CC: llvm(a)lists.linux.dev
CC: kbuild-all(a)lists.01.org
BCC: lkp(a)intel.com
In-Reply-To: <20220227215408.3180023-1-arnd(a)kernel.org>
References: <20220227215408.3180023-1-arnd(a)kernel.org>
TO: Arnd Bergmann <arnd(a)kernel.org>
TO: linux-kbuild(a)vger.kernel.org
CC: Arnd Bergmann <arnd(a)arndb.de>
CC: Masahiro Yamada <masahiroy(a)kernel.org>
CC: llvm(a)lists.linux.dev
CC: Jonathan Corbet <corbet(a)lwn.net>
CC: Federico Vaga <federico.vaga(a)vaga.pv.it>
CC: Alex Shi <alexs(a)kernel.org>
CC: Hu Haowen <src.res(a)email.cn>
CC: Michal Marek <michal.lkml(a)markovi.net>
CC: Nick Desaulniers <ndesaulniers(a)google.com>
CC: linux-doc(a)vger.kernel.org
CC: linux-kernel(a)vger.kernel.org
CC: linux-doc-tw-discuss(a)lists.sourceforge.net
CC: linux-arm-kernel(a)lists.infradead.org
CC: intel-gfx(a)lists.freedesktop.org
CC: dri-devel(a)lists.freedesktop.org
CC: greybus-dev(a)lists.linaro.org
CC: linux-staging(a)lists.linux.dev
CC: linux-btrfs(a)vger.kernel.org
Hi Arnd,
I love your patch! Perhaps something to improve:
[auto build test WARNING on arm64/for-next/core]
[also build test WARNING on drm-intel/for-linux-next staging/staging-testing
kdave/for-next soc/for-next linus/master v5.17-rc6]
[cannot apply to masahiroy-kbuild/for-next srcres258-doc/doc-zh-tw next-20220225]
[If your patch is applied to the wrong git tree, kindly drop us a note.
And when submitting patch, we suggest to use '--base' as documented in
https://git-scm.com/docs/git-format-patch]
url:
https://github.com/0day-ci/linux/commits/Arnd-Bergmann/Kbuild-remove-std-...
base:
https://git.kernel.org/pub/scm/linux/kernel/git/arm64/linux.git for-next/core
:::::: branch date: 17 hours ago
:::::: commit date: 17 hours ago
config: riscv-randconfig-c006-20220227
(
https://download.01.org/0day-ci/archive/20220228/202202282249.aKeM5wOk-lk...)
compiler: clang version 15.0.0 (
https://github.com/llvm/llvm-project
d271fc04d5b97b12e6b797c6067d3c96a8d7470e)
reproduce (this is a W=1 build):
wget
https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O
~/bin/make.cross
chmod +x ~/bin/make.cross
# install riscv cross compiling tool for clang build
# apt-get install binutils-riscv64-linux-gnu
#
https://github.com/0day-ci/linux/commit/c34e5f15d634547ada0607723cd7242fb...
git remote add linux-review
https://github.com/0day-ci/linux
git fetch --no-tags linux-review
Arnd-Bergmann/Kbuild-remove-std-gnu89-from-compiler-arguments/20220228-055556
git checkout c34e5f15d634547ada0607723cd7242fb8e527d5
# save the config file to linux build tree
COMPILER_INSTALL_PATH=$HOME/0day COMPILER=clang make.cross ARCH=riscv
clang-analyzer
If you fix the issue, kindly add following tag as appropriate
Reported-by: kernel test robot <lkp(a)intel.com>
clang-analyzer warnings: (new ones prefixed by >>)
include/linux/blkdev.h:500:3: note: Returning without writing to
'q->limits.zoned', which participates in a condition later
return true;
^
include/linux/blkdev.h:508:9: note: Returning from 'blk_queue_is_zoned'
return blk_queue_is_zoned(q) ? q->limits.chunk_sectors : 0;
^~~~~~~~~~~~~~~~~~~~~
include/linux/blkdev.h:508:9: note: '?' condition is true
include/linux/blkdev.h:508:2: note: Returning without writing to
'q->limits.zoned', which participates in a condition later
return blk_queue_is_zoned(q) ? q->limits.chunk_sectors : 0;
^
block/blk-zoned.c:195:26: note: Returning from 'blk_queue_zone_sectors'
sector_t zone_sectors = blk_queue_zone_sectors(q);
^~~~~~~~~~~~~~~~~~~~~~~~~
block/blk-zoned.c:202:6: note: Assuming 'need_reset' is non-null
if (!need_reset)
^~~~~~~~~~~
block/blk-zoned.c:202:2: note: Taking false branch
if (!need_reset)
^
block/blk-zoned.c:208:6: note: Assuming 'ret' is >= 0
if (ret < 0)
^~~~~~~
block/blk-zoned.c:208:2: note: Taking false branch
if (ret < 0)
^
block/blk-zoned.c:212:9: note: 'sector' is < 'capacity'
while (sector < capacity) {
^~~~~~
block/blk-zoned.c:212:2: note: Loop condition is true. Entering loop body
while (sector < capacity) {
^
block/blk-zoned.c:213:17: note: Calling 'blk_queue_zone_no'
if (!test_bit(blk_queue_zone_no(q, sector), need_reset)) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/blkdev.h:520:7: note: Calling 'blk_queue_is_zoned'
if (!blk_queue_is_zoned(q))
^~~~~~~~~~~~~~~~~~~~~
include/linux/blkdev.h:497:10: note: Calling 'blk_queue_zoned_model'
switch (blk_queue_zoned_model(q)) {
^~~~~~~~~~~~~~~~~~~~~~~~
include/linux/blkdev.h:490:2: note: Taking true branch
if (IS_ENABLED(CONFIG_BLK_DEV_ZONED))
^
include/linux/blkdev.h:491:3: note: Returning without writing to
'q->limits.zoned', which participates in a condition later
return q->limits.zoned;
^
include/linux/blkdev.h:491:3: note: Returning the value 2, which participates in a
condition later
return q->limits.zoned;
^~~~~~~~~~~~~~~~~~~~~~
include/linux/blkdev.h:497:10: note: Returning from 'blk_queue_zoned_model'
switch (blk_queue_zoned_model(q)) {
^~~~~~~~~~~~~~~~~~~~~~~~
include/linux/blkdev.h:497:2: note: Control jumps to 'case BLK_ZONED_HM:' at
line 499
switch (blk_queue_zoned_model(q)) {
^
include/linux/blkdev.h:500:3: note: Returning the value 1, which participates in a
condition later
return true;
^~~~~~~~~~~
include/linux/blkdev.h:520:7: note: Returning from 'blk_queue_is_zoned'
if (!blk_queue_is_zoned(q))
^~~~~~~~~~~~~~~~~~~~~
include/linux/blkdev.h:520:2: note: Taking false branch
if (!blk_queue_is_zoned(q))
^
include/linux/blkdev.h:522:19: note: '?' condition is false
return sector >> ilog2(q->limits.chunk_sectors);
^
include/linux/log2.h:158:2: note: expanded from macro 'ilog2'
__builtin_constant_p(n) ? \
^
include/linux/blkdev.h:522:19: note: '?' condition is true
return sector >> ilog2(q->limits.chunk_sectors);
^
include/linux/log2.h:161:2: note: expanded from macro 'ilog2'
(sizeof(n) <= 4) ? \
^
include/linux/blkdev.h:522:19: note: Calling '__ilog2_u32'
return sector >> ilog2(q->limits.chunk_sectors);
^
include/linux/log2.h:162:2: note: expanded from macro 'ilog2'
__ilog2_u32(n) : \
^~~~~~~~~~~~~~
include/linux/log2.h:24:2: note: Returning the value -1
return fls(n) - 1;
^~~~~~~~~~~~~~~~~
include/linux/blkdev.h:522:19: note: Returning from '__ilog2_u32'
return sector >> ilog2(q->limits.chunk_sectors);
^
include/linux/log2.h:162:2: note: expanded from macro 'ilog2'
__ilog2_u32(n) : \
^~~~~~~~~~~~~~
include/linux/blkdev.h:522:16: note: The result of the right shift is undefined because
the right operand is negative
return sector >> ilog2(q->limits.chunk_sectors);
^
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
20 warnings generated.
> fs/pstore/platform.c:360:3: warning: Call to function
'memcpy' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(psinfo->buf, big_oops_buf, hsize);
^~~~~~
fs/pstore/platform.c:360:3: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(psinfo->buf, big_oops_buf, hsize);
^~~~~~
fs/pstore/platform.c:361:3: warning: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(psinfo->buf + hsize, big_oops_buf + diff,
^~~~~~
fs/pstore/platform.c:361:3: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(psinfo->buf + hsize, big_oops_buf + diff,
^~~~~~
fs/pstore/platform.c:365:3: warning: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(psinfo->buf, big_oops_buf, total_len);
^~~~~~
fs/pstore/platform.c:365:3: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(psinfo->buf, big_oops_buf, total_len);
^~~~~~
> fs/pstore/platform.c:373:2: warning: Call to function
'memset' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(record, 0, sizeof(*record));
^~~~~~
fs/pstore/platform.c:373:2: note: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(record, 0, sizeof(*record));
^~~~~~
> fs/pstore/platform.c:436:17: warning: Call to function
'snprintf' is insecure as it does not provide security checks introduced in the
C11 standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
header_size = snprintf(dst, dst_size, "%s#%d Part%u\n", why,
^~~~~~~~
fs/pstore/platform.c:436:17: note: Call to function 'snprintf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
header_size = snprintf(dst, dst_size, "%s#%d Part%u\n", why,
^~~~~~~~
fs/pstore/platform.c:709:2: warning: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(workspace + unzipped_len, record->buf + record->size,
^~~~~~
fs/pstore/platform.c:709:2: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(workspace + unzipped_len, record->buf + record->size,
^~~~~~
Suppressed 14 warnings (14 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
crypto/crypto_null.c:32:2: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dst, src, slen);
^~~~~~
crypto/crypto_null.c:32:2: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(dst, src, slen);
^~~~~~
crypto/crypto_null.c:73:2: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dst, src, NULL_BLOCK_SIZE);
^~~~~~
crypto/crypto_null.c:73:2: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(dst, src, NULL_BLOCK_SIZE);
^~~~~~
crypto/crypto_null.c:85:4: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(walk.dst.virt.addr, walk.src.virt.addr,
^~~~~~
crypto/crypto_null.c:85:4: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(walk.dst.virt.addr, walk.src.virt.addr,
^~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
20 warnings generated.
crypto/md4.c:160:3: warning: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy((char *)mctx->block + (sizeof(mctx->block) - avail),
^~~~~~
crypto/md4.c:160:3: note: Call to function 'memcpy' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memcpy_s' in
case of C11
memcpy((char *)mctx->block + (sizeof(mctx->block) - avail),
^~~~~~
crypto/md4.c:165:2: warning: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy((char *)mctx->block + (sizeof(mctx->block) - avail),
^~~~~~
crypto/md4.c:165:2: note: Call to function 'memcpy' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memcpy_s' in
case of C11
memcpy((char *)mctx->block + (sizeof(mctx->block) - avail),
^~~~~~
crypto/md4.c:173:3: warning: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(mctx->block, data, sizeof(mctx->block));
^~~~~~
crypto/md4.c:173:3: note: Call to function 'memcpy' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memcpy_s' in
case of C11
memcpy(mctx->block, data, sizeof(mctx->block));
^~~~~~
crypto/md4.c:179:2: warning: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(mctx->block, data, len);
^~~~~~
crypto/md4.c:179:2: note: Call to function 'memcpy' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memcpy_s' in
case of C11
memcpy(mctx->block, data, len);
^~~~~~
crypto/md4.c:193:3: warning: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(p, 0x00, padding + sizeof (u64));
^~~~~~
crypto/md4.c:193:3: note: Call to function 'memset' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memset_s' in
case of C11
memset(p, 0x00, padding + sizeof (u64));
^~~~~~
crypto/md4.c:199:2: warning: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(p, 0, padding);
^~~~~~
crypto/md4.c:199:2: note: Call to function 'memset' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memset_s' in
case of C11
memset(p, 0, padding);
^~~~~~
crypto/md4.c:206:2: warning: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(out, mctx->hash, sizeof(mctx->hash));
^~~~~~
crypto/md4.c:206:2: note: Call to function 'memcpy' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memcpy_s' in
case of C11
memcpy(out, mctx->hash, sizeof(mctx->hash));
^~~~~~
crypto/md4.c:207:2: warning: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(mctx, 0, sizeof(*mctx));
^~~~~~
crypto/md4.c:207:2: note: Call to function 'memset' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memset_s' in
case of C11
memset(mctx, 0, sizeof(*mctx));
^~~~~~
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
29 warnings generated.
kernel/futex/waitwake.c:218:17: warning: The left operand of '==' is a garbage
value [clang-analyzer-core.UndefinedBinaryOperatorResult]
return oldval == cmparg;
^
kernel/futex/waitwake.c:249:15: note: Assuming 'ret' is equal to 0
if (unlikely(ret != 0))
^
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
kernel/futex/waitwake.c:249:2: note: Taking false branch
if (unlikely(ret != 0))
^
kernel/futex/waitwake.c:252:15: note: Assuming 'ret' is equal to 0
if (unlikely(ret != 0))
--
^
include/linux/bitops.h:155:10: note: Calling 'fls'
return fls(l);
^~~~~~
include/asm-generic/bitops/fls.h:15:2: note: 'r' initialized to 32
int r = 32;
^~~~~
include/asm-generic/bitops/fls.h:17:6: note: Assuming 'x' is not equal to 0,
which participates in a condition later
if (!x)
^~
include/asm-generic/bitops/fls.h:17:2: note: Taking false branch
if (!x)
^
include/asm-generic/bitops/fls.h:19:6: note: Assuming the condition is false
if (!(x & 0xffff0000u)) {
^~~~~~~~~~~~~~~~~~
include/asm-generic/bitops/fls.h:19:2: note: Taking false branch
if (!(x & 0xffff0000u)) {
^
include/asm-generic/bitops/fls.h:23:6: note: Assuming the condition is false
if (!(x & 0xff000000u)) {
^~~~~~~~~~~~~~~~~~
include/asm-generic/bitops/fls.h:23:2: note: Taking false branch
if (!(x & 0xff000000u)) {
^
include/asm-generic/bitops/fls.h:27:6: note: Assuming the condition is false
if (!(x & 0xf0000000u)) {
^~~~~~~~~~~~~~~~~~
include/asm-generic/bitops/fls.h:27:2: note: Taking false branch
if (!(x & 0xf0000000u)) {
^
include/asm-generic/bitops/fls.h:31:6: note: Assuming the condition is false
if (!(x & 0xc0000000u)) {
^~~~~~~~~~~~~~~~~~
include/asm-generic/bitops/fls.h:31:2: note: Taking false branch
if (!(x & 0xc0000000u)) {
^
include/asm-generic/bitops/fls.h:35:6: note: Assuming the condition is false
if (!(x & 0x80000000u)) {
^~~~~~~~~~~~~~~~~~
include/asm-generic/bitops/fls.h:35:2: note: Taking false branch
if (!(x & 0x80000000u)) {
^
include/asm-generic/bitops/fls.h:39:2: note: Returning the value 32 (loaded from
'r'), which participates in a condition later
return r;
^~~~~~~~
include/asm-generic/bitops/fls.h:39:2: note: Returning the value 32 (loaded from
'r')
return r;
^~~~~~~~
include/linux/bitops.h:155:10: note: Returning from 'fls'
return fls(l);
^~~~~~
include/linux/bitops.h:155:3: note: Returning the value 32, which participates in a
condition later
return fls(l);
^~~~~~~~~~~~~
include/linux/bitops.h:155:3: note: Returning the value 32
return fls(l);
^~~~~~~~~~~~~
arch/riscv/mm/context.c:225:14: note: Returning from 'fls_long'
asid_bits = fls_long(asid_bits);
^~~~~~~~~~~~~~~~~~~
arch/riscv/mm/context.c:225:2: note: The value 32 is assigned to 'asid_bits'
asid_bits = fls_long(asid_bits);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
arch/riscv/mm/context.c:236:6: note: 'asid_bits' is 32
if (asid_bits) {
^~~~~~~~~
arch/riscv/mm/context.c:236:2: note: Taking true branch
if (asid_bits) {
^
arch/riscv/mm/context.c:237:17: note: The result of the left shift is undefined due to
shifting by '32', which is greater or equal to the width of type 'int'
num_asids = 1 << asid_bits;
^ ~~~~~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
53 warnings generated.
> lib/test_printf.c:49:2: warning: Call to function
'memset' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(alloced_buffer, FILL_CHAR, BUF_SIZE + 2*PAD_SIZE);
^~~~~~
lib/test_printf.c:49:2: note: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(alloced_buffer, FILL_CHAR, BUF_SIZE + 2*PAD_SIZE);
^~~~~~
> lib/test_printf.c:51:8: warning: Call to function
'vsnprintf' is insecure as it does not provide security checks introduced in the
C11 standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'vsnprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = vsnprintf(test_buffer, bufsize, fmt, aq);
^~~~~~~~~
lib/test_printf.c:51:8: note: Call to function 'vsnprintf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'vsnprintf_s' in case of C11
ret = vsnprintf(test_buffer, bufsize, fmt, aq);
^~~~~~~~~
> lib/test_printf.c:267:11: warning: Call to function
'snprintf' is insecure as it does not provide security checks introduced in the
C11 standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
nchars = snprintf(buf, len, "%p", p);
^~~~~~~~
lib/test_printf.c:267:11: note: Call to function 'snprintf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
nchars = snprintf(buf, len, "%p", p);
^~~~~~~~
lib/test_printf.c:639:2: warning: Call to function 'snprintf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(cmp_buf + size, BUF_SIZE - size, ")");
^~~~~~~~
lib/test_printf.c:639:2: note: Call to function 'snprintf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
snprintf(cmp_buf + size, BUF_SIZE - size, ")");
^~~~~~~~
lib/test_printf.c:681:2: warning: Call to function 'snprintf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(cmp_buffer, BUF_SIZE, "%#lx", (unsigned long) gfp);
^~~~~~~~
lib/test_printf.c:681:2: note: Call to function 'snprintf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
snprintf(cmp_buffer, BUF_SIZE, "%#lx", (unsigned long) gfp);
^~~~~~~~
lib/test_printf.c:684:2: warning: Call to function 'snprintf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(cmp_buffer, BUF_SIZE, "__GFP_ATOMIC|%#lx",
^~~~~~~~
lib/test_printf.c:684:2: note: Call to function 'snprintf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
snprintf(cmp_buffer, BUF_SIZE, "__GFP_ATOMIC|%#lx",
^~~~~~~~
Suppressed 47 warnings (34 in non-user code, 13 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
56 warnings generated.
fs/pipe.c:490:24: warning: Value stored to 'buf' during its initialization is
never read [clang-analyzer-deadcode.DeadStores]
struct pipe_buffer *buf = &pipe->bufs[head & mask];
^~~ ~~~~~~~~~~~~~~~~~~~~~~~~
fs/pipe.c:490:24: note: Value stored to 'buf' during its initialization is
never read
struct pipe_buffer *buf = &pipe->bufs[head & mask];
^~~ ~~~~~~~~~~~~~~~~~~~~~~~~
fs/pipe.c:1277:4: warning: Call to function 'memcpy' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memcpy_s' in
case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(bufs, pipe->bufs + t,
^~~~~~
fs/pipe.c:1277:4: note: Call to function 'memcpy' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memcpy_s' in
case of C11
memcpy(bufs, pipe->bufs + t,
^~~~~~
fs/pipe.c:1282:5: warning: Call to function 'memcpy' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memcpy_s' in
case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(bufs + tsize, pipe->bufs,
^~~~~~
fs/pipe.c:1282:5: note: Call to function 'memcpy' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memcpy_s' in
case of C11
memcpy(bufs + tsize, pipe->bufs,
^~~~~~
fs/pipe.c:1284:4: warning: Call to function 'memcpy' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memcpy_s' in
case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(bufs, pipe->bufs + t,
^~~~~~
fs/pipe.c:1284:4: note: Call to function 'memcpy' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memcpy_s' in
case of C11
memcpy(bufs, pipe->bufs + t,
^~~~~~
include/linux/log2.h:57:13: warning: The result of the left shift is undefined due to
shifting by '32', which is greater or equal to the width of type 'unsigned
long' [clang-analyzer-core.UndefinedBinaryOperatorResult]
return 1UL << fls_long(n - 1);
^
fs/pipe.c:1383:7: note: 'pipe' is non-null
if (!pipe)
^~~~
fs/pipe.c:1383:2: note: Taking false branch
if (!pipe)
^
fs/pipe.c:1388:2: note: Control jumps to 'case 1031:' at line 1389
switch (cmd) {
^
fs/pipe.c:1390:9: note: Calling 'pipe_set_size'
ret = pipe_set_size(pipe, arg);
^~~~~~~~~~~~~~~~~~~~~~~~
fs/pipe.c:1320:9: note: Calling 'round_pipe_size'
size = round_pipe_size(arg);
^~~~~~~~~~~~~~~~~~~~
fs/pipe.c:1233:6: note: Assuming the condition is false
if (size > (1U << 31))
^~~~~~~~~~~~~~~~~
fs/pipe.c:1233:2: note: Taking false branch
if (size > (1U << 31))
^
fs/pipe.c:1237:6: note: Assuming the condition is false
if (size < PAGE_SIZE)
^~~~~~~~~~~~~~~~
fs/pipe.c:1237:2: note: Taking false branch
if (size < PAGE_SIZE)
^
fs/pipe.c:1240:9: note: '?' condition is false
return roundup_pow_of_two(size);
^
include/linux/log2.h:176:2: note: expanded from macro 'roundup_pow_of_two'
__builtin_constant_p(n) ? ( \
^
fs/pipe.c:1240:9: note: Calling '__roundup_pow_of_two'
return roundup_pow_of_two(size);
^
include/linux/log2.h:180:2: note: expanded from macro 'roundup_pow_of_two'
__roundup_pow_of_two(n) \
^~~~~~~~~~~~~~~~~~~~~~~
include/linux/log2.h:57:16: note: Calling 'fls_long'
return 1UL << fls_long(n - 1);
^~~~~~~~~~~~~~~
include/linux/bitops.h:154:2: note: Taking true branch
if (sizeof(l) == 4)
^
include/linux/bitops.h:155:10: note: Calling 'fls'
return fls(l);
--
^
include/asm-generic/bitops/fls.h:39:2: note: Returning the value 32 (loaded from
'r')
return r;
^~~~~~~~
include/linux/bitops.h:155:10: note: Returning from 'fls'
return fls(l);
^~~~~~
include/linux/bitops.h:155:3: note: Returning the value 32
return fls(l);
^~~~~~~~~~~~~
include/linux/log2.h:57:16: note: Returning from 'fls_long'
return 1UL << fls_long(n - 1);
^~~~~~~~~~~~~~~
include/linux/log2.h:57:13: note: The result of the left shift is undefined due to
shifting by '32', which is greater or equal to the width of type 'unsigned
long'
return 1UL << fls_long(n - 1);
^ ~~~~~~~~~~~~~~~
Suppressed 51 warnings (46 in non-user code, 5 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
46 warnings generated.
crypto/drbg.c:246:17: warning: Value stored to 'entropylen' during its
initialization is never read [clang-analyzer-deadcode.DeadStores]
unsigned short entropylen = drbg_sec_strength(drbg->core->flags);
^~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
crypto/drbg.c:246:17: note: Value stored to 'entropylen' during its
initialization is never read
unsigned short entropylen = drbg_sec_strength(drbg->core->flags);
^~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
crypto/drbg.c:261:3: warning: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(drbg->prev, entropy, entropylen);
^~~~~~
crypto/drbg.c:261:3: note: Call to function 'memcpy' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memcpy_s' in
case of C11
memcpy(drbg->prev, entropy, entropylen);
^~~~~~
crypto/drbg.c:269:2: warning: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(drbg->prev, entropy, entropylen);
^~~~~~
crypto/drbg.c:269:2: note: Call to function 'memcpy' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memcpy_s' in
case of C11
memcpy(drbg->prev, entropy, entropylen);
^~~~~~
crypto/drbg.c:666:3: warning: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(drbg->V, 1, drbg_statelen(drbg));
^~~~~~
crypto/drbg.c:666:3: note: Call to function 'memset' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memset_s' in
case of C11
memset(drbg->V, 1, drbg_statelen(drbg));
^~~~~~
crypto/drbg.c:736:3: warning: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf + len, drbg->V, outlen);
^~~~~~
crypto/drbg.c:736:3: note: Call to function 'memcpy' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memcpy_s' in
case of C11
memcpy(buf + len, drbg->V, outlen);
^~~~~~
crypto/drbg.c:1200:4: warning: Value stored to 'ret' is never read
[clang-analyzer-deadcode.DeadStores]
ret = crypto_rng_get_bytes(drbg->jent,
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
crypto/drbg.c:1200:4: note: Value stored to 'ret' is never read
ret = crypto_rng_get_bytes(drbg->jent,
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
crypto/drbg.c:1242:3: warning: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(drbg->V, 0, drbg_statelen(drbg));
^~~~~~
crypto/drbg.c:1242:3: note: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(drbg->V, 0, drbg_statelen(drbg));
^~~~~~
crypto/drbg.c:1243:3: warning: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(drbg->C, 0, drbg_statelen(drbg));
^~~~~~
crypto/drbg.c:1243:3: note: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(drbg->C, 0, drbg_statelen(drbg));
^~~~~~
crypto/drbg.c:2081:2: warning: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(alg->base.cra_name, "stdrng", 6);
^~~~~~
crypto/drbg.c:2081:2: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(alg->base.cra_name, "stdrng", 6);
^~~~~~
crypto/drbg.c:2083:3: warning: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(alg->base.cra_driver_name, "drbg_pr_", 8);
^~~~~~
crypto/drbg.c:2083:3: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(alg->base.cra_driver_name, "drbg_pr_", 8);
^~~~~~
crypto/drbg.c:2086:3: warning: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(alg->base.cra_driver_name, "drbg_nopr_", 10);
^~~~~~
crypto/drbg.c:2086:3: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(alg->base.cra_driver_name, "drbg_nopr_", 10);
^~~~~~
crypto/drbg.c:2089:2: warning: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(alg->base.cra_driver_name + pos, core->cra_name,
^~~~~~
crypto/drbg.c:2089:2: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(alg->base.cra_driver_name + pos, core->cra_name,
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
49 warnings generated.
Suppressed 49 warnings (49 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
49 warnings generated.
Suppressed 49 warnings (49 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
51 warnings generated.
> block/partitions/sysv68.c:77:2: warning: Call to function
'snprintf' is insecure as it does not provide security checks introduced in the
C11 standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(tmp, sizeof(tmp), "sysV68: %s(s%u)", state->name, slices);
^~~~~~~~
block/partitions/sysv68.c:77:2: note: Call to function 'snprintf' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
snprintf(tmp, sizeof(tmp), "sysV68: %s(s%u)", state->name,
slices);
^~~~~~~~
block/partitions/sysv68.c:87:4: warning: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(tmp, sizeof(tmp), "(s%u)", i);
^~~~~~~~
block/partitions/sysv68.c:87:4: note: Call to function 'snprintf' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
snprintf(tmp, sizeof(tmp), "(s%u)", i);
^~~~~~~~
Suppressed 49 warnings (49 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
53 warnings generated.
block/disk-events.c:347:11: warning: Call to function 'sprintf' is insecure as
it does not provide bounding of the memory buffer or security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
pos += sprintf(buf + pos, "%s%s",
^~~~~~~
block/disk-events.c:347:11: note: Call to function 'sprintf' is insecure as it
does not provide bounding of the memory buffer or security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'sprintf_s' in case of C11
pos += sprintf(buf + pos, "%s%s",
^~~~~~~
block/disk-events.c:352:10: warning: Call to function 'sprintf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
pos += sprintf(buf + pos, "\n");
^~~~~~~
block/disk-events.c:352:10: note: Call to function 'sprintf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
pos += sprintf(buf + pos, "\n");
^~~~~~~
block/disk-events.c:379:10: warning: Call to function 'sprintf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "-1\n");
^~~~~~~
block/disk-events.c:379:10: note: Call to function 'sprintf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
return sprintf(buf, "-1\n");
^~~~~~~
block/disk-events.c:380:9: warning: Call to function 'sprintf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%ld\n", disk->ev->poll_msecs);
^~~~~~~
block/disk-events.c:380:9: note: Call to function 'sprintf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
return sprintf(buf, "%ld\n", disk->ev->poll_msecs);
^~~~~~~
block/disk-events.c:390:17: warning: Call to function 'sscanf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sscanf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (!count || !sscanf(buf, "%ld", &intv))
^~~~~~
block/disk-events.c:390:17: note: Call to function 'sscanf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sscanf_s' in case of C11
if (!count || !sscanf(buf, "%ld", &intv))
^~~~~~
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
48 warnings generated.
include/linux/log2.h:57:13: warning: The result of the left shift is undefined due to
shifting by '32', which is greater or equal to the width of type 'unsigned
long' [clang-analyzer-core.UndefinedBinaryOperatorResult]
return 1UL << fls_long(n - 1);
^
mm/readahead.c:587:6: note: Assuming field 'ra_pages' is not equal to 0
if (!ractl->ra->ra_pages)
^~~~~~~~~~~~~~~~~~~~
mm/readahead.c:587:2: note: Taking false branch
if (!ractl->ra->ra_pages)
^
mm/readahead.c:593:6: note: Assuming the condition is false
if (folio_test_writeback(folio))
^~~~~~~~~~~~~~~~~~~~~~~~~~~
mm/readahead.c:593:2: note: Taking false branch
if (folio_test_writeback(folio))
^
mm/readahead.c:601:6: note: Assuming the condition is false
if (inode_read_congested(ractl->mapping->host))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
mm/readahead.c:601:2: note: Taking false branch
if (inode_read_congested(ractl->mapping->host))
^
mm/readahead.c:604:2: note: Taking false branch
if (blk_cgroup_congested())
^
mm/readahead.c:608:2: note: Calling 'ondemand_readahead'
ondemand_readahead(ractl, true, req_count);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
mm/readahead.c:451:6: note: Assuming 'req_size' is <= 'max_pages'
if (req_size > max_pages && bdi->io_pages > max_pages)
^~~~~~~~~~~~~~~~~~~~
mm/readahead.c:451:27: note: Left side of '&&' is false
if (req_size > max_pages && bdi->io_pages > max_pages)
^
mm/readahead.c:457:6: note: Assuming 'index' is 0
if (!index)
^~~~~~
mm/readahead.c:457:2: note: Taking true branch
if (!index)
^
mm/readahead.c:458:3: note: Control jumps to line 528
goto initial_readahead;
^
mm/readahead.c:529:13: note: Calling 'get_init_ra_size'
ra->size = get_init_ra_size(req_size, max_pages);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
mm/readahead.c:315:26: note: '?' condition is false
unsigned long newsize = roundup_pow_of_two(size);
--
crypto/ecc.c:1303:2: note: Calling 'xycz_initial_double'
xycz_initial_double(rx[1], ry[1], rx[0], ry[0], initial_z, curve);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
crypto/ecc.c:1168:6: note: 'p_initial_z' is non-null
if (p_initial_z)
^~~~~~~~~~~
crypto/ecc.c:1168:2: note: Taking true branch
if (p_initial_z)
^
crypto/ecc.c:1173:2: note: Calling 'ecc_point_double_jacobian'
ecc_point_double_jacobian(x1, y1, z, curve);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
crypto/ecc.c:1089:6: note: Assuming the condition is false
if (vli_is_zero(z1, ndigits))
^~~~~~~~~~~~~~~~~~~~~~~~
crypto/ecc.c:1089:2: note: Taking false branch
if (vli_is_zero(z1, ndigits))
^
crypto/ecc.c:1093:2: note: Calling 'vli_mod_square_fast'
vli_mod_square_fast(t4, y1, curve);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
crypto/ecc.c:982:2: note: Calling 'vli_mmod_fast'
vli_mmod_fast(result, product, curve);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
crypto/ecc.c:918:2: note: Taking false branch
if (strncmp(curve->name, "nist_", 5) != 0) {
^
crypto/ecc.c:934:2: note: Control jumps to the 'default' case at line 944
switch (ndigits) {
^
crypto/ecc.c:945:3: note: Assuming the condition is false
pr_err_ratelimited("ecc: unsupported digits size!\n");
^
include/linux/printk.h:654:2: note: expanded from macro 'pr_err_ratelimited'
printk_ratelimited(KERN_ERR pr_fmt(fmt), ##__VA_ARGS__)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/printk.h:639:6: note: expanded from macro 'printk_ratelimited'
if (__ratelimit(&_rs)) \
^~~~~~~~~~~~~~~~~
include/linux/ratelimit_types.h:41:28: note: expanded from macro '__ratelimit'
#define __ratelimit(state) ___ratelimit(state, __func__)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
crypto/ecc.c:945:3: note: Taking false branch
pr_err_ratelimited("ecc: unsupported digits size!\n");
^
include/linux/printk.h:654:2: note: expanded from macro 'pr_err_ratelimited'
printk_ratelimited(KERN_ERR pr_fmt(fmt), ##__VA_ARGS__)
^
include/linux/printk.h:639:2: note: expanded from macro 'printk_ratelimited'
if (__ratelimit(&_rs)) \
^
crypto/ecc.c:946:3: note: Returning without writing to '*result'
return false;
^
crypto/ecc.c:982:2: note: Returning from 'vli_mmod_fast'
vli_mmod_fast(result, product, curve);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
crypto/ecc.c:983:1: note: Returning without writing to '*result'
}
^
crypto/ecc.c:1093:2: note: Returning from 'vli_mod_square_fast'
vli_mod_square_fast(t4, y1, curve);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
crypto/ecc.c:1097:2: note: Calling 'vli_mod_square_fast'
vli_mod_square_fast(t4, t4, curve);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
crypto/ecc.c:981:2: note: Calling 'vli_square'
vli_square(product, left, curve->g.ndigits);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
crypto/ecc.c:455:14: note: Assuming the condition is true
for (k = 0; k < ndigits * 2 - 1; k++) {
^~~~~~~~~~~~~~~~~~~
crypto/ecc.c:455:2: note: Loop condition is true. Entering loop body
for (k = 0; k < ndigits * 2 - 1; k++) {
^
crypto/ecc.c:458:7: note: Assuming 'k' is < 'ndigits'
if (k < ndigits)
^~~~~~~~~~~
crypto/ecc.c:458:3: note: Taking true branch
if (k < ndigits)
^
crypto/ecc.c:459:4: note: The value 0 is assigned to 'min'
min = 0;
^~~~~~~
crypto/ecc.c:463:8: note: The value 0 is assigned to 'i'
for (i = min; i <= k && i <= k - i; i++) {
^~~~~~~
crypto/ecc.c:463:17: note: 'i' is <= 'k'
for (i = min; i <= k && i <= k - i; i++) {
^
crypto/ecc.c:463:17: note: Left side of '&&' is true
crypto/ecc.c:463:3: note: Loop condition is true. Entering loop body
for (i = min; i <= k && i <= k - i; i++) {
^
crypto/ecc.c:466:14: note: 1st function call argument is an uninitialized value
product = mul_64_64(left[i], left[k - i]);
^ ~~~~~~~
Suppressed 13 warnings (13 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
53 warnings generated.
> fs/erofs/super.c:93:2: warning: Call to function 'memset'
is insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(vi, 0, offsetof(struct erofs_inode, vfs_inode));
^~~~~~
fs/erofs/super.c:93:2: note: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(vi, 0, offsetof(struct erofs_inode, vfs_inode));
^~~~~~
> fs/erofs/super.c:156:3: warning: Call to function
'memcpy' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buffer + i, ptr + erofs_blkoff(*offset), cnt);
^~~~~~
fs/erofs/super.c:156:3: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(buffer + i, ptr + erofs_blkoff(*offset), cnt);
^~~~~~
fs/erofs/super.c:344:2: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&sb->s_uuid, dsb->uuid, sizeof(dsb->uuid));
^~~~~~
fs/erofs/super.c:344:2: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(&sb->s_uuid, dsb->uuid, sizeof(dsb->uuid));
^~~~~~
include/linux/log2.h:57:13: warning: The result of the left shift is undefined due to
shifting by '32', which is greater or equal to the width of type 'unsigned
long' [clang-analyzer-core.UndefinedBinaryOperatorResult]
return 1UL << fls_long(n - 1);
^
fs/erofs/super.c:589:6: note: Assuming the condition is false
if (!sb_set_blocksize(sb, EROFS_BLKSIZ)) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/erofs/super.c:589:2: note: Taking false branch
if (!sb_set_blocksize(sb, EROFS_BLKSIZ)) {
^
fs/erofs/super.c:595:6: note: Assuming 'sbi' is non-null
if (!sbi)
^~~~
fs/erofs/super.c:595:2: note: Taking false branch
if (!sbi)
^
fs/erofs/super.c:604:8: note: Calling 'erofs_read_superblock'
err = erofs_read_superblock(sb);
^~~~~~~~~~~~~~~~~~~~~~~~~
fs/erofs/super.c:291:2: note: Taking false branch
if (IS_ERR(page)) {
^
fs/erofs/super.c:302:6: note: Assuming field 'magic' is equal to
EROFS_SUPER_MAGIC_V1
if (le32_to_cpu(dsb->magic) != EROFS_SUPER_MAGIC_V1) {
^
include/linux/byteorder/generic.h:89:21: note: expanded from macro
'le32_to_cpu'
#define le32_to_cpu __le32_to_cpu
^
include/uapi/linux/byteorder/little_endian.h:35:26: note: expanded from macro
'__le32_to_cpu'
#define __le32_to_cpu(x) ((__force __u32)(__le32)(x))
^
fs/erofs/super.c:302:2: note: Taking false branch
if (le32_to_cpu(dsb->magic) != EROFS_SUPER_MAGIC_V1) {
^
fs/erofs/super.c:308:6: note: Assuming the condition is false
if (erofs_sb_has_sb_chksum(sbi)) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/erofs/super.c:308:2: note: Taking false branch
if (erofs_sb_has_sb_chksum(sbi)) {
^
fs/erofs/super.c:317:6: note: Assuming 'blkszbits' is equal to LOG_BLOCK_SIZE
if (blkszbits != LOG_BLOCK_SIZE) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/erofs/super.c:317:2: note: Taking false branch
if (blkszbits != LOG_BLOCK_SIZE) {
^
fs/erofs/super.c:323:2: note: Taking false branch
if (!check_layout_compatibility(sb, dsb))
^
fs/erofs/super.c:327:6: note: Assuming the condition is false
if (sbi->sb_size > EROFS_BLKSIZ) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/erofs/super.c:327:2: note: Taking false branch
if (sbi->sb_size > EROFS_BLKSIZ) {
^
fs/erofs/super.c:337:19: note: '?' condition is true
sbi->islotbits = ilog2(sizeof(struct erofs_inode_compact));
^
include/linux/log2.h:158:2: note: expanded from macro 'ilog2'
__builtin_constant_p(n) ? \
^
fs/erofs/super.c:337:19: note: '?' condition is false
sbi->islotbits = ilog2(sizeof(struct erofs_inode_compact));
^
include/linux/log2.h:159:3: note: expanded from macro 'ilog2'
((n) < 2 ? 0 : \
^
fs/erofs/super.c:348:6: note: Assuming 'ret' is >= 0
if (ret < 0) { /* -E2BIG */
^~~~~~~
fs/erofs/super.c:348:2: note: Taking false branch
if (ret < 0) { /* -E2BIG */
^
fs/erofs/super.c:355:6: note: Assuming the condition is false
if (erofs_sb_has_compr_cfgs(sbi))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/erofs/super.c:355:2: note: Taking false branch
if (erofs_sb_has_compr_cfgs(sbi))
^
fs/erofs/super.c:359:6: note: Assuming 'ret' is >= 0
if (ret < 0)
^~~~~~~
fs/erofs/super.c:359:2: note: Taking false branch
if (ret < 0)
^
fs/erofs/super.c:363:8: note: Calling 'erofs_init_devices'
ret = erofs_init_devices(sb, dsb);
^~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/erofs/super.c:235:6: note: Assuming the condition is false
if (!erofs_sb_has_device_table(sbi))
--
^
kernel/sched/topology.c:2251:4: note: Calling 'claim_allocations'
claim_allocations(i, sd);
^~~~~~~~~~~~~~~~~~~~~~~~
kernel/sched/topology.c:1473:16: note: Loop condition is false. Exiting loop
WARN_ON_ONCE(*per_cpu_ptr(sdd->sd, cpu) != sd);
^
include/linux/percpu-defs.h:235:2: note: expanded from macro 'per_cpu_ptr'
__verify_pcpu_ptr(ptr); \
^
include/linux/percpu-defs.h:217:37: note: expanded from macro
'__verify_pcpu_ptr'
#define __verify_pcpu_ptr(ptr) \
^
kernel/sched/topology.c:1473:2: note: Assuming '__ret_warn_on' is not equal to
0
WARN_ON_ONCE(*per_cpu_ptr(sdd->sd, cpu) != sd);
^
include/asm-generic/bug.h:179:33: note: expanded from macro 'WARN_ON_ONCE'
#define WARN_ON_ONCE(condition) WARN_ON(condition)
^~~~~~~~~~~~~~~~~~
include/asm-generic/bug.h:167:2: note: expanded from macro 'WARN_ON'
unlikely(__ret_warn_on); \
^~~~~~~~~~~~~~~~~~~~~~~
include/linux/compiler.h:78:40: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^~~~
kernel/sched/topology.c:1474:3: note: Loop condition is false. Exiting loop
*per_cpu_ptr(sdd->sd, cpu) = NULL;
^
include/linux/percpu-defs.h:235:2: note: expanded from macro 'per_cpu_ptr'
__verify_pcpu_ptr(ptr); \
^
include/linux/percpu-defs.h:217:37: note: expanded from macro
'__verify_pcpu_ptr'
#define __verify_pcpu_ptr(ptr) \
^
kernel/sched/topology.c:1476:21: note: Loop condition is false. Exiting loop
if (atomic_read(&(*per_cpu_ptr(sdd->sds, cpu))->ref))
^
include/linux/percpu-defs.h:235:2: note: expanded from macro 'per_cpu_ptr'
__verify_pcpu_ptr(ptr); \
^
include/linux/percpu-defs.h:217:37: note: expanded from macro
'__verify_pcpu_ptr'
#define __verify_pcpu_ptr(ptr) \
^
kernel/sched/topology.c:1476:6: note: Assuming the condition is false
if (atomic_read(&(*per_cpu_ptr(sdd->sds, cpu))->ref))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/sched/topology.c:1476:2: note: Taking false branch
if (atomic_read(&(*per_cpu_ptr(sdd->sds, cpu))->ref))
^
kernel/sched/topology.c:1479:21: note: Loop condition is false. Exiting loop
if (atomic_read(&(*per_cpu_ptr(sdd->sg, cpu))->ref))
^
include/linux/percpu-defs.h:235:2: note: expanded from macro 'per_cpu_ptr'
__verify_pcpu_ptr(ptr); \
^
include/linux/percpu-defs.h:217:37: note: expanded from macro
'__verify_pcpu_ptr'
#define __verify_pcpu_ptr(ptr) \
^
kernel/sched/topology.c:1479:6: note: Assuming the condition is false
if (atomic_read(&(*per_cpu_ptr(sdd->sg, cpu))->ref))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/sched/topology.c:1479:2: note: Taking false branch
if (atomic_read(&(*per_cpu_ptr(sdd->sg, cpu))->ref))
^
kernel/sched/topology.c:1482:21: note: Loop condition is false. Exiting loop
if (atomic_read(&(*per_cpu_ptr(sdd->sgc, cpu))->ref))
^
include/linux/percpu-defs.h:235:2: note: expanded from macro 'per_cpu_ptr'
__verify_pcpu_ptr(ptr); \
^
include/linux/percpu-defs.h:217:37: note: expanded from macro
'__verify_pcpu_ptr'
#define __verify_pcpu_ptr(ptr) \
^
kernel/sched/topology.c:1482:6: note: Assuming the condition is false
if (atomic_read(&(*per_cpu_ptr(sdd->sgc, cpu))->ref))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/sched/topology.c:1482:2: note: Taking false branch
if (atomic_read(&(*per_cpu_ptr(sdd->sgc, cpu))->ref))
^
kernel/sched/topology.c:1484:1: note: Returning without writing to
'sd->groups'
}
^
kernel/sched/topology.c:2251:4: note: Returning from 'claim_allocations'
claim_allocations(i, sd);
^~~~~~~~~~~~~~~~~~~~~~~~
kernel/sched/topology.c:2252:4: note: Calling 'init_sched_groups_capacity'
init_sched_groups_capacity(i, sd);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/sched/topology.c:1250:2: note: 'sg' initialized here
struct sched_group *sg = sd->groups;
^~~~~~~~~~~~~~~~~~~~~~
kernel/sched/topology.c:1252:10: note: Assuming 'sg' is null
WARN_ON(!sg);
^
include/asm-generic/bug.h:166:25: note: expanded from macro 'WARN_ON'
int __ret_warn_on = !!(condition); \
^~~~~~~~~
kernel/sched/topology.c:1257:20: note: Access to field 'group_weight' results
in a dereference of a null pointer (loaded from variable 'sg')
sg->group_weight = cpumask_weight(sched_group_span(sg));
~~ ^
> kernel/sched/topology.c:1450:2: warning: Call to function
'memset' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(d, 0, sizeof(*d));
^~~~~~
kernel/sched/topology.c:1450:2: note: Call to function 'memset' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(d, 0, sizeof(*d));
^~~~~~
Suppressed 69 warnings (68 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
67 warnings generated.
