);
^~~~~~
fs/ecryptfs/keystore.c:190:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&message[i], session_key->encrypted_key,
^~~~~~
fs/ecryptfs/keystore.c:190:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&message[i], session_key->encrypted_key,
^~~~~~
fs/ecryptfs/keystore.c:266:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(session_key->decrypted_key, &data[i],
^~~~~~
fs/ecryptfs/keystore.c:266:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(session_key->decrypted_key, &data[i],
^~~~~~
fs/ecryptfs/keystore.c:322:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&message[i], signature, ECRYPTFS_SIG_SIZE_HEX);
^~~~~~
fs/ecryptfs/keystore.c:322:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&message[i], signature, ECRYPTFS_SIG_SIZE_HEX);
^~~~~~
fs/ecryptfs/keystore.c:334:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&message[i], crypt_stat->key, crypt_stat->key_size);
^~~~~~
fs/ecryptfs/keystore.c:334:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&message[i], crypt_stat->key, crypt_stat->key_size);
^~~~~~
fs/ecryptfs/keystore.c:406:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(key_rec->enc_key, &data[i], key_rec->enc_key_size);
^~~~~~
fs/ecryptfs/keystore.c:406:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(key_rec->enc_key, &data[i], key_rec->enc_key_size);
^~~~~~
fs/ecryptfs/keystore.c:784:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(s->hash, s->tmp_hash,
^~~~~~
fs/ecryptfs/keystore.c:784:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(s->hash, s->tmp_hash,
^~~~~~
fs/ecryptfs/keystore.c:790:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&s->block_aligned_filename[s->num_rand_bytes], filename,
^~~~~~
fs/ecryptfs/keystore.c:790:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&s->block_aligned_filename[s->num_rand_bytes], filename,
^~~~~~
fs/ecryptfs/keystore.c:1076:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy((*filename), &s->decrypted_filename[s->i], (*filename_size));
^~~~~~
fs/ecryptfs/keystore.c:1076:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy((*filename), &s->decrypted_filename[s->i], (*filename_size));
^~~~~~
fs/ecryptfs/keystore.c:1170:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(crypt_stat->key, auth_tok->session_key.decrypted_key,
^~~~~~
fs/ecryptfs/keystore.c:1170:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(crypt_stat->key, auth_tok->session_key.decrypted_key,
^~~~~~
fs/ecryptfs/keystore.c:1310:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy((*new_auth_tok)->session_key.encrypted_key,
^~~~~~
fs/ecryptfs/keystore.c:1310:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy((*new_auth_tok)->session_key.encrypted_key,
^~~~~~
>> fs/ecryptfs/keystore.c:1327:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(auth_tok_list_item, 0,
^~~~~~
fs/ecryptfs/keystore.c:1327:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(auth_tok_list_item, 0,
^~~~~~
fs/ecryptfs/keystore.c:1464:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy((*new_auth_tok)->token.password.salt,
^~~~~~
fs/ecryptfs/keystore.c:1464:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy((*new_auth_tok)->token.password.salt,
^~~~~~
fs/ecryptfs/keystore.c:1475:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy((*new_auth_tok)->session_key.encrypted_key,
^~~~~~
fs/ecryptfs/keystore.c:1475:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy((*new_auth_tok)->session_key.encrypted_key,
^~~~~~
fs/ecryptfs/keystore.c:1503:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(auth_tok_list_item, 0,
^~~~~~
fs/ecryptfs/keystore.c:1503:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(auth_tok_list_item, 0,
^~~~~~
fs/ecryptfs/keystore.c:1599:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(contents, &data[(*packet_size)], (*tag_11_contents_size));
^~~~~~
fs/ecryptfs/keystore.c:1599:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(contents, &data[(*packet_size)], (*tag_11_contents_size));
^~~~~~
fs/ecryptfs/keystore.c:1726:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(crypt_stat->key, auth_tok->session_key.decrypted_key,
^~~~~~
fs/ecryptfs/keystore.c:1726:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(crypt_stat->key, auth_tok->session_key.decrypted_key,
^~~~~~
fs/ecryptfs/keystore.c:1887:4: warning: Value stored to 'found_auth_tok' is never read [clang-analyzer-deadcode.DeadStores]
found_auth_tok = 1;
^ ~
fs/ecryptfs/keystore.c:1887:4: note: Value stored to 'found_auth_tok' is never read
found_auth_tok = 1;
^ ~
fs/ecryptfs/keystore.c:1899:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&(candidate_auth_tok->token.private_key),
^~~~~~
fs/ecryptfs/keystore.c:1899:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&(candidate_auth_tok->token.private_key),
^~~~~~
fs/ecryptfs/keystore.c:1907:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&(candidate_auth_tok->token.password),
^~~~~~
fs/ecryptfs/keystore.c:1907:3: note: Call to function 'memcpy' is insecure as it does not