Suppressed 67 warnings (67 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
67 warnings generated.
Suppressed 67 warnings (67 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
33 warnings generated.
crypto/asymmetric_keys/asymmetric_type.c:74:9: warning: Access to field 'len'
results in a dereference of a null pointer (loaded from variable 'id_2')
[clang-analyzer-core.NullDereference]
len = id_2->len;
^~~~
crypto/asymmetric_keys/asymmetric_type.c:64:10: note: Assuming 'id_0' is null
WARN_ON(!id_0 && !id_1 && !id_2);
^
include/asm-generic/bug.h:166:25: note: expanded from macro 'WARN_ON'
int __ret_warn_on = !!(condition); \
^~~~~~~~~
crypto/asymmetric_keys/asymmetric_type.c:64:10: note: Left side of '&&'
is true
WARN_ON(!id_0 && !id_1 && !id_2);
^
crypto/asymmetric_keys/asymmetric_type.c:64:19: note: Assuming 'id_1' is null
WARN_ON(!id_0 && !id_1 && !id_2);
^
include/asm-generic/bug.h:166:25: note: expanded from macro 'WARN_ON'
int __ret_warn_on = !!(condition); \
^~~~~~~~~
crypto/asymmetric_keys/asymmetric_type.c:64:10: note: Left side of '&&'
is true
WARN_ON(!id_0 && !id_1 && !id_2);
^
crypto/asymmetric_keys/asymmetric_type.c:64:28: note: Assuming 'id_2' is null
WARN_ON(!id_0 && !id_1 && !id_2);
^
include/asm-generic/bug.h:166:25: note: expanded from macro 'WARN_ON'
int __ret_warn_on = !!(condition); \
^~~~~~~~~
crypto/asymmetric_keys/asymmetric_type.c:66:6: note: 'id_0' is null
if (id_0) {
^~~~
crypto/asymmetric_keys/asymmetric_type.c:66:2: note: Taking false branch
if (id_0) {
^
crypto/asymmetric_keys/asymmetric_type.c:69:13: note: 'id_1' is null
} else if (id_1) {
^~~~
crypto/asymmetric_keys/asymmetric_type.c:69:9: note: Taking false branch
} else if (id_1) {
^
crypto/asymmetric_keys/asymmetric_type.c:74:9: note: Access to field 'len'
results in a dereference of a null pointer (loaded from variable 'id_2')
len = id_2->len;
^~~~
crypto/asymmetric_keys/asymmetric_type.c:160:2: warning: Call to function
'memcpy' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(kid->data, val_1, len_1);
^~~~~~
crypto/asymmetric_keys/asymmetric_type.c:160:2: note: Call to function 'memcpy'
is insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(kid->data, val_1, len_1);
^~~~~~
crypto/asymmetric_keys/asymmetric_type.c:161:2: warning: Call to function
'memcpy' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(kid->data + len_1, val_2, len_2);
^~~~~~
crypto/asymmetric_keys/asymmetric_type.c:161:2: note: Call to function 'memcpy'
is insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(kid->data + len_1, val_2, len_2);
^~~~~~
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
9 warnings generated.
Suppressed 9 warnings (9 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
96 warnings generated.
init/do_mounts.c:117:7: warning: Call to function 'sscanf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sscanf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(slash + 1, "PARTNROFF=%d%c", &offset, &c)
!= 1)
^~~~~~
init/do_mounts.c:117:7: note: Call to function 'sscanf' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sscanf_s' in case of C11
if (sscanf(slash + 1, "PARTNROFF=%d%c", &offset, &c)
!= 1)
^~~~~~
init/do_mounts.c:194:2: warning: Call to function 'strcpy' is insecure as it
does not provide bounding of the memory buffer. Replace unbounded copy functions with
analogous functions that support length arguments such as 'strlcpy'. CWE-119
[clang-analyzer-security.insecureAPI.strcpy]
strcpy(s, name);
^~~~~~
init/do_mounts.c:194:2: note: Call to function 'strcpy' is insecure as it does
not provide bounding of the memory buffer. Replace unbounded copy functions with analogous
functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(s, name);
^~~~~~
init/do_mounts.c:234:6: warning: Call to function 'sscanf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sscanf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(name, "%u:%u%c", &maj, &min, &dummy) == 2 ||
^~~~~~
init/do_mounts.c:234:6: note: Call to function 'sscanf' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sscanf_s' in case of C11
if (sscanf(name, "%u:%u%c", &maj, &min, &dummy) == 2 ||
^~~~~~
init/do_mounts.c:235:6: warning: Call to function 'sscanf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sscanf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sscanf(name, "%u:%u:%u:%c", &maj, &min, &offset,
&dummy) == 3) {
^~~~~~
init/do_mounts.c:235:6: note: Call to function 'sscanf' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sscanf_s' in case of C11
sscanf(name, "%u:%u:%u:%c", &maj, &min, &offset,
&dummy) == 3) {
^~~~~~
init/do_mounts.c:373:3: warning: Call to function 'strncpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'strncpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(data_page, data, PAGE_SIZE);
^~~~~~~
init/do_mounts.c:373:3: note: Call to function 'strncpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'strncpy_s' in case of C11
strncpy(data_page, data, PAGE_SIZE);
^~~~~~~
Suppressed 91 warnings (91 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
50 warnings generated.
> fs/erofs/xattr.c:329:2: warning: Call to function
'memcpy' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(it->buffer + processed, buf, len);
^~~~~~
fs/erofs/xattr.c:329:2: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(it->buffer + processed, buf, len);
^~~~~~
fs/erofs/xattr.c:517:2: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(it->buffer + it->buffer_ofs, prefix, prefix_len);
^~~~~~
fs/erofs/xattr.c:517:2: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(it->buffer + it->buffer_ofs, prefix, prefix_len);
^~~~~~
fs/erofs/xattr.c:528:2: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(it->buffer + it->buffer_ofs, buf, len);
^~~~~~
fs/erofs/xattr.c:528:2: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(it->buffer + it->buffer_ofs, buf, len);
^~~~~~
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
52 warnings generated.
> fs/erofs/decompressor.c:175:3: warning: Call to function
'memcpy' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(tmp, inpage + *inputmargin, page_copycnt);
^~~~~~
fs/erofs/decompressor.c:175:3: note: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(tmp, inpage + *inputmargin, page_copycnt);
^~~~~~
> fs/erofs/decompressor.c:255:4: warning: Call to function
'memset' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(out + ret, 0, rq->outputsize - ret);
^~~~~~
fs/erofs/decompressor.c:255:4: note: Call to function 'memset' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(out + ret, 0, rq->outputsize - ret);
^~~~~~
fs/erofs/decompressor.c:340:3: warning: Call to function 'memcpy' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dst + rq->pageofs_out, src, righthalf);
^~~~~~
fs/erofs/decompressor.c:340:3: note: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(dst + rq->pageofs_out, src, righthalf);
^~~~~~
> fs/erofs/decompressor.c:347:4: warning: Call to function
'memmove' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memmove_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(src, src + righthalf, rq->pageofs_out);
^~~~~~~
fs/erofs/decompressor.c:347:4: note: Call to function 'memmove' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memmove_s' in case of C11
memmove(src, src + righthalf, rq->pageofs_out);
^~~~~~~
fs/erofs/decompressor.c:350:4: warning: Call to function 'memcpy' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dst, src + righthalf, rq->pageofs_out);
^~~~~~
fs/erofs/decompressor.c:350:4: note: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(dst, src + righthalf, rq->pageofs_out);
^~~~~~
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
50 warnings generated.
fs/udf/misc.c:73:4: warning: Call to function 'memmove' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memmove_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(&ad[size], ad, iinfo->i_lenAlloc);
^~~~~~~
fs/udf/misc.c:73:4: note: Call to function 'memmove' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memmove_s' in
case of C11
memmove(&ad[size], ad, iinfo->i_lenAlloc);
^~~~~~~
fs/udf/misc.c:107:5: warning: Call to function 'memmove' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memmove_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(&ea[offset - aal + size],
^~~~~~~
fs/udf/misc.c:107:5: note: Call to function 'memmove' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memmove_s' in case of C11
memmove(&ea[offset - aal + size],
^~~~~~~
fs/udf/misc.c:117:5: warning: Call to function 'memmove' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memmove_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(&ea[offset - ial + size],
^~~~~~~
fs/udf/misc.c:117:5: note: Call to function 'memmove' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memmove_s' in case of C11
memmove(&ea[offset - ial + size],
^~~~~~~
fs/udf/misc.c:128:5: warning: Call to function 'memmove' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memmove_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(&ea[offset - aal + size],
^~~~~~~
fs/udf/misc.c:128:5: note: Call to function 'memmove' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memmove_s' in case of C11
memmove(&ea[offset - aal + size],
^~~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
51 warnings generated.
fs/udf/unicode.c:176:3: warning: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(str_o, 0, str_max_len);
^~~~~~
fs/udf/unicode.c:176:3: note: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(str_o, 0, str_max_len);
^~~~~~
fs/udf/unicode.c:187:3: warning: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(str_o, 0, str_max_len);
^~~~~~
fs/udf/unicode.c:187:3: note: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(str_o, 0, str_max_len);
^~~~~~
fs/udf/unicode.c:262:4: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&str_o[str_o_len], crc, len);
^~~~~~
fs/udf/unicode.c:262:4: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(&str_o[str_o_len], crc, len);
^~~~~~
fs/udf/unicode.c:267:4: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&str_o[str_o_len], ext, ext_o_len);
^~~~~~
fs/udf/unicode.c:267:4: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(&str_o[str_o_len], ext, ext_o_len);
^~~~~~
fs/udf/unicode.c:293:2: warning: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ocu, 0, ocu_max_len);
^~~~~~
fs/udf/unicode.c:293:2: note: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(ocu, 0, ocu_max_len);
^~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
21 warnings generated.
block/badblocks.c:68:3: warning: Value stored to 'sectors' is never read
[clang-analyzer-deadcode.DeadStores]
sectors = target - s;
^ ~~~~~~~~~~
block/badblocks.c:68:3: note: Value stored to 'sectors' is never read
sectors = target - s;
^ ~~~~~~~~~~
block/badblocks.c:278:4: warning: Call to function 'memmove' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memmove_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(p + hi, p + hi + 1,
^~~~~~~
block/badblocks.c:278:4: note: Call to function 'memmove' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memmove_s' in case of C11
memmove(p + hi, p + hi + 1,
^~~~~~~
block/badblocks.c:294:4: warning: Call to function 'memmove' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memmove_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(p + hi + 1, p + hi,
^~~~~~~
block/badblocks.c:294:4: note: Call to function 'memmove' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memmove_s' in case of C11
memmove(p + hi + 1, p + hi,
^~~~~~~
block/badblocks.c:348:3: warning: Value stored to 'sectors' is never read
[clang-analyzer-deadcode.DeadStores]
sectors = target - s;
--
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
36 warnings generated.
Suppressed 36 warnings (34 in non-user code, 2 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
24 warnings generated.
kernel/time/clockevents.c:680:11: warning: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
count = snprintf(buf, PAGE_SIZE, "%s\n",
td->evtdev->name);
^~~~~~~~
kernel/time/clockevents.c:680:11: note: Call to function 'snprintf' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
count = snprintf(buf, PAGE_SIZE, "%s\n",
td->evtdev->name);
^~~~~~~~
Suppressed 23 warnings (23 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
35 warnings generated.
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
35 warnings generated.
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
35 warnings generated.
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
14 warnings generated.
lib/zstd/compress/zstd_compress_literals.c:38:5: warning: Call to function
'memcpy' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ZSTD_memcpy(ostart + flSize, src, srcSize);
^
lib/zstd/compress/../common/zstd_deps.h:32:28: note: expanded from macro
'ZSTD_memcpy'
#define ZSTD_memcpy(d,s,n) __builtin_memcpy((d),(s),(n))
^~~~~~~~~~~~~~~~
lib/zstd/compress/zstd_compress_literals.c:38:5: note: Call to function
'memcpy' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memcpy_s' in case of C11
ZSTD_memcpy(ostart + flSize, src, srcSize);
^
lib/zstd/compress/../common/zstd_deps.h:32:28: note: expanded from macro
'ZSTD_memcpy'
#define ZSTD_memcpy(d,s,n) __builtin_memcpy((d),(s),(n))
^~~~~~~~~~~~~~~~
lib/zstd/compress/zstd_compress_literals.c:89:5: warning: Call to function
'memcpy' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ZSTD_memcpy(nextHuf, prevHuf, sizeof(*prevHuf));
^
lib/zstd/compress/../common/zstd_deps.h:32:28: note: expanded from macro
'ZSTD_memcpy'
#define ZSTD_memcpy(d,s,n) __builtin_memcpy((d),(s),(n))
^~~~~~~~~~~~~~~~
lib/zstd/compress/zstd_compress_literals.c:89:5: note: Call to function
'memcpy' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memcpy_s' in case of C11
ZSTD_memcpy(nextHuf, prevHuf, sizeof(*prevHuf));
^
lib/zstd/compress/../common/zstd_deps.h:32:28: note: expanded from macro
'ZSTD_memcpy'
#define ZSTD_memcpy(d,s,n) __builtin_memcpy((d),(s),(n))
^~~~~~~~~~~~~~~~
lib/zstd/compress/zstd_compress_literals.c:121:9: warning: Call to function
'memcpy' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ZSTD_memcpy(nextHuf, prevHuf, sizeof(*prevHuf));
^
lib/zstd/compress/../common/zstd_deps.h:32:28: note: expanded from macro
'ZSTD_memcpy'
#define ZSTD_memcpy(d,s,n) __builtin_memcpy((d),(s),(n))
^~~~~~~~~~~~~~~~
lib/zstd/compress/zstd_compress_literals.c:121:9: note: Call to function
'memcpy' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memcpy_s' in case of C11
ZSTD_memcpy(nextHuf, prevHuf, sizeof(*prevHuf));
^
lib/zstd/compress/../common/zstd_deps.h:32:28: note: expanded from macro
'ZSTD_memcpy'
#define ZSTD_memcpy(d,s,n) __builtin_memcpy((d),(s),(n))
^~~~~~~~~~~~~~~~
lib/zstd/compress/zstd_compress_literals.c:125:9: warning: Call to function
'memcpy' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ZSTD_memcpy(nextHuf, prevHuf, sizeof(*prevHuf));
^
lib/zstd/compress/../common/zstd_deps.h:32:28: note: expanded from macro
'ZSTD_memcpy'
#define ZSTD_memcpy(d,s,n) __builtin_memcpy((d),(s),(n))
^~~~~~~~~~~~~~~~
lib/zstd/compress/zstd_compress_literals.c:125:9: note: Call to function
'memcpy' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memcpy_s' in case of C11
ZSTD_memcpy(nextHuf, prevHuf, sizeof(*prevHuf));
^
lib/zstd/compress/../common/zstd_deps.h:32:28: note: expanded from macro
'ZSTD_memcpy'
#define ZSTD_memcpy(d,s,n) __builtin_memcpy((d),(s),(n))
^~~~~~~~~~~~~~~~
Suppressed 10 warnings (10 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
56 warnings generated.
fs/erofs/inode.c:50:3: warning: Value stored to 'err' is never read
[clang-analyzer-deadcode.DeadStores]
err = -EOPNOTSUPP;
^ ~~~~~~~~~~~
fs/erofs/inode.c:50:3: note: Value stored to 'err' is never read
err = -EOPNOTSUPP;
^ ~~~~~~~~~~~
fs/erofs/inode.c:58:3: warning: Value stored to 'err' is never read
[clang-analyzer-deadcode.DeadStores]
err = -EOPNOTSUPP;
^ ~~~~~~~~~~~
fs/erofs/inode.c:58:3: note: Value stored to 'err' is never read
err = -EOPNOTSUPP;
^ ~~~~~~~~~~~
fs/erofs/inode.c:74:5: warning: Value stored to 'err' is never read
[clang-analyzer-deadcode.DeadStores]
err = -ENOMEM;
^ ~~~~~~~
fs/erofs/inode.c:74:5: note: Value stored to 'err' is never read
err = -ENOMEM;
^ ~~~~~~~
> fs/erofs/inode.c:77:4: warning: Call to function 'memcpy'
is insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(copied, dic, gotten);
^~~~~~
fs/erofs/inode.c:77:4: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(copied, dic, gotten);
^~~~~~
fs/erofs/inode.c:87:4: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy((u8 *)copied + gotten, kaddr, *ofs);
^~~~~~
fs/erofs/inode.c:87:4: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy((u8 *)copied + gotten, kaddr, *ofs);
^~~~~~
fs/erofs/inode.c:172:3: warning: Value stored to 'err' is never read
[clang-analyzer-deadcode.DeadStores]
err = -EOPNOTSUPP;
^ ~~~~~~~~~~~
fs/erofs/inode.c:172:3: note: Value stored to 'err' is never read
err = -EOPNOTSUPP;
^ ~~~~~~~~~~~
fs/erofs/inode.c:181:4: warning: Value stored to 'err' is never read
[clang-analyzer-deadcode.DeadStores]
err = -EOPNOTSUPP;
^ ~~~~~~~~~~~
fs/erofs/inode.c:181:4: note: Value stored to 'err' is never read
err = -EOPNOTSUPP;
^ ~~~~~~~~~~~
fs/erofs/inode.c:206:2: warning: Value stored to 'err' is never read
[clang-analyzer-deadcode.DeadStores]
err = -EFSCORRUPTED;
^ ~~~~~~~~~~~~~
fs/erofs/inode.c:206:2: note: Value stored to 'err' is never read
err = -EFSCORRUPTED;
^ ~~~~~~~~~~~~~
fs/erofs/inode.c:241:2: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(lnk, kaddr + m_pofs, inode->i_size);
^~~~~~
fs/erofs/inode.c:241:2: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(lnk, kaddr + m_pofs, inode->i_size);
^~~~~~
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
8 warnings generated.
lib/crypto/chacha.c:81:2: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(x, state, 64);
^~~~~~
lib/crypto/chacha.c:81:2: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(x, state, 64);
^~~~~~
lib/crypto/chacha.c:107:2: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(x, state, 64);
^~~~~~
lib/crypto/chacha.c:107:2: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(x, state, 64);
^~~~~~
lib/crypto/chacha.c:111:2: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&stream[0], &x[0], 16);
^~~~~~
lib/crypto/chacha.c:111:2: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(&stream[0], &x[0], 16);
^~~~~~
lib/crypto/chacha.c:112:2: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&stream[4], &x[12], 16);
^~~~~~
lib/crypto/chacha.c:112:2: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(&stream[4], &x[12], 16);
^~~~~~
Suppressed 4 warnings (4 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
19 warnings generated.
Suppressed 19 warnings (19 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
57 warnings generated.
crypto/aegis128-core.c:189:4: warning: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dst, tmp.bytes, AEGIS_BLOCK_SIZE);
^~~~~~
crypto/aegis128-core.c:189:4: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(dst, tmp.bytes, AEGIS_BLOCK_SIZE);
^~~~~~
crypto/aegis128-core.c:199:3: warning: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(msg.bytes, src, size);
^~~~~~
crypto/aegis128-core.c:199:3: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(msg.bytes, src, size);
^~~~~~
crypto/aegis128-core.c:210:3: warning: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dst, msg.bytes, size);
^~~~~~
crypto/aegis128-core.c:210:3: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(dst, msg.bytes, size);
^~~~~~
crypto/aegis128-core.c:250:4: warning: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dst, tmp.bytes, AEGIS_BLOCK_SIZE);
^~~~~~
crypto/aegis128-core.c:250:4: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(dst, tmp.bytes, AEGIS_BLOCK_SIZE);
^~~~~~
crypto/aegis128-core.c:260:3: warning: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(msg.bytes, src, size);
^~~~~~
crypto/aegis128-core.c:260:3: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(msg.bytes, src, size);
^~~~~~
crypto/aegis128-core.c:268:3: warning: Call to function 'memset' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(msg.bytes + size, 0, AEGIS_BLOCK_SIZE - size);
^~~~~~
crypto/aegis128-core.c:268:3: note: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(msg.bytes + size, 0, AEGIS_BLOCK_SIZE - size);
^~~~~~
crypto/aegis128-core.c:272:3: warning: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dst, msg.bytes, size);
^~~~~~
crypto/aegis128-core.c:272:3: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(dst, msg.bytes, size);
^~~~~~
crypto/aegis128-core.c:295:5: warning: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf.bytes + pos, src, fill);
^~~~~~
crypto/aegis128-core.c:295:5: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(buf.bytes + pos, src, fill);
^~~~~~
crypto/aegis128-core.c:307:3: warning: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf.bytes + pos, src, left);
^~~~~~
crypto/aegis128-core.c:307:3: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(buf.bytes + pos, src, left);
^~~~~~
crypto/aegis128-core.c:317:3: warning: Call to function 'memset' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buf.bytes + pos, 0, AEGIS_BLOCK_SIZE - pos);
^~~~~~
crypto/aegis128-core.c:317:3: note: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(buf.bytes + pos, 0, AEGIS_BLOCK_SIZE - pos);
^~~~~~
crypto/aegis128-core.c:374:2: warning: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ctx->key.bytes, key, AEGIS128_KEY_SIZE);
^~~~~~
crypto/aegis128-core.c:374:2: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(ctx->key.bytes, key, AEGIS128_KEY_SIZE);
^~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
20 warnings generated.
> arch/riscv/kernel/cpufeature.c:135:2: warning: Call to function
'memset' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(print_str, 0, sizeof(print_str));
^~~~~~
arch/riscv/kernel/cpufeature.c:135:2: note: Call to function 'memset' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(print_str, 0, sizeof(print_str));
^~~~~~
arch/riscv/kernel/cpufeature.c:141:2: warning: Call to function 'memset' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(print_str, 0, sizeof(print_str));
^~~~~~
arch/riscv/kernel/cpufeature.c:141:2: note: Call to function 'memset' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(print_str, 0, sizeof(print_str));
^~~~~~
Suppressed 18 warnings (18 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
36 warnings generated.
> arch/riscv/kernel/process.c:130:3: warning: Call to function
'memset' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(childregs, 0, sizeof(struct pt_regs));
^~~~~~
arch/riscv/kernel/process.c:130:3: note: Call to function 'memset' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(childregs, 0, sizeof(struct pt_regs));
^~~~~~
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
51 warnings generated.
Suppressed 51 warnings (51 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
10 warnings generated.
Suppressed 10 warnings (10 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
35 warnings generated.
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
48 warnings generated.
crypto/asymmetric_keys/public_key.c:79:8: warning: Call to function 'snprintf'
is insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
n = snprintf(alg_name, CRYPTO_MAX_ALG_NAME,
^~~~~~~~
crypto/asymmetric_keys/public_key.c:79:8: note: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
n = snprintf(alg_name, CRYPTO_MAX_ALG_NAME,
^~~~~~~~
crypto/asymmetric_keys/public_key.c:83:8: warning: Call to function 'snprintf'
is insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
n = snprintf(alg_name, CRYPTO_MAX_ALG_NAME,
^~~~~~~~
crypto/asymmetric_keys/public_key.c:83:8: note: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
n = snprintf(alg_name, CRYPTO_MAX_ALG_NAME,
^~~~~~~~
crypto/asymmetric_keys/public_key.c:91:3: warning: Call to function 'strcpy' is
insecure as it does not provide bounding of the memory buffer. Replace unbounded copy
functions with analogous functions that support length arguments such as
'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(alg_name, pkey->pkey_algo);
^~~~~~
crypto/asymmetric_keys/public_key.c:91:3: note: Call to function 'strcpy' is
insecure as it does not provide bounding of the memory buffer. Replace unbounded copy
functions with analogous functions that support length arguments such as
'strlcpy'. CWE-119
strcpy(alg_name, pkey->pkey_algo);
^~~~~~
crypto/asymmetric_keys/public_key.c:100:2: warning: Call to function 'memcpy'
is insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dst, &val, sizeof(val));
^~~~~~
crypto/asymmetric_keys/public_key.c:100:2: note: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(dst, &val, sizeof(val));
^~~~~~
crypto/asymmetric_keys/public_key.c:131:2: warning: Call to function 'memcpy'
is insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(key, pkey->key, pkey->keylen);
^~~~~~
crypto/asymmetric_keys/public_key.c:131:2: note: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(key, pkey->key, pkey->keylen);
^~~~~~
crypto/asymmetric_keys/public_key.c:135:2: warning: Call to function 'memcpy'
is insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ptr, pkey->params, pkey->paramlen);
^~~~~~
crypto/asymmetric_keys/public_key.c:135:2: note: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(ptr, pkey->params, pkey->paramlen);
^~~~~~
crypto/asymmetric_keys/public_key.c:202:2: warning: Call to function 'memcpy'
is insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(key, pkey->key, pkey->keylen);
^~~~~~
crypto/asymmetric_keys/public_key.c:202:2: note: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(key, pkey->key, pkey->keylen);
^~~~~~
crypto/asymmetric_keys/public_key.c:206:2: warning: Call to function 'memcpy'
is insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ptr, pkey->params, pkey->paramlen);
^~~~~~
crypto/asymmetric_keys/public_key.c:206:2: note: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(ptr, pkey->params, pkey->paramlen);
^~~~~~
crypto/asymmetric_keys/public_key.c:348:2: warning: Call to function 'memcpy'
is insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(key, pkey->key, pkey->keylen);
^~~~~~
crypto/asymmetric_keys/public_key.c:348:2: note: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(key, pkey->key, pkey->keylen);
^~~~~~
crypto/asymmetric_keys/public_key.c:352:2: warning: Call to function 'memcpy'
is insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ptr, pkey->params, pkey->paramlen);
^~~~~~
crypto/asymmetric_keys/public_key.c:352:2: note: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(ptr, pkey->params, pkey->paramlen);
^~~~~~
Suppressed 38 warnings (38 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
72 warnings generated.
crypto/authencesn.c:424:6: warning: Call to function 'snprintf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (snprintf(inst->alg.base.cra_name, CRYPTO_MAX_ALG_NAME,
^~~~~~~~
crypto/authencesn.c:424:6: note: Call to function 'snprintf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
if (snprintf(inst->alg.base.cra_name, CRYPTO_MAX_ALG_NAME,
^~~~~~~~
crypto/authencesn.c:429:6: warning: Call to function 'snprintf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (snprintf(inst->alg.base.cra_driver_name, CRYPTO_MAX_ALG_NAME,
^~~~~~~~
crypto/authencesn.c:429:6: note: Call to function 'snprintf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
if (snprintf(inst->alg.base.cra_driver_name, CRYPTO_MAX_ALG_NAME,
^~~~~~~~
Suppressed 70 warnings (70 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
15 warnings generated.
crypto/crypto_engine.c:534:2: warning: Call to function 'snprintf' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(engine->name, sizeof(engine->name),
^~~~~~~~
crypto/crypto_engine.c:534:2: note: Call to function 'snprintf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
snprintf(engine->name, sizeof(engine->name),
^~~~~~~~
crypto/crypto_engine.c:545:2: warning: Call to function 'memset' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
kthread_init_work(&engine->pump_requests, crypto_pump_work);
^
include/linux/kthread.h:195:3: note: expanded from macro 'kthread_init_work'
memset((work), 0, sizeof(struct kthread_work)); \
^~~~~~
crypto/crypto_engine.c:545:2: note: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
kthread_init_work(&engine->pump_requests, crypto_pump_work);
^
include/linux/kthread.h:195:3: note: expanded from macro 'kthread_init_work'
memset((work), 0, sizeof(struct kthread_work)); \
^~~~~~
Suppressed 13 warnings (13 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
> mm/kmemleak.c:610:3: warning: Call to function 'strncpy'
is insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'strncpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(object->comm, "hardirq", sizeof(object->comm));
^~~~~~~
mm/kmemleak.c:610:3: note: Call to function 'strncpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'strncpy_s' in case of C11
strncpy(object->comm, "hardirq",
sizeof(object->comm));
^~~~~~~
mm/kmemleak.c:613:3: warning: Call to function 'strncpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'strncpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(object->comm, "softirq",
sizeof(object->comm));
^~~~~~~
mm/kmemleak.c:613:3: note: Call to function 'strncpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'strncpy_s' in case of C11
strncpy(object->comm, "softirq",
sizeof(object->comm));
^~~~~~~
mm/kmemleak.c:622:3: warning: Call to function 'strncpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'strncpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(object->comm, current->comm, sizeof(object->comm));
^~~~~~~
mm/kmemleak.c:622:3: note: Call to function 'strncpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'strncpy_s' in case of C11
strncpy(object->comm, current->comm, sizeof(object->comm));
^~~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
> lib/test_meminit.c:55:3: warning: Call to function
'memset' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&p[i], GARBAGE_BYTE, size);
^~~~~~
lib/test_meminit.c:55:3: note: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(&p[i], GARBAGE_BYTE, size);
^~~~~~
> lib/test_meminit.c:245:4: warning: Call to function
'memcpy' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf_copy, buf, size);
^~~~~~
lib/test_meminit.c:245:4: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(buf_copy, buf, size);
^~~~~~
lib/test_meminit.c:292:2: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf_contents, buf, size);
^~~~~~
lib/test_meminit.c:292:2: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(buf_contents, buf, size);
^~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
2 warnings generated.
Suppressed 2 warnings (2 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
2 warnings generated.
Suppressed 2 warnings (2 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
2 warnings generated.
Suppressed 2 warnings (2 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
10 warnings generated.
Suppressed 10 warnings (10 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
35 warnings generated.
> arch/riscv/kernel/crash_dump.c:42:3: warning: Call to function
'memcpy' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, vaddr + offset, csize);
^~~~~~
arch/riscv/kernel/crash_dump.c:42:3: note: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(buf, vaddr + offset, csize);
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
36 warnings generated.
arch/riscv/kernel/efi.c:67:3: warning: Value stored to 'val' is never read
[clang-analyzer-deadcode.DeadStores]
val = pte_val(pte) & ~_PAGE_WRITE;
^
arch/riscv/kernel/efi.c:67:3: note: Value stored to 'val' is never read
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
50 warnings generated.
> arch/riscv/mm/init.c:506:3: warning: Call to function
'memset' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(nextp, 0, PAGE_SIZE);
^~~~~~
arch/riscv/mm/init.c:506:3: note: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(nextp, 0, PAGE_SIZE);
^~~~~~
Suppressed 49 warnings (46 in non-user code, 3 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
14 warnings generated.
Suppressed 14 warnings (14 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
2 warnings generated.
Suppressed 2 warnings (2 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
38 warnings generated.
lib/string_helpers.c:112:12: warning: Assigned value is garbage or undefined
[clang-analyzer-core.uninitialized.Assign]
remainder += rounding[j];
^ ~~~~~~~~~~~
lib/string_helpers.c:60:6: note: Assuming 'blk_size' is not equal to 0
if (blk_size == 0)
^~~~~~~~~~~~~
lib/string_helpers.c:60:2: note: Taking false branch
if (blk_size == 0)
^
lib/string_helpers.c:62:6: note: Assuming 'size' is not equal to 0
if (size == 0)
^~~~~~~~~
lib/string_helpers.c:62:2: note: Taking false branch
if (size == 0)
^
lib/string_helpers.c:76:2: note: Loop condition is false. Execution continues on line
81
while (blk_size >> 32) {
^
lib/string_helpers.c:81:2: note: Loop condition is false. Execution continues on line
88
while (size >> 32) {
^
lib/string_helpers.c:91:2: note: Loop condition is false. Execution continues on line
98
while (size >= divisor[units]) {
^
lib/string_helpers.c:99:14: note: Assuming the condition is true
for (j = 0; sf_cap*10 < 1000; j++)
^~~~~~~~~~~~~~~~
lib/string_helpers.c:99:2: note: Loop condition is true. Entering loop body
for (j = 0; sf_cap*10 < 1000; j++)
^
lib/string_helpers.c:99:14: note: Assuming the condition is true
for (j = 0; sf_cap*10 < 1000; j++)
^~~~~~~~~~~~~~~~
lib/string_helpers.c:99:2: note: Loop condition is true. Entering loop body
for (j = 0; sf_cap*10 < 1000; j++)
^
lib/string_helpers.c:99:14: note: Assuming the condition is true
for (j = 0; sf_cap*10 < 1000; j++)
^~~~~~~~~~~~~~~~
lib/string_helpers.c:99:2: note: Loop condition is true. Entering loop body
for (j = 0; sf_cap*10 < 1000; j++)
^
lib/string_helpers.c:99:32: note: The value 3 is assigned to 'j'
for (j = 0; sf_cap*10 < 1000; j++)
^~~
lib/string_helpers.c:99:14: note: Assuming the condition is false
for (j = 0; sf_cap*10 < 1000; j++)
^~~~~~~~~~~~~~~~
lib/string_helpers.c:99:2: note: Loop condition is false. Execution continues on line
102
for (j = 0; sf_cap*10 < 1000; j++)
^
lib/string_helpers.c:102:6: note: Assuming 'units' is not equal to
STRING_UNITS_2
if (units == STRING_UNITS_2) {
^~~~~~~~~~~~~~~~~~~~~~~
lib/string_helpers.c:102:2: note: Taking false branch
if (units == STRING_UNITS_2) {
--
60 warnings generated.
block/partitions/core.c:140:2: warning: Call to function 'snprintf' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(state->name, BDEVNAME_SIZE, "%s", hd->disk_name);
^~~~~~~~
block/partitions/core.c:140:2: note: Call to function 'snprintf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
snprintf(state->name, BDEVNAME_SIZE, "%s", hd->disk_name);
^~~~~~~~
block/partitions/core.c:141:2: warning: Call to function 'snprintf' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(state->pp_buf, PAGE_SIZE, " %s:", state->name);
^~~~~~~~
block/partitions/core.c:141:2: note: Call to function 'snprintf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
snprintf(state->pp_buf, PAGE_SIZE, " %s:", state->name);
^~~~~~~~
block/partitions/core.c:143:3: warning: Call to function 'sprintf' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(state->name, "p");
^~~~~~~
block/partitions/core.c:143:3: note: Call to function 'sprintf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
sprintf(state->name, "p");
^~~~~~~
block/partitions/core.c:147:3: warning: Call to function 'memset' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(state->parts, 0, state->limit *
sizeof(state->parts[0]));
^~~~~~
block/partitions/core.c:147:3: note: Call to function 'memset' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(state->parts, 0, state->limit *
sizeof(state->parts[0]));
^~~~~~
block/partitions/core.c:186:9: warning: Call to function 'sprintf' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", dev_to_bdev(dev)->bd_partno);
^~~~~~~
block/partitions/core.c:186:9: note: Call to function 'sprintf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
return sprintf(buf, "%d\n", dev_to_bdev(dev)->bd_partno);
^~~~~~~
block/partitions/core.c:192:9: warning: Call to function 'sprintf' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%llu\n", dev_to_bdev(dev)->bd_start_sect);
^~~~~~~
block/partitions/core.c:192:9: note: Call to function 'sprintf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
return sprintf(buf, "%llu\n", dev_to_bdev(dev)->bd_start_sect);
^~~~~~~
block/partitions/core.c:198:9: warning: Call to function 'sprintf' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", bdev_read_only(dev_to_bdev(dev)));
^~~~~~~
block/partitions/core.c:198:9: note: Call to function 'sprintf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
return sprintf(buf, "%d\n", bdev_read_only(dev_to_bdev(dev)));
^~~~~~~
block/partitions/core.c:206:9: warning: Call to function 'sprintf' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n",
^~~~~~~
block/partitions/core.c:206:9: note: Call to function 'sprintf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
return sprintf(buf, "%u\n",
^~~~~~~
block/partitions/core.c:216:9: warning: Call to function 'sprintf' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n",
^~~~~~~
block/partitions/core.c:216:9: note: Call to function 'sprintf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
return sprintf(buf, "%u\n",
^~~~~~~
Suppressed 51 warnings (51 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
49 warnings generated.
include/asm-generic/unaligned.h:32:2: warning: Undefined or garbage value returned to
caller [clang-analyzer-core.uninitialized.UndefReturn]
return le32_to_cpu(__get_unaligned_t(__le32, p));
^
lib/crypto/chacha20poly1305.c:183:2: note: Calling 'chacha_init'
chacha_init(chacha_state, k, (u8 *)iv);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/crypto/chacha.h:85:2: note: Taking false branch
if (IS_ENABLED(CONFIG_CRYPTO_ARCH_HAVE_LIB_CHACHA))
^
include/crypto/chacha.h:88:3: note: Calling 'chacha_init_generic'
chacha_init_generic(state, key, iv);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/crypto/chacha.h:78:14: note: Calling 'get_unaligned_le32'
state[13] = get_unaligned_le32(iv + 4);
^~~~~~~~~~~~~~~~~~~~~~~~~~~
include/asm-generic/unaligned.h:32:2: note: Undefined or garbage value returned to
caller
return le32_to_cpu(__get_unaligned_t(__le32, p));
^
lib/crypto/chacha20poly1305.c:41:2: warning: Call to function 'memset' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(iv, 0, 8);
^~~~~~
lib/crypto/chacha20poly1305.c:41:2: note: Call to function 'memset' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(iv, 0, 8);
^~~~~~
lib/crypto/chacha20poly1305.c:42:2: warning: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(iv + 8, nonce + 16, 8);
^~~~~~
lib/crypto/chacha20poly1305.c:42:2: note: Call to function 'memcpy' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(iv + 8, nonce + 16, 8);
^~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
13 warnings generated.
Suppressed 13 warnings (13 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
50 warnings generated.
> block/blk-mq-debugfs.c:751:2: warning: Call to function
'snprintf' is insecure as it does not provide security checks introduced in the
C11 standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(name, sizeof(name), "cpu%u", ctx->cpu);
^~~~~~~~
block/blk-mq-debugfs.c:751:2: note: Call to function 'snprintf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
snprintf(name, sizeof(name), "cpu%u", ctx->cpu);
^~~~~~~~
block/blk-mq-debugfs.c:764:2: warning: Call to function 'snprintf' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(name, sizeof(name), "hctx%u", hctx->queue_num);
^~~~~~~~
block/blk-mq-debugfs.c:764:2: note: Call to function 'snprintf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
snprintf(name, sizeof(name), "hctx%u", hctx->queue_num);
^~~~~~~~
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
86 warnings generated.
fs/file.c:61:2: warning: Call to function 'memcpy' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memcpy_s' in
case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(nfdt->open_fds, ofdt->open_fds, cpy);
^~~~~~
fs/file.c:61:2: note: Call to function 'memcpy' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memcpy_s' in
case of C11
memcpy(nfdt->open_fds, ofdt->open_fds, cpy);
^~~~~~
fs/file.c:62:2: warning: Call to function 'memset' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memset_s' in
case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset((char *)nfdt->open_fds + cpy, 0, set);
^~~~~~
fs/file.c:62:2: note: Call to function 'memset' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memset_s' in
case of C11
memset((char *)nfdt->open_fds + cpy, 0, set);
^~~~~~
fs/file.c:63:2: warning: Call to function 'memcpy' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memcpy_s' in
case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(nfdt->close_on_exec, ofdt->close_on_exec, cpy);
^~~~~~
fs/file.c:63:2: note: Call to function 'memcpy' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memcpy_s' in
case of C11
memcpy(nfdt->close_on_exec, ofdt->close_on_exec, cpy);
^~~~~~
fs/file.c:64:2: warning: Call to function 'memset' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memset_s' in
case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset((char *)nfdt->close_on_exec + cpy, 0, set);
^~~~~~
fs/file.c:64:2: note: Call to function 'memset' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memset_s' in
case of C11
memset((char *)nfdt->close_on_exec + cpy, 0, set);
^~~~~~
fs/file.c:68:2: warning: Call to function 'memcpy' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memcpy_s' in
case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(nfdt->full_fds_bits, ofdt->full_fds_bits, cpy);
^~~~~~
fs/file.c:68:2: note: Call to function 'memcpy' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memcpy_s' in
case of C11
memcpy(nfdt->full_fds_bits, ofdt->full_fds_bits, cpy);
^~~~~~
fs/file.c:69:2: warning: Call to function 'memset' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memset_s' in
case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset((char *)nfdt->full_fds_bits + cpy, 0, set);
^~~~~~
fs/file.c:69:2: note: Call to function 'memset' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memset_s' in
case of C11
memset((char *)nfdt->full_fds_bits + cpy, 0, set);
^~~~~~
fs/file.c:84:2: warning: Call to function 'memcpy' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memcpy_s' in
case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(nfdt->fd, ofdt->fd, cpy);
^~~~~~
fs/file.c:84:2: note: Call to function 'memcpy' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memcpy_s' in
case of C11
memcpy(nfdt->fd, ofdt->fd, cpy);
^~~~~~
fs/file.c:85:2: warning: Call to function 'memset' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memset_s' in
case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset((char *)nfdt->fd + cpy, 0, set);
^~~~~~
fs/file.c:85:2: note: Call to function 'memset' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memset_s' in
case of C11
memset((char *)nfdt->fd + cpy, 0, set);
^~~~~~
fs/file.c:371:2: warning: Call to function 'memset' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memset_s' in
case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(new_fds, 0, (new_fdt->max_fds - open_files) * sizeof(struct file
*));
^~~~~~
fs/file.c:371:2: note: Call to function 'memset' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memset_s' in
case of C11
memset(new_fds, 0, (new_fdt->max_fds - open_files) * sizeof(struct file
*));
^~~~~~
include/linux/log2.h:57:13: warning: The result of the left shift is undefined due to
shifting by '32', which is greater or equal to the width of type 'unsigned
long' [clang-analyzer-core.UndefinedBinaryOperatorResult]
return 1UL << fls_long(n - 1);
^
fs/file.c:296:6: note: Assuming 'newf' is non-null
if (!newf)
^~~~~
fs/file.c:296:2: note: Taking false branch
if (!newf)
^
fs/file.c:301:2: note: Loop condition is false. Exiting loop
spin_lock_init(&newf->file_lock);
^
include/linux/spinlock.h:329:35: note: expanded from macro 'spin_lock_init'
# define spin_lock_init(lock) \
^
fs/file.c:303:2: note: Loop condition is false. Exiting loop
init_waitqueue_head(&newf->resize_wait);
^
include/linux/wait.h:67:2: note: expanded from macro 'init_waitqueue_head'
do { \
^
fs/file.c:313:12: note: Left side of '||' is false
old_fdt = files_fdtable(oldf);
--
^~~~~~
lib/bitmap.c:222:2: warning: Call to function 'memmove' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memmove_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(dst, src, len * sizeof(*dst));
^~~~~~~
lib/bitmap.c:222:2: note: Call to function 'memmove' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memmove_s' in
case of C11
memmove(dst, src, len * sizeof(*dst));
^~~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
54 warnings generated.
include/linux/scatterlist.h:76:9: warning: Access to field 'page_link' results
in a dereference of a null pointer (loaded from variable 'sg')
[clang-analyzer-core.NullDereference]
return sg->page_link & SG_PAGE_LINK_MASK;
^
lib/scatterlist.c:103:27: note: 'ret' initialized to a null pointer value
struct scatterlist *sg, *ret = NULL;
^~~
lib/scatterlist.c:106:30: note: Assuming 'i' is >= 'nents'
for_each_sg(sgl, sg, nents, i)
^
include/linux/scatterlist.h:169:31: note: expanded from macro 'for_each_sg'
for (__i = 0, sg = (sglist); __i < (nr); __i++, sg = sg_next(sg))
^~~~~~~~~~
lib/scatterlist.c:106:2: note: Loop condition is false. Execution continues on line
109
for_each_sg(sgl, sg, nents, i)
^
include/linux/scatterlist.h:169:2: note: expanded from macro 'for_each_sg'
for (__i = 0, sg = (sglist); __i < (nr); __i++, sg = sg_next(sg))
^
lib/scatterlist.c:109:21: note: Passing null pointer value via 1st parameter
'sg'
BUG_ON(!sg_is_last(ret));
^
include/asm-generic/bug.h:161:45: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^~~~~~~~~
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
lib/scatterlist.c:109:10: note: Calling 'sg_is_last'
BUG_ON(!sg_is_last(ret));
^
include/asm-generic/bug.h:161:45: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^~~~~~~~~
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
include/linux/scatterlist.h:91:20: note: Passing null pointer value via 1st parameter
'sg'
return __sg_flags(sg) & SG_END;
^~
include/linux/scatterlist.h:91:9: note: Calling '__sg_flags'
return __sg_flags(sg) & SG_END;
^~~~~~~~~~~~~~
include/linux/scatterlist.h:76:9: note: Access to field 'page_link' results in
a dereference of a null pointer (loaded from variable 'sg')
return sg->page_link & SG_PAGE_LINK_MASK;
^~
lib/scatterlist.c:126:2: warning: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(sgl, 0, sizeof(*sgl) * nents);
^~~~~~
lib/scatterlist.c:126:2: note: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(sgl, 0, sizeof(*sgl) * nents);
^~~~~~
lib/scatterlist.c:292:2: warning: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(table, 0, sizeof(*table));
^~~~~~
lib/scatterlist.c:292:2: note: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(table, 0, sizeof(*table));
^~~~~~
lib/scatterlist.c:579:2: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(sgt, &append.sgt, sizeof(*sgt));
^~~~~~
lib/scatterlist.c:579:2: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(sgt, &append.sgt, sizeof(*sgt));
^~~~~~
lib/scatterlist.c:789:2: warning: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(miter, 0, sizeof(struct sg_mapping_iter));
^~~~~~
lib/scatterlist.c:789:2: note: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(miter, 0, sizeof(struct sg_mapping_iter));
^~~~~~
lib/scatterlist.c:971:4: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf + offset, miter.addr, len);
^~~~~~
lib/scatterlist.c:971:4: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(buf + offset, miter.addr, len);
^~~~~~
lib/scatterlist.c:973:4: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(miter.addr, buf + offset, len);
^~~~~~
lib/scatterlist.c:973:4: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(miter.addr, buf + offset, len);
^~~~~~
lib/scatterlist.c:1079:3: warning: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(miter.addr, 0, len);
^~~~~~
lib/scatterlist.c:1079:3: note: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(miter.addr, 0, len);
^~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
47 warnings generated.
> arch/riscv/kvm/mmu.c:352:2: warning: Call to function
'memset' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&pcache, 0, sizeof(pcache));
^~~~~~
arch/riscv/kvm/mmu.c:352:2: note: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(&pcache, 0, sizeof(pcache));
^~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
36 warnings generated.
> arch/riscv/kvm/vcpu.c:68:2: warning: Call to function
'memcpy' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(csr, reset_csr, sizeof(*csr));
^~~~~~
arch/riscv/kvm/vcpu.c:68:2: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(csr, reset_csr, sizeof(*csr));
^~~~~~
arch/riscv/kvm/vcpu.c:70:2: warning: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(cntx, reset_cntx, sizeof(*cntx));
^~~~~~
arch/riscv/kvm/vcpu.c:70:2: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(cntx, reset_cntx, sizeof(*cntx));
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
35 warnings generated.
> arch/riscv/kvm/vcpu_exit.c:287:3: warning: Call to function
'memcpy' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(run->mmio.data, data_buf, len);
^~~~~~
arch/riscv/kvm/vcpu_exit.c:287:3: note: Call to function 'memcpy' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(run->mmio.data, data_buf, len);
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
49 warnings generated.
fs/udf/file.c:53:2: warning: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(kaddr, iinfo->i_data + iinfo->i_lenEAttr, isize);
^~~~~~
fs/udf/file.c:53:2: note: Call to function 'memcpy' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memcpy_s' in
case of C11
memcpy(kaddr, iinfo->i_data + iinfo->i_lenEAttr, isize);
^~~~~~
fs/udf/file.c:54:2: warning: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(kaddr + isize, 0, PAGE_SIZE - isize);
^~~~~~
fs/udf/file.c:54:2: note: Call to function 'memset' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memset_s' in
case of C11
memset(kaddr + isize, 0, PAGE_SIZE - isize);
^~~~~~
fs/udf/file.c:79:2: warning: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(iinfo->i_data + iinfo->i_lenEAttr, kaddr, i_size_read(inode));
^~~~~~
fs/udf/file.c:79:2: note: Call to function 'memcpy' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memcpy_s' in
case of C11
memcpy(iinfo->i_data + iinfo->i_lenEAttr, kaddr, i_size_read(inode));
^~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
78 warnings generated.
fs/udf/inode.c:103:3: warning: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(pos, &iinfo->cached_extent.epos,
^~~~~~
fs/udf/inode.c:103:3: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(pos, &iinfo->cached_extent.epos,
^~~~~~
fs/udf/inode.c:124:2: warning: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&iinfo->cached_extent.epos, pos, sizeof(*pos));
^~~~~~
fs/udf/inode.c:124:2: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(&iinfo->cached_extent.epos, pos, sizeof(*pos));
^~~~~~
fs/udf/inode.c:286:3: warning: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(kaddr + iinfo->i_lenAlloc, 0x00,
^~~~~~
fs/udf/inode.c:286:3: note: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(kaddr + iinfo->i_lenAlloc, 0x00,
^~~~~~
fs/udf/inode.c:288:3: warning: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(kaddr, iinfo->i_data + iinfo->i_lenEAttr,
^~~~~~
fs/udf/inode.c:288:3: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(kaddr, iinfo->i_data + iinfo->i_lenEAttr,
^~~~~~
fs/udf/inode.c:295:2: warning: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(iinfo->i_data + iinfo->i_lenEAttr, 0x00,
^~~~~~
fs/udf/inode.c:295:2: note: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(iinfo->i_data + iinfo->i_lenEAttr, 0x00,
^~~~~~
fs/udf/inode.c:313:3: warning: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(iinfo->i_data + iinfo->i_lenEAttr, kaddr,
inode->i_size);
^~~~~~
fs/udf/inode.c:313:3: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(iinfo->i_data + iinfo->i_lenEAttr, kaddr,
inode->i_size);
^~~~~~
fs/udf/inode.c:368:2: warning: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(dbh->b_data, 0x00, inode->i_sb->s_blocksize);
^~~~~~
fs/udf/inode.c:368:2: note: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(dbh->b_data, 0x00, inode->i_sb->s_blocksize);
^~~~~~
fs/udf/inode.c:400:2: warning: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(iinfo->i_data + iinfo->i_lenEAttr, 0, iinfo->i_lenAlloc);
^~~~~~
fs/udf/inode.c:400:2: note: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(iinfo->i_data + iinfo->i_lenEAttr, 0, iinfo->i_lenAlloc);
^~~~~~
fs/udf/inode.c:468:4: warning: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(bh->b_data, 0x00, inode->i_sb->s_blocksize);
^~~~~~
fs/udf/inode.c:468:4: note: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(bh->b_data, 0x00, inode->i_sb->s_blocksize);
^~~~~~
fs/udf/inode.c:790:4: warning: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&laarr[0].extLocation, 0x00,
^~~~~~
fs/udf/inode.c:790:4: note: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(&laarr[0].extLocation, 0x00,
^~~~~~
fs/udf/inode.c:817:4: warning: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&laarr[c].extLocation, 0x00,
^~~~~~
fs/udf/inode.c:817:4: note: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(&laarr[c].extLocation, 0x00,
--
^~~~~~~~~~~~~~~~
lib/zstd/decompress/huf_decompress.c:717:5: note: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
ZSTD_memcpy(op, dt+val, 2);
^
lib/zstd/decompress/../common/zstd_deps.h:32:28: note: expanded from macro
'ZSTD_memcpy'
#define ZSTD_memcpy(d,s,n) __builtin_memcpy((d),(s),(n))
^~~~~~~~~~~~~~~~
lib/zstd/decompress/huf_decompress.c:726:5: warning: Call to function 'memcpy'
is insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ZSTD_memcpy(op, dt+val, 1);
^
lib/zstd/decompress/../common/zstd_deps.h:32:28: note: expanded from macro
'ZSTD_memcpy'
#define ZSTD_memcpy(d,s,n) __builtin_memcpy((d),(s),(n))
^~~~~~~~~~~~~~~~
lib/zstd/decompress/huf_decompress.c:726:5: note: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
ZSTD_memcpy(op, dt+val, 1);
^
lib/zstd/decompress/../common/zstd_deps.h:32:28: note: expanded from macro
'ZSTD_memcpy'
#define ZSTD_memcpy(d,s,n) __builtin_memcpy((d),(s),(n))
^~~~~~~~~~~~~~~~
lib/zstd/decompress/huf_decompress.c:1113:32: warning: Call to function
'memcpy' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (cSrcSize == dstSize) { ZSTD_memcpy(dst, cSrc, dstSize); return dstSize; } /*
not compressed */
^
lib/zstd/decompress/../common/zstd_deps.h:32:28: note: expanded from macro
'ZSTD_memcpy'
#define ZSTD_memcpy(d,s,n) __builtin_memcpy((d),(s),(n))
^~~~~~~~~~~~~~~~
lib/zstd/decompress/huf_decompress.c:1113:32: note: Call to function 'memcpy'
is insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
if (cSrcSize == dstSize) { ZSTD_memcpy(dst, cSrc, dstSize); return dstSize; } /*
not compressed */
^
lib/zstd/decompress/../common/zstd_deps.h:32:28: note: expanded from macro
'ZSTD_memcpy'
#define ZSTD_memcpy(d,s,n) __builtin_memcpy((d),(s),(n))
^~~~~~~~~~~~~~~~
lib/zstd/decompress/huf_decompress.c:1114:26: warning: Call to function
'memset' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (cSrcSize == 1) { ZSTD_memset(dst, *(const BYTE*)cSrc, dstSize); return dstSize;
} /* RLE */
^
lib/zstd/decompress/../common/zstd_deps.h:34:28: note: expanded from macro
'ZSTD_memset'
#define ZSTD_memset(d,s,n) __builtin_memset((d),(s),(n))
^~~~~~~~~~~~~~~~
lib/zstd/decompress/huf_decompress.c:1114:26: note: Call to function 'memset'
is insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
if (cSrcSize == 1) { ZSTD_memset(dst, *(const BYTE*)cSrc, dstSize); return dstSize;
} /* RLE */
^
lib/zstd/decompress/../common/zstd_deps.h:34:28: note: expanded from macro
'ZSTD_memset'
#define ZSTD_memset(d,s,n) __builtin_memset((d),(s),(n))
^~~~~~~~~~~~~~~~
Suppressed 1 warnings (1 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
21 warnings generated.
lib/crypto/blake2s-generic.c:56:3: warning: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(m, block, BLAKE2S_BLOCK_SIZE);
^~~~~~
lib/crypto/blake2s-generic.c:56:3: note: Call to function 'memcpy' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(m, block, BLAKE2S_BLOCK_SIZE);
^~~~~~
lib/crypto/blake2s-generic.c:58:3: warning: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(v, state->h, 32);
^~~~~~
lib/crypto/blake2s-generic.c:58:3: note: Call to function 'memcpy' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(v, state->h, 32);
^~~~~~
Suppressed 19 warnings (19 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
40 warnings generated.
lib/mpi/mpicoder.c:290:3: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(p, (u8 *)&alimb + lzeros, BYTES_PER_MPI_LIMB - lzeros);
^~~~~~
lib/mpi/mpicoder.c:290:3: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(p, (u8 *)&alimb + lzeros, BYTES_PER_MPI_LIMB - lzeros);
^~~~~~
lib/mpi/mpicoder.c:387:3: warning: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(p2, 0, i);
^~~~~~
lib/mpi/mpicoder.c:387:3: note: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(p2, 0, i);
^~~~~~
lib/mpi/mpicoder.c:615:4: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(s, tmp, n-!!extra);
^~~~~~
lib/mpi/mpicoder.c:615:4: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(s, tmp, n-!!extra);
^~~~~~
lib/mpi/mpicoder.c:636:4: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buffer, tmp, n);
^~~~~~
lib/mpi/mpicoder.c:636:4: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(buffer, tmp, n);
^~~~~~
lib/mpi/mpicoder.c:661:4: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(s+2, tmp, n);
^~~~~~
lib/mpi/mpicoder.c:661:4: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(s+2, tmp, n);
^~~~~~
lib/mpi/mpicoder.c:703:4: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(s, tmp, n-!!extra);
^~~~~~
lib/mpi/mpicoder.c:703:4: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(s, tmp, n-!!extra);
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
47 warnings generated.
> fs/freevxfs/vxfs_inode.c:127:2: warning: Call to function
'memcpy' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&vip->vii_org, &dip->vdi_org, sizeof(vip->vii_org));
^~~~~~
fs/freevxfs/vxfs_inode.c:127:2: note: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(&vip->vii_org, &dip->vdi_org, sizeof(vip->vii_org));
^~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
31 warnings generated.
fs/exportfs/expfs.c:260:3: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf->name, name, len);
^~~~~~
fs/exportfs/expfs.c:260:3: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(buf->name, name, len);
^~~~~~
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
13 warnings generated.
fs/nls/nls_base.c:227:10: warning: Dereference of null pointer
[clang-analyzer-core.NullDereference]
*op++ = (u8) u;
~~~~~~^~~~~~~~
fs/nls/nls_base.c:194:9: note: Assuming 'inlen' is > 0
while (inlen > 0 && maxout > 0) {
^~~~~~~~~
fs/nls/nls_base.c:194:9: note: Left side of '&&' is true
fs/nls/nls_base.c:194:22: note: Assuming 'maxout' is > 0
while (inlen > 0 && maxout > 0) {
^~~~~~~~~~
fs/nls/nls_base.c:194:2: note: Loop condition is true. Entering loop body
while (inlen > 0 && maxout > 0) {
^
fs/nls/nls_base.c:195:7: note: Calling 'get_utf16'
u = get_utf16(*pwcs, endian);
^~~~~~~~~~~~~~~~~~~~~~~~
fs/nls/nls_base.c:176:2: note: Control jumps to the 'default' case at line 177
switch (endian) {
^
fs/nls/nls_base.c:178:3: note: Returning value (loaded from 'c'), which
participates in a condition later
return c;
^~~~~~~~
fs/nls/nls_base.c:195:7: note: Returning from 'get_utf16'
u = get_utf16(*pwcs, endian);
^~~~~~~~~~~~~~~~~~~~~~~~
fs/nls/nls_base.c:196:7: note: Assuming 'u' is not equal to 0
if (!u)
^~
fs/nls/nls_base.c:196:3: note: Taking false branch
if (!u)
^
fs/nls/nls_base.c:200:7: note: Assuming 'u' is > 127
if (u > 0x7f) {
^~~~~~~~
fs/nls/nls_base.c:200:3: note: Taking true branch
if (u > 0x7f) {
^
fs/nls/nls_base.c:201:8: note: Assuming the condition is false
if ((u & SURROGATE_MASK) == SURROGATE_PAIR) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/nls/nls_base.c:201:4: note: Taking false branch
if ((u & SURROGATE_MASK) == SURROGATE_PAIR) {
^
fs/nls/nls_base.c:220:4: note: Taking false branch
if (size == -1) {
^
fs/nls/nls_base.c:194:9: note: Assuming 'inlen' is > 0
while (inlen > 0 && maxout > 0) {
^~~~~~~~~
fs/nls/nls_base.c:194:9: note: Left side of '&&' is true
fs/nls/nls_base.c:194:22: note: 'maxout' is > 0
while (inlen > 0 && maxout > 0) {
^~~~~~
fs/nls/nls_base.c:194:2: note: Loop condition is true. Entering loop body
while (inlen > 0 && maxout > 0) {
^
fs/nls/nls_base.c:195:7: note: Calling 'get_utf16'
u = get_utf16(*pwcs, endian);
^~~~~~~~~~~~~~~~~~~~~~~~
fs/nls/nls_base.c:176:2: note: Control jumps to the 'default' case at line 177
switch (endian) {
^
fs/nls/nls_base.c:178:3: note: Returning value (loaded from 'c'), which
participates in a condition later
return c;
^~~~~~~~
fs/nls/nls_base.c:195:7: note: Returning from 'get_utf16'
u = get_utf16(*pwcs, endian);
^~~~~~~~~~~~~~~~~~~~~~~~
fs/nls/nls_base.c:196:7: note: Assuming 'u' is not equal to 0
if (!u)
^~
--
47 warnings generated.
crypto/scatterwalk.c:23:2: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dst, src, nbytes);
^~~~~~
crypto/scatterwalk.c:23:2: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(dst, src, nbytes);
^~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
16 warnings generated.
lib/xz/xz_dec_bcj.c:404:2: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(b->out + b->out_pos, s->temp.buf, copy_size);
^~~~~~
lib/xz/xz_dec_bcj.c:404:2: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(b->out + b->out_pos, s->temp.buf, copy_size);
^~~~~~
lib/xz/xz_dec_bcj.c:409:2: warning: Call to function 'memmove' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memmove_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(s->temp.buf, s->temp.buf + copy_size, s->temp.size);
^~~~~~~
lib/xz/xz_dec_bcj.c:409:2: note: Call to function 'memmove' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memmove_s' in case of C11
memmove(s->temp.buf, s->temp.buf + copy_size, s->temp.size);
^~~~~~~
lib/xz/xz_dec_bcj.c:451:3: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(b->out + b->out_pos, s->temp.buf, s->temp.size);
^~~~~~
lib/xz/xz_dec_bcj.c:451:3: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(b->out + b->out_pos, s->temp.buf, s->temp.size);
^~~~~~
lib/xz/xz_dec_bcj.c:471:3: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(s->temp.buf, b->out + b->out_pos, s->temp.size);
^~~~~~
lib/xz/xz_dec_bcj.c:471:3: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(s->temp.buf, b->out + b->out_pos, s->temp.size);
^~~~~~
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
13 warnings generated.
Suppressed 13 warnings (13 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
33 warnings generated.
lib/seq_buf.c:64:9: warning: Call to function 'vsnprintf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'vsnprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len = vsnprintf(s->buffer + s->len, s->size - s->len, fmt,
args);
^~~~~~~~~
lib/seq_buf.c:64:9: note: Call to function 'vsnprintf' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'vsnprintf_s' in case of C11
len = vsnprintf(s->buffer + s->len, s->size - s->len, fmt,
args);
^~~~~~~~~
lib/seq_buf.c:152:3: warning: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(s->buffer + s->len, str, len);
^~~~~~
lib/seq_buf.c:152:3: note: Call to function 'memcpy' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memcpy_s' in
case of C11
memcpy(s->buffer + s->len, str, len);
^~~~~~
lib/seq_buf.c:199:3: warning: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(s->buffer + s->len, mem, len);
^~~~~~
lib/seq_buf.c:199:3: note: Call to function 'memcpy' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memcpy_s' in
case of C11
memcpy(s->buffer + s->len, mem, len);
^~~~~~
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
4 warnings generated.
Suppressed 4 warnings (4 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
2 warnings generated.
Suppressed 2 warnings (2 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
35 warnings generated.
lib/dump_stack.c:35:2: warning: Call to function 'vsnprintf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'vsnprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
vsnprintf(dump_stack_arch_desc_str, sizeof(dump_stack_arch_desc_str),
^~~~~~~~~
lib/dump_stack.c:35:2: note: Call to function 'vsnprintf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'vsnprintf_s' in case of C11
vsnprintf(dump_stack_arch_desc_str, sizeof(dump_stack_arch_desc_str),
^~~~~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
4 warnings generated.
Suppressed 4 warnings (4 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
48 warnings generated.
> fs/efs/symlink.c:32:2: warning: Call to function 'memcpy'
is insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(link, bh->b_data, (size > EFS_BLOCKSIZE) ? EFS_BLOCKSIZE : size);
^~~~~~
fs/efs/symlink.c:32:2: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(link, bh->b_data, (size > EFS_BLOCKSIZE) ? EFS_BLOCKSIZE : size);
^~~~~~
fs/efs/symlink.c:38:3: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(link + EFS_BLOCKSIZE, bh->b_data, size - EFS_BLOCKSIZE);
^~~~~~
fs/efs/symlink.c:38:3: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(link + EFS_BLOCKSIZE, bh->b_data, size - EFS_BLOCKSIZE);
^~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
66 warnings generated.
kernel/cred.c:267:2: warning: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(new, old, sizeof(struct cred));
^~~~~~
kernel/cred.c:267:2: note: Call to function 'memcpy' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memcpy_s' in
case of C11
memcpy(new, old, sizeof(struct cred));
^~~~~~
Suppressed 65 warnings (65 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
48 warnings generated.
kernel/reboot.c:721:9: warning: Call to function 'sprintf' is insecure as it
does not provide bounding of the memory buffer or security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", val);
^~~~~~~
kernel/reboot.c:721:9: note: Call to function 'sprintf' is insecure as it does
not provide bounding of the memory buffer or security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", val);
^~~~~~~
kernel/reboot.c:831:9: warning: Call to function 'sprintf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", reboot_cpu);
^~~~~~~
kernel/reboot.c:831:9: note: Call to function 'sprintf' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
return sprintf(buf, "%d\n", reboot_cpu);
^~~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
15 warnings generated.
kernel/async.c:125:2: warning: Value stored to 'calltime' is never read
[clang-analyzer-deadcode.DeadStores]
calltime = ktime_get();
^ ~~~~~~~~~~~
kernel/async.c:125:2: note: Value stored to 'calltime' is never read
calltime = ktime_get();
^ ~~~~~~~~~~~
kernel/async.c:272:2: warning: Value stored to 'starttime' is never read
[clang-analyzer-deadcode.DeadStores]
starttime = ktime_get();
^ ~~~~~~~~~~~
kernel/async.c:272:2: note: Value stored to 'starttime' is never read
starttime = ktime_get();
^ ~~~~~~~~~~~
Suppressed 13 warnings (13 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
62 warnings generated.
fs/ext4/resize.c:383:3: warning: Value stored to 'group' is never read
[clang-analyzer-deadcode.DeadStores]
group = group_data[0].group;
^ ~~~~~~~~~~~~~~~~~~~
fs/ext4/resize.c:383:3: note: Value stored to 'group' is never read
group = group_data[0].group;
^ ~~~~~~~~~~~~~~~~~~~
fs/ext4/resize.c:417:3: warning: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(bh->b_data, 0, sb->s_blocksize);
^~~~~~
fs/ext4/resize.c:417:3: note: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(bh->b_data, 0, sb->s_blocksize);
^~~~~~
fs/ext4/resize.c:449:7: warning: Value stored to 'count2' is never read
[clang-analyzer-deadcode.DeadStores]
for (count2 = count; count > 0;
^ ~~~~~
fs/ext4/resize.c:449:7: note: Value stored to 'count2' is never read
for (count2 = count; count > 0;
^ ~~~~~
fs/ext4/resize.c:580:4: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(gdb->b_data, sbi_array_rcu_deref(sbi,
^~~~~~
fs/ext4/resize.c:580:4: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(gdb->b_data, sbi_array_rcu_deref(sbi,
^~~~~~
fs/ext4/resize.c:903:2: warning: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(gdb_bh->b_data, 0, sb->s_blocksize);
^~~~~~
fs/ext4/resize.c:903:2: note: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(gdb_bh->b_data, 0, sb->s_blocksize);
^~~~~~
fs/ext4/resize.c:914:2: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(n_group_desc, o_group_desc,
--
^
lib/rhashtable.c:1031:20: note: '?' condition is false
ht->p.min_size = roundup_pow_of_two(params->min_size);
^
include/linux/log2.h:176:2: note: expanded from macro 'roundup_pow_of_two'
__builtin_constant_p(n) ? ( \
^
lib/rhashtable.c:1031:20: note: Calling '__roundup_pow_of_two'
ht->p.min_size = roundup_pow_of_two(params->min_size);
^
include/linux/log2.h:180:2: note: expanded from macro 'roundup_pow_of_two'
__roundup_pow_of_two(n) \
^~~~~~~~~~~~~~~~~~~~~~~
include/linux/log2.h:57:16: note: Calling 'fls_long'
return 1UL << fls_long(n - 1);
^~~~~~~~~~~~~~~
include/linux/bitops.h:154:2: note: Taking true branch
if (sizeof(l) == 4)
^
include/linux/bitops.h:155:10: note: Calling 'fls'
return fls(l);
^~~~~~
include/asm-generic/bitops/fls.h:15:2: note: 'r' initialized to 32
int r = 32;
^~~~~
include/asm-generic/bitops/fls.h:17:6: note: Assuming 'x' is not equal to 0,
which participates in a condition later
if (!x)
^~
include/asm-generic/bitops/fls.h:17:2: note: Taking false branch
if (!x)
^
include/asm-generic/bitops/fls.h:19:6: note: Assuming the condition is false
if (!(x & 0xffff0000u)) {
^~~~~~~~~~~~~~~~~~
include/asm-generic/bitops/fls.h:19:2: note: Taking false branch
if (!(x & 0xffff0000u)) {
^
include/asm-generic/bitops/fls.h:23:6: note: Assuming the condition is false
if (!(x & 0xff000000u)) {
^~~~~~~~~~~~~~~~~~
include/asm-generic/bitops/fls.h:23:2: note: Taking false branch
if (!(x & 0xff000000u)) {
^
include/asm-generic/bitops/fls.h:27:6: note: Assuming the condition is false
if (!(x & 0xf0000000u)) {
^~~~~~~~~~~~~~~~~~
include/asm-generic/bitops/fls.h:27:2: note: Taking false branch
if (!(x & 0xf0000000u)) {
^
include/asm-generic/bitops/fls.h:31:6: note: Assuming the condition is false
if (!(x & 0xc0000000u)) {
^~~~~~~~~~~~~~~~~~
include/asm-generic/bitops/fls.h:31:2: note: Taking false branch
if (!(x & 0xc0000000u)) {
^
include/asm-generic/bitops/fls.h:35:6: note: Assuming the condition is false
if (!(x & 0x80000000u)) {
^~~~~~~~~~~~~~~~~~
include/asm-generic/bitops/fls.h:35:2: note: Taking false branch
if (!(x & 0x80000000u)) {
^
include/asm-generic/bitops/fls.h:39:2: note: Returning the value 32 (loaded from
'r')
return r;
^~~~~~~~
include/linux/bitops.h:155:10: note: Returning from 'fls'
return fls(l);
^~~~~~
include/linux/bitops.h:155:3: note: Returning the value 32
return fls(l);
^~~~~~~~~~~~~
include/linux/log2.h:57:16: note: Returning from 'fls_long'
return 1UL << fls_long(n - 1);
^~~~~~~~~~~~~~~
include/linux/log2.h:57:13: note: The result of the left shift is undefined due to
shifting by '32', which is greater or equal to the width of type 'unsigned
long'
return 1UL << fls_long(n - 1);
^ ~~~~~~~~~~~~~~~
lib/rhashtable.c:792:21: warning: Value stored to 'p' during its initialization
is never read [clang-analyzer-deadcode.DeadStores]
struct rhash_head *p = iter->p;
^ ~~~~~~~
lib/rhashtable.c:792:21: note: Value stored to 'p' during its initialization is
never read
struct rhash_head *p = iter->p;
^ ~~~~~~~
lib/rhashtable.c:1025:2: warning: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ht, 0, sizeof(*ht));
^~~~~~
lib/rhashtable.c:1025:2: note: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(ht, 0, sizeof(*ht));
^~~~~~
lib/rhashtable.c:1028:2: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&ht->p, params, sizeof(*params));
^~~~~~
lib/rhashtable.c:1028:2: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(&ht->p, params, sizeof(*params));
^~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
35 warnings generated.
> arch/riscv/kvm/vcpu_sbi_v01.c:27:2: warning: Call to function
'memset' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&run->system_event, 0, sizeof(run->system_event));
^~~~~~
arch/riscv/kvm/vcpu_sbi_v01.c:27:2: note: Call to function 'memset' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(&run->system_event, 0, sizeof(run->system_event));
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
48 warnings generated.
Suppressed 48 warnings (47 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
37 warnings generated.
lib/mpi/mpih-div.c:127:18: warning: Assigned value is garbage or undefined
[clang-analyzer-core.uninitialized.Assign]
divisor_limb <<= normalization_steps;
^ ~~~~~~~~~~~~~~~~~~~
lib/mpi/mpih-div.c:37:6: note: Assuming 'dividend_size' is not equal to 0
if (!dividend_size)
^~~~~~~~~~~~~~
lib/mpi/mpih-div.c:37:2: note: Taking false branch
if (!dividend_size)
^
lib/mpi/mpih-div.c:49:4: note: Left side of '&&' is false
&& (UDIV_TIME - (2 * UMUL_TIME + 6)) * dividend_size
> UDIV_TIME) {
^
lib/mpi/mpih-div.c:122:3: note: Taking true branch
if (UDIV_NEEDS_NORMALIZATION) {
^
lib/mpi/mpih-div.c:125:26: note: Calling 'count_leading_zeros'
normalization_steps = count_leading_zeros(divisor_limb);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/count_zeros.h:25:2: note: Taking true branch
if (sizeof(x) == 4)
^
include/linux/count_zeros.h:26:3: note: Returning the value 32, which participates in a
condition later
return BITS_PER_LONG - fls(x);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/count_zeros.h:26:3: note: Returning the value 32
return BITS_PER_LONG - fls(x);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
lib/mpi/mpih-div.c:125:26: note: Returning from 'count_leading_zeros'
normalization_steps = count_leading_zeros(divisor_limb);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
lib/mpi/mpih-div.c:125:4: note: The value 32 is assigned to
'normalization_steps'
normalization_steps = count_leading_zeros(divisor_limb);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
lib/mpi/mpih-div.c:126:8: note: 'normalization_steps' is 32
if (normalization_steps) {
^~~~~~~~~~~~~~~~~~~
lib/mpi/mpih-div.c:126:4: note: Taking true branch
if (normalization_steps) {
^
lib/mpi/mpih-div.c:127:18: note: Assigned value is garbage or undefined
divisor_limb <<= normalization_steps;
^ ~~~~~~~~~~~~~~~~~~~
lib/mpi/mpih-div.c:202:12: warning: Division by zero [clang-analyzer-core.DivideZero]
return 1 / dsize;
~~^~~~~~~
lib/mpi/mpih-div.c:194:2: note: Control jumps to 'case 0:' at line 195
switch (dsize) {
^
lib/mpi/mpih-div.c:202:12: note: Division by zero
return 1 / dsize;
~~^~~~~~~
lib/mpi/mpih-div.c:475:18: warning: Assigned value is garbage or undefined
[clang-analyzer-core.uninitialized.Assign]
divisor_limb <<= normalization_steps;
^ ~~~~~~~~~~~~~~~~~~~
lib/mpi/mpih-div.c:387:6: note: Assuming 'dividend_size' is not equal to 0
if (!dividend_size)
^~~~~~~~~~~~~~
lib/mpi/mpih-div.c:387:2: note: Taking false branch
if (!dividend_size)
^
lib/mpi/mpih-div.c:399:4: note: Left side of '&&' is false
&& (UDIV_TIME - (2 * UMUL_TIME + 6)) * dividend_size
> UDIV_TIME) {
^
lib/mpi/mpih-div.c:470:3: note: Taking true branch
if (UDIV_NEEDS_NORMALIZATION) {
^
lib/mpi/mpih-div.c:473:26: note: Calling 'count_leading_zeros'
normalization_steps = count_leading_zeros(divisor_limb);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/count_zeros.h:25:2: note: Taking true branch
if (sizeof(x) == 4)
^
include/linux/count_zeros.h:26:3: note: Returning the value 32, which participates in a
condition later
return BITS_PER_LONG - fls(x);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/count_zeros.h:26:3: note: Returning the value 32
return BITS_PER_LONG - fls(x);
--
^
mm/percpu.c:2526:6: note: Taking true branch
pr_cont("%s ", empty_str);
^
include/linux/printk.h:531:2: note: expanded from macro 'pr_cont'
printk(KERN_CONT fmt, ##__VA_ARGS__)
^
include/linux/printk.h:446:26: note: expanded from macro 'printk'
#define printk(fmt, ...) printk_index_wrap(_printk, fmt, ##__VA_ARGS__)
^
include/linux/printk.h:417:3: note: expanded from macro 'printk_index_wrap'
__printk_index_emit(_fmt, NULL, NULL); \
^
include/linux/printk.h:370:3: note: expanded from macro '__printk_index_emit'
if (__builtin_constant_p(_fmt) && __builtin_constant_p(_level))
{ \
^
mm/percpu.c:2526:6: note: '?' condition is true
pr_cont("%s ", empty_str);
^
include/linux/printk.h:531:2: note: expanded from macro 'pr_cont'
printk(KERN_CONT fmt, ##__VA_ARGS__)
^
include/linux/printk.h:446:26: note: expanded from macro 'printk'
#define printk(fmt, ...) printk_index_wrap(_printk, fmt, ##__VA_ARGS__)
^
include/linux/printk.h:417:3: note: expanded from macro 'printk_index_wrap'
__printk_index_emit(_fmt, NULL, NULL); \
^
include/linux/printk.h:379:12: note: expanded from macro '__printk_index_emit'
.fmt = __builtin_constant_p(_fmt) ? (_fmt) : NULL, \
^
mm/percpu.c:2526:6: note: '?' condition is true
pr_cont("%s ", empty_str);
^
include/linux/printk.h:531:2: note: expanded from macro 'pr_cont'
printk(KERN_CONT fmt, ##__VA_ARGS__)
^
include/linux/printk.h:446:26: note: expanded from macro 'printk'
#define printk(fmt, ...) printk_index_wrap(_printk, fmt, ##__VA_ARGS__)
^
include/linux/printk.h:417:3: note: expanded from macro 'printk_index_wrap'
__printk_index_emit(_fmt, NULL, NULL); \
^
include/linux/printk.h:383:14: note: expanded from macro '__printk_index_emit'
.level = __builtin_constant_p(_level) ? (_level) :
NULL, \
^
mm/percpu.c:2526:6: note: Loop condition is false. Exiting loop
pr_cont("%s ", empty_str);
^
include/linux/printk.h:531:2: note: expanded from macro 'pr_cont'
printk(KERN_CONT fmt, ##__VA_ARGS__)
^
include/linux/printk.h:446:26: note: expanded from macro 'printk'
#define printk(fmt, ...) printk_index_wrap(_printk, fmt, ##__VA_ARGS__)
^
include/linux/printk.h:417:3: note: expanded from macro 'printk_index_wrap'
__printk_index_emit(_fmt, NULL, NULL); \
^
include/linux/printk.h:369:2: note: expanded from macro '__printk_index_emit'
do { \
^
mm/percpu.c:2521:26: note: Assuming 'unit' is >= 'unit_end'
for (unit_end += upa; unit < unit_end; unit++)
^~~~~~~~~~~~~~~
mm/percpu.c:2521:4: note: Loop condition is false. Execution continues on line 2514
for (unit_end += upa; unit < unit_end; unit++)
^
mm/percpu.c:2514:8: note: Assuming 'alloc' is >= 'alloc_end'
alloc < alloc_end; alloc++) {
^~~~~~~~~~~~~~~~~
mm/percpu.c:2513:3: note: Loop condition is false. Execution continues on line 2508
for (alloc_end += gi->nr_units / upa;
^
mm/percpu.c:2508:18: note: Assuming 'group' is < field 'nr_groups'
for (group = 0; group < ai->nr_groups; group++) {
^~~~~~~~~~~~~~~~~~~~~
mm/percpu.c:2508:2: note: Loop condition is true. Entering loop body
for (group = 0; group < ai->nr_groups; group++) {
^
mm/percpu.c:2512:23: note: Division by zero
BUG_ON(gi->nr_units % upa);
^
include/asm-generic/bug.h:161:45: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^~~~~~~~~
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
mm/percpu.c:2869:2: warning: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(group_map, 0, sizeof(group_map));
^~~~~~
mm/percpu.c:2869:2: note: Call to function 'memset' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memset_s' in
case of C11
memset(group_map, 0, sizeof(group_map));
^~~~~~
mm/percpu.c:2870:2: warning: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(group_cnt, 0, sizeof(group_cnt));
^~~~~~
mm/percpu.c:2870:2: note: Call to function 'memset' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memset_s' in
case of C11
memset(group_cnt, 0, sizeof(group_cnt));
^~~~~~
> mm/percpu.c:3143:4: warning: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ptr, __per_cpu_load, ai->static_size);
^~~~~~
mm/percpu.c:3143:4: note: Call to function 'memcpy' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memcpy_s' in
case of C11
memcpy(ptr, __per_cpu_load, ai->static_size);
^~~~~~
Suppressed 48 warnings (47 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
49 warnings generated.
drivers/video/backlight/pwm_bl.c:206:12: warning: Division by zero
[clang-analyzer-core.DivideZero]
min((int)DIV_ROUND_UP(period, fls(period)), 4096);
^
include/linux/math.h:36:22: note: expanded from macro 'DIV_ROUND_UP'
#define DIV_ROUND_UP __KERNEL_DIV_ROUND_UP
^
include/uapi/linux/const.h:34:54: note: expanded from macro
'__KERNEL_DIV_ROUND_UP'
#define __KERNEL_DIV_ROUND_UP(n, d) (((n) + (d) - 1) / (d))
^
drivers/video/backlight/pwm_bl.c:465:6: note: Assuming 'data' is non-null
if (!data) {
^~~~~
drivers/video/backlight/pwm_bl.c:465:2: note: Taking false branch
if (!data) {
^
drivers/video/backlight/pwm_bl.c:475:6: note: Assuming field 'init' is null
if (data->init) {
^~~~~~~~~~
drivers/video/backlight/pwm_bl.c:475:2: note: Taking false branch
if (data->init) {
^
drivers/video/backlight/pwm_bl.c:482:6: note: Assuming 'pb' is non-null
if (!pb) {
^~~
drivers/video/backlight/pwm_bl.c:482:2: note: Taking false branch
if (!pb) {
^
drivers/video/backlight/pwm_bl.c:498:6: note: Calling 'IS_ERR'
if (IS_ERR(pb->enable_gpio)) {
^~~~~~~~~~~~~~~~~~~~~~~
include/linux/err.h:36:9: note: Assuming the condition is false
return IS_ERR_VALUE((unsigned long)ptr);
^
include/linux/err.h:22:34: note: expanded from macro 'IS_ERR_VALUE'
#define IS_ERR_VALUE(x) unlikely((unsigned long)(void *)(x) >= (unsigned
long)-MAX_ERRNO)
~~~~~~~~~^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
include/linux/err.h:36:2: note: Returning zero, which participates in a condition
later
return IS_ERR_VALUE((unsigned long)ptr);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/video/backlight/pwm_bl.c:498:6: note: Returning from 'IS_ERR'
if (IS_ERR(pb->enable_gpio)) {
^~~~~~~~~~~~~~~~~~~~~~~
drivers/video/backlight/pwm_bl.c:498:2: note: Taking false branch
if (IS_ERR(pb->enable_gpio)) {
^
drivers/video/backlight/pwm_bl.c:504:6: note: Calling 'IS_ERR'
if (IS_ERR(pb->power_supply)) {
^~~~~~~~~~~~~~~~~~~~~~~~
include/linux/err.h:36:9: note: Assuming the condition is false
return IS_ERR_VALUE((unsigned long)ptr);
^
include/linux/err.h:22:34: note: expanded from macro 'IS_ERR_VALUE'
#define IS_ERR_VALUE(x) unlikely((unsigned long)(void *)(x) >= (unsigned
long)-MAX_ERRNO)
~~~~~~~~~^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
include/linux/err.h:36:2: note: Returning zero, which participates in a condition
later
return IS_ERR_VALUE((unsigned long)ptr);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/video/backlight/pwm_bl.c:504:6: note: Returning from 'IS_ERR'
if (IS_ERR(pb->power_supply)) {
^~~~~~~~~~~~~~~~~~~~~~~~
drivers/video/backlight/pwm_bl.c:504:2: note: Taking false branch
if (IS_ERR(pb->power_supply)) {
^
drivers/video/backlight/pwm_bl.c:510:22: note: Left side of '&&' is
false
if (IS_ERR(pb->pwm) && PTR_ERR(pb->pwm) != -EPROBE_DEFER
&& !node) {
^
drivers/video/backlight/pwm_bl.c:516:6: note: Calling 'IS_ERR'
if (IS_ERR(pb->pwm)) {
^~~~~~~~~~~~~~~
include/linux/err.h:36:2: note: Returning zero, which participates in a condition
later
return IS_ERR_VALUE((unsigned long)ptr);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/video/backlight/pwm_bl.c:516:6: note: Returning from 'IS_ERR'
if (IS_ERR(pb->pwm)) {
^~~~~~~~~~~~~~~
drivers/video/backlight/pwm_bl.c:516:2: note: Taking false branch
if (IS_ERR(pb->pwm)) {
^
drivers/video/backlight/pwm_bl.c:523:2: note: Taking false branch
dev_dbg(&pdev->dev, "got pwm for backlight\n");
^
include/linux/dev_printk.h:162:2: note: expanded from macro 'dev_dbg'
if (0) \
^
drivers/video/backlight/pwm_bl.c:526:2: note: Calling 'pwm_init_state'
pwm_init_state(pb->pwm, &state);
--
^
include/linux/minmax.h:38:14: note: expanded from macro '__careful_cmp'
__cmp_once(x, y, __UNIQUE_ID(__x), __UNIQUE_ID(__y), op))
^
include/linux/minmax.h:31:25: note: expanded from macro '__cmp_once'
typeof(x) unique_x = (x); \
^
drivers/video/backlight/pwm_bl.c:206:33: note: Calling 'fls'
min((int)DIV_ROUND_UP(period, fls(period)), 4096);
^
include/linux/math.h:36:22: note: expanded from macro 'DIV_ROUND_UP'
#define DIV_ROUND_UP __KERNEL_DIV_ROUND_UP
^
include/uapi/linux/const.h:34:57: note: expanded from macro
'__KERNEL_DIV_ROUND_UP'
#define __KERNEL_DIV_ROUND_UP(n, d) (((n) + (d) - 1) / (d))
^
include/linux/minmax.h:45:33: note: expanded from macro 'min'
#define min(x, y) __careful_cmp(x, y, <)
^
include/linux/minmax.h:38:14: note: expanded from macro '__careful_cmp'
__cmp_once(x, y, __UNIQUE_ID(__x), __UNIQUE_ID(__y), op))
^
include/linux/minmax.h:31:25: note: expanded from macro '__cmp_once'
typeof(x) unique_x = (x); \
^
include/asm-generic/bitops/fls.h:17:7: note: 'x' is 0
if (!x)
^
include/asm-generic/bitops/fls.h:17:2: note: Taking true branch
if (!x)
^
include/asm-generic/bitops/fls.h:18:3: note: Returning zero
return 0;
^~~~~~~~
drivers/video/backlight/pwm_bl.c:206:33: note: Returning from 'fls'
min((int)DIV_ROUND_UP(period, fls(period)), 4096);
^
include/linux/math.h:36:22: note: expanded from macro 'DIV_ROUND_UP'
#define DIV_ROUND_UP __KERNEL_DIV_ROUND_UP
^
include/uapi/linux/const.h:34:57: note: expanded from macro
'__KERNEL_DIV_ROUND_UP'
#define __KERNEL_DIV_ROUND_UP(n, d) (((n) + (d) - 1) / (d))
^
include/linux/minmax.h:45:33: note: expanded from macro 'min'
#define min(x, y) __careful_cmp(x, y, <)
^
include/linux/minmax.h:38:14: note: expanded from macro '__careful_cmp'
__cmp_once(x, y, __UNIQUE_ID(__x), __UNIQUE_ID(__y), op))
^
include/linux/minmax.h:31:25: note: expanded from macro '__cmp_once'
typeof(x) unique_x = (x); \
^
drivers/video/backlight/pwm_bl.c:206:12: note: Division by zero
min((int)DIV_ROUND_UP(period, fls(period)), 4096);
^
include/linux/math.h:36:22: note: expanded from macro 'DIV_ROUND_UP'
#define DIV_ROUND_UP __KERNEL_DIV_ROUND_UP
^
include/uapi/linux/const.h:34:54: note: expanded from macro
'__KERNEL_DIV_ROUND_UP'
#define __KERNEL_DIV_ROUND_UP(n, d) (((n) + (d) - 1) / (d))
^
include/linux/minmax.h:45:33: note: expanded from macro 'min'
#define min(x, y) __careful_cmp(x, y, <)
~~~~~~~~~~~~~~^~~~~~~~
include/linux/minmax.h:38:14: note: expanded from macro '__careful_cmp'
__cmp_once(x, y, __UNIQUE_ID(__x), __UNIQUE_ID(__y), op))
~~~~~~~~~~~^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/minmax.h:31:25: note: expanded from macro '__cmp_once'
typeof(x) unique_x = (x); \
^
drivers/video/backlight/pwm_bl.c:244:2: warning: Call to function 'memset' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(data, 0, sizeof(*data));
^~~~~~
drivers/video/backlight/pwm_bl.c:244:2: note: Call to function 'memset' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(data, 0, sizeof(*data));
^~~~~~
drivers/video/backlight/pwm_bl.c:544:2: warning: Call to function 'memset' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&props, 0, sizeof(struct backlight_properties));
^~~~~~
drivers/video/backlight/pwm_bl.c:544:2: note: Call to function 'memset' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(&props, 0, sizeof(struct backlight_properties));
^~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
35 warnings generated.
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
47 warnings generated.
> lib/irq_poll.c:181:2: warning: Call to function 'memset'
is insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(iop, 0, sizeof(*iop));
^~~~~~
lib/irq_poll.c:181:2: note: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(iop, 0, sizeof(*iop));
^~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
32 warnings generated.
lib/stackdepot.c:139:2: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(stack->entries, entries, flex_array_size(stack, entries, size));
^~~~~~
lib/stackdepot.c:139:2: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(stack->entries, entries, flex_array_size(stack, entries, size));
^~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
33 warnings generated.
lib/syscall.c:15:3: warning: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(info, 0, sizeof(*info));
^~~~~~
lib/syscall.c:15:3: note: Call to function 'memset' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memset_s' in
case of C11
memset(info, 0, sizeof(*info));
^~~~~~
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
3 warnings generated.
Suppressed 3 warnings (2 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
15 warnings generated.
Suppressed 15 warnings (15 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
9 warnings generated.
Suppressed 9 warnings (9 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
13 warnings generated.
lib/glob.c:48:32: warning: Assigned value is garbage or undefined
[clang-analyzer-core.uninitialized.Assign]
char const *back_pat = NULL, *back_str = back_str;
^ ~~~~~~~~
lib/glob.c:48:32: note: Assigned value is garbage or undefined
char const *back_pat = NULL, *back_str = back_str;
^ ~~~~~~~~
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
36 warnings generated.
drivers/char/ipmi/ipmi_si_platform.c:158:2: warning: Call to function 'memset'
is insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&io, 0, sizeof(io));
^~~~~~
drivers/char/ipmi/ipmi_si_platform.c:158:2: note: Call to function 'memset' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(&io, 0, sizeof(io));
^~~~~~
drivers/char/ipmi/ipmi_si_platform.c:271:2: warning: Call to function 'memset'
is insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&io, 0, sizeof(io));
^~~~~~
drivers/char/ipmi/ipmi_si_platform.c:271:2: note: Call to function 'memset' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(&io, 0, sizeof(io));
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
44 warnings generated.
lib/mpi/ec.c:209:2: warning: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(n, 0, sizeof(n));
^~~~~~
lib/mpi/ec.c:209:2: note: Call to function 'memset' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memset_s' in
case of C11
memset(n, 0, sizeof(n));
^~~~~~
lib/mpi/ec.c:231:2: warning: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(n, 0, sizeof(n));
^~~~~~
lib/mpi/ec.c:231:2: note: Call to function 'memset' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memset_s' in
case of C11
memset(n, 0, sizeof(n));
^~~~~~
lib/mpi/ec.c:260:2: warning: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(wp, n, wsize * BYTES_PER_MPI_LIMB);
^~~~~~
lib/mpi/ec.c:260:2: note: Call to function 'memcpy' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memcpy_s' in
case of C11
memcpy(wp, n, wsize * BYTES_PER_MPI_LIMB);
^~~~~~
lib/mpi/ec.c:263:2: warning: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(m, n+LIMB_SIZE_25519-1, (wsize+1) * BYTES_PER_MPI_LIMB);
--
#define FSE_BUILD_CTABLE_WORKSPACE_SIZE_U32(maxSymbolValue, tableLog) (maxSymbolValue +
2 + (1ull << (tableLog - 2)))
^ ~~~~~~~~~~~~~~
lib/zstd/compress/fse_compress.c:75:56: note: Assuming 'tableLog' is 0
void* const FSCT = ((U32*)ptr) + 1 /* header */ + (tableLog ? tableSize>>1 :
1) ;
^~~~~~~~
lib/zstd/compress/fse_compress.c:75:56: note: '?' condition is false
lib/zstd/compress/fse_compress.c:84:9: note: Assuming the condition is false
if ((size_t)workSpace & 3) return ERROR(GENERIC); /* Must be 4 byte aligned */
^~~~~~~~~~~~~~~~~~~~~
lib/zstd/compress/fse_compress.c:84:5: note: Taking false branch
if ((size_t)workSpace & 3) return ERROR(GENERIC); /* Must be 4 byte aligned */
^
lib/zstd/compress/fse_compress.c:85:9: note: The result of the left shift is undefined
due to shifting by '4294967294', which is greater or equal to the width of type
'unsigned long long'
if (FSE_BUILD_CTABLE_WORKSPACE_SIZE(maxSymbolValue, tableLog) > wkspSize) return
ERROR(tableLog_tooLarge);
^
lib/zstd/compress/../common/fse.h:338:87: note: expanded from macro
'FSE_BUILD_CTABLE_WORKSPACE_SIZE'
#define FSE_BUILD_CTABLE_WORKSPACE_SIZE(maxSymbolValue, tableLog) (sizeof(unsigned) *
FSE_BUILD_CTABLE_WORKSPACE_SIZE_U32(maxSymbolValue, tableLog))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
lib/zstd/compress/../common/fse.h:337:99: note: expanded from macro
'FSE_BUILD_CTABLE_WORKSPACE_SIZE_U32'
#define FSE_BUILD_CTABLE_WORKSPACE_SIZE_U32(maxSymbolValue, tableLog) (maxSymbolValue +
2 + (1ull << (tableLog - 2)))
^ ~~~~~~~~~~~~~~
lib/zstd/compress/fse_compress.c:95:6: warning: Call to function 'memset' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ZSTD_memset(tableSymbol, 0, sizeof(*tableSymbol) * tableSize); /* useless
initialization, just to keep scan-build happy */
^
lib/zstd/compress/../common/zstd_deps.h:34:28: note: expanded from macro
'ZSTD_memset'
#define ZSTD_memset(d,s,n) __builtin_memset((d),(s),(n))
^~~~~~~~~~~~~~~~
lib/zstd/compress/fse_compress.c:95:6: note: Call to function 'memset' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
ZSTD_memset(tableSymbol, 0, sizeof(*tableSymbol) * tableSize); /* useless
initialization, just to keep scan-build happy */
^
lib/zstd/compress/../common/zstd_deps.h:34:28: note: expanded from macro
'ZSTD_memset'
#define ZSTD_memset(d,s,n) __builtin_memset((d),(s),(n))
^~~~~~~~~~~~~~~~
lib/zstd/compress/fse_compress.c:579:5: warning: Value stored to 'srcSize' is
never read [clang-analyzer-deadcode.DeadStores]
srcSize -= 2;
^ ~
lib/zstd/compress/fse_compress.c:579:5: note: Value stored to 'srcSize' is
never read
srcSize -= 2;
^ ~
Suppressed 3 warnings (3 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
4 warnings generated.
lib/zstd/compress/hist.c:37:5: warning: Call to function 'memset' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ZSTD_memset(count, 0, (maxSymbolValue+1) * sizeof(*count));
^
lib/zstd/compress/../common/zstd_deps.h:34:28: note: expanded from macro
'ZSTD_memset'
#define ZSTD_memset(d,s,n) __builtin_memset((d),(s),(n))
^~~~~~~~~~~~~~~~
lib/zstd/compress/hist.c:37:5: note: Call to function 'memset' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
ZSTD_memset(count, 0, (maxSymbolValue+1) * sizeof(*count));
^
lib/zstd/compress/../common/zstd_deps.h:34:28: note: expanded from macro
'ZSTD_memset'
#define ZSTD_memset(d,s,n) __builtin_memset((d),(s),(n))
^~~~~~~~~~~~~~~~
lib/zstd/compress/hist.c:84:9: warning: Call to function 'memset' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ZSTD_memset(count, 0, countSize);
^
lib/zstd/compress/../common/zstd_deps.h:34:28: note: expanded from macro
'ZSTD_memset'
#define ZSTD_memset(d,s,n) __builtin_memset((d),(s),(n))
^~~~~~~~~~~~~~~~
lib/zstd/compress/hist.c:84:9: note: Call to function 'memset' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
ZSTD_memset(count, 0, countSize);
^
lib/zstd/compress/../common/zstd_deps.h:34:28: note: expanded from macro
'ZSTD_memset'
#define ZSTD_memset(d,s,n) __builtin_memset((d),(s),(n))
^~~~~~~~~~~~~~~~
lib/zstd/compress/hist.c:88:5: warning: Call to function 'memset' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ZSTD_memset(workSpace, 0, 4*256*sizeof(unsigned));
^
lib/zstd/compress/../common/zstd_deps.h:34:28: note: expanded from macro
'ZSTD_memset'
#define ZSTD_memset(d,s,n) __builtin_memset((d),(s),(n))
^~~~~~~~~~~~~~~~
lib/zstd/compress/hist.c:88:5: note: Call to function 'memset' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
ZSTD_memset(workSpace, 0, 4*256*sizeof(unsigned));
^
lib/zstd/compress/../common/zstd_deps.h:34:28: note: expanded from macro
'ZSTD_memset'
#define ZSTD_memset(d,s,n) __builtin_memset((d),(s),(n))
^~~~~~~~~~~~~~~~
lib/zstd/compress/hist.c:130:9: warning: Call to function 'memmove' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memmove_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ZSTD_memmove(count, Counting1, countSize); /* in case count & Counting1
are overlapping */
^
lib/zstd/compress/../common/zstd_deps.h:33:29: note: expanded from macro
'ZSTD_memmove'
#define ZSTD_memmove(d,s,n) __builtin_memmove((d),(s),(n))
^~~~~~~~~~~~~~~~~
lib/zstd/compress/hist.c:130:9: note: Call to function 'memmove' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memmove_s' in case of C11
ZSTD_memmove(count, Counting1, countSize); /* in case count & Counting1
are overlapping */
^
lib/zstd/compress/../common/zstd_deps.h:33:29: note: expanded from macro
'ZSTD_memmove'
#define ZSTD_memmove(d,s,n) __builtin_memmove((d),(s),(n))
^~~~~~~~~~~~~~~~~
35 warnings generated.
kernel/dma/coherent.c:158:2: warning: Call to function 'memset' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ret, 0, size);
^~~~~~
kernel/dma/coherent.c:158:2: note: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(ret, 0, size);
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
36 warnings generated.
> kernel/dma/debug.c:599:2: warning: Call to function
'memset' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(entry, 0, sizeof(*entry));
^~~~~~
kernel/dma/debug.c:599:2: note: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(entry, 0, sizeof(*entry));
^~~~~~
kernel/dma/debug.c:1062:4: warning: Value stored to 'addr' is never read
[clang-analyzer-deadcode.DeadStores]
addr = (u8 *)current->stack + i * PAGE_SIZE + offset;
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/dma/debug.c:1062:4: note: Value stored to 'addr' is never read
addr = (u8 *)current->stack + i * PAGE_SIZE + offset;
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
49 warnings generated.
> init/do_mounts_rd.c:80:2: warning: Call to function
'memset' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buf, 0xe5, size);
^~~~~~
init/do_mounts_rd.c:80:2: note: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(buf, 0xe5, size);
^~~~~~
init/do_mounts_rd.c:252:4: warning: Value stored to 'rotate' is never read
[clang-analyzer-deadcode.DeadStores]
rotate = 0;
^ ~
init/do_mounts_rd.c:252:4: note: Value stored to 'rotate' is never read
rotate = 0;
^ ~
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
10 warnings generated.
Suppressed 10 warnings (9 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
65 warnings generated.
Suppressed 65 warnings (65 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
18 warnings generated.
Suppressed 18 warnings (18 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
38 warnings generated.
drivers/pinctrl/pinctrl-single.c:732:41: warning: Division by zero
[clang-analyzer-core.DivideZero]
nr_pins = (pcs->size * BITS_PER_BYTE) / pcs->bits_per_pin;
^
drivers/pinctrl/pinctrl-single.c:1786:14: note: Assuming 'soc' is non-null
if (WARN_ON(!soc))
^
include/asm-generic/bug.h:166:25: note: expanded from macro 'WARN_ON'
int __ret_warn_on = !!(condition); \
^~~~~~~~~
drivers/pinctrl/pinctrl-single.c:1786:2: note: Taking false branch
if (WARN_ON(!soc))
^
drivers/pinctrl/pinctrl-single.c:1790:6: note: Assuming 'pcs' is non-null
if (!pcs)
^~~~
drivers/pinctrl/pinctrl-single.c:1790:2: note: Taking false branch
if (!pcs)
^
drivers/pinctrl/pinctrl-single.c:1795:2: note: Loop condition is false. Exiting loop
raw_spin_lock_init(&pcs->lock);
^
include/linux/spinlock.h:102:39: note: expanded from macro
'raw_spin_lock_init'
# define raw_spin_lock_init(lock) \
^
drivers/pinctrl/pinctrl-single.c:1796:2: note: Loop condition is false. Exiting loop
mutex_init(&pcs->mutex);
^
include/linux/mutex.h:101:32: note: expanded from macro 'mutex_init'
#define mutex_init(mutex) \
^
drivers/pinctrl/pinctrl-single.c:1801:8: note: Calling 'of_property_read_u32'
ret = of_property_read_u32(np, "pinctrl-single,register-width",
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/of.h:1323:9: note: Calling 'of_property_read_u32_array'
return of_property_read_u32_array(np, propname, out_value, 1);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/of.h:1269:6: note: Assuming 'ret' is >= 0
if (ret >= 0)
^~~~~~~~
include/linux/of.h:1269:2: note: Taking true branch
if (ret >= 0)
^
include/linux/of.h:1270:3: note: Returning zero, which participates in a condition
later
return 0;
^~~~~~~~
include/linux/of.h:1323:9: note: Returning from 'of_property_read_u32_array'
return of_property_read_u32_array(np, propname, out_value, 1);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/of.h:1323:2: note: Returning zero, which participates in a condition
later
return of_property_read_u32_array(np, propname, out_value, 1);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/pinctrl/pinctrl-single.c:1801:8: note: Returning from
'of_property_read_u32'
ret = of_property_read_u32(np, "pinctrl-single,register-width",
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/pinctrl/pinctrl-single.c:1803:6: note: 'ret' is 0
if (ret) {
^~~
drivers/pinctrl/pinctrl-single.c:1803:2: note: Taking false branch
if (ret) {
^
drivers/pinctrl/pinctrl-single.c:1811:7: note: 'ret' is not equal to 0
if (!ret) {
^~~
drivers/pinctrl/pinctrl-single.c:1811:2: note: Taking false branch
if (!ret) {
^
drivers/pinctrl/pinctrl-single.c:1823:6: note: 'ret' is not equal to 0
if (ret)
^~~
drivers/pinctrl/pinctrl-single.c:1823:2: note: Taking true branch
if (ret)
^
drivers/pinctrl/pinctrl-single.c:1826:22: note: Calling
'of_property_read_bool'
pcs->bits_per_mux = of_property_read_bool(np,
--
include/linux/platform_device.h:243:2: note: Calling 'dev_set_drvdata'
dev_set_drvdata(&pdev->dev, data);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/device.h:699:1: note: Returning without writing to
'data->bits_per_mux', which participates in a condition later
}
^
include/linux/device.h:699:1: note: Returning without writing to
'data->fmask', which participates in a condition later
include/linux/device.h:699:1: note: Returning without writing to
'data->bits_per_pin'
include/linux/platform_device.h:243:2: note: Returning from 'dev_set_drvdata'
dev_set_drvdata(&pdev->dev, data);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/platform_device.h:244:1: note: Returning without writing to
'data->bits_per_mux', which participates in a condition later
}
^
include/linux/platform_device.h:244:1: note: Returning without writing to
'data->fmask', which participates in a condition later
include/linux/platform_device.h:244:1: note: Returning without writing to
'data->bits_per_pin'
drivers/pinctrl/pinctrl-single.c:1856:2: note: Returning from
'platform_set_drvdata'
platform_set_drvdata(pdev, pcs);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/pinctrl/pinctrl-single.c:1858:2: note: Control jumps to the 'default'
case at line 1871
switch (pcs->width) {
^
drivers/pinctrl/pinctrl-single.c:1872:3: note: Execution continues on line 1875
break;
^
drivers/pinctrl/pinctrl-single.c:1878:6: note: Assuming the condition is false
if (PCS_HAS_PINCONF)
^
drivers/pinctrl/pinctrl-single.c:212:27: note: expanded from macro
'PCS_HAS_PINCONF'
#define PCS_HAS_PINCONF (pcs->flags & PCS_FEAT_PINCONF)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/pinctrl/pinctrl-single.c:1878:2: note: Taking false branch
if (PCS_HAS_PINCONF)
^
drivers/pinctrl/pinctrl-single.c:1882:8: note: Calling
'pcs_allocate_pin_table'
ret = pcs_allocate_pin_table(pcs);
^~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/pinctrl/pinctrl-single.c:730:11: note: Field 'bits_per_mux' is true
if (pcs->bits_per_mux) {
^
drivers/pinctrl/pinctrl-single.c:730:2: note: Taking true branch
if (pcs->bits_per_mux) {
^
drivers/pinctrl/pinctrl-single.c:731:23: note: Calling 'fls'
pcs->bits_per_pin = fls(pcs->fmask);
^~~~~~~~~~~~~~~
include/asm-generic/bitops/fls.h:17:6: note: Assuming 'x' is 0, which
participates in a condition later
if (!x)
^~
include/asm-generic/bitops/fls.h:17:2: note: Taking true branch
if (!x)
^
include/asm-generic/bitops/fls.h:18:3: note: Returning zero
return 0;
^~~~~~~~
drivers/pinctrl/pinctrl-single.c:731:23: note: Returning from 'fls'
pcs->bits_per_pin = fls(pcs->fmask);
^~~~~~~~~~~~~~~
drivers/pinctrl/pinctrl-single.c:731:3: note: The value 0 is assigned to field
'bits_per_pin'
pcs->bits_per_pin = fls(pcs->fmask);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/pinctrl/pinctrl-single.c:732:41: note: Division by zero
nr_pins = (pcs->size * BITS_PER_BYTE) / pcs->bits_per_pin;
~~~~~~~~~~~~~~~~~~~~~~~~~~~~^~~~~~~~~~~~~~~~~~~
drivers/pinctrl/pinctrl-single.c:882:40: warning: The result of the right shift is
undefined due to shifting by '4294967295', which is greater or equal to the width
of type 'unsigned int' [clang-analyzer-core.UndefinedBinaryOperatorResult]
add_setting(settings, param, value[0] >> shift);
^ ~~~~~
drivers/pinctrl/pinctrl-single.c:874:8: note: Calling
'of_property_read_u32_array'
ret = of_property_read_u32_array(np, name, value, 2);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/of.h:1269:6: note: Assuming 'ret' is >= 0
if (ret >= 0)
^~~~~~~~
include/linux/of.h:1269:2: note: Taking true branch
if (ret >= 0)
^
include/linux/of.h:1270:3: note: Returning zero, which participates in a condition
later
return 0;
^~~~~~~~
drivers/pinctrl/pinctrl-single.c:874:8: note: Returning from
'of_property_read_u32_array'
ret = of_property_read_u32_array(np, name, value, 2);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/pinctrl/pinctrl-single.c:875:6: note: 'ret' is 0
if (ret)
^~~
drivers/pinctrl/pinctrl-single.c:875:2: note: Taking false branch
if (ret)
^
drivers/pinctrl/pinctrl-single.c:879:2: note: The value 4294967295 is assigned to
'shift'
shift = ffs(value[1]) - 1;
^~~~~~~~~~~~~~~~~~~~~~~~~
drivers/pinctrl/pinctrl-single.c:882:40: note: The result of the right shift is
undefined due to shifting by '4294967295', which is greater or equal to the width
of type 'unsigned int'
add_setting(settings, param, value[0] >> shift);
^ ~~~~~
drivers/pinctrl/pinctrl-single.c:1417:3: warning: Value stored to 'mask' is
never read [clang-analyzer-deadcode.DeadStores]
mask = pcs->read(pcswi->reg);
^ ~~~~~~~~~~~~~~~~~~~~~
drivers/pinctrl/pinctrl-single.c:1417:3: note: Value stored to 'mask' is never
read
mask = pcs->read(pcswi->reg);
^ ~~~~~~~~~~~~~~~~~~~~~
> drivers/pinctrl/pinctrl-single.c:1799:2: warning: Call to
function 'memcpy' is insecure as it does not provide security checks introduced in
the C11 standard. Replace with analogous functions that support length arguments or
provides boundary checks such as 'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&pcs->socdata, soc, sizeof(*soc));
^~~~~~
drivers/pinctrl/pinctrl-single.c:1799:2: note: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(&pcs->socdata, soc, sizeof(*soc));
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
13 warnings generated.
Suppressed 13 warnings (13 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
9 warnings generated.
Suppressed 9 warnings (9 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
49 warnings generated.
mm/filemap.c:2705:4: warning: 1st function call argument is an uninitialized value
[clang-analyzer-core.CallAndMessage]
folio_mark_accessed(fbatch.folios[0]);
^
mm/filemap.c:2777:6: note: Assuming 'count' is not equal to 0
if (!count)
^~~~~~
mm/filemap.c:2777:2: note: Taking false branch
if (!count)
^
mm/filemap.c:2780:6: note: Assuming the condition is false
if (iocb->ki_flags & IOCB_DIRECT) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
mm/filemap.c:2780:2: note: Taking false branch
if (iocb->ki_flags & IOCB_DIRECT) {
^
mm/filemap.c:2822:9: note: Calling 'filemap_read'
return filemap_read(iocb, iter, retval);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
mm/filemap.c:2654:15: note: Assuming field 'ki_pos' is < field
's_maxbytes'
if (unlikely(iocb->ki_pos >= inode->i_sb->s_maxbytes))
^
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
mm/filemap.c:2654:2: note: Taking false branch
if (unlikely(iocb->ki_pos >= inode->i_sb->s_maxbytes))
^
mm/filemap.c:2656:2: note: Taking false branch
if (unlikely(!iov_iter_count(iter)))
^
mm/filemap.c:2660:2: note: Calling 'folio_batch_init'
folio_batch_init(&fbatch);
^~~~~~~~~~~~~~~~~~~~~~~~~
mm/filemap.c:2660:2: note: Returning from 'folio_batch_init'
folio_batch_init(&fbatch);
^~~~~~~~~~~~~~~~~~~~~~~~~
mm/filemap.c:2670:8: note: Assuming the condition is false
if ((iocb->ki_flags & IOCB_WAITQ) && already_read)
^~~~~~~~~~~~~~~~~~~~~~~~~~~
mm/filemap.c:2670:37: note: Left side of '&&' is false
if ((iocb->ki_flags & IOCB_WAITQ) && already_read)
^
mm/filemap.c:2673:16: note: Assuming the condition is false
if (unlikely(iocb->ki_pos >= i_size_read(inode)))
^
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
mm/filemap.c:2673:3: note: Taking false branch
if (unlikely(iocb->ki_pos >= i_size_read(inode)))
^
mm/filemap.c:2676:11: note: Calling 'filemap_get_pages'
error = filemap_get_pages(iocb, iter, &fbatch);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
mm/filemap.c:2582:2: note: Taking false branch
if (fatal_signal_pending(current))
^
mm/filemap.c:2585:2: note: Calling 'filemap_get_read_batch'
filemap_get_read_batch(mapping, index, last_index, fbatch);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
mm/filemap.c:2380:2: note: Loop condition is false. Execution continues on line 2404
for (folio = xas_load(&xas); folio; folio = xas_next(&xas)) {
^
mm/filemap.c:2585:2: note: Returning from 'filemap_get_read_batch'
filemap_get_read_batch(mapping, index, last_index, fbatch);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
mm/filemap.c:2586:7: note: Calling 'folio_batch_count'
if (!folio_batch_count(fbatch)) {
^~~~~~~~~~~~~~~~~~~~~~~~~
mm/filemap.c:2586:7: note: Returning from 'folio_batch_count'
if (!folio_batch_count(fbatch)) {
^~~~~~~~~~~~~~~~~~~~~~~~~
mm/filemap.c:2586:2: note: Taking true branch
if (!folio_batch_count(fbatch)) {
^
mm/filemap.c:2587:7: note: Assuming the condition is false
if (iocb->ki_flags & IOCB_NOIO)
^~~~~~~~~~~~~~~~~~~~~~~~~~
mm/filemap.c:2587:3: note: Taking false branch
if (iocb->ki_flags & IOCB_NOIO)
^
mm/filemap.c:2591:3: note: Calling 'filemap_get_read_batch'
filemap_get_read_batch(mapping, index, last_index, fbatch);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
mm/filemap.c:2380:2: note: Loop condition is false. Execution continues on line 2404
for (folio = xas_load(&xas); folio; folio = xas_next(&xas)) {
--
^~~~~~~~~~~~~~~~
lib/zstd/decompress/zstd_decompress_block.c:1215:13: note: Call to function
'memcpy' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memcpy_s' in case of C11
ZSTD_memcpy(op, litPtr, lastLLSize);
^
lib/zstd/decompress/../common/zstd_deps.h:32:28: note: expanded from macro
'ZSTD_memcpy'
#define ZSTD_memcpy(d,s,n) __builtin_memcpy((d),(s),(n))
^~~~~~~~~~~~~~~~
lib/zstd/decompress/zstd_decompress_block.c:1320:13: warning: Call to function
'memcpy' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ZSTD_memcpy(op, litPtr, lastLLSize);
^
lib/zstd/decompress/../common/zstd_deps.h:32:28: note: expanded from macro
'ZSTD_memcpy'
#define ZSTD_memcpy(d,s,n) __builtin_memcpy((d),(s),(n))
^~~~~~~~~~~~~~~~
lib/zstd/decompress/zstd_decompress_block.c:1320:13: note: Call to function
'memcpy' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memcpy_s' in case of C11
ZSTD_memcpy(op, litPtr, lastLLSize);
^
lib/zstd/decompress/../common/zstd_deps.h:32:28: note: expanded from macro
'ZSTD_memcpy'
#define ZSTD_memcpy(d,s,n) __builtin_memcpy((d),(s),(n))
^~~~~~~~~~~~~~~~
Suppressed 4 warnings (4 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
15 warnings generated.
lib/kobject.c:156:3: warning: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(path + length, kobject_name(parent), cur);
^~~~~~
lib/kobject.c:156:3: note: Call to function 'memcpy' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memcpy_s' in
case of C11
memcpy(path + length, kobject_name(parent), cur);
^~~~~~
lib/kobject.c:516:2: warning: Call to function 'sprintf' is insecure as it does
not provide bounding of the memory buffer or security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(devpath_string, "DEVPATH_OLD=%s", devpath);
^~~~~~~
lib/kobject.c:516:2: note: Call to function 'sprintf' is insecure as it does
not provide bounding of the memory buffer or security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'sprintf_s' in case of C11
sprintf(devpath_string, "DEVPATH_OLD=%s", devpath);
^~~~~~~
lib/kobject.c:582:2: warning: Call to function 'sprintf' is insecure as it does
not provide bounding of the memory buffer or security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(devpath_string, "DEVPATH_OLD=%s", devpath);
^~~~~~~
lib/kobject.c:582:2: note: Call to function 'sprintf' is insecure as it does
not provide bounding of the memory buffer or security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'sprintf_s' in case of C11
sprintf(devpath_string, "DEVPATH_OLD=%s", devpath);
^~~~~~~
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
23 warnings generated.
Suppressed 23 warnings (23 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
36 warnings generated.
kernel/locking/mutex-debug.c:30:2: warning: Call to function 'memset' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(waiter, MUTEX_DEBUG_INIT, sizeof(*waiter));
^~~~~~
kernel/locking/mutex-debug.c:30:2: note: Call to function 'memset' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(waiter, MUTEX_DEBUG_INIT, sizeof(*waiter));
^~~~~~
kernel/locking/mutex-debug.c:47:2: warning: Call to function 'memset' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(waiter, MUTEX_DEBUG_FREE, sizeof(*waiter));
^~~~~~
kernel/locking/mutex-debug.c:47:2: note: Call to function 'memset' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(waiter, MUTEX_DEBUG_FREE, sizeof(*waiter));
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
41 warnings generated.
kernel/locking/lockdep.c:5911:2: warning: Call to function 'memset' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(current->held_locks, 0, MAX_LOCK_DEPTH*sizeof(struct held_lock));
^~~~~~
kernel/locking/lockdep.c:5911:2: note: Call to function 'memset' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(current->held_locks, 0, MAX_LOCK_DEPTH*sizeof(struct held_lock));
^~~~~~
kernel/locking/lockdep.c:6020:2: warning: Call to function 'memset' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(p + offset, 0, sizeof(*class) - offset);
^~~~~~
kernel/locking/lockdep.c:6020:2: note: Call to function 'memset' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(p + offset, 0, sizeof(*class) - offset);
^~~~~~
Suppressed 39 warnings (38 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
lib/842/842_decompress.c:205:2: warning: Call to function 'memcpy' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(p->out, &p->ostart[offset], size);
^~~~~~
lib/842/842_decompress.c:205:2: note: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(p->out, &p->ostart[offset], size);
^~~~~~
lib/842/842_decompress.c:319:5: warning: Call to function 'memcpy' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(p.out, p.out - 8, 8);
^~~~~~
lib/842/842_decompress.c:319:5: note: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(p.out, p.out - 8, 8);
^~~~~~
lib/842/842_decompress.c:332:4: warning: Call to function 'memset' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(p.out, 0, 8);
^~~~~~
lib/842/842_decompress.c:332:4: note: Call to function 'memset' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(p.out, 0, 8);
^~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
24 warnings generated.
Suppressed 24 warnings (24 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
17 warnings generated.
> lib/reed_solomon/test_rslib.c:169:2: warning: Call to function
'memset' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(c + dlen, 0, nroots * sizeof(*c));
^~~~~~
lib/reed_solomon/test_rslib.c:169:2: note: Call to function 'memset' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(c + dlen, 0, nroots * sizeof(*c));
^~~~~~
> lib/reed_solomon/test_rslib.c:173:2: warning: Call to function
'memcpy' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(r, c, len * sizeof(*r));
^~~~~~
lib/reed_solomon/test_rslib.c:173:2: note: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(r, c, len * sizeof(*r));
^~~~~~
lib/reed_solomon/test_rslib.c:174:2: warning: Call to function 'memset' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(errlocs, 0, len * sizeof(*errlocs));
^~~~~~
lib/reed_solomon/test_rslib.c:174:2: note: Call to function 'memset' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(errlocs, 0, len * sizeof(*errlocs));
^~~~~~
lib/reed_solomon/test_rslib.c:175:2: warning: Call to function 'memset' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(derrlocs, 0, nroots * sizeof(*derrlocs));
^~~~~~
lib/reed_solomon/test_rslib.c:175:2: note: Call to function 'memset' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(derrlocs, 0, nroots * sizeof(*derrlocs));
^~~~~~
lib/reed_solomon/test_rslib.c:395:4: warning: Call to function 'memset' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(corr, 0, nroots * sizeof(*corr));
^~~~~~
lib/reed_solomon/test_rslib.c:395:4: note: Call to function 'memset' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(corr, 0, nroots * sizeof(*corr));
^~~~~~
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
6 warnings generated.
Suppressed 6 warnings (4 in non-user code, 2 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
58 warnings generated.
> arch/riscv/kvm/../../../virt/kvm/kvm_main.c:964:2: warning: Call
to function 'snprintf' is insecure as it does not provide security checks
introduced in the C11 standard. Replace with analogous functions that support length
arguments or provides boundary checks such as 'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(dir_name, sizeof(dir_name), "%d-%d", task_pid_nr(current), fd);
^~~~~~~~
arch/riscv/kvm/../../../virt/kvm/kvm_main.c:964:2: note: Call to function
'snprintf' is insecure as it does not provide security checks introduced in the
C11 standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'snprintf_s' in case of C11
snprintf(dir_name, sizeof(dir_name), "%d-%d", task_pid_nr(current),
fd);
^~~~~~~~
> arch/riscv/kvm/../../../virt/kvm/kvm_main.c:2055:3: warning: Call
to function 'memset' is insecure as it does not provide security checks introduced
in the C11 standard. Replace with analogous functions that support length arguments or
provides boundary checks such as 'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(dirty_bitmap_buffer, 0, n);
^~~~~~
arch/riscv/kvm/../../../virt/kvm/kvm_main.c:2055:3: note: Call to function
'memset' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memset_s' in case of C11
memset(dirty_bitmap_buffer, 0, n);
^~~~~~
arch/riscv/kvm/../../../virt/kvm/kvm_main.c:3687:2: warning: Call to function
'snprintf' is insecure as it does not provide security checks introduced in the
C11 standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(name, sizeof(name), "kvm-vcpu:%d", vcpu->vcpu_id);
^~~~~~~~
arch/riscv/kvm/../../../virt/kvm/kvm_main.c:3687:2: note: Call to function
'snprintf' is insecure as it does not provide security checks introduced in the
C11 standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'snprintf_s' in case of C11
snprintf(name, sizeof(name), "kvm-vcpu:%d", vcpu->vcpu_id);
^~~~~~~~
arch/riscv/kvm/../../../virt/kvm/kvm_main.c:3773:2: warning: Call to function
'snprintf' is insecure as it does not provide security checks introduced in the
C11 standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(vcpu->stats_id, sizeof(vcpu->stats_id),
"kvm-%d/vcpu-%d",
^~~~~~~~
arch/riscv/kvm/../../../virt/kvm/kvm_main.c:3773:2: note: Call to function
'snprintf' is insecure as it does not provide security checks introduced in the
C11 standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'snprintf_s' in case of C11
snprintf(vcpu->stats_id, sizeof(vcpu->stats_id),
"kvm-%d/vcpu-%d",
^~~~~~~~
arch/riscv/kvm/../../../virt/kvm/kvm_main.c:3845:2: warning: Call to function
'snprintf' is insecure as it does not provide security checks introduced in the
C11 standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(name, sizeof(name), "kvm-vcpu-stats:%d", vcpu->vcpu_id);
^~~~~~~~
arch/riscv/kvm/../../../virt/kvm/kvm_main.c:3845:2: note: Call to function
'snprintf' is insecure as it does not provide security checks introduced in the
C11 standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'snprintf_s' in case of C11
snprintf(name, sizeof(name), "kvm-vcpu-stats:%d", vcpu->vcpu_id);
^~~~~~~~
arch/riscv/kvm/../../../virt/kvm/kvm_main.c:4754:2: warning: Call to function
'snprintf' is insecure as it does not provide security checks introduced in the
C11 standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(kvm->stats_id, sizeof(kvm->stats_id),
^~~~~~~~
arch/riscv/kvm/../../../virt/kvm/kvm_main.c:4754:2: note: Call to function
'snprintf' is insecure as it does not provide security checks introduced in the
C11 standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'snprintf_s' in case of C11
snprintf(kvm->stats_id, sizeof(kvm->stats_id),
^~~~~~~~
> arch/riscv/kvm/../../../virt/kvm/kvm_main.c:5150:2: warning: Call
to function 'memcpy' is insecure as it does not provide security checks introduced
in the C11 standard. Replace with analogous functions that support length arguments or
provides boundary checks such as 'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(new_bus, bus, sizeof(*bus) + i * sizeof(struct kvm_io_range));
^~~~~~
arch/riscv/kvm/../../../virt/kvm/kvm_main.c:5150:2: note: Call to function
'memcpy' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memcpy_s' in case of C11
memcpy(new_bus, bus, sizeof(*bus) + i * sizeof(struct kvm_io_range));
^~~~~~
arch/riscv/kvm/../../../virt/kvm/kvm_main.c:5153:2: warning: Call to function
'memcpy' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(new_bus->range + i + 1, bus->range + i,
^~~~~~
arch/riscv/kvm/../../../virt/kvm/kvm_main.c:5153:2: note: Call to function
'memcpy' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memcpy_s' in case of C11
memcpy(new_bus->range + i + 1, bus->range + i,
^~~~~~
arch/riscv/kvm/../../../virt/kvm/kvm_main.c:5186:3: warning: Call to function
'memcpy' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(new_bus, bus, struct_size(bus, range, i));
^~~~~~
arch/riscv/kvm/../../../virt/kvm/kvm_main.c:5186:3: note: Call to function
'memcpy' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memcpy_s' in case of C11
memcpy(new_bus, bus, struct_size(bus, range, i));
^~~~~~
arch/riscv/kvm/../../../virt/kvm/kvm_main.c:5188:3: warning: Call to function
'memcpy' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(new_bus->range + i, bus->range + i + 1,
^~~~~~
arch/riscv/kvm/../../../virt/kvm/kvm_main.c:5188:3: note: Call to function
'memcpy' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memcpy_s' in case of C11
memcpy(new_bus->range + i, bus->range + i + 1,
^~~~~~
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
21 warnings generated.
Suppressed 21 warnings (21 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
35 warnings generated.
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
36 warnings generated.
kernel/time/tick-sched.c:1492:2: warning: Call to function 'memset' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ts, 0, sizeof(*ts));
^~~~~~
kernel/time/tick-sched.c:1492:2: note: Call to function 'memset' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(ts, 0, sizeof(*ts));
^~~~~~
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
48 warnings generated.
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
16 warnings generated.
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
25 warnings generated.
Suppressed 25 warnings (25 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
36 warnings generated.
drivers/dma-buf/dma-buf.c:1196:14: warning: Access to field 'resv' results in a
dereference of a null pointer (loaded from variable 'dmabuf')
[clang-analyzer-core.NullDereference]
might_lock(&dmabuf->resv->lock.base);
^
drivers/dma-buf/dma-buf.c:336:2: note: Value assigned to 'dmabuf'
dmabuf = file->private_data;
^~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/dma-buf/dma-buf.c:338:2: note: Control jumps to 'case 1074291200:' at
line 339
switch (cmd) {
^
drivers/dma-buf/dma-buf.c:340:7: note: Calling 'copy_from_user'
if (copy_from_user(&sync, (void __user *) arg, sizeof(sync)))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/uaccess.h:191:2: note: Taking true branch
if (likely(check_copy_size(to, n, false)))
^
include/linux/uaccess.h:193:2: note: Returning value (loaded from 'n'), which
participates in a condition later
return n;
^~~~~~~~
drivers/dma-buf/dma-buf.c:340:7: note: Returning from 'copy_from_user'
if (copy_from_user(&sync, (void __user *) arg, sizeof(sync)))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/dma-buf/dma-buf.c:340:7: note: Assuming the condition is false
if (copy_from_user(&sync, (void __user *) arg, sizeof(sync)))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/dma-buf/dma-buf.c:340:3: note: Taking false branch
if (copy_from_user(&sync, (void __user *) arg, sizeof(sync)))
^
drivers/dma-buf/dma-buf.c:343:7: note: Assuming the condition is false
if (sync.flags & ~DMA_BUF_SYNC_VALID_FLAGS_MASK)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/dma-buf/dma-buf.c:343:3: note: Taking false branch
if (sync.flags & ~DMA_BUF_SYNC_VALID_FLAGS_MASK)
^
drivers/dma-buf/dma-buf.c:346:3: note: Control jumps to 'case 3:' at line 353
switch (sync.flags & DMA_BUF_SYNC_RW) {
^
drivers/dma-buf/dma-buf.c:355:4: note: Execution continues on line 360
break;
^
drivers/dma-buf/dma-buf.c:360:7: note: Assuming the condition is true
if (sync.flags & DMA_BUF_SYNC_END)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/dma-buf/dma-buf.c:360:3: note: Taking true branch
if (sync.flags & DMA_BUF_SYNC_END)
--
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/math64.h:92:15: note: '__base' initialized to 0
*remainder = do_div(dividend, divisor);
^
include/asm-generic/div64.h:220:2: note: expanded from macro 'do_div'
uint32_t __base = (base); \
^~~~~~~~~~~~~~~
include/linux/math64.h:92:15: note: Left side of '&&' is false
*remainder = do_div(dividend, divisor);
^
include/asm-generic/div64.h:223:35: note: expanded from macro 'do_div'
if (__builtin_constant_p(__base) && \
^
include/linux/math64.h:92:15: note: Left side of '&&' is false
*remainder = do_div(dividend, divisor);
^
include/asm-generic/div64.h:227:42: note: expanded from macro 'do_div'
} else if (__builtin_constant_p(__base) && \
^
include/linux/math64.h:92:15: note: Assuming the condition is true
*remainder = do_div(dividend, divisor);
^
include/asm-generic/div64.h:234:20: note: expanded from macro 'do_div'
} else if (likely(((n) >> 32) == 0)) { \
~~~~~~~^~~~~~~~~~~~~~~~~
include/linux/compiler.h:77:40: note: expanded from macro 'likely'
# define likely(x) __builtin_expect(!!(x), 1)
^
include/linux/math64.h:92:15: note: Taking true branch
*remainder = do_div(dividend, divisor);
^
include/asm-generic/div64.h:234:9: note: expanded from macro 'do_div'
} else if (likely(((n) >> 32) == 0)) { \
^
include/linux/math64.h:92:15: note: Division by zero
*remainder = do_div(dividend, divisor);
^
include/asm-generic/div64.h:235:25: note: expanded from macro 'do_div'
__rem = (uint32_t)(n) % __base; \
~~~~~~~~~~~~~~^~~~~~~~
Suppressed 2 warnings (2 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
24 warnings generated.
drivers/base/cpu.c:364:2: warning: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&cpu->dev, 0x00, sizeof(struct device));
^~~~~~
drivers/base/cpu.c:364:2: note: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(&cpu->dev, 0x00, sizeof(struct device));
^~~~~~
Suppressed 23 warnings (23 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
13 warnings generated.
Suppressed 13 warnings (13 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
19 warnings generated.
Suppressed 19 warnings (19 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
37 warnings generated.
drivers/base/devres.c:120:2: warning: Call to function 'memset' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(dr, 0, offsetof(struct devres, data));
^~~~~~
drivers/base/devres.c:120:2: note: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(dr, 0, offsetof(struct devres, data));
^~~~~~
drivers/base/devres.c:921:2: warning: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(new_dr->data, old_dr->data,
^~~~~~
drivers/base/devres.c:921:2: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(new_dr->data, old_dr->data,
^~~~~~
drivers/base/devres.c:955:3: warning: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, s, size);
^~~~~~
drivers/base/devres.c:955:3: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(buf, s, size);
^~~~~~
drivers/base/devres.c:1001:8: warning: Call to function 'vsnprintf' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'vsnprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len = vsnprintf(NULL, 0, fmt, aq);
^~~~~~~~~
drivers/base/devres.c:1001:8: note: Call to function 'vsnprintf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'vsnprintf_s' in case of C11
len = vsnprintf(NULL, 0, fmt, aq);
^~~~~~~~~
drivers/base/devres.c:1008:2: warning: Call to function 'vsnprintf' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'vsnprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
vsnprintf(p, len+1, fmt, ap);
^~~~~~~~~
drivers/base/devres.c:1008:2: note: Call to function 'vsnprintf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'vsnprintf_s' in case of C11
vsnprintf(p, len+1, fmt, ap);
^~~~~~~~~
drivers/base/devres.c:1077:3: warning: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(p, src, len);
^~~~~~
drivers/base/devres.c:1077:3: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(p, src, len);
^~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
31 warnings generated.
> drivers/clk/sifive/sifive-prci.c:158:2: warning: Call to function
'memcpy' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&pwd->c, c, sizeof(*c));
^~~~~~
drivers/clk/sifive/sifive-prci.c:158:2: note: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(&pwd->c, c, sizeof(*c));
^~~~~~
drivers/clk/sifive/sifive-prci.c:199:2: warning: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&c, &pwd->c, sizeof(c));
^~~~~~
drivers/clk/sifive/sifive-prci.c:199:2: note: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(&c, &pwd->c, sizeof(c));
^~~~~~
drivers/clk/sifive/sifive-prci.c:326:2: warning: Value stored to 'r' is never
read [clang-analyzer-deadcode.DeadStores]
r = __prci_readl(pd, PRCI_CORECLKSEL_OFFSET); /* barrier */
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/clk/sifive/sifive-prci.c:326:2: note: Value stored to 'r' is never
read
r = __prci_readl(pd, PRCI_CORECLKSEL_OFFSET); /* barrier */
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/clk/sifive/sifive-prci.c:347:2: warning: Value stored to 'r' is never
read [clang-analyzer-deadcode.DeadStores]
r = __prci_readl(pd, PRCI_CORECLKSEL_OFFSET); /* barrier */
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/clk/sifive/sifive-prci.c:347:2: note: Value stored to 'r' is never
read
r = __prci_readl(pd, PRCI_CORECLKSEL_OFFSET); /* barrier */
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/clk/sifive/sifive-prci.c:369:2: warning: Value stored to 'r' is never
read [clang-analyzer-deadcode.DeadStores]
r = __prci_readl(pd, PRCI_CORECLKSEL_OFFSET); /* barrier */
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/clk/sifive/sifive-prci.c:369:2: note: Value stored to 'r' is never
read
r = __prci_readl(pd, PRCI_CORECLKSEL_OFFSET); /* barrier */
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/clk/sifive/sifive-prci.c:390:2: warning: Value stored to 'r' is never
read [clang-analyzer-deadcode.DeadStores]
r = __prci_readl(pd, PRCI_COREPLLSEL_OFFSET); /* barrier */
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/clk/sifive/sifive-prci.c:390:2: note: Value stored to 'r' is never
read
r = __prci_readl(pd, PRCI_COREPLLSEL_OFFSET); /* barrier */
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/clk/sifive/sifive-prci.c:411:2: warning: Value stored to 'r' is never
read [clang-analyzer-deadcode.DeadStores]
r = __prci_readl(pd, PRCI_COREPLLSEL_OFFSET); /* barrier */
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/clk/sifive/sifive-prci.c:411:2: note: Value stored to 'r' is never
read
r = __prci_readl(pd, PRCI_COREPLLSEL_OFFSET); /* barrier */
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/clk/sifive/sifive-prci.c:432:2: warning: Value stored to 'r' is never
read [clang-analyzer-deadcode.DeadStores]
r = __prci_readl(pd, PRCI_HFPCLKPLLSEL_OFFSET); /* barrier */
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/clk/sifive/sifive-prci.c:432:2: note: Value stored to 'r' is never
read
r = __prci_readl(pd, PRCI_HFPCLKPLLSEL_OFFSET); /* barrier */
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/clk/sifive/sifive-prci.c:453:2: warning: Value stored to 'r' is never
read [clang-analyzer-deadcode.DeadStores]
r = __prci_readl(pd, PRCI_HFPCLKPLLSEL_OFFSET); /* barrier */
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/clk/sifive/sifive-prci.c:453:2: note: Value stored to 'r' is never
read
r = __prci_readl(pd, PRCI_HFPCLKPLLSEL_OFFSET); /* barrier */
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Suppressed 22 warnings (22 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
48 warnings generated.
fs/fs-writeback.c:148:3: warning: Argument to kfree() is the address of the local
variable 'work', which is not memory allocated by malloc()
[clang-analyzer-unix.Malloc]
kfree(work);
^
fs/fs-writeback.c:2702:6: note: Assuming the condition is false
if (bdi == &noop_backing_dev_info)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/fs-writeback.c:2702:2: note: Taking false branch
if (bdi == &noop_backing_dev_info)
^
fs/fs-writeback.c:2708:2: note: Calling 'bdi_split_work_to_wbs'
bdi_split_work_to_wbs(bdi, &work, false);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/fs-writeback.c:1204:2: note: Loop condition is false. Exiting loop
might_sleep();
^
include/linux/kernel.h:180:29: note: expanded from macro 'might_sleep'
# define might_sleep() do { might_resched(); } while (0)
^
include/linux/kernel.h:115:26: note: expanded from macro 'might_resched'
# define might_resched() do { } while (0)
^
fs/fs-writeback.c:1204:2: note: Loop condition is false. Exiting loop
might_sleep();
^
include/linux/kernel.h:180:24: note: expanded from macro 'might_sleep'
# define might_sleep() do { might_resched(); } while (0)
^
fs/fs-writeback.c:1206:7: note: 'skip_if_busy' is false
if (!skip_if_busy || !writeback_in_progress(&bdi->wb)) {
^~~~~~~~~~~~
fs/fs-writeback.c:1206:20: note: Left side of '||' is true
if (!skip_if_busy || !writeback_in_progress(&bdi->wb)) {
^
fs/fs-writeback.c:1208:3: note: Calling 'wb_queue_work'
wb_queue_work(&bdi->wb, base_work);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/fs-writeback.c:163:6: note: Assuming field 'done' is null
if (work->done)
^~~~~~~~~~
fs/fs-writeback.c:163:2: note: Taking false branch
if (work->done)
^
fs/fs-writeback.c:168:6: note: Assuming the condition is false
if (test_bit(WB_registered, &wb->state)) {
^
include/asm-generic/bitops/non-atomic.h:120:18: note: expanded from macro
'test_bit'
#define test_bit arch_test_bit
^
fs/fs-writeback.c:168:2: note: Taking false branch
if (test_bit(WB_registered, &wb->state)) {
^
fs/fs-writeback.c:172:3: note: Calling 'finish_writeback_work'
finish_writeback_work(wb, work);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/fs-writeback.c:147:6: note: Assuming field 'auto_free' is not equal to 0
if (work->auto_free)
^~~~~~~~~~~~~~~
fs/fs-writeback.c:147:2: note: Taking true branch
if (work->auto_free)
^
fs/fs-writeback.c:148:3: note: Argument to kfree() is the address of the local variable
'work', which is not memory allocated by malloc()
kfree(work);
^ ~~~~
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
65 warnings generated.
Suppressed 65 warnings (65 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
32 warnings generated.
fs/configfs/file.c:270:4: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(tbuf, buffer->bin_buffer,
^~~~~~
fs/configfs/file.c:270:4: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(tbuf, buffer->bin_buffer,
^~~~~~
fs/configfs/file.c:276:3: warning: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(tbuf + buffer->bin_buffer_size, 0,
^~~~~~
fs/configfs/file.c:276:3: note: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(tbuf + buffer->bin_buffer_size, 0,
^~~~~~
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
32 warnings generated.
fs/configfs/dir.c:1315:2: warning: Call to function 'snprintf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(name, dentry->d_name.len + 1, "%s",
dentry->d_name.name);
^~~~~~~~
fs/configfs/dir.c:1315:2: note: Call to function 'snprintf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
snprintf(name, dentry->d_name.len + 1, "%s",
dentry->d_name.name);
^~~~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
49 warnings generated.
> fs/erofs/zdata.c:51:3: warning: Call to function
'sprintf' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(pcs->name, "erofs_pcluster-%u", pcs->maxpages);
^~~~~~~
fs/erofs/zdata.c:51:3: note: Call to function 'sprintf' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
sprintf(pcs->name, "erofs_pcluster-%u",
pcs->maxpages);
^~~~~~~
fs/erofs/zdata.c:1167:4: warning: Value stored to 'justfound' is never read
[clang-analyzer-deadcode.DeadStores]
justfound = 0;
^ ~
fs/erofs/zdata.c:1167:4: note: Value stored to 'justfound' is never read
justfound = 0;
^ ~
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
51 warnings generated.
fs/zonefs/super.c:724:16: warning: Assigned value is garbage or undefined
[clang-analyzer-core.uninitialized.Assign]
iocb->ki_pos += size;
^
fs/zonefs/super.c:914:6: note: Assuming the condition is true
if (unlikely(IS_IMMUTABLE(inode)))
^
include/linux/compiler.h:78:40: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^~~~
fs/zonefs/super.c:914:2: note: Taking false branch
if (unlikely(IS_IMMUTABLE(inode)))
^
fs/zonefs/super.c:917:6: note: Assuming the condition is false
if (sb_rdonly(inode->i_sb))
^~~~~~~~~~~~~~~~~~~~~~
fs/zonefs/super.c:917:2: note: Taking false branch
if (sb_rdonly(inode->i_sb))
^
fs/zonefs/super.c:921:6: note: Assuming field 'ki_pos' is < field
'i_max_size'
if (iocb->ki_pos >= ZONEFS_I(inode)->i_max_size)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/zonefs/super.c:921:2: note: Taking false branch
if (iocb->ki_pos >= ZONEFS_I(inode)->i_max_size)
^
fs/zonefs/super.c:924:6: note: Assuming the condition is true
if (iocb->ki_flags & IOCB_DIRECT) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/zonefs/super.c:924:2: note: Taking true branch
if (iocb->ki_flags & IOCB_DIRECT) {
^
fs/zonefs/super.c:925:17: note: Calling 'zonefs_file_dio_write'
ssize_t ret = zonefs_file_dio_write(iocb, from);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/zonefs/super.c:817:6: note: Assuming field 'i_ztype' is not equal to
ZONEFS_ZTYPE_SEQ
if (zi->i_ztype == ZONEFS_ZTYPE_SEQ && !sync &&
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/zonefs/super.c:817:38: note: Left side of '&&' is false
if (zi->i_ztype == ZONEFS_ZTYPE_SEQ && !sync &&
^
fs/zonefs/super.c:821:6: note: Assuming the condition is true
if (iocb->ki_flags & IOCB_NOWAIT) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/zonefs/super.c:821:2: note: Taking true branch
if (iocb->ki_flags & IOCB_NOWAIT) {
^
fs/zonefs/super.c:822:7: note: Assuming the condition is false
if (!inode_trylock(inode))
^~~~~~~~~~~~~~~~~~~~~
fs/zonefs/super.c:822:3: note: Taking false branch
if (!inode_trylock(inode))
^
fs/zonefs/super.c:829:6: note: 'count' is > 0
if (count <= 0) {
^~~~~
fs/zonefs/super.c:829:2: note: Taking false branch
if (count <= 0) {
^
fs/zonefs/super.c:834:6: note: Assuming the condition is false
if ((iocb->ki_pos | count) & (sb->s_blocksize - 1)) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/zonefs/super.c:834:2: note: Taking false branch
if ((iocb->ki_pos | count) & (sb->s_blocksize - 1)) {
^
fs/zonefs/super.c:840:6: note: Assuming field 'i_ztype' is equal to
ZONEFS_ZTYPE_SEQ
if (zi->i_ztype == ZONEFS_ZTYPE_SEQ) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/zonefs/super.c:840:2: note: Taking true branch
if (zi->i_ztype == ZONEFS_ZTYPE_SEQ) {
^
fs/zonefs/super.c:842:7: note: Assuming field 'ki_pos' is equal to field
'i_wpoffset'
if (iocb->ki_pos != zi->i_wpoffset) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/zonefs/super.c:842:3: note: Taking false branch
if (iocb->ki_pos != zi->i_wpoffset) {
^
fs/zonefs/super.c:851:6: note: 'append' is true
if (append)
^~~~~~
fs/zonefs/super.c:851:2: note: Taking true branch
if (append)
^
fs/zonefs/super.c:852:9: note: Calling 'zonefs_file_dio_append'
ret = zonefs_file_dio_append(iocb, from);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/zonefs/super.c:683:2: note: 'size' declared without an initial value
ssize_t size;
--
drivers/dma-buf/udmabuf.c:204:3: note: Taking false branch
if (!memfd)
^
drivers/dma-buf/udmabuf.c:207:8: note: Calling 'shmem_mapping'
if (!shmem_mapping(mapping) && !is_file_hugepages(memfd))
^~~~~~~~~~~~~~~~~~~~~~
include/linux/shmem_fs.h:79:2: note: Returning zero, which participates in a condition
later
return false;
^~~~~~~~~~~~
drivers/dma-buf/udmabuf.c:207:8: note: Returning from 'shmem_mapping'
if (!shmem_mapping(mapping) && !is_file_hugepages(memfd))
^~~~~~~~~~~~~~~~~~~~~~
drivers/dma-buf/udmabuf.c:207:7: note: Left side of '&&' is true
if (!shmem_mapping(mapping) && !is_file_hugepages(memfd))
^
drivers/dma-buf/udmabuf.c:207:35: note: Calling 'is_file_hugepages'
if (!shmem_mapping(mapping) && !is_file_hugepages(memfd))
^~~~~~~~~~~~~~~~~~~~~~~~
include/linux/hugetlb.h:484:6: note: Assuming the condition is true
if (file->f_op == &hugetlbfs_file_operations)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/hugetlb.h:484:2: note: Taking true branch
if (file->f_op == &hugetlbfs_file_operations)
^
include/linux/hugetlb.h:485:3: note: Returning the value 1, which participates in a
condition later
return true;
^~~~~~~~~~~
drivers/dma-buf/udmabuf.c:207:35: note: Returning from 'is_file_hugepages'
if (!shmem_mapping(mapping) && !is_file_hugepages(memfd))
^~~~~~~~~~~~~~~~~~~~~~~~
drivers/dma-buf/udmabuf.c:207:3: note: Taking false branch
if (!shmem_mapping(mapping) && !is_file_hugepages(memfd))
^
drivers/dma-buf/udmabuf.c:210:7: note: Assuming the condition is false
if (seals == -EINVAL)
^~~~~~~~~~~~~~~~
drivers/dma-buf/udmabuf.c:210:3: note: Taking false branch
if (seals == -EINVAL)
^
drivers/dma-buf/udmabuf.c:213:7: note: Assuming the condition is false
if ((seals & SEALS_WANTED) != SEALS_WANTED ||
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/dma-buf/udmabuf.c:213:7: note: Left side of '||' is false
drivers/dma-buf/udmabuf.c:214:7: note: Assuming the condition is false
(seals & SEALS_DENIED) != 0)
^~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/dma-buf/udmabuf.c:213:3: note: Taking false branch
if ((seals & SEALS_WANTED) != SEALS_WANTED ||
^
drivers/dma-buf/udmabuf.c:218:3: note: Taking false branch
if (is_file_hugepages(memfd)) {
^
drivers/dma-buf/udmabuf.c:225:19: note: Assuming 'pgidx' is <
'pgcnt'
for (pgidx = 0; pgidx < pgcnt; pgidx++) {
^~~~~~~~~~~~~
drivers/dma-buf/udmabuf.c:225:3: note: Loop condition is true. Entering loop body
for (pgidx = 0; pgidx < pgcnt; pgidx++) {
^
drivers/dma-buf/udmabuf.c:226:8: note: Calling 'is_file_hugepages'
if (is_file_hugepages(memfd)) {
^~~~~~~~~~~~~~~~~~~~~~~~
include/linux/hugetlb.h:484:6: note: Assuming the condition is true
if (file->f_op == &hugetlbfs_file_operations)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/hugetlb.h:484:2: note: Taking true branch
if (file->f_op == &hugetlbfs_file_operations)
^
include/linux/hugetlb.h:485:3: note: Returning the value 1, which participates in a
condition later
return true;
^~~~~~~~~~~
drivers/dma-buf/udmabuf.c:226:8: note: Returning from 'is_file_hugepages'
if (is_file_hugepages(memfd)) {
^~~~~~~~~~~~~~~~~~~~~~~~
drivers/dma-buf/udmabuf.c:226:4: note: Taking true branch
if (is_file_hugepages(memfd)) {
^
drivers/dma-buf/udmabuf.c:227:10: note: 'hpage' is null
if (!hpage) {
^~~~~
drivers/dma-buf/udmabuf.c:227:5: note: Taking true branch
if (!hpage) {
^
drivers/dma-buf/udmabuf.c:230:10: note: Assuming 'hpage' is non-null
if (!hpage) {
^~~~~~
drivers/dma-buf/udmabuf.c:230:6: note: Taking false branch
if (!hpage) {
^
drivers/dma-buf/udmabuf.c:235:18: note: The right operand of '+' is a garbage
value
page = hpage + subpgoff;
^ ~~~~~~~~
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
47 warnings generated.
> fs/freevxfs/vxfs_fshead.c:87:3: warning: Call to function
'memcpy' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(fhp, bp->b_data, sizeof(*fhp));
^~~~~~
fs/freevxfs/vxfs_fshead.c:87:3: note: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(fhp, bp->b_data, sizeof(*fhp));
^~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
47 warnings generated.
> fs/freevxfs/vxfs_immed.c:73:2: warning: Call to function
'memcpy' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(kaddr, vip->vii_immed.vi_immed + offset, PAGE_SIZE);
^~~~~~
fs/freevxfs/vxfs_immed.c:73:2: note: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(kaddr, vip->vii_immed.vi_immed + offset, PAGE_SIZE);
^~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
22 warnings generated.
Suppressed 22 warnings (22 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
19 warnings generated.
drivers/pps/sysfs.c:26:9: warning: Call to function 'sprintf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%lld.%09d#%d\n",
^~~~~~~
drivers/pps/sysfs.c:26:9: note: Call to function 'sprintf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
return sprintf(buf, "%lld.%09d#%d\n",
^~~~~~~
drivers/pps/sysfs.c:40:9: warning: Call to function 'sprintf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%lld.%09d#%d\n",
^~~~~~~
drivers/pps/sysfs.c:40:9: note: Call to function 'sprintf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
return sprintf(buf, "%lld.%09d#%d\n",
^~~~~~~
drivers/pps/sysfs.c:51:9: warning: Call to function 'sprintf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%4x\n", pps->info.mode);
^~~~~~~
drivers/pps/sysfs.c:51:9: note: Call to function 'sprintf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
return sprintf(buf, "%4x\n", pps->info.mode);
^~~~~~~
drivers/pps/sysfs.c:60:9: warning: Call to function 'sprintf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", !!pps->info.echo);
^~~~~~~
drivers/pps/sysfs.c:60:9: note: Call to function 'sprintf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
return sprintf(buf, "%d\n", !!pps->info.echo);
^~~~~~~
drivers/pps/sysfs.c:69:9: warning: Call to function 'sprintf' is insecure as it
does not provide bounding of the memory buffer or security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", pps->info.name);
^~~~~~~
drivers/pps/sysfs.c:69:9: note: Call to function 'sprintf' is insecure as it
does not provide bounding of the memory buffer or security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", pps->info.name);
^~~~~~~
drivers/pps/sysfs.c:78:9: warning: Call to function 'sprintf' is insecure as it
does not provide bounding of the memory buffer or security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", pps->info.path);
^~~~~~~
drivers/pps/sysfs.c:78:9: note: Call to function 'sprintf' is insecure as it
does not provide bounding of the memory buffer or security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", pps->info.path);
^~~~~~~
Suppressed 13 warnings (13 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
9 warnings generated.
Suppressed 9 warnings (9 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
15 warnings generated.
lib/usercopy.c:19:3: warning: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(to + (n - res), 0, res);
^~~~~~
lib/usercopy.c:19:3: note: Call to function 'memset' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memset_s' in
case of C11
memset(to + (n - res), 0, res);
^~~~~~
Suppressed 14 warnings (14 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
47 warnings generated.
drivers/regulator/helpers.c:963:6: warning: Assigned value is garbage or undefined
[clang-analyzer-core.uninitialized.Assign]
sel <<= ffs(rdev->desc->ramp_mask) - 1;
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/regulator/helpers.c:951:14: note: Assuming field 'n_ramp_values' is not
equal to 0
if (WARN_ON(!rdev->desc->n_ramp_values ||
!rdev->desc->ramp_delay_table))
^
include/asm-generic/bug.h:166:25: note: expanded from macro 'WARN_ON'
int __ret_warn_on = !!(condition); \
^~~~~~~~~
drivers/regulator/helpers.c:951:14: note: Left side of '||' is false
if (WARN_ON(!rdev->desc->n_ramp_values ||
!rdev->desc->ramp_delay_table))
^
drivers/regulator/helpers.c:951:44: note: Assuming field 'ramp_delay_table' is
non-null
if (WARN_ON(!rdev->desc->n_ramp_values ||
!rdev->desc->ramp_delay_table))
^
include/asm-generic/bug.h:166:25: note: expanded from macro 'WARN_ON'
int __ret_warn_on = !!(condition); \
^~~~~~~~~
drivers/regulator/helpers.c:951:2: note: Taking false branch
if (WARN_ON(!rdev->desc->n_ramp_values ||
!rdev->desc->ramp_delay_table))
^
drivers/regulator/helpers.c:957:6: note: 'ret' is 0
if (ret) {
^~~
drivers/regulator/helpers.c:957:2: note: Taking false branch
if (ret) {
^
drivers/regulator/helpers.c:963:6: note: Assigned value is garbage or undefined
sel <<= ffs(rdev->desc->ramp_mask) - 1;
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
47 warnings generated.
> drivers/leds/trigger/ledtrig-backlight.c:65:9: warning: Call to
function 'sprintf' is insecure as it does not provide security checks introduced
in the C11 standard. Replace with analogous functions that support length arguments or
provides boundary checks such as 'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", n->invert);
^~~~~~~
drivers/leds/trigger/ledtrig-backlight.c:65:9: note: Call to function 'sprintf'
is insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
return sprintf(buf, "%u\n", n->invert);
^~~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
39 warnings generated.
drivers/leds/trigger/ledtrig-gpio.c:53:9: warning: Call to function 'sprintf'
is insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", gpio_data->desired_brightness);
^~~~~~~
drivers/leds/trigger/ledtrig-gpio.c:53:9: note: Call to function 'sprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
return sprintf(buf, "%u\n", gpio_data->desired_brightness);
^~~~~~~
drivers/leds/trigger/ledtrig-gpio.c:63:8: warning: Call to function 'sscanf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'sscanf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = sscanf(buf, "%u", &desired_brightness);
^~~~~~
drivers/leds/trigger/ledtrig-gpio.c:63:8: note: Call to function 'sscanf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'sscanf_s' in case of C11
ret = sscanf(buf, "%u", &desired_brightness);
^~~~~~
drivers/leds/trigger/ledtrig-gpio.c:81:9: warning: Call to function 'sprintf'
is insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", gpio_data->inverted);
^~~~~~~
drivers/leds/trigger/ledtrig-gpio.c:81:9: note: Call to function 'sprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
return sprintf(buf, "%u\n", gpio_data->inverted);
^~~~~~~
drivers/leds/trigger/ledtrig-gpio.c:115:9: warning: Call to function 'sprintf'
is insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", gpio_data->gpio);
^~~~~~~
drivers/leds/trigger/ledtrig-gpio.c:115:9: note: Call to function 'sprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
return sprintf(buf, "%u\n", gpio_data->gpio);
^~~~~~~
drivers/leds/trigger/ledtrig-gpio.c:126:8: warning: Call to function 'sscanf'
is insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'sscanf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = sscanf(buf, "%u", &gpio);
^~~~~~
drivers/leds/trigger/ledtrig-gpio.c:126:8: note: Call to function 'sscanf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'sscanf_s' in case of C11
ret = sscanf(buf, "%u", &gpio);
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
16 warnings generated.
lib/lz4/lz4hc_compress.c:63:2: warning: Call to function 'memset' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset((void *)hc4->hashTable, 0, sizeof(hc4->hashTable));
^~~~~~
lib/lz4/lz4hc_compress.c:63:2: note: Call to function 'memset' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset((void *)hc4->hashTable, 0, sizeof(hc4->hashTable));
^~~~~~
lib/lz4/lz4hc_compress.c:64:2: warning: Call to function 'memset' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(hc4->chainTable, 0xFF, sizeof(hc4->chainTable));
^~~~~~
lib/lz4/lz4hc_compress.c:64:2: note: Call to function 'memset' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(hc4->chainTable, 0xFF, sizeof(hc4->chainTable));
^~~~~~
lib/lz4/lz4hc_compress.c:573:3: warning: Call to function 'memcpy' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
LZ4_memcpy(op, anchor, iend - anchor);
^
lib/lz4/lz4defs.h:150:36: note: expanded from macro 'LZ4_memcpy'
#define LZ4_memcpy(dst, src, size) __builtin_memcpy(dst, src, size)
^~~~~~~~~~~~~~~~
lib/lz4/lz4hc_compress.c:573:3: note: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
LZ4_memcpy(op, anchor, iend - anchor);
^
lib/lz4/lz4defs.h:150:36: note: expanded from macro 'LZ4_memcpy'
#define LZ4_memcpy(dst, src, size) __builtin_memcpy(dst, src, size)
^~~~~~~~~~~~~~~~
lib/lz4/lz4hc_compress.c:750:2: warning: Call to function 'memmove' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memmove_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(safeBuffer, streamPtr->end - dictSize, dictSize);
^~~~~~~
lib/lz4/lz4hc_compress.c:750:2: note: Call to function 'memmove' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memmove_s' in case of C11
memmove(safeBuffer, streamPtr->end - dictSize, dictSize);
^~~~~~~
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
23 warnings generated.
lib/lz4/lz4_decompress.c:156:4: warning: Call to function 'memcpy' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
LZ4_memcpy(op, ip, endOnInput ? 16 : 8);
^
lib/lz4/lz4defs.h:150:36: note: expanded from macro 'LZ4_memcpy'
#define LZ4_memcpy(dst, src, size) __builtin_memcpy(dst, src, size)
^~~~~~~~~~~~~~~~
lib/lz4/lz4_decompress.c:156:4: note: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
LZ4_memcpy(op, ip, endOnInput ? 16 : 8);
^
lib/lz4/lz4defs.h:150:36: note: expanded from macro 'LZ4_memcpy'
#define LZ4_memcpy(dst, src, size) __builtin_memcpy(dst, src, size)
^~~~~~~~~~~~~~~~
lib/lz4/lz4_decompress.c:175:5: warning: Call to function 'memcpy' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
LZ4_memcpy(op + 0, match + 0, 8);
^
lib/lz4/lz4defs.h:150:36: note: expanded from macro 'LZ4_memcpy'
#define LZ4_memcpy(dst, src, size) __builtin_memcpy(dst, src, size)
^~~~~~~~~~~~~~~~
lib/lz4/lz4_decompress.c:175:5: note: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
LZ4_memcpy(op + 0, match + 0, 8);
^
lib/lz4/lz4defs.h:150:36: note: expanded from macro 'LZ4_memcpy'
#define LZ4_memcpy(dst, src, size) __builtin_memcpy(dst, src, size)
^~~~~~~~~~~~~~~~
lib/lz4/lz4_decompress.c:176:5: warning: Call to function 'memcpy' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
LZ4_memcpy(op + 8, match + 8, 8);
--
drivers/mfd/wm831x-irq.c:517:7: note: Assuming 'primary' is equal to
WM831X_GP_INT
if (primary == WM831X_GP_INT &&
^~~~~~~~~~~~~~~~~~~~~~~~
drivers/mfd/wm831x-irq.c:517:7: note: Left side of '&&' is true
drivers/mfd/wm831x-irq.c:518:7: note: Assuming the condition is true
wm831x->gpio_level_high[i - WM831X_IRQ_GPIO_1]) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/mfd/wm831x-irq.c:517:3: note: Taking true branch
if (primary == WM831X_GP_INT &&
^
drivers/mfd/wm831x-irq.c:520:19: note: The result of the left shift is undefined due to
shifting by '4294967295', which is greater or equal to the width of type
'int'
while (ret & 1 << (i - WM831X_IRQ_GPIO_1)) {
^ ~~~~~~~~~~~~~~~~~~~~~~~
drivers/mfd/wm831x-irq.c:531:21: warning: The result of the left shift is undefined due
to shifting by '4294967295', which is greater or equal to the width of type
'int' [clang-analyzer-core.UndefinedBinaryOperatorResult]
while (!(ret & 1 << (i - WM831X_IRQ_GPIO_1))) {
^ ~~~~~~~~~~~~~~~~~~~~~~~
drivers/mfd/wm831x-irq.c:459:6: note: Assuming 'primary' is >= 0
if (primary < 0) {
^~~~~~~~~~~
drivers/mfd/wm831x-irq.c:459:2: note: Taking false branch
if (primary < 0) {
^
drivers/mfd/wm831x-irq.c:470:6: note: Assuming the condition is false
if (primary & WM831X_TCHPD_INT)
^~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/mfd/wm831x-irq.c:470:2: note: Taking false branch
if (primary & WM831X_TCHPD_INT)
^
drivers/mfd/wm831x-irq.c:473:6: note: Assuming the condition is false
if (primary & WM831X_TCHDATA_INT)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/mfd/wm831x-irq.c:473:2: note: Taking false branch
if (primary & WM831X_TCHDATA_INT)
^
drivers/mfd/wm831x-irq.c:478:2: note: Loop condition is true. Entering loop body
for (i = 0; i < ARRAY_SIZE(wm831x_irqs); i++) {
^
drivers/mfd/wm831x-irq.c:481:7: note: Assuming the condition is false
if (!(primary & wm831x_irqs[i].primary))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/mfd/wm831x-irq.c:481:3: note: Taking false branch
if (!(primary & wm831x_irqs[i].primary))
^
drivers/mfd/wm831x-irq.c:488:7: note: Assuming the condition is false
if (!read[offset]) {
^~~~~~~~~~~~~
drivers/mfd/wm831x-irq.c:488:3: note: Taking false branch
if (!read[offset]) {
^
drivers/mfd/wm831x-irq.c:510:7: note: Assuming the condition is false
if (*status & wm831x_irqs[i].mask)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/mfd/wm831x-irq.c:510:3: note: Taking false branch
if (*status & wm831x_irqs[i].mask)
^
drivers/mfd/wm831x-irq.c:517:7: note: Assuming 'primary' is equal to
WM831X_GP_INT
if (primary == WM831X_GP_INT &&
^~~~~~~~~~~~~~~~~~~~~~~~
drivers/mfd/wm831x-irq.c:517:7: note: Left side of '&&' is true
drivers/mfd/wm831x-irq.c:518:7: note: Assuming the condition is false
wm831x->gpio_level_high[i - WM831X_IRQ_GPIO_1]) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/mfd/wm831x-irq.c:517:3: note: Taking false branch
if (primary == WM831X_GP_INT &&
^
drivers/mfd/wm831x-irq.c:528:7: note: 'primary' is equal to WM831X_GP_INT
if (primary == WM831X_GP_INT &&
^~~~~~~
drivers/mfd/wm831x-irq.c:528:7: note: Left side of '&&' is true
drivers/mfd/wm831x-irq.c:529:7: note: Assuming the condition is true
wm831x->gpio_level_low[i - WM831X_IRQ_GPIO_1]) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/mfd/wm831x-irq.c:528:3: note: Taking true branch
if (primary == WM831X_GP_INT &&
^
drivers/mfd/wm831x-irq.c:531:21: note: The result of the left shift is undefined due to
shifting by '4294967295', which is greater or equal to the width of type
'int'
while (!(ret & 1 << (i - WM831X_IRQ_GPIO_1))) {
^ ~~~~~~~~~~~~~~~~~~~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
36 warnings generated.
fs/locks.c:325:2: warning: Call to function 'memset' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memset_s' in
case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(fl, 0, sizeof(struct file_lock));
^~~~~~
fs/locks.c:325:2: note: Call to function 'memset' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memset_s' in
case of C11
memset(fl, 0, sizeof(struct file_lock));
^~~~~~
fs/locks.c:2415:3: warning: Value stored to 'cmd' is never read
[clang-analyzer-deadcode.DeadStores]
cmd = F_GETLK64;
^
fs/locks.c:2415:3: note: Value stored to 'cmd' is never read
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
fs/binfmt_flat.c:908:2: warning: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&bprm, 0, sizeof(bprm));
^~~~~~
fs/binfmt_flat.c:908:2: note: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(&bprm, 0, sizeof(bprm));
^~~~~~
> fs/binfmt_flat.c:911:2: warning: Call to function
'sprintf' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(buf, "/lib/lib%d.so", id);
^~~~~~~
fs/binfmt_flat.c:911:2: note: Call to function 'sprintf' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
sprintf(buf, "/lib/lib%d.so", id);
^~~~~~~
fs/binfmt_flat.c:948:2: warning: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&libinfo, 0, sizeof(libinfo));
^~~~~~
fs/binfmt_flat.c:948:2: note: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(&libinfo, 0, sizeof(libinfo));
^~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
25 warnings generated.
drivers/pwm/sysfs.c:45:9: warning: Call to function 'sprintf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%llu\n", state.period);
^~~~~~~
drivers/pwm/sysfs.c:45:9: note: Call to function 'sprintf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
return sprintf(buf, "%llu\n", state.period);
^~~~~~~
drivers/pwm/sysfs.c:80:9: warning: Call to function 'sprintf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%llu\n", state.duty_cycle);
^~~~~~~
drivers/pwm/sysfs.c:80:9: note: Call to function 'sprintf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
return sprintf(buf, "%llu\n", state.duty_cycle);
^~~~~~~
drivers/pwm/sysfs.c:115:9: warning: Call to function 'sprintf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", state.enabled);
^~~~~~~
drivers/pwm/sysfs.c:115:9: note: Call to function 'sprintf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
return sprintf(buf, "%d\n", state.enabled);
^~~~~~~
drivers/pwm/sysfs.c:174:9: warning: Call to function 'sprintf' is insecure as
it does not provide bounding of the memory buffer or security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", polarity);
^~~~~~~
drivers/pwm/sysfs.c:174:9: note: Call to function 'sprintf' is insecure as it
does not provide bounding of the memory buffer or security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", polarity);
^~~~~~~
drivers/pwm/sysfs.c:215:9: warning: Call to function 'sprintf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u %u\n", result.period, result.duty_cycle);
^~~~~~~
drivers/pwm/sysfs.c:215:9: note: Call to function 'sprintf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
return sprintf(buf, "%u %u\n", result.period, result.duty_cycle);
^~~~~~~
drivers/pwm/sysfs.c:364:9: warning: Call to function 'sprintf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", chip->npwm);
^~~~~~~
drivers/pwm/sysfs.c:364:9: note: Call to function 'sprintf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
return sprintf(buf, "%u\n", chip->npwm);
^~~~~~~
Suppressed 19 warnings (19 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
48 warnings generated.
fs/iomap/direct-io.c:405:4: warning: Call to function 'memset' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(iomap_inline_data(iomap, size), 0, pos - size);
^~~~~~
fs/iomap/direct-io.c:405:4: note: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(iomap_inline_data(iomap, size), 0, pos - size);
^~~~~~
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (46 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
33 warnings generated.
fs/kernfs/symlink.c:76:3: warning: Call to function 'strcpy' is insecure as it
does not provide bounding of the memory buffer. Replace unbounded copy functions with
analogous functions that support length arguments such as 'strlcpy'. CWE-119
[clang-analyzer-security.insecureAPI.strcpy]
strcpy(s, "../");
^~~~~~
fs/kernfs/symlink.c:76:3: note: Call to function 'strcpy' is insecure as it
does not provide bounding of the memory buffer. Replace unbounded copy functions with
analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(s, "../");
^~~~~~
fs/kernfs/symlink.c:101:3: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(s + len, kn->name, slen);
^~~~~~
fs/kernfs/symlink.c:101:3: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(s + len, kn->name, slen);
^~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
59 warnings generated.
kernel/workqueue.c:1962:3: warning: Call to function 'snprintf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(id_buf, sizeof(id_buf), "%d:%d%s", pool->cpu,
id,
--
^~~~~~~~
kernel/trace/trace.c:6129:6: warning: Call to function 'sprintf' is insecure as
it does not provide bounding of the memory buffer or security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
r = sprintf(buf, "%s\n", tr->current_trace->name);
^~~~~~~
kernel/trace/trace.c:6129:6: note: Call to function 'sprintf' is insecure as it
does not provide bounding of the memory buffer or security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'sprintf_s' in case of C11
r = sprintf(buf, "%s\n", tr->current_trace->name);
^~~~~~~
kernel/trace/trace.c:6470:6: warning: Call to function 'snprintf' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
r = snprintf(buf, sizeof(buf), "%ld\n",
^~~~~~~~
kernel/trace/trace.c:6470:6: note: Call to function 'snprintf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
r = snprintf(buf, sizeof(buf), "%ld\n",
^~~~~~~~
kernel/trace/trace.c:6958:9: warning: Call to function 'sprintf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
r = sprintf(buf, "%lu (expanded: %lu)\n",
^~~~~~~
kernel/trace/trace.c:6958:9: note: Call to function 'sprintf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
r = sprintf(buf, "%lu (expanded: %lu)\n",
^~~~~~~
kernel/trace/trace.c:6962:9: warning: Call to function 'sprintf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
r = sprintf(buf, "%lu\n", size >> 10);
^~~~~~~
kernel/trace/trace.c:6962:9: note: Call to function 'sprintf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
r = sprintf(buf, "%lu\n", size >> 10);
^~~~~~~
kernel/trace/trace.c:6964:8: warning: Call to function 'sprintf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
r = sprintf(buf, "X\n");
^~~~~~~
kernel/trace/trace.c:6964:8: note: Call to function 'sprintf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
r = sprintf(buf, "X\n");
^~~~~~~
kernel/trace/trace.c:6966:7: warning: Call to function 'sprintf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
r = sprintf(buf, "%lu\n",
per_cpu_ptr(tr->array_buffer.data, cpu)->entries >> 10);
^~~~~~~
kernel/trace/trace.c:6966:7: note: Call to function 'sprintf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
r = sprintf(buf, "%lu\n",
per_cpu_ptr(tr->array_buffer.data, cpu)->entries >> 10);
^~~~~~~
kernel/trace/trace.c:7018:7: warning: Call to function 'sprintf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
r = sprintf(buf, "%lu\n", size);
^~~~~~~
kernel/trace/trace.c:7018:7: note: Call to function 'sprintf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
r = sprintf(buf, "%lu\n", size);
^~~~~~~
kernel/trace/trace.c:7020:7: warning: Call to function 'sprintf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
r = sprintf(buf, "%lu (expanded: %lu)\n", size,
expanded_size);
^~~~~~~
kernel/trace/trace.c:7020:7: note: Call to function 'sprintf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
r = sprintf(buf, "%lu (expanded: %lu)\n", size,
expanded_size);
^~~~~~~
kernel/trace/trace.c:7102:3: warning: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&entry->buf, FAULTED_STR, FAULTED_SIZE);
^~~~~~
kernel/trace/trace.c:7102:3: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(&entry->buf, FAULTED_STR, FAULTED_SIZE);
^~~~~~
kernel/trace/trace.c:7178:3: warning: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&entry->buf, FAULTED_STR, FAULTED_SIZE);
^~~~~~
kernel/trace/trace.c:7178:3: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(&entry->buf, FAULTED_STR, FAULTED_SIZE);
^~~~~~
kernel/trace/trace.c:7703:8: warning: Call to function 'snprintf' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len = snprintf(buf, sizeof(buf), "%llu\n", val);
^~~~~~~~
kernel/trace/trace.c:7703:8: note: Call to function 'snprintf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
len = snprintf(buf, sizeof(buf), "%llu\n", val);
^~~~~~~~
kernel/trace/trace.c:7824:2: warning: Call to function 'snprintf' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(err->loc, TRACING_LOG_LOC_MAX, "%s: error: ", loc);
^~~~~~~~
kernel/trace/trace.c:7824:2: note: Call to function 'snprintf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
snprintf(err->loc, TRACING_LOG_LOC_MAX, "%s: error: ", loc);
^~~~~~~~
kernel/trace/trace.c:7825:2: warning: Call to function 'snprintf' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(err->cmd, MAX_FILTER_STR_VAL,"\n" CMD_PREFIX
"%s\n", cmd);
^~~~~~~~
kernel/trace/trace.c:7825:2: note: Call to function 'snprintf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
snprintf(err->cmd, MAX_FILTER_STR_VAL,"\n" CMD_PREFIX
"%s\n", cmd);
^~~~~~~~
kernel/trace/trace.c:8590:2: warning: Call to function 'snprintf' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(cpu_dir, 30, "cpu%ld", cpu);
^~~~~~~~
kernel/trace/trace.c:8590:2: note: Call to function 'snprintf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
snprintf(cpu_dir, 30, "cpu%ld", cpu);
^~~~~~~~
kernel/trace/trace.c:8931:6: warning: Call to function 'sprintf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
r = sprintf(buf, "%d\n", r);
^~~~~~~
kernel/trace/trace.c:8931:6: note: Call to function 'sprintf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
r = sprintf(buf, "%d\n", r);
^~~~~~~
kernel/trace/trace.c:8987:6: warning: Call to function 'sprintf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
r = sprintf(buf, "%d\n", r);
^~~~~~~
kernel/trace/trace.c:8987:6: note: Call to function 'sprintf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
r = sprintf(buf, "%d\n", r);
^~~~~~~
Suppressed 48 warnings (47 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
48 warnings generated.
> kernel/module_decompress.c:26:2: warning: Call to function
'memcpy' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(new_pages, info->pages, info->max_pages * sizeof(info->pages));
^~~~~~
kernel/module_decompress.c:26:2: note: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(new_pages, info->pages, info->max_pages *
sizeof(info->pages));
^~~~~~
kernel/module_decompress.c:215:2: warning: Value stored to 'error' is never
read [clang-analyzer-deadcode.DeadStores]
error = module_extend_max_pages(info, n_pages);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/module_decompress.c:215:2: note: Value stored to 'error' is never read
error = module_extend_max_pages(info, n_pages);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
13 warnings generated.
> kernel/module_signing.c:31:2: warning: Call to function
'memcpy' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&ms, mod + (modlen - sizeof(ms)), sizeof(ms));
^~~~~~
kernel/module_signing.c:31:2: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(&ms, mod + (modlen - sizeof(ms)), sizeof(ms));
^~~~~~
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
89 warnings generated.
kernel/kallsyms.c:454:10: warning: Call to function 'sprintf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buffer, "0x%lx", address - symbol_offset);
^~~~~~~
kernel/kallsyms.c:454:10: note: Call to function 'sprintf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
return sprintf(buffer, "0x%lx", address - symbol_offset);
^~~~~~~
kernel/kallsyms.c:457:3: warning: Call to function 'strcpy' is insecure as it
does not provide bounding of the memory buffer. Replace unbounded copy functions with
analogous functions that support length arguments such as 'strlcpy'. CWE-119
[clang-analyzer-security.insecureAPI.strcpy]
strcpy(buffer, name);
^~~~~~
kernel/kallsyms.c:457:3: note: Call to function 'strcpy' is insecure as it does
not provide bounding of the memory buffer. Replace unbounded copy functions with analogous
functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(buffer, name);
^~~~~~
kernel/kallsyms.c:462:10: warning: Call to function 'sprintf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += sprintf(buffer + len, "+%#lx/%#lx", offset, size);
^~~~~~~
kernel/kallsyms.c:462:10: note: Call to function 'sprintf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
len += sprintf(buffer + len, "+%#lx/%#lx", offset, size);
^~~~~~~
kernel/kallsyms.c:465:10: warning: Call to function 'sprintf' is insecure as it
does not provide bounding of the memory buffer or security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += sprintf(buffer + len, " [%s", modname);
^~~~~~~
kernel/kallsyms.c:465:10: note: Call to function 'sprintf' is insecure as it
does not provide bounding of the memory buffer or security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'sprintf_s' in case of C11
len += sprintf(buffer + len, " [%s", modname);
^~~~~~~
kernel/kallsyms.c:475:10: warning: Call to function 'sprintf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += sprintf(buffer + len, "]");
^~~~~~~
kernel/kallsyms.c:475:10: note: Call to function 'sprintf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
len += sprintf(buffer + len, "]");
^~~~~~~
Suppressed 84 warnings (83 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
36 warnings generated.
drivers/char/ipmi/ipmi_plat_data.c:21:2: warning: Call to function 'memset' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(pr, 0, sizeof(pr));
^~~~~~
drivers/char/ipmi/ipmi_plat_data.c:21:2: note: Call to function 'memset' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(pr, 0, sizeof(pr));
^~~~~~
drivers/char/ipmi/ipmi_plat_data.c:22:2: warning: Call to function 'memset' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(r, 0, sizeof(r));
^~~~~~
drivers/char/ipmi/ipmi_plat_data.c:22:2: note: Call to function 'memset' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(r, 0, sizeof(r));
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
13 warnings generated.
Suppressed 13 warnings (13 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
19 warnings generated.
Suppressed 19 warnings (19 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
19 warnings generated.
Suppressed 19 warnings (19 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
46 warnings generated.
> drivers/firmware/efi/efi-pstore.c:60:6: warning: Call to function
'sscanf' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'sscanf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if
(sscanf(name, "dump-type%u-%u-%d-%llu-%c",
^~~~~~
drivers/firmware/efi/efi-pstore.c:60:6: note: Call to function 'sscanf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'sscanf_s' in case of C11
if (sscanf(name, "dump-type%u-%u-%d-%llu-%c",
^~~~~~
drivers/firmware/efi/efi-pstore.c:72:13: warning: Call to function 'sscanf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'sscanf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
} else if (sscanf(name, "dump-type%u-%u-%d-%llu",
^~~~~~
drivers/firmware/efi/efi-pstore.c:72:13: note: Call to function 'sscanf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'sscanf_s' in case of C11
} else if (sscanf(name, "dump-type%u-%u-%d-%llu",
^~~~~~
drivers/firmware/efi/efi-pstore.c:81:13: warning: Call to function 'sscanf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'sscanf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
} else if (sscanf(name, "dump-type%u-%u-%llu",
^~~~~~
drivers/firmware/efi/efi-pstore.c:81:13: note: Call to function 'sscanf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'sscanf_s' in case of C11
} else if (sscanf(name, "dump-type%u-%u-%llu",
^~~~~~
> drivers/firmware/efi/efi-pstore.c:102:2: warning: Call to
function 'memcpy' is insecure as it does not provide security checks introduced in
the C11 standard. Replace with analogous functions that support length arguments or
provides boundary checks such as 'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(record->buf, entry->var.Data,
^~~~~~
drivers/firmware/efi/efi-pstore.c:102:2: note: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(record->buf, entry->var.Data,
^~~~~~
> drivers/firmware/efi/efi-pstore.c:258:2: warning: Call to
function 'memset' is insecure as it does not provide security checks introduced in
the C11 standard. Replace with analogous functions that support length arguments or
provides boundary checks such as 'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(name, 0, sizeof(name));
^~~~~~
drivers/firmware/efi/efi-pstore.c:258:2: note: Call to function 'memset' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(name, 0, sizeof(name));
^~~~~~
> drivers/firmware/efi/efi-pstore.c:260:2: warning: Call to
function 'snprintf' is insecure as it does not provide security checks introduced
in the C11 standard. Replace with analogous functions that support length arguments or
provides boundary checks such as 'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(name, sizeof(name), "dump-type%u-%u-%d-%lld-%c",
^~~~~~~~
drivers/firmware/efi/efi-pstore.c:260:2: note: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
snprintf(name, sizeof(name), "dump-type%u-%u-%d-%lld-%c",
^~~~~~~~
drivers/firmware/efi/efi-pstore.c:338:2: warning: Call to function 'snprintf'
is insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(name, sizeof(name), "dump-type%u-%u-%d-%lld",
^~~~~~~~
drivers/firmware/efi/efi-pstore.c:338:2: note: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
snprintf(name, sizeof(name), "dump-type%u-%u-%d-%lld",
^~~~~~~~
drivers/firmware/efi/efi-pstore.c:345:2: warning: Call to function 'snprintf'
is insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(name, sizeof(name), "dump-type%u-%u-%lld",
^~~~~~~~
drivers/firmware/efi/efi-pstore.c:345:2: note: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
snprintf(name, sizeof(name), "dump-type%u-%u-%lld",
^~~~~~~~
drivers/firmware/efi/efi-pstore.c:373:2: warning: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(entry->var.VariableName, name, name_size);
^~~~~~
drivers/firmware/efi/efi-pstore.c:373:2: note: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(entry->var.VariableName, name, name_size);
^~~~~~
drivers/firmware/efi/efi-pstore.c:391:2: warning: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(entry->var.VariableName, name, name_size);
^~~~~~
drivers/firmware/efi/efi-pstore.c:391:2: note: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(entry->var.VariableName, name, name_size);
^~~~~~
drivers/firmware/efi/efi-pstore.c:392:2: warning: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&(entry->var.VendorGuid), &vendor, sizeof(efi_guid_t));
^~~~~~
drivers/firmware/efi/efi-pstore.c:392:2: note: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(&(entry->var.VendorGuid), &vendor, sizeof(efi_guid_t));
^~~~~~
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
50 warnings generated.
Suppressed 50 warnings (50 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
50 warnings generated.
Suppressed 50 warnings (50 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
49 warnings generated.
fs/jbd2/transaction.c:951:2: warning: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(jh->b_frozen_data, source + offset, bh->b_size);
^~~~~~
fs/jbd2/transaction.c:951:2: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(jh->b_frozen_data, source + offset, bh->b_size);
^~~~~~
fs/jbd2/transaction.c:1409:3: warning: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(jh->b_committed_data, bh->b_data, bh->b_size);
^~~~~~
fs/jbd2/transaction.c:1409:3: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(jh->b_committed_data, bh->b_data, bh->b_size);
^~~~~~
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
49 warnings generated.
fs/jbd2/commit.c:606:2: warning: Value stored to 'err' is never read
[clang-analyzer-deadcode.DeadStores]
err = 0;
^ ~
fs/jbd2/commit.c:606:2: note: Value stored to 'err' is never read
err = 0;
^ ~
fs/jbd2/commit.c:723:4: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy (tagp, journal->j_uuid, 16);
^~~~~~
fs/jbd2/commit.c:723:4: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy (tagp, journal->j_uuid, 16);
^~~~~~
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
52 warnings generated.
fs/jbd2/recovery.c:209:3: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&tag, tagp, sizeof(tag));
^~~~~~
fs/jbd2/recovery.c:209:3: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(&tag, tagp, sizeof(tag));
^~~~~~
fs/jbd2/recovery.c:290:2: warning: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&info, 0, sizeof(info));
^~~~~~
fs/jbd2/recovery.c:290:2: note: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(&info, 0, sizeof(info));
^~~~~~
fs/jbd2/recovery.c:354:2: warning: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset (&info, 0, sizeof(info));
^~~~~~
fs/jbd2/recovery.c:354:2: note: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset (&info, 0, sizeof(info));
^~~~~~
fs/jbd2/recovery.c:616:5: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&tag, tagp, sizeof(tag));
^~~~~~
fs/jbd2/recovery.c:616:5: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(&tag, tagp, sizeof(tag));
^~~~~~
fs/jbd2/recovery.c:678:6: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(nbh->b_data, obh->b_data,
^~~~~~
fs/jbd2/recovery.c:678:6: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(nbh->b_data, obh->b_data,
^~~~~~
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
48 warnings generated.
> drivers/firmware/efi/efi.c:127:10: warning: Call to function
'sprintf' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
str += sprintf(str, "ACPI20=0x%lx\n", efi.acpi20);
^~~~~~~
drivers/firmware/efi/efi.c:127:10: note: Call to function 'sprintf' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
str += sprintf(str, "ACPI20=0x%lx\n", efi.acpi20);
^~~~~~~
drivers/firmware/efi/efi.c:129:10: warning: Call to function 'sprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
str += sprintf(str, "ACPI=0x%lx\n", efi.acpi);
^~~~~~~
drivers/firmware/efi/efi.c:129:10: note: Call to function 'sprintf' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
str += sprintf(str, "ACPI=0x%lx\n", efi.acpi);
^~~~~~~
drivers/firmware/efi/efi.c:136:10: warning: Call to function 'sprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
str += sprintf(str, "SMBIOS3=0x%lx\n", efi.smbios3);
^~~~~~~
drivers/firmware/efi/efi.c:136:10: note: Call to function 'sprintf' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
str += sprintf(str, "SMBIOS3=0x%lx\n", efi.smbios3);
^~~~~~~
drivers/firmware/efi/efi.c:138:10: warning: Call to function 'sprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
str += sprintf(str, "SMBIOS=0x%lx\n", efi.smbios);
^~~~~~~
drivers/firmware/efi/efi.c:138:10: note: Call to function 'sprintf' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
str += sprintf(str, "SMBIOS=0x%lx\n", efi.smbios);
^~~~~~~
drivers/firmware/efi/efi.c:151:9: warning: Call to function 'sprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", efi_enabled(EFI_64BIT) ? 64 : 32);
^~~~~~~
drivers/firmware/efi/efi.c:151:9: note: Call to function 'sprintf' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
return sprintf(buf, "%d\n", efi_enabled(EFI_64BIT) ? 64 : 32);
^~~~~~~
> drivers/firmware/efi/efi.c:322:4: warning: Call to function
'snprintf' is insecure as it does not provide security checks introduced in the
C11 standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(name, sizeof(name), "boot_services_code%d",
^~~~~~~~
drivers/firmware/efi/efi.c:322:4: note: Call to function 'snprintf' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
snprintf(name, sizeof(name), "boot_services_code%d",
^~~~~~~~
drivers/firmware/efi/efi.c:326:4: warning: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(name, sizeof(name), "boot_services_data%d",
^~~~~~~~
drivers/firmware/efi/efi.c:326:4: note: Call to function 'snprintf' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
snprintf(name, sizeof(name), "boot_services_data%d",
^~~~~~~~
> drivers/firmware/efi/efi.c:468:4: warning: Call to function
'memcpy' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(out_md, md, sizeof(*out_md));
^~~~~~
drivers/firmware/efi/efi.c:468:4: note: Call to function 'memcpy' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(out_md, md, sizeof(*out_md));
^~~~~~
drivers/firmware/efi/efi.c:761:14: warning: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
type_len = snprintf(pos, size, "[type=%u", md->type);
^~~~~~~~
drivers/firmware/efi/efi.c:761:14: note: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
type_len = snprintf(pos, size, "[type=%u", md->type);
^~~~~~~~
drivers/firmware/efi/efi.c:763:14: warning: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
type_len = snprintf(pos, size, "[%-*s",
^~~~~~~~
drivers/firmware/efi/efi.c:763:14: note: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
type_len = snprintf(pos, size, "[%-*s",
^~~~~~~~
drivers/firmware/efi/efi.c:778:3: warning: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(pos, size, "|attr=0x%016llx]",
^~~~~~~~
drivers/firmware/efi/efi.c:778:3: note: Call to function 'snprintf' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
snprintf(pos, size, "|attr=0x%016llx]",
^~~~~~~~
drivers/firmware/efi/efi.c:781:3: warning: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(pos, size,
^~~~~~~~
drivers/firmware/efi/efi.c:781:3: note: Call to function 'snprintf' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
snprintf(pos, size,
^~~~~~~~
Suppressed 36 warnings (35 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
15 warnings generated.
lib/xz/xz_dec_stream.c:162:2: warning: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(s->temp.buf + s->temp.pos, b->in + b->in_pos, copy_size);
^~~~~~
lib/xz/xz_dec_stream.c:162:2: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(s->temp.buf + s->temp.pos, b->in + b->in_pos, copy_size);
^~~~~~
lib/xz/xz_dec_stream.c:822:2: warning: Call to function 'memset' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memzero(&s->block, sizeof(s->block));
^
lib/xz/xz_private.h:44:30: note: expanded from macro 'memzero'
# define memzero(buf, size) memset(buf, 0, size)
^~~~~~
lib/xz/xz_dec_stream.c:822:2: note: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memzero(&s->block, sizeof(s->block));
^
lib/xz/xz_private.h:44:30: note: expanded from macro 'memzero'
# define memzero(buf, size) memset(buf, 0, size)
^~~~~~
lib/xz/xz_dec_stream.c:823:2: warning: Call to function 'memset' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memzero(&s->index, sizeof(s->index));
^
lib/xz/xz_private.h:44:30: note: expanded from macro 'memzero'
# define memzero(buf, size) memset(buf, 0, size)
^~~~~~
lib/xz/xz_dec_stream.c:823:2: note: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memzero(&s->index, sizeof(s->index));
^
lib/xz/xz_private.h:44:30: note: expanded from macro 'memzero'
# define memzero(buf, size) memset(buf, 0, size)
^~~~~~
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
19 warnings generated.
lib/xz/xz_dec_lzma2.c:401:3: warning: Call to function 'memmove' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memmove_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(dict->buf + dict->pos, b->in + b->in_pos,
copy_size);
^~~~~~~
lib/xz/xz_dec_lzma2.c:401:3: note: Call to function 'memmove' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memmove_s' in case of C11
memmove(dict->buf + dict->pos, b->in + b->in_pos,
copy_size);
^~~~~~~
lib/xz/xz_dec_lzma2.c:415:4: warning: Call to function 'memmove' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memmove_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(b->out + b->out_pos, b->in + b->in_pos,
^~~~~~~
lib/xz/xz_dec_lzma2.c:415:4: note: Call to function 'memmove' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memmove_s' in case of C11
memmove(b->out + b->out_pos, b->in + b->in_pos,
^~~~~~~
lib/xz/xz_dec_lzma2.c:456:4: warning: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(b->out + b->out_pos, dict->buf +
dict->start,
^~~~~~
lib/xz/xz_dec_lzma2.c:456:4: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(b->out + b->out_pos, dict->buf +
dict->start,
^~~~~~
lib/xz/xz_dec_lzma2.c:892:3: warning: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(s->temp.buf + s->temp.size, b->in + b->in_pos,
tmp);
^~~~~~
lib/xz/xz_dec_lzma2.c:892:3: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(s->temp.buf + s->temp.size, b->in + b->in_pos,
tmp);
^~~~~~
lib/xz/xz_dec_lzma2.c:895:4: warning: Call to function 'memset' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memzero(s->temp.buf + s->temp.size + tmp,
^
lib/xz/xz_private.h:44:30: note: expanded from macro 'memzero'
# define memzero(buf, size) memset(buf, 0, size)
^~~~~~
lib/xz/xz_dec_lzma2.c:895:4: note: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memzero(s->temp.buf + s->temp.size + tmp,
--
kernel/time/clocksource.c:1359:9: note: Calling 'clocksource_unbind'
ret = clocksource_unbind(cs);
^~~~~~~~~~~~~~~~~~~~~~
kernel/time/clocksource.c:1219:2: note: Taking false branch
if (clocksource_is_watchdog(cs)) {
^
kernel/time/clocksource.c:1226:6: note: Assuming 'cs' is equal to
'curr_clocksource'
if (cs == curr_clocksource) {
^~~~~~~~~~~~~~~~~~~~~~
kernel/time/clocksource.c:1226:2: note: Taking true branch
if (cs == curr_clocksource) {
^
kernel/time/clocksource.c:1229:7: note: Assuming 'curr_clocksource' is not
equal to 'cs'
if (curr_clocksource == cs)
^~~~~~~~~~~~~~~~~~~~~~
kernel/time/clocksource.c:1229:3: note: Taking false branch
if (curr_clocksource == cs)
^
kernel/time/clocksource.c:1233:6: note: Assuming the condition is true
if (clocksource_is_suspend(cs)) {
^~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/time/clocksource.c:1233:2: note: Taking true branch
if (clocksource_is_suspend(cs)) {
^
kernel/time/clocksource.c:1239:3: note: Calling 'clocksource_suspend_select'
clocksource_suspend_select(true);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/time/clocksource.c:713:6: note: 'fallback' is true
if (fallback)
^~~~~~~~
kernel/time/clocksource.c:713:2: note: Taking true branch
if (fallback)
^
kernel/time/clocksource.c:716:22: note: Null pointer value stored to 'cs'
list_for_each_entry(cs, &clocksource_list, list) {
^
include/linux/list.h:638:7: note: expanded from macro 'list_for_each_entry'
for (pos = list_first_entry(head, typeof(*pos), member); \
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/time/clocksource.c:716:2: note: Loop condition is true. Entering loop body
list_for_each_entry(cs, &clocksource_list, list) {
^
include/linux/list.h:638:2: note: expanded from macro 'list_for_each_entry'
for (pos = list_first_entry(head, typeof(*pos), member); \
^
kernel/time/clocksource.c:718:7: note: 'fallback' is true
if (fallback && cs == old_suspend)
^~~~~~~~
kernel/time/clocksource.c:718:7: note: Left side of '&&' is true
kernel/time/clocksource.c:718:19: note: Assuming 'cs' is equal to
'old_suspend'
if (fallback && cs == old_suspend)
^~~~~~~~~~~~~~~~~
kernel/time/clocksource.c:718:3: note: Taking true branch
if (fallback && cs == old_suspend)
^
kernel/time/clocksource.c:719:4: note: Execution continues on line 716
continue;
^
kernel/time/clocksource.c:716:2: note: Dereference of null pointer
list_for_each_entry(cs, &clocksource_list, list) {
^
include/linux/list.h:640:13: note: expanded from macro 'list_for_each_entry'
pos = list_next_entry(pos, member))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/list.h:564:2: note: expanded from macro 'list_next_entry'
list_entry((pos)->member.next, typeof(*(pos)), member)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/list.h:520:2: note: expanded from macro 'list_entry'
container_of(ptr, type, member)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/container_of.h:18:25: note: expanded from macro 'container_of'
void *__mptr = (void *)(ptr); \
^~~~~
kernel/time/clocksource.c:1282:10: warning: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
count = snprintf(buf, PAGE_SIZE, "%s\n", curr_clocksource->name);
^~~~~~~~
kernel/time/clocksource.c:1282:10: note: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
count = snprintf(buf, PAGE_SIZE, "%s\n", curr_clocksource->name);
^~~~~~~~
kernel/time/clocksource.c:1300:3: warning: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dst, buf, cnt);
^~~~~~
kernel/time/clocksource.c:1300:3: note: Call to function 'memcpy' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(dst, buf, cnt);
^~~~~~
kernel/time/clocksource.c:1391:13: warning: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
count += snprintf(buf + count,
^~~~~~~~
kernel/time/clocksource.c:1391:13: note: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
count += snprintf(buf + count,
^~~~~~~~
kernel/time/clocksource.c:1397:11: warning: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
count += snprintf(buf + count,
^~~~~~~~
kernel/time/clocksource.c:1397:11: note: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
count += snprintf(buf + count,
^~~~~~~~
Suppressed 23 warnings (23 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
58 warnings generated.
> drivers/crypto/ccree/cc_cipher.c:321:2: warning: Call to function
'memcpy' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&hki, key, keylen);
^~~~~~
drivers/crypto/ccree/cc_cipher.c:321:2: note: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(&hki, key, keylen);
^~~~~~
drivers/crypto/ccree/cc_cipher.c:472:2: warning: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ctx_p->user.key, key, keylen);
^~~~~~
drivers/crypto/ccree/cc_cipher.c:472:2: note: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(ctx_p->user.key, key, keylen);
^~~~~~
drivers/crypto/ccree/cc_cipher.c:777:17: warning: Value stored to 'dev' during
its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct device *dev = drvdata_to_dev(ctx_p->drvdata);
^~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/crypto/ccree/cc_cipher.c:777:17: note: Value stored to 'dev' during its
initialization is never read
struct device *dev = drvdata_to_dev(ctx_p->drvdata);
^~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/crypto/ccree/cc_cipher.c:804:17: warning: Value stored to 'dev' during
its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct device *dev = drvdata_to_dev(ctx_p->drvdata);
^~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/crypto/ccree/cc_cipher.c:804:17: note: Value stored to 'dev' during its
initialization is never read
struct device *dev = drvdata_to_dev(ctx_p->drvdata);
^~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/crypto/ccree/cc_cipher.c:870:3: warning: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(req->iv, req_ctx->iv, ivsize);
^~~~~~
drivers/crypto/ccree/cc_cipher.c:870:3: note: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(req->iv, req_ctx->iv, ivsize);
^~~~~~
> drivers/crypto/ccree/cc_cipher.c:994:2: warning: Call to function
'memset' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(req_ctx, 0, sizeof(*req_ctx));
^~~~~~
drivers/crypto/ccree/cc_cipher.c:994:2: note: Call to function 'memset' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(req_ctx, 0, sizeof(*req_ctx));
^~~~~~
drivers/crypto/ccree/cc_cipher.c:1003:2: warning: Call to function 'memset' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(req_ctx, 0, sizeof(*req_ctx));
^~~~~~
drivers/crypto/ccree/cc_cipher.c:1003:2: note: Call to function 'memset' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(req_ctx, 0, sizeof(*req_ctx));
^~~~~~
drivers/crypto/ccree/cc_cipher.c:1428:2: warning: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(alg, &tmpl->template_skcipher, sizeof(*alg));
^~~~~~
drivers/crypto/ccree/cc_cipher.c:1428:2: note: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(alg, &tmpl->template_skcipher, sizeof(*alg));
^~~~~~
> drivers/crypto/ccree/cc_cipher.c:1430:2: warning: Call to
function 'snprintf' is insecure as it does not provide security checks introduced
in the C11 standard. Replace with analogous functions that support length arguments or
provides boundary checks such as 'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(alg->base.cra_name, CRYPTO_MAX_ALG_NAME, "%s", tmpl->name);
^~~~~~~~
drivers/crypto/ccree/cc_cipher.c:1430:2: note: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
snprintf(alg->base.cra_name, CRYPTO_MAX_ALG_NAME, "%s",
tmpl->name);
^~~~~~~~
drivers/crypto/ccree/cc_cipher.c:1431:2: warning: Call to function 'snprintf'
is insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(alg->base.cra_driver_name, CRYPTO_MAX_ALG_NAME, "%s",
^~~~~~~~
drivers/crypto/ccree/cc_cipher.c:1431:2: note: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
snprintf(alg->base.cra_driver_name, CRYPTO_MAX_ALG_NAME, "%s",
^~~~~~~~
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
50 warnings generated.
> block/blk-crypto-fallback.c:308:2: warning: Call to function
'memcpy' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(curr_dun, bc->bc_dun, sizeof(curr_dun));
^~~~~~
block/blk-crypto-fallback.c:308:2: note: Call to function 'memcpy' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(curr_dun, bc->bc_dun, sizeof(curr_dun));
^~~~~~
block/blk-crypto-fallback.c:411:2: warning: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(curr_dun, bc->bc_dun, sizeof(curr_dun));
^~~~~~
block/blk-crypto-fallback.c:411:2: note: Call to function 'memcpy' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(curr_dun, bc->bc_dun, sizeof(curr_dun));
^~~~~~
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
22 warnings generated.
Suppressed 22 warnings (22 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
drivers/base/regmap/regmap-mmio.c:52:3: warning: Value stored to 'min_stride'
is never read [clang-analyzer-deadcode.DeadStores]
min_stride = 0;
^ ~
drivers/base/regmap/regmap-mmio.c:52:3: note: Value stored to 'min_stride' is
never read
min_stride = 0;
^ ~
Suppressed 33 warnings (33 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
35 warnings generated.
drivers/base/regmap/regmap-irq.c:444:3: warning: Call to function 'memset' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(data->status_buf, 0, size);
^~~~~~
drivers/base/regmap/regmap-irq.c:444:3: note: Call to function 'memset' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(data->status_buf, 0, size);
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
40 warnings generated.
drivers/virtio/virtio_ring.c:577:2: warning: Array subscript is undefined
[clang-analyzer-core.uninitialized.ArraySubscript]
desc[prev].flags &= cpu_to_virtio16(_vq->vdev, ~VRING_DESC_F_NEXT);
^ ~~~~
drivers/virtio/virtio_ring.c:490:40: note: 'prev' declared without an initial
value
unsigned int i, n, avail, descs_used, prev, err_idx;
^~~~
drivers/virtio/virtio_ring.c:496:9: note: Assuming 'data' is not equal to null
BUG_ON(data == NULL);
^
include/asm-generic/bug.h:161:45: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
~~~~~~~~~^~~~~~~~~~
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
drivers/virtio/virtio_ring.c:496:2: note: Taking false branch
BUG_ON(data == NULL);
^
include/asm-generic/bug.h:161:32: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^
drivers/virtio/virtio_ring.c:496:2: note: Loop condition is false. Exiting loop
BUG_ON(data == NULL);
^
include/asm-generic/bug.h:161:27: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^
drivers/virtio/virtio_ring.c:497:9: note: Assuming 'ctx' is null
BUG_ON(ctx && vq->indirect);
^
include/asm-generic/bug.h:161:45: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^~~~~~~~~
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
drivers/virtio/virtio_ring.c:497:13: note: Left side of '&&' is false
BUG_ON(ctx && vq->indirect);
^
drivers/virtio/virtio_ring.c:497:2: note: Taking false branch
BUG_ON(ctx && vq->indirect);
^
include/asm-generic/bug.h:161:32: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^
drivers/virtio/virtio_ring.c:497:2: note: Loop condition is false. Exiting loop
BUG_ON(ctx && vq->indirect);
^
include/asm-generic/bug.h:161:27: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^
drivers/virtio/virtio_ring.c:499:6: note: Assuming field 'broken' is false
if (unlikely(vq->broken)) {
^
include/linux/compiler.h:78:40: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^~~~
drivers/virtio/virtio_ring.c:499:2: note: Taking false branch
if (unlikely(vq->broken)) {
--
^~~~~~
kernel/printk/printk_ringbuffer.c:1729:2: warning: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&buf[0], data, data_size); /* LMM(copy_data:A) */
^~~~~~
kernel/printk/printk_ringbuffer.c:1729:2: note: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(&buf[0], data, data_size); /* LMM(copy_data:A) */
^~~~~~
kernel/printk/printk_ringbuffer.c:1811:3: warning: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(r->info, info, sizeof(*(r->info)));
^~~~~~
kernel/printk/printk_ringbuffer.c:1811:3: note: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(r->info, info, sizeof(*(r->info)));
^~~~~~
kernel/printk/printk_ringbuffer.c:2039:2: warning: Call to function 'memset' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(descs, 0, _DESCS_COUNT(descbits) * sizeof(descs[0]));
^~~~~~
kernel/printk/printk_ringbuffer.c:2039:2: note: Call to function 'memset' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(descs, 0, _DESCS_COUNT(descbits) * sizeof(descs[0]));
^~~~~~
kernel/printk/printk_ringbuffer.c:2040:2: warning: Call to function 'memset' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(infos, 0, _DESCS_COUNT(descbits) * sizeof(infos[0]));
^~~~~~
kernel/printk/printk_ringbuffer.c:2040:2: note: Call to function 'memset' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(infos, 0, _DESCS_COUNT(descbits) * sizeof(infos[0]));
^~~~~~
Suppressed 10 warnings (10 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
23 warnings generated.
Suppressed 23 warnings (23 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
22 warnings generated.
Suppressed 22 warnings (22 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
53 warnings generated.
drivers/fpga/fpga-mgr.c:447:9: warning: Call to function 'sprintf' is insecure
as it does not provide bounding of the memory buffer or security checks introduced in the
C11 standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", mgr->name);
^~~~~~~
drivers/fpga/fpga-mgr.c:447:9: note: Call to function 'sprintf' is insecure as
it does not provide bounding of the memory buffer or security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", mgr->name);
^~~~~~~
drivers/fpga/fpga-mgr.c:455:9: warning: Call to function 'sprintf' is insecure
as it does not provide bounding of the memory buffer or security checks introduced in the
C11 standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", state_str[mgr->state]);
^~~~~~~
drivers/fpga/fpga-mgr.c:455:9: note: Call to function 'sprintf' is insecure as
it does not provide bounding of the memory buffer or security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", state_str[mgr->state]);
^~~~~~~
drivers/fpga/fpga-mgr.c:468:10: warning: Call to function 'sprintf' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += sprintf(buf + len, "reconfig operation error\n");
^~~~~~~
drivers/fpga/fpga-mgr.c:468:10: note: Call to function 'sprintf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
len += sprintf(buf + len, "reconfig operation error\n");
^~~~~~~
drivers/fpga/fpga-mgr.c:470:10: warning: Call to function 'sprintf' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += sprintf(buf + len, "reconfig CRC error\n");
^~~~~~~
drivers/fpga/fpga-mgr.c:470:10: note: Call to function 'sprintf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
len += sprintf(buf + len, "reconfig CRC error\n");
^~~~~~~
drivers/fpga/fpga-mgr.c:472:10: warning: Call to function 'sprintf' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += sprintf(buf + len, "reconfig incompatible image\n");
^~~~~~~
drivers/fpga/fpga-mgr.c:472:10: note: Call to function 'sprintf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
len += sprintf(buf + len, "reconfig incompatible image\n");
^~~~~~~
drivers/fpga/fpga-mgr.c:474:10: warning: Call to function 'sprintf' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += sprintf(buf + len, "reconfig IP protocol error\n");
^~~~~~~
drivers/fpga/fpga-mgr.c:474:10: note: Call to function 'sprintf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
len += sprintf(buf + len, "reconfig IP protocol error\n");
^~~~~~~
drivers/fpga/fpga-mgr.c:476:10: warning: Call to function 'sprintf' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += sprintf(buf + len, "reconfig fifo overflow error\n");
^~~~~~~
drivers/fpga/fpga-mgr.c:476:10: note: Call to function 'sprintf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
len += sprintf(buf + len, "reconfig fifo overflow error\n");
^~~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
39 warnings generated.
kernel/panic.c:408:13: warning: Call to function 'sprintf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
s = buf + sprintf(buf, "Tainted: ");
^~~~~~~
kernel/panic.c:408:13: note: Call to function 'sprintf' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
s = buf + sprintf(buf, "Tainted: ");
^~~~~~~
kernel/panic.c:416:3: warning: Call to function 'snprintf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(buf, sizeof(buf), "Not tainted");
^~~~~~~~
kernel/panic.c:416:3: note: Call to function 'snprintf' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
snprintf(buf, sizeof(buf), "Not tainted");
^~~~~~~~
Suppressed 37 warnings (34 in non-user code, 3 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
55 warnings generated.
> kernel/cpu.c:2271:9: warning: Call to function 'sprintf'
is insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", st->state);
^~~~~~~
kernel/cpu.c:2271:9: note: Call to function 'sprintf' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
return sprintf(buf, "%d\n", st->state);
^~~~~~~
kernel/cpu.c:2319:9: warning: Call to function 'sprintf' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", st->target);
^~~~~~~
kernel/cpu.c:2319:9: note: Call to function 'sprintf' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
return sprintf(buf, "%d\n", st->target);
^~~~~~~
kernel/cpu.c:2378:9: warning: Call to function 'sprintf' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", st->fail);
^~~~~~~
kernel/cpu.c:2378:9: note: Call to function 'sprintf' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
return sprintf(buf, "%d\n", st->fail);
^~~~~~~
> kernel/cpu.c:2407:10: warning: Call to function 'sprintf'
is insecure as it does not provide bounding of the memory buffer or security checks
introduced in the C11 standard. Replace with analogous functions that support length
arguments or provides boundary checks such as 'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
cur = sprintf(buf, "%3d: %s\n", i, sp->name);
^~~~~~~
kernel/cpu.c:2407:10: note: Call to function 'sprintf' is insecure as it does
not provide bounding of the memory buffer or security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'sprintf_s' in case of C11
cur = sprintf(buf, "%3d: %s\n", i, sp->name);
^~~~~~~
> kernel/cpu.c:2493:9: warning: Call to function 'snprintf'
is insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(buf, PAGE_SIZE - 2, "%s\n", state);
^~~~~~~~
kernel/cpu.c:2493:9: note: Call to function 'snprintf' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
return snprintf(buf, PAGE_SIZE - 2, "%s\n", state);
^~~~~~~~
kernel/cpu.c:2506:9: warning: Call to function 'snprintf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(buf, PAGE_SIZE - 2, "%d\n", sched_smt_active());
^~~~~~~~
kernel/cpu.c:2506:9: note: Call to function 'snprintf' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
return snprintf(buf, PAGE_SIZE - 2, "%d\n", sched_smt_active());
^~~~~~~~
Suppressed 49 warnings (49 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
66 warnings generated.
drivers/bus/mhi/core/init.c:98:9: warning: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(buf, PAGE_SIZE, "Serial Number: %u\n",
^~~~~~~~
drivers/bus/mhi/core/init.c:98:9: note: Call to function 'snprintf' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
return snprintf(buf, PAGE_SIZE, "Serial Number: %u\n",
^~~~~~~~
drivers/bus/mhi/core/init.c:112:10: warning: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
cnt += snprintf(buf + cnt, PAGE_SIZE - cnt,
^~~~~~~~
drivers/bus/mhi/core/init.c:112:10: note: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
cnt += snprintf(buf + cnt, PAGE_SIZE - cnt,
^~~~~~~~
Suppressed 64 warnings (64 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
47 warnings generated.
fs/debugfs/file.c:1006:9: warning: Call to function 'snprintf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len = snprintf(buf, bufsize, "%u%c", *array++, term);
^~~~~~~~
fs/debugfs/file.c:1006:9: note: Call to function 'snprintf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
len = snprintf(buf, bufsize, "%u%c", *array++, term);
^~~~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
32 warnings generated.
fs/tracefs/inode.c:65:2: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(name, dname, len);
^~~~~~
fs/tracefs/inode.c:65:2: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(name, dname, len);
^~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
62 warnings generated.
drivers/char/ipmi/ipmi_msghandler.c:98:9: warning: Call to function 'sprintf'
is insecure as it does not provide bounding of the memory buffer or security checks
introduced in the C11 standard. Replace with analogous functions that support length
arguments or provides boundary checks such as 'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buffer, "%s\n", event_str);
^~~~~~~
drivers/char/ipmi/ipmi_msghandler.c:98:9: note: Call to function 'sprintf' is
insecure as it does not provide bounding of the memory buffer or security checks
introduced in the C11 standard. Replace with analogous functions that support length
arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buffer, "%s\n", event_str);
^~~~~~~
drivers/char/ipmi/ipmi_msghandler.c:718:2: warning: Attempt to free released memory
[clang-analyzer-unix.Malloc]
kfree(intf);
^
drivers/char/ipmi/ipmi_msghandler.c:3479:6: note: Assuming field 'in_shutdown'
is false
if (!intf->in_shutdown)
^~~~~~~~~~~~~~~~~~
drivers/char/ipmi/ipmi_msghandler.c:3479:2: note: Taking true branch
if (!intf->in_shutdown)
^
drivers/char/ipmi/ipmi_msghandler.c:3480:3: note: Calling 'bmc_get_device_id'
bmc_get_device_id(intf, NULL, NULL, NULL, NULL);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/char/ipmi/ipmi_msghandler.c:2706:9: note: Calling
'__bmc_get_device_id'
return __bmc_get_device_id(intf, bmc, id, guid_set, guid, -1);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/char/ipmi/ipmi_msghandler.c:2575:18: note: 'intf' is not equal to NULL
bool intf_set = intf != NULL;
^~~~
drivers/char/ipmi/ipmi_msghandler.c:2577:7: note: 'intf' is non-null
if (!intf) {
^~~~
drivers/char/ipmi/ipmi_msghandler.c:2577:2: note: Taking false branch
if (!intf) {
^
drivers/char/ipmi/ipmi_msghandler.c:2604:6: note: Assuming field
'in_bmc_register' is false
if (intf->in_bmc_register ||
^~~~~~~~~~~~~~~~~~~~~
drivers/char/ipmi/ipmi_msghandler.c:2604:6: note: Left side of '||' is false
drivers/char/ipmi/ipmi_msghandler.c:2605:7: note: Assuming field 'dyn_id_set'
is 0
(bmc->dyn_id_set &&
time_is_after_jiffies(bmc->dyn_id_expiry)))
^~~~~~~~~~~~~~~
drivers/char/ipmi/ipmi_msghandler.c:2605:23: note: Left side of '&&' is
false
(bmc->dyn_id_set &&
time_is_after_jiffies(bmc->dyn_id_expiry)))
^
drivers/char/ipmi/ipmi_msghandler.c:2613:6: note: Assuming 'rv' is not equal to
0
if (rv)
^~
drivers/char/ipmi/ipmi_msghandler.c:2613:2: note: Taking true branch
if (rv)
^
drivers/char/ipmi/ipmi_msghandler.c:2614:3: note: Control jumps to line 2668
goto out;
^
drivers/char/ipmi/ipmi_msghandler.c:2668:6: note: 'rv' is not equal to 0
--
^~~~
lib/iov_iter.c:782:3: warning: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(addr + off, base, len)
^
lib/iov_iter.c:147:57: note: expanded from macro 'iterate_and_advance'
__iterate_and_advance(i, n, base, len, off, I, ((void)(K),0))
^
lib/iov_iter.c:126:14: note: expanded from macro '__iterate_and_advance'
bvec, (K)) \
^
lib/iov_iter.c:52:11: note: expanded from macro 'iterate_bvec'
left = (STEP); \
^~~~
lib/iov_iter.c:782:3: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(addr + off, base, len)
^
lib/iov_iter.c:147:57: note: expanded from macro 'iterate_and_advance'
__iterate_and_advance(i, n, base, len, off, I, ((void)(K),0))
^
lib/iov_iter.c:126:14: note: expanded from macro '__iterate_and_advance'
bvec, (K)) \
^
lib/iov_iter.c:52:11: note: expanded from macro 'iterate_bvec'
left = (STEP); \
^~~~
lib/iov_iter.c:929:3: warning: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(p + off, 0, chunk);
^~~~~~
lib/iov_iter.c:929:3: note: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(p + off, 0, chunk);
^~~~~~
lib/iov_iter.c:947:3: warning: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(base, 0, len)
^
lib/iov_iter.c:147:57: note: expanded from macro 'iterate_and_advance'
__iterate_and_advance(i, n, base, len, off, I, ((void)(K),0))
^
lib/iov_iter.c:126:14: note: expanded from macro '__iterate_and_advance'
bvec, (K)) \
^
lib/iov_iter.c:52:11: note: expanded from macro 'iterate_bvec'
left = (STEP); \
^~~~
lib/iov_iter.c:947:3: note: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(base, 0, len)
^
lib/iov_iter.c:147:57: note: expanded from macro 'iterate_and_advance'
__iterate_and_advance(i, n, base, len, off, I, ((void)(K),0))
^
lib/iov_iter.c:126:14: note: expanded from macro '__iterate_and_advance'
bvec, (K)) \
^
lib/iov_iter.c:52:11: note: expanded from macro 'iterate_bvec'
left = (STEP); \
^~~~
lib/iov_iter.c:969:3: warning: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(p + off, base, len)
^
lib/iov_iter.c:147:57: note: expanded from macro 'iterate_and_advance'
__iterate_and_advance(i, n, base, len, off, I, ((void)(K),0))
^
lib/iov_iter.c:126:14: note: expanded from macro '__iterate_and_advance'
bvec, (K)) \
^
lib/iov_iter.c:52:11: note: expanded from macro 'iterate_bvec'
left = (STEP); \
^~~~
lib/iov_iter.c:969:3: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(p + off, base, len)
^
lib/iov_iter.c:147:57: note: expanded from macro 'iterate_and_advance'
__iterate_and_advance(i, n, base, len, off, I, ((void)(K),0))
^
lib/iov_iter.c:126:14: note: expanded from macro '__iterate_and_advance'
bvec, (K)) \
^
lib/iov_iter.c:52:11: note: expanded from macro 'iterate_bvec'
left = (STEP); \
^~~~
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
35 warnings generated.
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
38 warnings generated.
> drivers/staging/pi433/rf69.c:867:2: warning: Call to function
'memset' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&transfer, 0, sizeof(transfer));
^~~~~~
drivers/staging/pi433/rf69.c:867:2: note: Call to function 'memset' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(&transfer, 0, sizeof(transfer));
^~~~~~
> drivers/staging/pi433/rf69.c:879:2: warning: Call to function
'memcpy' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buffer, &local_buffer[1], size);
^~~~~~
drivers/staging/pi433/rf69.c:879:2: note: Call to function 'memcpy' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(buffer, &local_buffer[1], size);
^~~~~~
drivers/staging/pi433/rf69.c:898:2: warning: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&local_buffer[1], buffer, size);
^~~~~~
drivers/staging/pi433/rf69.c:898:2: note: Call to function 'memcpy' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(&local_buffer[1], buffer, size);
^~~~~~
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
38 warnings generated.
> drivers/staging/axis-fifo/axis-fifo.c:174:9: warning: Call to
function 'snprintf' is insecure as it does not provide security checks introduced
in the C11 standard. Replace with analogous functions that support length arguments or
provides boundary checks such as 'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len = snprintf(tmp, sizeof(tmp), "0x%x\n", read_val);
^~~~~~~~
drivers/staging/axis-fifo/axis-fifo.c:174:9: note: Call to function 'snprintf'
is insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
len = snprintf(tmp, sizeof(tmp), "0x%x\n", read_val);
^~~~~~~~
> drivers/staging/axis-fifo/axis-fifo.c:175:2: warning: Call to
function 'memcpy' is insecure as it does not provide security checks introduced in
the C11 standard. Replace with analogous functions that support length arguments or
provides boundary checks such as 'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, tmp, len);
^~~~~~
drivers/staging/axis-fifo/axis-fifo.c:175:2: note: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(buf, tmp, len);
^~~~~~
drivers/staging/axis-fifo/axis-fifo.c:562:4: warning: 1st function call argument is an
uninitialized value [clang-analyzer-core.CallAndMessage]
iowrite32(tmp_buf[i], fifo->base_addr +
^ ~~~~~~~~~~
include/asm-generic/io.h:759:19: note: expanded from macro 'iowrite32'
#define iowrite32 iowrite32
^
drivers/staging/axis-fifo/axis-fifo.c:488:6: note: Assuming the condition is false
if (len % sizeof(u32)) {
^~~~~~~~~~~~~~~~~
drivers/staging/axis-fifo/axis-fifo.c:488:2: note: Taking false branch
if (len % sizeof(u32)) {
^
drivers/staging/axis-fifo/axis-fifo.c:496:6: note: Assuming 'words_to_write' is
not equal to 0
if (!words_to_write) {
^~~~~~~~~~~~~~~
drivers/staging/axis-fifo/axis-fifo.c:496:2: note: Taking false branch
if (!words_to_write) {
^
drivers/staging/axis-fifo/axis-fifo.c:502:6: note: Assuming 'words_to_write' is
<= field 'tx_fifo_depth'
if (words_to_write > fifo->tx_fifo_depth) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/staging/axis-fifo/axis-fifo.c:502:2: note: Taking false branch
if (words_to_write > fifo->tx_fifo_depth) {
^
drivers/staging/axis-fifo/axis-fifo.c:508:6: note: Assuming the condition is true
if (fifo->write_flags & O_NONBLOCK) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/staging/axis-fifo/axis-fifo.c:508:2: note: Taking true branch
if (fifo->write_flags & O_NONBLOCK) {
^
drivers/staging/axis-fifo/axis-fifo.c:513:7: note: Assuming the condition is false
if (!mutex_trylock(&fifo->write_lock))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/staging/axis-fifo/axis-fifo.c:513:3: note: Taking false branch
if (!mutex_trylock(&fifo->write_lock))
^
drivers/staging/axis-fifo/axis-fifo.c:516:7: note: Assuming the condition is false
if (words_to_write > ioread32(fifo->base_addr +
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/staging/axis-fifo/axis-fifo.c:516:3: note: Taking false branch
if (words_to_write > ioread32(fifo->base_addr +
^
drivers/staging/axis-fifo/axis-fifo.c:551:9: note: 'words_to_write' is > 0
while (words_to_write > 0) {
^~~~~~~~~~~~~~
drivers/staging/axis-fifo/axis-fifo.c:551:2: note: Loop condition is true. Entering
loop body
while (words_to_write > 0) {
^
drivers/staging/axis-fifo/axis-fifo.c:552:10: note: Assuming
'__UNIQUE_ID___x242' is < '__UNIQUE_ID___y243'
copy = min(words_to_write, WRITE_BUF_SIZE);
^
include/linux/minmax.h:45:19: note: expanded from macro 'min'
#define min(x, y) __careful_cmp(x, y, <)
^~~~~~~~~~~~~~~~~~~~~~
include/linux/minmax.h:38:3: note: expanded from macro '__careful_cmp'
__cmp_once(x, y, __UNIQUE_ID(__x), __UNIQUE_ID(__y), op))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/minmax.h:33:3: note: expanded from macro '__cmp_once'
__cmp(unique_x, unique_y, op); })
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/minmax.h:28:26: note: expanded from macro '__cmp'
#define __cmp(x, y, op) ((x) op (y) ? (x) : (y))
^~~~~~~~~~
drivers/staging/axis-fifo/axis-fifo.c:552:10: note: '?' condition is true
copy = min(words_to_write, WRITE_BUF_SIZE);
^
include/linux/minmax.h:45:19: note: expanded from macro 'min'
#define min(x, y) __careful_cmp(x, y, <)
^
include/linux/minmax.h:38:3: note: expanded from macro '__careful_cmp'
__cmp_once(x, y, __UNIQUE_ID(__x), __UNIQUE_ID(__y), op))
^
include/linux/minmax.h:33:3: note: expanded from macro '__cmp_once'
__cmp(unique_x, unique_y, op); })
^
include/linux/minmax.h:28:26: note: expanded from macro '__cmp'
#define __cmp(x, y, op) ((x) op (y) ? (x) : (y))
^
drivers/staging/axis-fifo/axis-fifo.c:554:7: note: Calling 'copy_from_user'
if (copy_from_user(tmp_buf, buf + copied * sizeof(u32),
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/uaccess.h:191:13: note: Calling 'check_copy_size'
if (likely(check_copy_size(to, n, false)))
^
include/linux/compiler.h:77:40: note: expanded from macro 'likely'
# define likely(x) __builtin_expect(!!(x), 1)
^
include/linux/thread_info.h:221:15: note: Assuming 'sz' is >= 0
if (unlikely(sz >= 0 && sz < bytes)) {
^
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
include/linux/thread_info.h:221:15: note: Left side of '&&' is true
if (unlikely(sz >= 0 && sz < bytes)) {
--
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/hugetlb_cgroup.h:243:2: note: Returning without writing to
'*ptr'
return 0;
^
include/linux/hugetlb_cgroup.h:243:2: note: Returning zero, which participates in a
condition later
return 0;
^~~~~~~~
mm/hugetlb.c:2892:9: note: Returning from 'hugetlb_cgroup_charge_cgroup_rsvd'
ret = hugetlb_cgroup_charge_cgroup_rsvd(
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
mm/hugetlb.c:2894:7: note: 'ret' is 0
if (ret)
^~~
mm/hugetlb.c:2894:3: note: Taking false branch
if (ret)
^
mm/hugetlb.c:2898:8: note: Calling 'hugetlb_cgroup_charge_cgroup'
ret = hugetlb_cgroup_charge_cgroup(idx, pages_per_huge_page(h), &h_cg);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/hugetlb_cgroup.h:236:2: note: Returning without writing to
'*ptr'
return 0;
^
include/linux/hugetlb_cgroup.h:236:2: note: Returning zero, which participates in a
condition later
return 0;
^~~~~~~~
mm/hugetlb.c:2898:8: note: Returning from 'hugetlb_cgroup_charge_cgroup'
ret = hugetlb_cgroup_charge_cgroup(idx, pages_per_huge_page(h), &h_cg);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
mm/hugetlb.c:2899:6: note: 'ret' is 0
if (ret)
^~~
mm/hugetlb.c:2899:2: note: Taking false branch
if (ret)
^
mm/hugetlb.c:2909:6: note: Assuming 'page' is null
if (!page) {
^~~~~
mm/hugetlb.c:2909:2: note: Taking true branch
if (!page) {
^
mm/hugetlb.c:2911:10: note: Calling 'alloc_buddy_huge_page_with_mpol'
page = alloc_buddy_huge_page_with_mpol(h, vma, addr);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
mm/hugetlb.c:2260:2: note: Taking false branch
if (mpol_is_preferred_many(mpol)) {
^
mm/hugetlb.c:2270:7: note: 'page' is null
if (!page)
^~~~
mm/hugetlb.c:2270:2: note: Taking true branch
if (!page)
^
mm/hugetlb.c:2273:2: note: Returning pointer (loaded from 'page'), which
participates in a condition later
return page;
^~~~~~~~~~~
mm/hugetlb.c:2911:10: note: Returning from 'alloc_buddy_huge_page_with_mpol'
page = alloc_buddy_huge_page_with_mpol(h, vma, addr);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
mm/hugetlb.c:2912:7: note: Assuming 'page' is null
if (!page)
^~~~~
mm/hugetlb.c:2912:3: note: Taking true branch
if (!page)
^
mm/hugetlb.c:2913:4: note: Control jumps to line 2957
goto out_uncharge_cgroup;
^
mm/hugetlb.c:2957:2: note: 3rd function call argument is an uninitialized value
hugetlb_cgroup_uncharge_cgroup(idx, pages_per_huge_page(h), h_cg);
^ ~~~~
mm/hugetlb.c:3005:12: warning: Access to field 'hstate' results in a
dereference of a null pointer (loaded from variable 'm')
[clang-analyzer-core.NullDereference]
m->hstate = h;
~ ^
mm/hugetlb.c:2973:2: note: 'm' initialized to a null pointer value
struct huge_bootmem_page *m = NULL; /* initialize for clang */
^~~~~~~~~~~~~~~~~~~~~~~~~~~
mm/hugetlb.c:2976:6: note: Assuming the condition is false
if (nid != NUMA_NO_NODE && nid >= nr_online_nodes)
^~~~~~~~~~~~~~~~~~~
mm/hugetlb.c:2976:26: note: Left side of '&&' is false
if (nid != NUMA_NO_NODE && nid >= nr_online_nodes)
^
mm/hugetlb.c:2979:2: note: Taking false branch
if (nid != NUMA_NO_NODE) {
^
mm/hugetlb.c:2987:33: note: Assuming 'nr_nodes' is <= 0
for_each_node_mask_to_alloc(h, nr_nodes, node, &node_states[N_MEMORY]) {
^
mm/hugetlb.c:1294:3: note: expanded from macro 'for_each_node_mask_to_alloc'
nr_nodes > 0 && \
^~~~~~~~~~~~
mm/hugetlb.c:2987:2: note: Left side of '&&' is false
for_each_node_mask_to_alloc(h, nr_nodes, node, &node_states[N_MEMORY]) {
^
mm/hugetlb.c:1294:16: note: expanded from macro 'for_each_node_mask_to_alloc'
nr_nodes > 0 && \
^
mm/hugetlb.c:3005:12: note: Access to field 'hstate' results in a dereference
of a null pointer (loaded from variable 'm')
m->hstate = h;
~ ^
> mm/hugetlb.c:4103:2: warning: Call to function 'snprintf'
is insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(h->name, HSTATE_NAME_LEN, "hugepages-%lukB",
^~~~~~~~
mm/hugetlb.c:4103:2: note: Call to function 'snprintf' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
snprintf(h->name, HSTATE_NAME_LEN, "hugepages-%lukB",
^~~~~~~~
> mm/hugetlb.c:4154:7: warning: Call to function 'sscanf'
is insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'sscanf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(p, "%lu%n", &tmp, &count) != 1)
^~~~~~
mm/hugetlb.c:4154:7: note: Call to function 'sscanf' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'sscanf_s' in
case of C11
if (sscanf(p, "%lu%n", &tmp, &count) != 1)
^~~~~~
mm/hugetlb.c:4167:8: warning: Call to function 'sscanf' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sscanf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(p, "%lu%n", &tmp, &count) != 1)
^~~~~~
mm/hugetlb.c:4167:8: note: Call to function 'sscanf' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'sscanf_s' in
case of C11
if (sscanf(p, "%lu%n", &tmp, &count) != 1)
^~~~~~
mm/hugetlb.c:6889:7: warning: Call to function 'sscanf' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sscanf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(s, "%lu%n", &tmp, &count) != 1)
^~~~~~
mm/hugetlb.c:6889:7: note: Call to function 'sscanf' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'sscanf_s' in
case of C11
if (sscanf(s, "%lu%n", &tmp, &count) != 1)
^~~~~~
mm/hugetlb.c:6990:3: warning: Call to function 'snprintf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(name, sizeof(name), "hugetlb%d", nid);
^~~~~~~~
mm/hugetlb.c:6990:3: note: Call to function 'snprintf' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
snprintf(name, sizeof(name), "hugetlb%d", nid);
^~~~~~~~
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
54 warnings generated.
fs/buffer.c:1923:15: warning: Access to field 'bdev' results in a dereference
of a null pointer (loaded from variable 'iomap')
[clang-analyzer-core.NullDereference]
bh->b_bdev = iomap->bdev;
^
fs/buffer.c:2602:6: note: Assuming 'page' is non-null
if (!page)
^~~~~
fs/buffer.c:2602:2: note: Taking false branch
if (!page)
^
fs/buffer.c:2607:6: note: Assuming the condition is true
if (page_has_buffers(page)) {
^
include/linux/buffer_head.h:146:32: note: expanded from macro
'page_has_buffers'
#define page_has_buffers(page) PagePrivate(page)
^~~~~~~~~~~~~~~~~
fs/buffer.c:2607:2: note: Taking true branch
if (page_has_buffers(page)) {
^
fs/buffer.c:2608:9: note: Calling '__block_write_begin'
ret = __block_write_begin(page, pos, len, get_block);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/buffer.c:2061:12: note: Passing null pointer value via 5th parameter
'iomap'
NULL);
^
include/linux/stddef.h:8:14: note: expanded from macro 'NULL'
#define NULL ((void *)0)
^~~~~~~~~~~
fs/buffer.c:2060:9: note: Calling '__block_write_begin_int'
return __block_write_begin_int(page_folio(page), pos, len, get_block,
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/buffer.c:1984:9: note: Assuming the condition is false
BUG_ON(!folio_test_locked(folio));
^
include/asm-generic/bug.h:161:45: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^~~~~~~~~
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
fs/buffer.c:1984:2: note: Taking false branch
BUG_ON(!folio_test_locked(folio));
^
include/asm-generic/bug.h:161:32: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^
fs/buffer.c:1984:2: note: Loop condition is false. Exiting loop
BUG_ON(!folio_test_locked(folio));
^
include/asm-generic/bug.h:161:27: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^
fs/buffer.c:1985:2: note: Taking false branch
BUG_ON(from > PAGE_SIZE);
^
include/asm-generic/bug.h:161:32: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^
fs/buffer.c:1985:2: note: Loop condition is false. Exiting loop
BUG_ON(from > PAGE_SIZE);
^
include/asm-generic/bug.h:161:27: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^
fs/buffer.c:1986:9: note: Assuming the condition is false
BUG_ON(to > PAGE_SIZE);
^
include/asm-generic/bug.h:161:45: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
--
^~~~~~~~~~
include/linux/sched.h:1633:2: note: Returning the value 32
return fls(state);
^~~~~~~~~~~~~~~~~
include/linux/sched.h:1647:28: note: Returning from 'task_state_index'
return task_index_to_char(task_state_index(tsk));
^~~~~~~~~~~~~~~~~~~~~
include/linux/sched.h:1647:28: note: Passing the value 32 via 1st parameter
'state'
return task_index_to_char(task_state_index(tsk));
^~~~~~~~~~~~~~~~~~~~~
include/linux/sched.h:1647:9: note: Calling 'task_index_to_char'
return task_index_to_char(task_state_index(tsk));
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/sched.h:1640:19: note: '?' condition is true
BUILD_BUG_ON(1 + ilog2(TASK_REPORT_MAX) != sizeof(state_char) - 1);
^
include/linux/log2.h:158:2: note: expanded from macro 'ilog2'
__builtin_constant_p(n) ? \
^
include/linux/sched.h:1640:19: note: '?' condition is false
BUILD_BUG_ON(1 + ilog2(TASK_REPORT_MAX) != sizeof(state_char) - 1);
^
include/linux/log2.h:159:3: note: expanded from macro 'ilog2'
((n) < 2 ? 0 : \
^
include/linux/sched.h:1640:15: note: Assuming the condition is false
BUILD_BUG_ON(1 + ilog2(TASK_REPORT_MAX) != sizeof(state_char) - 1);
^
include/linux/build_bug.h:50:19: note: expanded from macro 'BUILD_BUG_ON'
BUILD_BUG_ON_MSG(condition, "BUILD_BUG_ON failed: " #condition)
~~~~~~~~~~~~~~~~~^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/build_bug.h:39:58: note: expanded from macro 'BUILD_BUG_ON_MSG'
#define BUILD_BUG_ON_MSG(cond, msg) compiletime_assert(!(cond), msg)
~~~~~~~~~~~~~~~~~~~~~^~~~~~~~~~~
include/linux/compiler_types.h:346:22: note: expanded from macro
'compiletime_assert'
_compiletime_assert(condition, msg, __compiletime_assert_, __COUNTER__)
~~~~~~~~~~~~~~~~~~~~^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/compiler_types.h:334:23: note: expanded from macro
'_compiletime_assert'
__compiletime_assert(condition, msg, prefix, suffix)
~~~~~~~~~~~~~~~~~~~~~^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/compiler_types.h:326:9: note: expanded from macro
'__compiletime_assert'
if (!(condition)) \
^~~~~~~~~
include/linux/sched.h:1640:2: note: Taking false branch
BUILD_BUG_ON(1 + ilog2(TASK_REPORT_MAX) != sizeof(state_char) - 1);
^
include/linux/build_bug.h:50:2: note: expanded from macro 'BUILD_BUG_ON'
BUILD_BUG_ON_MSG(condition, "BUILD_BUG_ON failed: " #condition)
^
include/linux/build_bug.h:39:37: note: expanded from macro 'BUILD_BUG_ON_MSG'
#define BUILD_BUG_ON_MSG(cond, msg) compiletime_assert(!(cond), msg)
^
include/linux/compiler_types.h:346:2: note: expanded from macro
'compiletime_assert'
_compiletime_assert(condition, msg, __compiletime_assert_, __COUNTER__)
^
include/linux/compiler_types.h:334:2: note: expanded from macro
'_compiletime_assert'
__compiletime_assert(condition, msg, prefix, suffix)
^
include/linux/compiler_types.h:326:3: note: expanded from macro
'__compiletime_assert'
if (!(condition)) \
^
include/linux/sched.h:1640:2: note: Loop condition is false. Exiting loop
BUILD_BUG_ON(1 + ilog2(TASK_REPORT_MAX) != sizeof(state_char) - 1);
^
include/linux/build_bug.h:50:2: note: expanded from macro 'BUILD_BUG_ON'
BUILD_BUG_ON_MSG(condition, "BUILD_BUG_ON failed: " #condition)
^
include/linux/build_bug.h:39:37: note: expanded from macro 'BUILD_BUG_ON_MSG'
#define BUILD_BUG_ON_MSG(cond, msg) compiletime_assert(!(cond), msg)
^
include/linux/compiler_types.h:346:2: note: expanded from macro
'compiletime_assert'
_compiletime_assert(condition, msg, __compiletime_assert_, __COUNTER__)
^
include/linux/compiler_types.h:334:2: note: expanded from macro
'_compiletime_assert'
__compiletime_assert(condition, msg, prefix, suffix)
^
include/linux/compiler_types.h:318:2: note: expanded from macro
'__compiletime_assert'
do { \
^
include/linux/sched.h:1642:2: note: Undefined or garbage value returned to caller
return state_char[state];
^ ~~~~~~~~~~~~~~~~~
kernel/sched/core.c:5510:16: warning: Value stored to 'preempt_disable_ip'
during its initialization is never read [clang-analyzer-deadcode.DeadStores]
unsigned long preempt_disable_ip = get_preempt_disable_ip(current);
^~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/sched/core.c:5510:16: note: Value stored to 'preempt_disable_ip' during
its initialization is never read
unsigned long preempt_disable_ip = get_preempt_disable_ip(current);
^~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/sched/core.c:6295:3: warning: Value stored to 'rq' is never read
[clang-analyzer-deadcode.DeadStores]
rq = context_switch(rq, prev, next, &rf);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/sched/core.c:6295:3: note: Value stored to 'rq' is never read
rq = context_switch(rq, prev, next, &rf);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/sched/core.c:7651:2: warning: Call to function 'memset' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(attr, 0, sizeof(*attr));
^~~~~~
kernel/sched/core.c:7651:2: note: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(attr, 0, sizeof(*attr));
^~~~~~
> kernel/sched/core.c:8692:2: warning: Call to function
'sprintf' is insecure as it does not provide bounding of the memory buffer or
security checks introduced in the C11 standard. Replace with analogous functions that
support length arguments or provides boundary checks such as 'sprintf_s' in case
of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(idle->comm, "%s/%d", INIT_TASK_COMM, cpu);
^~~~~~~
kernel/sched/core.c:8692:2: note: Call to function 'sprintf' is insecure as it
does not provide bounding of the memory buffer or security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'sprintf_s' in case of C11
sprintf(idle->comm, "%s/%d", INIT_TASK_COMM, cpu);
^~~~~~~
kernel/sched/core.c:9319:3: warning: Value stored to 'ptr' is never read
[clang-analyzer-deadcode.DeadStores]
ptr += nr_cpu_ids * sizeof(void **);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/sched/core.c:9319:3: note: Value stored to 'ptr' is never read
ptr += nr_cpu_ids * sizeof(void **);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/sched/core.c:10759:6: warning: Call to function 'sscanf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sscanf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(buf, "%20s %llu", tok, periodp) < 1)
^~~~~~
kernel/sched/core.c:10759:6: note: Call to function 'sscanf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sscanf_s' in case of C11
if (sscanf(buf, "%20s %llu", tok, periodp) < 1)
^~~~~~
kernel/sched/core.c:10764:6: warning: Call to function 'sscanf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sscanf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(tok, "%llu", quotap))
^~~~~~
kernel/sched/core.c:10764:6: note: Call to function 'sscanf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sscanf_s' in case of C11
if (sscanf(tok, "%llu", quotap))
^~~~~~
Suppressed 97 warnings (95 in non-user code, 2 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
39 warnings generated.
drivers/of/address.c:89:2: warning: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(addr, 0, na * 4);
^~~~~~
drivers/of/address.c:89:2: note: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(addr, 0, na * 4);
^~~~~~
drivers/of/address.c:430:3: warning: Call to function 'memset' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(addr, 0, pna * 4);
^~~~~~
drivers/of/address.c:430:3: note: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(addr, 0, pna * 4);
^~~~~~
drivers/of/address.c:449:2: warning: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(addr, ranges + na, 4 * pna);
^~~~~~
drivers/of/address.c:449:2: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(addr, ranges + na, 4 * pna);
^~~~~~
drivers/of/address.c:502:2: warning: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(addr, in_addr, na * 4);
^~~~~~
drivers/of/address.c:502:2: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(addr, in_addr, na * 4);
^~~~~~
drivers/of/address.c:820:2: warning: Call to function 'memset' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(r, 0, sizeof(struct resource));
^~~~~~
drivers/of/address.c:820:2: note: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(r, 0, sizeof(struct resource));
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
36 warnings generated.
drivers/of/irq.c:404:3: warning: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(r, 0, sizeof(*r));
^~~~~~
drivers/of/irq.c:404:3: note: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(r, 0, sizeof(*r));
^~~~~~
drivers/of/irq.c:610:2: warning: Dereference of null pointer
[clang-analyzer-core.NullDereference]
list_for_each_entry_safe(desc, temp_desc, &intc_parent_list, list) {
^
include/linux/list.h:726:7: note: expanded from macro
'list_for_each_entry_safe'
n = list_next_entry(pos, member); \
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/list.h:564:2: note: expanded from macro 'list_next_entry'
list_entry((pos)->member.next, typeof(*(pos)), member)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/list.h:520:2: note: expanded from macro 'list_entry'
container_of(ptr, type, member)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/container_of.h:18:25: note: expanded from macro 'container_of'
void *__mptr = (void *)(ptr); \
^~~~~
drivers/of/irq.c:532:2: note: Loop condition is true. Entering loop body
for_each_matching_node_and_match(np, matches, &match) {
^
include/linux/of.h:1364:2: note: expanded from macro
'for_each_matching_node_and_match'
for (dn = of_find_matching_node_and_match(NULL, matches, match); \
^
drivers/of/irq.c:533:8: note: Calling 'of_property_read_bool'
if (!of_property_read_bool(np, "interrupt-controller") ||
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/of.h:1178:9: note: Assuming 'prop' is null
return prop ? true : false;
^~~~
include/linux/of.h:1178:9: note: '?' condition is false
include/linux/of.h:1178:2: note: Returning zero, which participates in a condition
later
return prop ? true : false;
^~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/of/irq.c:533:8: note: Returning from 'of_property_read_bool'
if (!of_property_read_bool(np, "interrupt-controller") ||
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/of/irq.c:533:58: note: Left side of '||' is true
--
^
drivers/of/irq.c:602:4: note: Taking true branch
pr_err("of_irq_init: children remain, but no
parents\n");
^
include/linux/printk.h:489:2: note: expanded from macro 'pr_err'
printk(KERN_ERR pr_fmt(fmt), ##__VA_ARGS__)
^
include/linux/printk.h:446:26: note: expanded from macro 'printk'
#define printk(fmt, ...) printk_index_wrap(_printk, fmt, ##__VA_ARGS__)
^
include/linux/printk.h:417:3: note: expanded from macro 'printk_index_wrap'
__printk_index_emit(_fmt, NULL, NULL); \
^
include/linux/printk.h:370:3: note: expanded from macro '__printk_index_emit'
if (__builtin_constant_p(_fmt) && __builtin_constant_p(_level))
{ \
^
drivers/of/irq.c:602:4: note: '?' condition is true
pr_err("of_irq_init: children remain, but no
parents\n");
^
include/linux/printk.h:489:2: note: expanded from macro 'pr_err'
printk(KERN_ERR pr_fmt(fmt), ##__VA_ARGS__)
^
include/linux/printk.h:446:26: note: expanded from macro 'printk'
#define printk(fmt, ...) printk_index_wrap(_printk, fmt, ##__VA_ARGS__)
^
include/linux/printk.h:417:3: note: expanded from macro 'printk_index_wrap'
__printk_index_emit(_fmt, NULL, NULL); \
^
include/linux/printk.h:379:12: note: expanded from macro '__printk_index_emit'
.fmt = __builtin_constant_p(_fmt) ? (_fmt) : NULL, \
^
drivers/of/irq.c:602:4: note: '?' condition is true
pr_err("of_irq_init: children remain, but no
parents\n");
^
include/linux/printk.h:489:2: note: expanded from macro 'pr_err'
printk(KERN_ERR pr_fmt(fmt), ##__VA_ARGS__)
^
include/linux/printk.h:446:26: note: expanded from macro 'printk'
#define printk(fmt, ...) printk_index_wrap(_printk, fmt, ##__VA_ARGS__)
^
include/linux/printk.h:417:3: note: expanded from macro 'printk_index_wrap'
__printk_index_emit(_fmt, NULL, NULL); \
^
include/linux/printk.h:383:14: note: expanded from macro '__printk_index_emit'
.level = __builtin_constant_p(_level) ? (_level) :
NULL, \
^
drivers/of/irq.c:602:4: note: Loop condition is false. Exiting loop
pr_err("of_irq_init: children remain, but no
parents\n");
^
include/linux/printk.h:489:2: note: expanded from macro 'pr_err'
printk(KERN_ERR pr_fmt(fmt), ##__VA_ARGS__)
^
include/linux/printk.h:446:26: note: expanded from macro 'printk'
#define printk(fmt, ...) printk_index_wrap(_printk, fmt, ##__VA_ARGS__)
^
include/linux/printk.h:417:3: note: expanded from macro 'printk_index_wrap'
__printk_index_emit(_fmt, NULL, NULL); \
^
include/linux/printk.h:369:2: note: expanded from macro '__printk_index_emit'
do { \
^
drivers/of/irq.c:603:4: note: Execution continues on line 610
break;
^
drivers/of/irq.c:610:27: note: Null pointer value stored to 'desc'
list_for_each_entry_safe(desc, temp_desc, &intc_parent_list, list) {
^
include/linux/list.h:725:7: note: expanded from macro
'list_for_each_entry_safe'
for (pos = list_first_entry(head, typeof(*pos), member), \
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/of/irq.c:610:2: note: Dereference of null pointer
list_for_each_entry_safe(desc, temp_desc, &intc_parent_list, list) {
^
include/linux/list.h:726:7: note: expanded from macro
'list_for_each_entry_safe'
n = list_next_entry(pos, member); \
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/list.h:564:2: note: expanded from macro 'list_next_entry'
list_entry((pos)->member.next, typeof(*(pos)), member)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/list.h:520:2: note: expanded from macro 'list_entry'
container_of(ptr, type, member)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/container_of.h:18:25: note: expanded from macro 'container_of'
void *__mptr = (void *)(ptr); \
^~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
32 warnings generated.
kernel/locking/lock_events.c:78:8: warning: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len = snprintf(buf, sizeof(buf) - 1, "%llu\n", sum);
^~~~~~~~
kernel/locking/lock_events.c:78:8: note: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
len = snprintf(buf, sizeof(buf) - 1, "%llu\n", sum);
^~~~~~~~
Suppressed 31 warnings (30 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
56 warnings generated.
> fs/hpfs/buffer.c:147:2: warning: Call to function
'memcpy' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data + 0 * 512, qbh->bh[0]->b_data, 512);
^~~~~~
fs/hpfs/buffer.c:147:2: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(data + 0 * 512, qbh->bh[0]->b_data, 512);
^~~~~~
fs/hpfs/buffer.c:148:2: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data + 1 * 512, qbh->bh[1]->b_data, 512);
^~~~~~
fs/hpfs/buffer.c:148:2: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(data + 1 * 512, qbh->bh[1]->b_data, 512);
^~~~~~
fs/hpfs/buffer.c:149:2: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data + 2 * 512, qbh->bh[2]->b_data, 512);
^~~~~~
fs/hpfs/buffer.c:149:2: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(data + 2 * 512, qbh->bh[2]->b_data, 512);
^~~~~~
fs/hpfs/buffer.c:150:2: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data + 3 * 512, qbh->bh[3]->b_data, 512);
^~~~~~
fs/hpfs/buffer.c:150:2: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(data + 3 * 512, qbh->bh[3]->b_data, 512);
^~~~~~
fs/hpfs/buffer.c:223:3: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(qbh->bh[0]->b_data, qbh->data + 0 * 512, 512);
^~~~~~
fs/hpfs/buffer.c:223:3: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(qbh->bh[0]->b_data, qbh->data + 0 * 512, 512);
^~~~~~
fs/hpfs/buffer.c:224:3: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(qbh->bh[1]->b_data, qbh->data + 1 * 512, 512);
^~~~~~
fs/hpfs/buffer.c:224:3: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(qbh->bh[1]->b_data, qbh->data + 1 * 512, 512);
^~~~~~
fs/hpfs/buffer.c:225:3: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(qbh->bh[2]->b_data, qbh->data + 2 * 512, 512);
^~~~~~
fs/hpfs/buffer.c:225:3: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(qbh->bh[2]->b_data, qbh->data + 2 * 512, 512);
^~~~~~
fs/hpfs/buffer.c:226:3: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(qbh->bh[3]->b_data, qbh->data + 3 * 512, 512);
^~~~~~
fs/hpfs/buffer.c:226:3: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(qbh->bh[3]->b_data, qbh->data + 3 * 512, 512);
^~~~~~
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
38 warnings generated.
drivers/auxdisplay/panel.c:1452:2: warning: Call to function 'strncpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'strncpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(key->u.kbd.press_str, press, sizeof(key->u.kbd.press_str));
^~~~~~~
drivers/auxdisplay/panel.c:1452:2: note: Call to function 'strncpy' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'strncpy_s' in case of C11
strncpy(key->u.kbd.press_str, press, sizeof(key->u.kbd.press_str));
^~~~~~~
drivers/auxdisplay/panel.c:1453:2: warning: Call to function 'strncpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'strncpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(key->u.kbd.repeat_str, repeat, sizeof(key->u.kbd.repeat_str));
^~~~~~~
drivers/auxdisplay/panel.c:1453:2: note: Call to function 'strncpy' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'strncpy_s' in case of C11
strncpy(key->u.kbd.repeat_str, repeat, sizeof(key->u.kbd.repeat_str));
^~~~~~~
drivers/auxdisplay/panel.c:1454:2: warning: Call to function 'strncpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'strncpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(key->u.kbd.release_str, release,
^~~~~~~
drivers/auxdisplay/panel.c:1454:2: note: Call to function 'strncpy' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'strncpy_s' in case of C11
strncpy(key->u.kbd.release_str, release,
^~~~~~~
drivers/auxdisplay/panel.c:1534:2: warning: Call to function 'memset' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&panel_cb, 0, sizeof(panel_cb));
^~~~~~
drivers/auxdisplay/panel.c:1534:2: note: Call to function 'memset' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(&panel_cb, 0, sizeof(panel_cb));
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
15 warnings generated.
> crypto/des_generic.c:33:3: warning: Call to function
'memset' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(dctx, 0, sizeof(*dctx));
^~~~~~
crypto/des_generic.c:33:3: note: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(dctx, 0, sizeof(*dctx));
^~~~~~
crypto/des_generic.c:65:3: warning: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(dctx, 0, sizeof(*dctx));
^~~~~~
crypto/des_generic.c:65:3: note: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(dctx, 0, sizeof(*dctx));
^~~~~~
Suppressed 13 warnings (13 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
13 warnings generated.
lib/xarray.c:2029:18: warning: Value stored to 'node' during its initialization
is never read [clang-analyzer-deadcode.DeadStores]
struct xa_node *node = xas->xa_node;
^~~~ ~~~~~~~~~~~~
lib/xarray.c:2029:18: note: Value stored to 'node' during its initialization is
never read
struct xa_node *node = xas->xa_node;
^~~~ ~~~~~~~~~~~~
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
9 warnings generated.
Suppressed 9 warnings (9 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
19 warnings generated.
Suppressed 19 warnings (19 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
70 warnings generated.
fs/namei.c:247:2: warning: Call to function 'memcpy' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memcpy_s' in
case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy((char *)result->name, filename, len);
^~~~~~
fs/namei.c:247:2: note: Call to function 'memcpy' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memcpy_s' in
case of C11
memcpy((char *)result->name, filename, len);
^~~~~~
fs/namei.c:635:2: warning: Call to function 'memcpy' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memcpy_s' in
case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(p, nd->internal, sizeof(nd->internal));
^~~~~~
fs/namei.c:635:2: note: Call to function 'memcpy' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memcpy_s' in
case of C11
memcpy(p, nd->internal, sizeof(nd->internal));
^~~~~~
fs/namei.c:3423:8: warning: 4th function call argument is an uninitialized value
[clang-analyzer-core.CallAndMessage]
res = step_into(nd, WALK_TRAILING, dentry, inode, seq);
^
fs/namei.c:3636:9: note: Calling 'path_openat'
filp = path_openat(&nd, op, flags | LOOKUP_RCU);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/namei.c:3595:41: note: Left side of '&&' is false
file = alloc_empty_file(op->open_flag, current_cred());
^
include/linux/cred.h:299:2: note: expanded from macro 'current_cred'
rcu_dereference_protected(current->cred, 1)
^
include/linux/rcupdate.h:594:2: note: expanded from macro
'rcu_dereference_protected'
__rcu_dereference_protected((p), __UNIQUE_ID(rcu), (c), __rcu)
^
include/linux/rcupdate.h:398:2: note: expanded from macro
'__rcu_dereference_protected'
RCU_LOCKDEP_WARN(!(c), "suspicious rcu_dereference_protected()
usage"); \
^
include/linux/rcupdate.h:319:11: note: expanded from macro 'RCU_LOCKDEP_WARN'
if ((c) && debug_lockdep_rcu_enabled() && !__warned) {
\
^
fs/namei.c:3595:41: note: Loop condition is false. Exiting loop
file = alloc_empty_file(op->open_flag, current_cred());
^
include/linux/cred.h:299:2: note: expanded from macro 'current_cred'
rcu_dereference_protected(current->cred, 1)
^
include/linux/rcupdate.h:594:2: note: expanded from macro
'rcu_dereference_protected'
__rcu_dereference_protected((p), __UNIQUE_ID(rcu), (c), __rcu)
^
include/linux/rcupdate.h:398:2: note: expanded from macro
'__rcu_dereference_protected'
RCU_LOCKDEP_WARN(!(c), "suspicious rcu_dereference_protected()
usage"); \
^
include/linux/rcupdate.h:317:2: note: expanded from macro 'RCU_LOCKDEP_WARN'
do { \
^
fs/namei.c:3596:2: note: Taking false branch
if (IS_ERR(file))
^
fs/namei.c:3599:6: note: Assuming the condition is true
if (unlikely(file->f_flags & __O_TMPFILE)) {
--
^
include/asm-generic/bug.h:166:23: note: expanded from macro 'WARN_ON'
int __ret_warn_on = !!(condition); \
^~~~~~~~~~~~
drivers/spi/spi-nxp-fspi.c:876:2: note: Calling 'nxp_fspi_prepare_lut'
nxp_fspi_prepare_lut(f, op);
^~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/spi/spi-nxp-fspi.c:538:6: note: Assuming field 'nbytes' is not equal to
0
if (op->addr.nbytes) {
^~~~~~~~~~~~~~~
drivers/spi/spi-nxp-fspi.c:538:2: note: Taking true branch
if (op->addr.nbytes) {
^
drivers/spi/spi-nxp-fspi.c:539:25: note: The result of the left shift is undefined
because the left operand is negative
lutval[lutidx / 2] |= LUT_DEF(lutidx, LUT_ADDR,
^
drivers/spi/spi-nxp-fspi.c:311:36: note: expanded from macro 'LUT_DEF'
((((ins) << INSTR_SHIFT) | ((pad) << PAD_SHIFT) | \
~~~~~ ^
drivers/spi/spi-nxp-fspi.c:547:25: warning: The result of the left shift is undefined
because the left operand is negative [clang-analyzer-core.UndefinedBinaryOperatorResult]
lutval[lutidx / 2] |= LUT_DEF(lutidx, LUT_DUMMY,
^
drivers/spi/spi-nxp-fspi.c:311:36: note: expanded from macro 'LUT_DEF'
((((ins) << INSTR_SHIFT) | ((pad) << PAD_SHIFT) | \
^
drivers/spi/spi-nxp-fspi.c:872:2: note: Assuming 'err' is not equal to 0
WARN_ON(err);
^
include/asm-generic/bug.h:166:23: note: expanded from macro 'WARN_ON'
int __ret_warn_on = !!(condition); \
^~~~~~~~~~~~
drivers/spi/spi-nxp-fspi.c:876:2: note: Calling 'nxp_fspi_prepare_lut'
nxp_fspi_prepare_lut(f, op);
^~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/spi/spi-nxp-fspi.c:538:6: note: Assuming field 'nbytes' is 0
if (op->addr.nbytes) {
^~~~~~~~~~~~~~~
drivers/spi/spi-nxp-fspi.c:538:2: note: Taking false branch
if (op->addr.nbytes) {
^
drivers/spi/spi-nxp-fspi.c:546:6: note: Assuming field 'nbytes' is not equal to
0
if (op->dummy.nbytes) {
^~~~~~~~~~~~~~~~
drivers/spi/spi-nxp-fspi.c:546:2: note: Taking true branch
if (op->dummy.nbytes) {
^
drivers/spi/spi-nxp-fspi.c:547:25: note: The result of the left shift is undefined
because the left operand is negative
lutval[lutidx / 2] |= LUT_DEF(lutidx, LUT_DUMMY,
^
drivers/spi/spi-nxp-fspi.c:311:36: note: expanded from macro 'LUT_DEF'
((((ins) << INSTR_SHIFT) | ((pad) << PAD_SHIFT) | \
~~~~~ ^
drivers/spi/spi-nxp-fspi.c:560:25: warning: The result of the left shift is undefined
because the left operand is negative [clang-analyzer-core.UndefinedBinaryOperatorResult]
lutval[lutidx / 2] |= LUT_DEF(lutidx,
^
drivers/spi/spi-nxp-fspi.c:311:36: note: expanded from macro 'LUT_DEF'
((((ins) << INSTR_SHIFT) | ((pad) << PAD_SHIFT) | \
^
drivers/spi/spi-nxp-fspi.c:872:2: note: Assuming 'err' is not equal to 0
WARN_ON(err);
^
include/asm-generic/bug.h:166:23: note: expanded from macro 'WARN_ON'
int __ret_warn_on = !!(condition); \
^~~~~~~~~~~~
drivers/spi/spi-nxp-fspi.c:876:2: note: Calling 'nxp_fspi_prepare_lut'
nxp_fspi_prepare_lut(f, op);
^~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/spi/spi-nxp-fspi.c:538:6: note: Assuming field 'nbytes' is 0
if (op->addr.nbytes) {
^~~~~~~~~~~~~~~
drivers/spi/spi-nxp-fspi.c:538:2: note: Taking false branch
if (op->addr.nbytes) {
^
drivers/spi/spi-nxp-fspi.c:546:6: note: Assuming field 'nbytes' is 0
if (op->dummy.nbytes) {
^~~~~~~~~~~~~~~~
drivers/spi/spi-nxp-fspi.c:546:2: note: Taking false branch
if (op->dummy.nbytes) {
^
drivers/spi/spi-nxp-fspi.c:559:6: note: Assuming field 'nbytes' is not equal to
0
if (op->data.nbytes) {
^~~~~~~~~~~~~~~
drivers/spi/spi-nxp-fspi.c:559:2: note: Taking true branch
if (op->data.nbytes) {
^
drivers/spi/spi-nxp-fspi.c:561:12: note: Assuming field 'dir' is not equal to
SPI_MEM_DATA_IN
op->data.dir == SPI_MEM_DATA_IN ?
^
drivers/spi/spi-nxp-fspi.c:311:6: note: expanded from macro 'LUT_DEF'
((((ins) << INSTR_SHIFT) | ((pad) << PAD_SHIFT) | \
^~~
drivers/spi/spi-nxp-fspi.c:561:12: note: '?' condition is false
op->data.dir == SPI_MEM_DATA_IN ?
^
drivers/spi/spi-nxp-fspi.c:560:25: note: The result of the left shift is undefined
because the left operand is negative
lutval[lutidx / 2] |= LUT_DEF(lutidx,
^
drivers/spi/spi-nxp-fspi.c:311:36: note: expanded from macro 'LUT_DEF'
((((ins) << INSTR_SHIFT) | ((pad) << PAD_SHIFT) | \
~~~~~ ^
> drivers/spi/spi-nxp-fspi.c:764:4: warning: Call to function
'memcpy' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&data, buf + i + j, 4);
^~~~~~
drivers/spi/spi-nxp-fspi.c:764:4: note: Call to function 'memcpy' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(&data, buf + i + j, 4);
^~~~~~
drivers/spi/spi-nxp-fspi.c:811:4: warning: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf + j, &tmp, size);
^~~~~~
drivers/spi/spi-nxp-fspi.c:811:4: note: Call to function 'memcpy' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(buf + j, &tmp, size);
^~~~~~
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
64 warnings generated.
fs/ext4/super.c:890:8: warning: Call to function 'snprintf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (snprintf(nbuf, 16, "error %d", -errno) >= 0)
^~~~~~~~
fs/ext4/super.c:890:8: note: Call to function 'snprintf' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
if (snprintf(nbuf, 16, "error %d", -errno) >= 0)
^~~~~~~~
fs/ext4/super.c:3190:3: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(new_groups, old_groups,
^~~~~~
fs/ext4/super.c:3190:3: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(new_groups, old_groups,
^~~~~~
fs/ext4/super.c:4227:4: warning: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buf, 0, PAGE_SIZE);
^~~~~~
fs/ext4/super.c:4227:4: note: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(buf, 0, PAGE_SIZE);
^~~~~~
fs/ext4/super.c:5072:2: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&sb->s_uuid, es->s_uuid, sizeof(es->s_uuid));
^~~~~~
fs/ext4/super.c:5072:2: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(&sb->s_uuid, es->s_uuid, sizeof(es->s_uuid));
^~~~~~
fs/ext4/super.c:5087:2: warning: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&sbi->s_fc_stats, 0, sizeof(sbi->s_fc_stats));
^~~~~~
fs/ext4/super.c:5087:2: note: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(&sbi->s_fc_stats, 0, sizeof(sbi->s_fc_stats));
^~~~~~
fs/ext4/super.c:5838:4: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(save, ((char *) es) +
^~~~~~
fs/ext4/super.c:5838:4: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(save, ((char *) es) +
^~~~~~
fs/ext4/super.c:5842:4: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(((char *) es) + EXT4_S_ERR_START,
^~~~~~
fs/ext4/super.c:5842:4: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(((char *) es) + EXT4_S_ERR_START,
^~~~~~
fs/ext4/super.c:5915:4: warning: Call to function 'strncpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'strncpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(es->s_first_error_func, sbi->s_first_error_func,
^~~~~~~
fs/ext4/super.c:5915:4: note: Call to function 'strncpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'strncpy_s' in case of C11
strncpy(es->s_first_error_func, sbi->s_first_error_func,
^~~~~~~
fs/ext4/super.c:5929:3: warning: Call to function 'strncpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'strncpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(es->s_last_error_func, sbi->s_last_error_func,
^~~~~~~
fs/ext4/super.c:5929:3: note: Call to function 'strncpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'strncpy_s' in case of C11
strncpy(es->s_last_error_func, sbi->s_last_error_func,
^~~~~~~
Suppressed 55 warnings (51 in non-user code, 4 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
35 warnings generated.
fs/filesystems.c:227:3: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, p->name, len);
^~~~~~
fs/filesystems.c:227:3: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(buf, p->name, len);
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
38 warnings generated.
drivers/remoteproc/remoteproc_elf_loader.c:225:5: warning: Call to function
'memcpy' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ptr, elf_data + offset, filesz);
^~~~~~
drivers/remoteproc/remoteproc_elf_loader.c:225:5: note: Call to function
'memcpy' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memcpy_s' in case of C11
memcpy(ptr, elf_data + offset, filesz);
^~~~~~
drivers/remoteproc/remoteproc_elf_loader.c:239:5: warning: Call to function
'memset' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ptr + filesz, 0, memsz - filesz);
^~~~~~
drivers/remoteproc/remoteproc_elf_loader.c:239:5: note: Call to function
'memset' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memset_s' in case of C11
memset(ptr + filesz, 0, memsz - filesz);
^~~~~~
Suppressed 36 warnings (36 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
41 warnings generated.
drivers/extcon/extcon.c:339:3: warning: Call to function 'memset' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(cable->usb_propval, 0, sizeof(cable->usb_propval));
--
^~~~~~ ~~~~~~~~~
drivers/crypto/amlogic/amlogic-gxl-cipher.c:95:22: note: Value stored to
'dst_sg' during its initialization is never read
struct scatterlist *dst_sg = areq->dst;
^~~~~~ ~~~~~~~~~
drivers/crypto/amlogic/amlogic-gxl-cipher.c:126:2: warning: Call to function
'memcpy' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(bkeyiv, op->key, op->keylen);
^~~~~~
drivers/crypto/amlogic/amlogic-gxl-cipher.c:126:2: note: Call to function
'memcpy' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memcpy_s' in case of C11
memcpy(bkeyiv, op->key, op->keylen);
^~~~~~
drivers/crypto/amlogic/amlogic-gxl-cipher.c:136:3: warning: Call to function
'memcpy' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(bkeyiv + 32, areq->iv, ivsize);
^~~~~~
drivers/crypto/amlogic/amlogic-gxl-cipher.c:136:3: note: Call to function
'memcpy' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memcpy_s' in case of C11
memcpy(bkeyiv + 32, areq->iv, ivsize);
^~~~~~
drivers/crypto/amlogic/amlogic-gxl-cipher.c:165:3: warning: Call to function
'memset' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(desc, 0, sizeof(struct meson_desc));
^~~~~~
drivers/crypto/amlogic/amlogic-gxl-cipher.c:165:3: note: Call to function
'memset' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memset_s' in case of C11
memset(desc, 0, sizeof(struct meson_desc));
^~~~~~
drivers/crypto/amlogic/amlogic-gxl-cipher.c:185:3: warning: Value stored to
'nr_sgd' is never read [clang-analyzer-deadcode.DeadStores]
nr_sgd = nr_sgs;
^ ~~~~~~
drivers/crypto/amlogic/amlogic-gxl-cipher.c:185:3: note: Value stored to
'nr_sgd' is never read
nr_sgd = nr_sgs;
^ ~~~~~~
drivers/crypto/amlogic/amlogic-gxl-cipher.c:208:3: warning: Call to function
'memset' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(desc, 0, sizeof(struct meson_desc));
^~~~~~
drivers/crypto/amlogic/amlogic-gxl-cipher.c:208:3: note: Call to function
'memset' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memset_s' in case of C11
memset(desc, 0, sizeof(struct meson_desc));
^~~~~~
drivers/crypto/amlogic/amlogic-gxl-cipher.c:247:4: warning: Call to function
'memcpy' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(areq->iv, backup_iv, ivsize);
^~~~~~
drivers/crypto/amlogic/amlogic-gxl-cipher.c:247:4: note: Call to function
'memcpy' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memcpy_s' in case of C11
memcpy(areq->iv, backup_iv, ivsize);
^~~~~~
drivers/crypto/amlogic/amlogic-gxl-cipher.c:317:2: warning: Call to function
'memset' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(op, 0, sizeof(struct meson_cipher_tfm_ctx));
^~~~~~
drivers/crypto/amlogic/amlogic-gxl-cipher.c:317:2: note: Call to function
'memset' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memset_s' in case of C11
memset(op, 0, sizeof(struct meson_cipher_tfm_ctx));
^~~~~~
drivers/crypto/amlogic/amlogic-gxl-cipher.c:351:20: warning: Value stored to
'mc' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct meson_dev *mc = op->mc;
^~ ~~~~~~
drivers/crypto/amlogic/amlogic-gxl-cipher.c:351:20: note: Value stored to 'mc'
during its initialization is never read
struct meson_dev *mc = op->mc;
^~ ~~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
14 warnings generated.
Suppressed 14 warnings (14 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
3 warnings generated.
Suppressed 3 warnings (3 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
2 warnings generated.
Suppressed 2 warnings (2 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
2 warnings generated.
Suppressed 2 warnings (2 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
3 warnings generated.
Suppressed 3 warnings (3 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
14 warnings generated.
Suppressed 14 warnings (14 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
2 warnings generated.
Suppressed 2 warnings (2 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
11 warnings generated.
Suppressed 11 warnings (11 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
31 warnings generated.
drivers/pinctrl/pinctrl-utils.c:48:2: warning: Call to function 'memset' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(new_map + old_num, 0, (new_num - old_num) * sizeof(*new_map));
^~~~~~
drivers/pinctrl/pinctrl-utils.c:48:2: note: Call to function 'memset' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(new_map + old_num, 0, (new_num - old_num) * sizeof(*new_map));
^~~~~~
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
64 warnings generated.
> fs/ecryptfs/crypto.c:92:2: warning: Call to function
'snprintf' is insecure as it does not provide security checks introduced in the
C11 standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf((*algified_name), algified_name_len, "%s(%s)",
^~~~~~~~
fs/ecryptfs/crypto.c:92:2: note: Call to function 'snprintf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
snprintf((*algified_name), algified_name_len, "%s(%s)",
^~~~~~~~
> fs/ecryptfs/crypto.c:125:2: warning: Call to function
'memcpy' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(src, crypt_stat->root_iv, crypt_stat->iv_bytes);
^~~~~~
fs/ecryptfs/crypto.c:125:2: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(src, crypt_stat->root_iv, crypt_stat->iv_bytes);
^~~~~~
> fs/ecryptfs/crypto.c:126:2: warning: Call to function
'memset' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset((src + crypt_stat->iv_bytes), 0, 16);
^~~~~~
fs/ecryptfs/crypto.c:126:2: note: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset((src + crypt_stat->iv_bytes), 0, 16);
^~~~~~
fs/ecryptfs/crypto.c:127:2: warning: Call to function 'snprintf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf((src + crypt_stat->iv_bytes), 16, "%lld", offset);
^~~~~~~~
fs/ecryptfs/crypto.c:127:2: note: Call to function 'snprintf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
snprintf((src + crypt_stat->iv_bytes), 16, "%lld", offset);
^~~~~~~~
fs/ecryptfs/crypto.c:139:2: warning: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(iv, dst, crypt_stat->iv_bytes);
^~~~~~
fs/ecryptfs/crypto.c:139:2: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(iv, dst, crypt_stat->iv_bytes);
^~~~~~
fs/ecryptfs/crypto.c:168:2: warning: Call to function 'memset' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset((void *)crypt_stat, 0, sizeof(struct ecryptfs_crypt_stat));
^~~~~~
fs/ecryptfs/crypto.c:168:2: note: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset((void *)crypt_stat, 0, sizeof(struct ecryptfs_crypt_stat));
^~~~~~
fs/ecryptfs/crypto.c:196:2: warning: Call to function 'memset' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(crypt_stat, 0, sizeof(struct ecryptfs_crypt_stat));
^~~~~~
fs/ecryptfs/crypto.c:196:2: note: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(crypt_stat, 0, sizeof(struct ecryptfs_crypt_stat));
^~~~~~
fs/ecryptfs/crypto.c:216:2: warning: Call to function 'memset' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(mount_crypt_stat, 0, sizeof(struct ecryptfs_mount_crypt_stat));
^~~~~~
fs/ecryptfs/crypto.c:216:2: note: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(mount_crypt_stat, 0, sizeof(struct ecryptfs_mount_crypt_stat));
^~~~~~
fs/ecryptfs/crypto.c:651:2: warning: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(crypt_stat->root_iv, dst, crypt_stat->iv_bytes);
^~~~~~
fs/ecryptfs/crypto.c:651:2: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(crypt_stat->root_iv, dst, crypt_stat->iv_bytes);
^~~~~~
fs/ecryptfs/crypto.c:654:3: warning: Call to function 'memset' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(crypt_stat->root_iv, 0, crypt_stat->iv_bytes);
^~~~~~
fs/ecryptfs/crypto.c:654:3: note: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(crypt_stat->root_iv, 0, crypt_stat->iv_bytes);
^~~~~~
fs/ecryptfs/crypto.c:790:2: warning: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(crypt_stat->cipher,
^~~~~~
fs/ecryptfs/crypto.c:790:2: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(crypt_stat->cipher,
^~~~~~
fs/ecryptfs/crypto.c:969:4: warning: Call to function 'strcpy' is insecure as
it does not provide bounding of the memory buffer. Replace unbounded copy functions with
analogous functions that support length arguments such as 'strlcpy'. CWE-119
[clang-analyzer-security.insecureAPI.strcpy]
strcpy(str, ecryptfs_cipher_code_str_map[i].cipher_str);
^~~~~~
fs/ecryptfs/crypto.c:969:4: note: Call to function 'strcpy' is insecure as it
does not provide bounding of the memory buffer. Replace unbounded copy functions with
analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(str, ecryptfs_cipher_code_str_map[i].cipher_str);
^~~~~~
fs/ecryptfs/crypto.c:1407:3: warning: Call to function 'memset' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(page_virt, 0, PAGE_SIZE);
^~~~~~
fs/ecryptfs/crypto.c:1407:3: note: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(page_virt, 0, PAGE_SIZE);
^~~~~~
fs/ecryptfs/crypto.c:1440:3: warning: Call to function 'memset' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(page_virt, 0, PAGE_SIZE);
^~~~~~
fs/ecryptfs/crypto.c:1440:3: note: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(page_virt, 0, PAGE_SIZE);
^~~~~~
fs/ecryptfs/crypto.c:1523:2: warning: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy((void *)(*copied_name), (void *)name, name_size);
^~~~~~
fs/ecryptfs/crypto.c:1523:2: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy((void *)(*copied_name), (void *)name, name_size);
^~~~~~
> fs/ecryptfs/crypto.c:1633:2: warning: Call to function
'strncpy' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'strncpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(tmp_tfm->cipher_name, cipher_name,
^~~~~~~
fs/ecryptfs/crypto.c:1633:2: note: Call to function 'strncpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'strncpy_s' in case of C11
strncpy(tmp_tfm->cipher_name, cipher_name,
^~~~~~~
fs/ecryptfs/crypto.c:1767:3: warning: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(last_block, (&src[src_size - 3]), 3);
^~~~~~
fs/ecryptfs/crypto.c:1767:3: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(last_block, (&src[src_size - 3]), 3);
^~~~~~
fs/ecryptfs/crypto.c:1941:4: warning: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy((*encoded_name),
^~~~~~
fs/ecryptfs/crypto.c:1941:4: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy((*encoded_name),
^~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
22 warnings generated.
Suppressed 22 warnings (22 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
27 warnings generated.
> fs/pstore/ram.c:149:6: warning: Call to function 'sscanf'
is insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'sscanf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if
(sscanf(buffer, RAMOOPS_KERNMSG_HDR "%lld.%lu-%c\n%n",
^~~~~~
fs/pstore/ram.c:149:6: note: Call to function 'sscanf' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sscanf_s' in case of C11
if (sscanf(buffer, RAMOOPS_KERNMSG_HDR "%lld.%lu-%c\n%n",
^~~~~~
fs/pstore/ram.c:157:13: warning: Call to function 'sscanf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sscanf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
} else if (sscanf(buffer, RAMOOPS_KERNMSG_HDR "%lld.%lu\n%n",
^~~~~~
fs/pstore/ram.c:157:13: note: Call to function 'sscanf' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sscanf_s' in case of C11
} else if (sscanf(buffer, RAMOOPS_KERNMSG_HDR "%lld.%lu\n%n",
^~~~~~
> fs/pstore/ram.c:276:2: warning: Call to function 'memcpy'
is insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(record->buf, (char *)persistent_ram_old(prz) + header_length,
^~~~~~
fs/pstore/ram.c:276:2: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(record->buf, (char *)persistent_ram_old(prz) + header_length,
^~~~~~
> fs/pstore/ram.c:728:3: warning: Call to function 'memset'
is insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(pdata, 0, sizeof(*pdata));
^~~~~~
fs/pstore/ram.c:728:3: note: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(pdata, 0, sizeof(*pdata));
^~~~~~
fs/pstore/ram.c:920:2: warning: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&pdata, 0, sizeof(pdata));
^~~~~~
fs/pstore/ram.c:920:2: note: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(&pdata, 0, sizeof(pdata));
^~~~~~
Suppressed 22 warnings (22 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
36 warnings generated.
drivers/parport/share.c:459:2: warning: Call to function 'memset' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(tmp->probe_info, 0, 5 * sizeof(struct parport_device_info));
^~~~~~
drivers/parport/share.c:459:2: note: Call to function 'memset' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(tmp->probe_info, 0, 5 * sizeof(struct parport_device_info));
^~~~~~
drivers/parport/share.c:490:2: warning: Call to function 'sprintf' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(name, "parport%d", tmp->portnum = tmp->number);
^~~~~~~
drivers/parport/share.c:490:2: note: Call to function 'sprintf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
sprintf(name, "parport%d", tmp->portnum = tmp->number);
^~~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
31 warnings generated.
drivers/parport/ieee1284_ops.c:599:4: warning: Call to function 'memset' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset (buf, byte, rle_count);
^~~~~~
drivers/parport/ieee1284_ops.c:599:4: note: Call to function 'memset' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset (buf, byte, rle_count);
^~~~~~
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
48 warnings generated.
drivers/video/fbdev/core/modedb.c:728:4: warning: Call to function 'memset' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&cvt_mode, 0, sizeof(cvt_mode));
^~~~~~
drivers/video/fbdev/core/modedb.c:728:4: note: Call to function 'memset' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(&cvt_mode, 0, sizeof(cvt_mode));
^~~~~~
drivers/video/fbdev/core/modedb.c:1180:3: warning: Call to function 'memset' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&var, 0, sizeof(struct fb_var_screeninfo));
^~~~~~
drivers/video/fbdev/core/modedb.c:1180:3: note: Call to function 'memset' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(&var, 0, sizeof(struct fb_var_screeninfo));
^~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
58 warnings generated.
drivers/video/fbdev/core/fbcvt.c:227:9: warning: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
read = snprintf(buf+offset, cnt, "fbcvt: %dx%d@%d: CVT Name - ",
^~~~~~~~
drivers/video/fbdev/core/fbcvt.c:227:9: note: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
read = snprintf(buf+offset, cnt, "fbcvt: %dx%d@%d: CVT Name - ",
^~~~~~~~
drivers/video/fbdev/core/fbcvt.c:233:3: warning: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(buf+offset, cnt, "Not a CVT standard - %d.%03d Mega
"
^~~~~~~~
drivers/video/fbdev/core/fbcvt.c:233:3: note: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
snprintf(buf+offset, cnt, "Not a CVT standard - %d.%03d Mega
"
^~~~~~~~
drivers/video/fbdev/core/fbcvt.c:237:11: warning: Call to function 'snprintf'
is insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
read = snprintf(buf+offset, cnt, "%d", pixcount);
^~~~~~~~
drivers/video/fbdev/core/fbcvt.c:237:11: note: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
read = snprintf(buf+offset, cnt, "%d", pixcount);
^~~~~~~~
drivers/video/fbdev/core/fbcvt.c:242:10: warning: Call to function 'snprintf'
is insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
read = snprintf(buf+offset, cnt, ".%03dM", pixcount_mod);
^~~~~~~~
drivers/video/fbdev/core/fbcvt.c:242:10: note: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
read = snprintf(buf+offset, cnt, ".%03dM", pixcount_mod);
^~~~~~~~
drivers/video/fbdev/core/fbcvt.c:247:11: warning: Call to function 'snprintf'
is insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
read = snprintf(buf+offset, cnt, "3");
^~~~~~~~
drivers/video/fbdev/core/fbcvt.c:247:11: note: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
read = snprintf(buf+offset, cnt, "3");
^~~~~~~~
drivers/video/fbdev/core/fbcvt.c:249:11: warning: Call to function 'snprintf'
is insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
read = snprintf(buf+offset, cnt, "4");
^~~~~~~~
drivers/video/fbdev/core/fbcvt.c:249:11: note: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
read = snprintf(buf+offset, cnt, "4");
^~~~~~~~
drivers/video/fbdev/core/fbcvt.c:251:11: warning: Call to function 'snprintf'
is insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
read = snprintf(buf+offset, cnt, "9");
^~~~~~~~
drivers/video/fbdev/core/fbcvt.c:251:11: note: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
read = snprintf(buf+offset, cnt, "9");
^~~~~~~~
drivers/video/fbdev/core/fbcvt.c:253:11: warning: Call to function 'snprintf'
is insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
read = snprintf(buf+offset, cnt, "A");
^~~~~~~~
drivers/video/fbdev/core/fbcvt.c:253:11: note: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
read = snprintf(buf+offset, cnt, "A");
^~~~~~~~
drivers/video/fbdev/core/fbcvt.c:260:11: warning: Call to function 'snprintf'
is insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
read = snprintf(buf+offset, cnt, "-R");
^~~~~~~~
drivers/video/fbdev/core/fbcvt.c:260:11: note: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
read = snprintf(buf+offset, cnt, "-R");
^~~~~~~~
drivers/video/fbdev/core/fbcvt.c:261:4: warning: Value stored to 'cnt' is never
read [clang-analyzer-deadcode.DeadStores]
cnt -= read;
^ ~~~~
drivers/video/fbdev/core/fbcvt.c:261:4: note: Value stored to 'cnt' is never
read
cnt -= read;
^ ~~~~
drivers/video/fbdev/core/fbcvt.c:262:4: warning: Value stored to 'offset' is
never read [clang-analyzer-deadcode.DeadStores]
offset += read;
^ ~~~~
drivers/video/fbdev/core/fbcvt.c:262:4: note: Value stored to 'offset' is never
read
offset += read;
^ ~~~~
drivers/video/fbdev/core/fbcvt.c:309:2: warning: Call to function 'memset' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&cvt, 0, sizeof(cvt));
^~~~~~
drivers/video/fbdev/core/fbcvt.c:309:2: note: Call to function 'memset' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(&cvt, 0, sizeof(cvt));
^~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
35 warnings generated.
> kernel/stop_machine.c:72:2: warning: Call to function
'memset' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(done, 0, sizeof(*done));
^~~~~~
kernel/stop_machine.c:72:2: note: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(done, 0, sizeof(*done));
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
42 warnings generated.
> kernel/kcov.c:943:2: warning: Call to function 'memcpy'
is insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dst_entries, src_entries, bytes_to_move);
^~~~~~
kernel/kcov.c:943:2: note: Call to function 'memcpy' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memcpy_s' in
case of C11
memcpy(dst_entries, src_entries, bytes_to_move);
^~~~~~
Suppressed 41 warnings (31 in non-user code, 10 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
35 warnings generated.
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
35 warnings generated.
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
23 warnings generated.
Suppressed 23 warnings (23 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
41 warnings generated.
kernel/trace/ring_buffer.c:2297:2: warning: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(iter->event, event, length);
^~~~~~
kernel/trace/ring_buffer.c:2297:2: note: Call to function 'memcpy' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(iter->event, event, length);
^~~~~~
kernel/trace/ring_buffer.c:3509:25: warning: The right operand of '!=' is a
garbage value [clang-analyzer-core.UndefinedBinaryOperatorResult]
if (unlikely(info->ts != save_before)) {
^
kernel/trace/ring_buffer.c:3823:2: note: Loop condition is false. Exiting loop
preempt_disable_notrace();
^
include/linux/preempt.h:254:35: note: expanded from macro
'preempt_disable_notrace'
#define preempt_disable_notrace() \
^
kernel/trace/ring_buffer.c:3825:6: note: Assuming the condition is false
if (atomic_read(&buffer->record_disabled))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/trace/ring_buffer.c:3825:2: note: Taking false branch
if (atomic_read(&buffer->record_disabled))
^
kernel/trace/ring_buffer.c:3830:6: note: Assuming the condition is false
if (!cpumask_test_cpu(cpu, buffer->cpumask))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/trace/ring_buffer.c:3830:2: note: Taking false branch
if (!cpumask_test_cpu(cpu, buffer->cpumask))
^
kernel/trace/ring_buffer.c:3835:6: note: Assuming the condition is false
if (atomic_read(&cpu_buffer->record_disabled))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/trace/ring_buffer.c:3835:2: note: Taking false branch
if (atomic_read(&cpu_buffer->record_disabled))
^
kernel/trace/ring_buffer.c:3838:6: note: Assuming the condition is false
if (length > BUF_MAX_DATA_SIZE)
^~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/trace/ring_buffer.c:3838:2: note: Taking false branch
if (length > BUF_MAX_DATA_SIZE)
^
kernel/trace/ring_buffer.c:3841:2: note: Taking false branch
if (unlikely(trace_recursive_lock(cpu_buffer)))
^
kernel/trace/ring_buffer.c:3844:10: note: Calling 'rb_reserve_next_event'
event = rb_reserve_next_event(buffer, cpu_buffer, length);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/trace/ring_buffer.c:3612:6: note: Assuming the condition is false
if (ring_buffer_time_stamp_abs(cpu_buffer->buffer)) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/trace/ring_buffer.c:3612:2: note: Taking false branch
if (ring_buffer_time_stamp_abs(cpu_buffer->buffer)) {
^
kernel/trace/ring_buffer.c:3632:6: note: '_____ret' is 0
if (RB_WARN_ON(cpu_buffer, ++nr_loops > 1000))
^
kernel/trace/ring_buffer.c:1054:7: note: expanded from macro 'RB_WARN_ON'
if (_____ret) { \
^~~~~~~~
kernel/trace/ring_buffer.c:3632:6: note: Taking false branch
if (RB_WARN_ON(cpu_buffer, ++nr_loops > 1000))
^
kernel/trace/ring_buffer.c:1054:3: note: expanded from macro 'RB_WARN_ON'
if (_____ret) { \
^
kernel/trace/ring_buffer.c:3632:2: note: Taking false branch
if (RB_WARN_ON(cpu_buffer, ++nr_loops > 1000))
^
kernel/trace/ring_buffer.c:3635:10: note: Calling '__rb_reserve_next'
event = __rb_reserve_next(cpu_buffer, &info);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/trace/ring_buffer.c:3440:32: note: Left side of '||' is false
tail_page = info->tail_page = READ_ONCE(cpu_buffer->tail_page);
^
include/asm-generic/rwonce.h:49:2: note: expanded from macro 'READ_ONCE'
compiletime_assert_rwonce_type(x); \
^
include/asm-generic/rwonce.h:36:21: note: expanded from macro
'compiletime_assert_rwonce_type'
compiletime_assert(__native_word(t) || sizeof(t) == sizeof(long long), \
--
^~~~~~
kernel/trace/ring_buffer.c:5129:2: note: Call to function 'memset' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(cpu_buffer->event_stamp, 0, sizeof(cpu_buffer->event_stamp));
^~~~~~
kernel/trace/ring_buffer.c:5596:4: warning: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(bpage->data + pos, rpage->data + rpos, size);
^~~~~~
kernel/trace/ring_buffer.c:5596:4: note: Call to function 'memcpy' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(bpage->data + pos, rpage->data + rpos, size);
^~~~~~
kernel/trace/ring_buffer.c:5653:4: warning: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&bpage->data[commit], &missed_events,
^~~~~~
kernel/trace/ring_buffer.c:5653:4: note: Call to function 'memcpy' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(&bpage->data[commit], &missed_events,
^~~~~~
kernel/trace/ring_buffer.c:5665:3: warning: Call to function 'memset' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&bpage->data[commit], 0, BUF_PAGE_SIZE - commit);
^~~~~~
kernel/trace/ring_buffer.c:5665:3: note: Call to function 'memset' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(&bpage->data[commit], 0, BUF_PAGE_SIZE - commit);
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
50 warnings generated.
drivers/siox/siox-core.c:150:2: warning: Call to function 'memset' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(smaster->buf, 0, smaster->setbuf_len);
^~~~~~
drivers/siox/siox-core.c:150:2: note: Call to function 'memset' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(smaster->buf, 0, smaster->setbuf_len);
^~~~~~
drivers/siox/siox-core.c:240:4: warning: Value stored to 'status' is never read
[clang-analyzer-deadcode.DeadStores]
status &= ~SIOX_STATUS_WDG;
^ ~~~~~~~~~~~~~~~~
drivers/siox/siox-core.c:240:4: note: Value stored to 'status' is never read
status &= ~SIOX_STATUS_WDG;
^ ~~~~~~~~~~~~~~~~
drivers/siox/siox-core.c:389:9: warning: Call to function 'sprintf' is insecure
as it does not provide bounding of the memory buffer or security checks introduced in the
C11 standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", sdev->type);
^~~~~~~
drivers/siox/siox-core.c:389:9: note: Call to function 'sprintf' is insecure as
it does not provide bounding of the memory buffer or security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", sdev->type);
^~~~~~~
drivers/siox/siox-core.c:399:9: warning: Call to function 'sprintf' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%zu\n", sdev->inbytes);
^~~~~~~
drivers/siox/siox-core.c:399:9: note: Call to function 'sprintf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
return sprintf(buf, "%zu\n", sdev->inbytes);
^~~~~~~
drivers/siox/siox-core.c:409:9: warning: Call to function 'sprintf' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%zu\n", sdev->outbytes);
^~~~~~~
drivers/siox/siox-core.c:409:9: note: Call to function 'sprintf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
return sprintf(buf, "%zu\n", sdev->outbytes);
^~~~~~~
drivers/siox/siox-core.c:426:9: warning: Call to function 'sprintf' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", status_errors);
^~~~~~~
drivers/siox/siox-core.c:426:9: note: Call to function 'sprintf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
return sprintf(buf, "%u\n", status_errors);
^~~~~~~
drivers/siox/siox-core.c:443:9: warning: Call to function 'sprintf' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", connected);
^~~~~~~
drivers/siox/siox-core.c:443:9: note: Call to function 'sprintf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
return sprintf(buf, "%u\n", connected);
^~~~~~~
drivers/siox/siox-core.c:460:9: warning: Call to function 'sprintf' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", status & SIOX_STATUS_WDG);
^~~~~~~
drivers/siox/siox-core.c:460:9: note: Call to function 'sprintf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
return sprintf(buf, "%d\n", status & SIOX_STATUS_WDG);
^~~~~~~
drivers/siox/siox-core.c:477:9: warning: Call to function 'sprintf' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", watchdog_errors);
^~~~~~~
drivers/siox/siox-core.c:477:9: note: Call to function 'sprintf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
return sprintf(buf, "%u\n", watchdog_errors);
^~~~~~~
drivers/siox/siox-core.c:559:9: warning: Call to function 'sprintf' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", smaster->active);
^~~~~~~
drivers/siox/siox-core.c:559:9: note: Call to function 'sprintf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
return sprintf(buf, "%d\n", smaster->active);
^~~~~~~
drivers/siox/siox-core.c:601:8: warning: Call to function 'sscanf' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'sscanf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = sscanf(buf, "%19s %zu %zu %hhu", type, &inbytes,
^~~~~~
drivers/siox/siox-core.c:601:8: note: Call to function 'sscanf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sscanf_s' in case of C11
ret = sscanf(buf, "%19s %zu %zu %hhu", type, &inbytes,
^~~~~~
drivers/siox/siox-core.c:637:9: warning: Call to function 'sprintf' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%lld\n",
jiffies_to_nsecs(smaster->poll_interval));
^~~~~~~
drivers/siox/siox-core.c:637:9: note: Call to function 'sprintf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
return sprintf(buf, "%lld\n",
jiffies_to_nsecs(smaster->poll_interval));
^~~~~~~
Suppressed 38 warnings (38 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
31 warnings generated.
> drivers/watchdog/watchdog_dev.c:1015:2: warning: Call to function
'memset' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
kthread_init_work(&wd_data->work, watchdog_ping_work);
^
include/linux/kthread.h:195:3: note: expanded from macro 'kthread_init_work'
memset((work), 0, sizeof(struct kthread_work)); \
^~~~~~
drivers/watchdog/watchdog_dev.c:1015:2: note: Call to function 'memset' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
kthread_init_work(&wd_data->work, watchdog_ping_work);
^
include/linux/kthread.h:195:3: note: expanded from macro 'kthread_init_work'
memset((work), 0, sizeof(struct kthread_work)); \
^~~~~~
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
49 warnings generated.
Suppressed 49 warnings (49 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
25 warnings generated.
drivers/leds/led-core.c:442:4: warning: Call to function 'snprintf' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(led_classdev_name, LED_MAX_NAME_SIZE,
"%s:%s",
^~~~~~~~
drivers/leds/led-core.c:442:4: note: Call to function 'snprintf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
snprintf(led_classdev_name, LED_MAX_NAME_SIZE,
"%s:%s",
^~~~~~~~
drivers/leds/led-core.c:449:4: warning: Call to function 'snprintf' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(tmp_buf, LED_MAX_NAME_SIZE, "%s:%s-%d",
^~~~~~~~
drivers/leds/led-core.c:449:4: note: Call to function 'snprintf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
snprintf(tmp_buf, LED_MAX_NAME_SIZE, "%s:%s-%d",
^~~~~~~~
drivers/leds/led-core.c:453:4: warning: Call to function 'snprintf' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(tmp_buf, LED_MAX_NAME_SIZE, "%s:%s",
^~~~~~~~
drivers/leds/led-core.c:453:4: note: Call to function 'snprintf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
snprintf(tmp_buf, LED_MAX_NAME_SIZE, "%s:%s",
^~~~~~~~
drivers/leds/led-core.c:458:4: warning: Call to function 'snprintf' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(led_classdev_name, LED_MAX_NAME_SIZE,
"%s:%s",
^~~~~~~~
drivers/leds/led-core.c:458:4: note: Call to function 'snprintf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
snprintf(led_classdev_name, LED_MAX_NAME_SIZE,
"%s:%s",
^~~~~~~~
drivers/leds/led-core.c:469:3: warning: Call to function 'snprintf' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(led_classdev_name, LED_MAX_NAME_SIZE, "%s:%s",
^~~~~~~~
drivers/leds/led-core.c:469:3: note: Call to function 'snprintf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
snprintf(led_classdev_name, LED_MAX_NAME_SIZE, "%s:%s",
^~~~~~~~
drivers/leds/led-core.c:472:30: warning: Access to field 'name' results in a
dereference of a null pointer [clang-analyzer-core.NullDereference]
strscpy(led_classdev_name, to_of_node(fwnode)->name,
^
include/linux/of.h:161:2: note: expanded from macro 'to_of_node'
({ \
^
drivers/leds/led-core.c:424:2: note: Taking false branch
BUG_ON(props.color == LED_COLOR_ID_MULTI);
^
include/asm-generic/bug.h:161:32: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^
drivers/leds/led-core.c:424:2: note: Loop condition is false. Exiting loop
BUG_ON(props.color == LED_COLOR_ID_MULTI);
^
include/asm-generic/bug.h:161:27: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^
drivers/leds/led-core.c:426:6: note: Assuming 'led_classdev_name' is non-null
if (!led_classdev_name)
^~~~~~~~~~~~~~~~~~
drivers/leds/led-core.c:426:2: note: Taking false branch
if (!led_classdev_name)
^
drivers/leds/led-core.c:429:2: note: Calling 'led_parse_fwnode_props'
led_parse_fwnode_props(dev, fwnode, &props);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/leds/led-core.c:370:6: note: Assuming 'fwnode' is non-null
if (!fwnode)
^~~~~~~
drivers/leds/led-core.c:370:2: note: Taking false branch
if (!fwnode)
^
drivers/leds/led-core.c:373:6: note: Assuming the condition is false
if (fwnode_property_present(fwnode, "label")) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/leds/led-core.c:373:2: note: Taking false branch
if (fwnode_property_present(fwnode, "label")) {
^
drivers/leds/led-core.c:380:6: note: Assuming the condition is false
if (fwnode_property_present(fwnode, "color")) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/leds/led-core.c:380:2: note: Taking false branch
if (fwnode_property_present(fwnode, "color")) {
^
drivers/leds/led-core.c:391:6: note: Assuming the condition is true
if (!fwnode_property_present(fwnode, "function"))
--
^~~~~~
drivers/staging/fieldbus/anybuss/host.c:1074:2: note: Call to function 'memcpy'
is insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(buf, t->area_pd.buf, count);
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
48 warnings generated.
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
48 warnings generated.
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
53 warnings generated.
block/blk-mq-sysfs.c:98:9: warning: Call to function 'sprintf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(page, "%u\n", hctx->tags->nr_tags);
^~~~~~~
block/blk-mq-sysfs.c:98:9: note: Call to function 'sprintf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
return sprintf(page, "%u\n", hctx->tags->nr_tags);
^~~~~~~
block/blk-mq-sysfs.c:104:9: warning: Call to function 'sprintf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(page, "%u\n", hctx->tags->nr_reserved_tags);
^~~~~~~
block/blk-mq-sysfs.c:104:9: note: Call to function 'sprintf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
return sprintf(page, "%u\n", hctx->tags->nr_reserved_tags);
^~~~~~~
block/blk-mq-sysfs.c:115:10: warning: Call to function 'snprintf' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = snprintf(pos + page, size - pos, "%u", i);
^~~~~~~~
block/blk-mq-sysfs.c:115:10: note: Call to function 'snprintf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
ret = snprintf(pos + page, size - pos, "%u", i);
^~~~~~~~
block/blk-mq-sysfs.c:117:10: warning: Call to function 'snprintf' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = snprintf(pos + page, size - pos, ", %u", i);
^~~~~~~~
block/blk-mq-sysfs.c:117:10: note: Call to function 'snprintf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
ret = snprintf(pos + page, size - pos, ", %u", i);
^~~~~~~~
block/blk-mq-sysfs.c:126:8: warning: Call to function 'snprintf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = snprintf(pos + page, size + 1 - pos, "\n");
^~~~~~~~
block/blk-mq-sysfs.c:126:8: note: Call to function 'snprintf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
ret = snprintf(pos + page, size + 1 - pos, "\n");
^~~~~~~~
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
22 warnings generated.
Suppressed 22 warnings (22 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
35 warnings generated.
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
48 warnings generated.
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
61 warnings generated.
fs/hpfs/hpfs_fn.h:180:4: warning: Assigned value is garbage or undefined
[clang-analyzer-core.uninitialized.Assign]
a = dst->down;
^
fs/hpfs/namei.c:533:6: note: Assuming the condition is false
if (flags & ~RENAME_NOREPLACE)
^~~~~~~~~~~~~~~~~~~~~~~~~
fs/hpfs/namei.c:533:2: note: Taking false branch
if (flags & ~RENAME_NOREPLACE)
^
fs/hpfs/namei.c:536:7: note: Assuming 'err' is 0
if ((err = hpfs_chk_name(new_name, &new_len))) return err;
^~~
fs/hpfs/namei.c:536:2: note: Taking false branch
if ((err = hpfs_chk_name(new_name, &new_len))) return err;
^
fs/hpfs/namei.c:544:6: note: Assuming 'new_inode' is null
if (new_inode && S_ISDIR(new_inode->i_mode)) {
^~~~~~~~~
fs/hpfs/namei.c:544:16: note: Left side of '&&' is false
if (new_inode && S_ISDIR(new_inode->i_mode)) {
^
fs/hpfs/namei.c:549:8: note: Assuming 'dep' is non-null
if (!(dep = map_dirent(old_dir, hpfs_i(old_dir)->i_dno, old_name, old_len,
&dno, &qbh))) {
^~~
fs/hpfs/namei.c:549:2: note: Taking false branch
if (!(dep = map_dirent(old_dir, hpfs_i(old_dir)->i_dno, old_name, old_len,
&dno, &qbh))) {
^
fs/hpfs/namei.c:554:2: note: Calling 'copy_de'
copy_de(&de, dep);
^~~~~~~~~~~~~~~~~
fs/hpfs/hpfs_fn.h:179:7: note: 'dst' is non-null
if (!dst || !src) return;
^~~
fs/hpfs/hpfs_fn.h:179:6: note: Left side of '||' is false
if (!dst || !src) return;
^
fs/hpfs/hpfs_fn.h:179:15: note: 'src' is non-null
if (!dst || !src) return;
^~~
fs/hpfs/hpfs_fn.h:179:2: note: Taking false branch
if (!dst || !src) return;
^
fs/hpfs/hpfs_fn.h:180:4: note: Assigned value is garbage or undefined
a = dst->down;
^ ~~~~~~~~~
> fs/hpfs/namei.c:48:2: warning: Call to function 'memset'
is insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&dee, 0, sizeof dee);
^~~~~~
fs/hpfs/namei.c:48:2: note: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(&dee, 0, sizeof dee);
^~~~~~
> fs/hpfs/namei.c:84:2: warning: Call to function 'memcpy'
is insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(fnode->name, name, len > 15 ? 15 : len);
^~~~~~
fs/hpfs/namei.c:84:2: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(fnode->name, name, len > 15 ? 15 : len);
^~~~~~
fs/hpfs/namei.c:151:2: warning: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&dee, 0, sizeof dee);
^~~~~~
fs/hpfs/namei.c:151:2: note: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(&dee, 0, sizeof dee);
^~~~~~
fs/hpfs/namei.c:190:2: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(fnode->name, name, len > 15 ? 15 : len);
^~~~~~
fs/hpfs/namei.c:190:2: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(fnode->name, name, len > 15 ? 15 : len);
^~~~~~
fs/hpfs/namei.c:239:2: warning: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&dee, 0, sizeof dee);
^~~~~~
fs/hpfs/namei.c:239:2: note: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(&dee, 0, sizeof dee);
^~~~~~
fs/hpfs/namei.c:273:2: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(fnode->name, name, len > 15 ? 15 : len);
^~~~~~
fs/hpfs/namei.c:273:2: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(fnode->name, name, len > 15 ? 15 : len);
^~~~~~
fs/hpfs/namei.c:317:2: warning: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&dee, 0, sizeof dee);
^~~~~~
fs/hpfs/namei.c:317:2: note: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(&dee, 0, sizeof dee);
^~~~~~
fs/hpfs/namei.c:352:2: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(fnode->name, name, len > 15 ? 15 : len);
^~~~~~
fs/hpfs/namei.c:352:2: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(fnode->name, name, len > 15 ? 15 : len);
^~~~~~
fs/hpfs/namei.c:559:8: warning: Although the value stored to 'r' is used in the
enclosing expression, the value is never actually read from 'r'
[clang-analyzer-deadcode.DeadStores]
if ((r = hpfs_remove_dirent(old_dir, dno, dep, &qbh, 1)) != 2) {
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/hpfs/namei.c:559:8: note: Although the value stored to 'r' is used in the
enclosing expression, the value is never actually read from 'r'
if ((r = hpfs_remove_dirent(old_dir, dno, dep, &qbh, 1)) != 2) {
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/hpfs/namei.c:563:5: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(nde->name, new_name, new_len);
^~~~~~
fs/hpfs/namei.c:563:5: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(nde->name, new_name, new_len);
^~~~~~
fs/hpfs/namei.c:607:3: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(fnode->name, new_name, new_len>15?15:new_len);
^~~~~~
fs/hpfs/namei.c:607:3: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(fnode->name, new_name, new_len>15?15:new_len);
^~~~~~
fs/hpfs/namei.c:608:21: warning: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (new_len < 15) memset(&fnode->name[new_len], 0, 15 -
new_len);
^~~~~~
fs/hpfs/namei.c:608:21: note: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
if (new_len < 15) memset(&fnode->name[new_len], 0, 15 -
new_len);
^~~~~~
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
55 warnings generated.
drivers/thermal/thermal_core.c:675:2: warning: Call to function 'sprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(dev->name, "cdev%d", dev->id);
^~~~~~~
drivers/thermal/thermal_core.c:675:2: note: Call to function 'sprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
sprintf(dev->name, "cdev%d", dev->id);
^~~~~~~
drivers/thermal/thermal_core.c:681:2: warning: Call to function 'sprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(dev->attr_name, "cdev%d_trip_point", dev->id);
^~~~~~~
drivers/thermal/thermal_core.c:681:2: note: Call to function 'sprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
sprintf(dev->attr_name, "cdev%d_trip_point", dev->id);
^~~~~~~
drivers/thermal/thermal_core.c:690:2: warning: Call to function 'sprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(dev->weight_attr_name, "cdev%d_weight", dev->id);
^~~~~~~
drivers/thermal/thermal_core.c:690:2: note: Call to function 'sprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
sprintf(dev->weight_attr_name, "cdev%d_weight", dev->id);
^~~~~~~
Suppressed 52 warnings (52 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
63 warnings generated.
drivers/thermal/thermal_sysfs.c:31:9: warning: Call to function 'sprintf' is
insecure as it does not provide bounding of the memory buffer or security checks
introduced in the C11 standard. Replace with analogous functions that support length
arguments or provides boundary checks such as 'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", tz->type);
^~~~~~~
drivers/thermal/thermal_sysfs.c:31:9: note: Call to function 'sprintf' is
insecure as it does not provide bounding of the memory buffer or security checks
introduced in the C11 standard. Replace with analogous functions that support length
arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", tz->type);
^~~~~~~
drivers/thermal/thermal_sysfs.c:45:9: warning: Call to function 'sprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", temperature);
--
^
drivers/thermal/thermal_sysfs.c:317:10: note: expanded from macro
'create_s32_tzp_attr'
return sprintf(buf, "%d\n", tz->tzp->name);
\
^~~~~~~
drivers/thermal/thermal_sysfs.c:344:1: note: Call to function 'sprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
create_s32_tzp_attr(k_d);
^
drivers/thermal/thermal_sysfs.c:317:10: note: expanded from macro
'create_s32_tzp_attr'
return sprintf(buf, "%d\n", tz->tzp->name);
\
^~~~~~~
drivers/thermal/thermal_sysfs.c:345:1: warning: Call to function 'sprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
create_s32_tzp_attr(integral_cutoff);
^
drivers/thermal/thermal_sysfs.c:317:10: note: expanded from macro
'create_s32_tzp_attr'
return sprintf(buf, "%d\n", tz->tzp->name);
\
^~~~~~~
drivers/thermal/thermal_sysfs.c:345:1: note: Call to function 'sprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
create_s32_tzp_attr(integral_cutoff);
^
drivers/thermal/thermal_sysfs.c:317:10: note: expanded from macro
'create_s32_tzp_attr'
return sprintf(buf, "%d\n", tz->tzp->name);
\
^~~~~~~
drivers/thermal/thermal_sysfs.c:346:1: warning: Call to function 'sprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
create_s32_tzp_attr(slope);
^
drivers/thermal/thermal_sysfs.c:317:10: note: expanded from macro
'create_s32_tzp_attr'
return sprintf(buf, "%d\n", tz->tzp->name);
\
^~~~~~~
drivers/thermal/thermal_sysfs.c:346:1: note: Call to function 'sprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
create_s32_tzp_attr(slope);
^
drivers/thermal/thermal_sysfs.c:317:10: note: expanded from macro
'create_s32_tzp_attr'
return sprintf(buf, "%d\n", tz->tzp->name);
\
^~~~~~~
drivers/thermal/thermal_sysfs.c:347:1: warning: Call to function 'sprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
create_s32_tzp_attr(offset);
^
drivers/thermal/thermal_sysfs.c:317:10: note: expanded from macro
'create_s32_tzp_attr'
return sprintf(buf, "%d\n", tz->tzp->name);
\
^~~~~~~
drivers/thermal/thermal_sysfs.c:347:1: note: Call to function 'sprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
create_s32_tzp_attr(offset);
^
drivers/thermal/thermal_sysfs.c:317:10: note: expanded from macro
'create_s32_tzp_attr'
return sprintf(buf, "%d\n", tz->tzp->name);
\
^~~~~~~
drivers/thermal/thermal_sysfs.c:456:3: warning: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(tz->trip_type_attrs[indx].name, THERMAL_NAME_LENGTH,
^~~~~~~~
drivers/thermal/thermal_sysfs.c:456:3: note: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
snprintf(tz->trip_type_attrs[indx].name, THERMAL_NAME_LENGTH,
^~~~~~~~
drivers/thermal/thermal_sysfs.c:467:3: warning: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(tz->trip_temp_attrs[indx].name, THERMAL_NAME_LENGTH,
^~~~~~~~
drivers/thermal/thermal_sysfs.c:467:3: note: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
snprintf(tz->trip_temp_attrs[indx].name, THERMAL_NAME_LENGTH,
^~~~~~~~
drivers/thermal/thermal_sysfs.c:486:3: warning: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(tz->trip_hyst_attrs[indx].name, THERMAL_NAME_LENGTH,
^~~~~~~~
drivers/thermal/thermal_sysfs.c:486:3: note: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
snprintf(tz->trip_hyst_attrs[indx].name, THERMAL_NAME_LENGTH,
^~~~~~~~
drivers/thermal/thermal_sysfs.c:576:9: warning: Call to function 'sprintf' is
insecure as it does not provide bounding of the memory buffer or security checks
introduced in the C11 standard. Replace with analogous functions that support length
arguments or provides boundary checks such as 'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", cdev->type);
^~~~~~~
drivers/thermal/thermal_sysfs.c:576:9: note: Call to function 'sprintf' is
insecure as it does not provide bounding of the memory buffer or security checks
introduced in the C11 standard. Replace with analogous functions that support length
arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", cdev->type);
^~~~~~~
drivers/thermal/thermal_sysfs.c:589:9: warning: Call to function 'sprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%ld\n", state);
^~~~~~~
drivers/thermal/thermal_sysfs.c:589:9: note: Call to function 'sprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
return sprintf(buf, "%ld\n", state);
^~~~~~~
drivers/thermal/thermal_sysfs.c:602:9: warning: Call to function 'sprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%ld\n", state);
^~~~~~~
drivers/thermal/thermal_sysfs.c:602:9: note: Call to function 'sprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
return sprintf(buf, "%ld\n", state);
^~~~~~~
drivers/thermal/thermal_sysfs.c:616:6: warning: Call to function 'sscanf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'sscanf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(buf, "%ld\n", &state) != 1)
^~~~~~
drivers/thermal/thermal_sysfs.c:616:6: note: Call to function 'sscanf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'sscanf_s' in case of C11
if (sscanf(buf, "%ld\n", &state) != 1)
^~~~~~
drivers/thermal/thermal_sysfs.c:705:8: warning: Call to function 'sprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = sprintf(buf, "%u\n", stats->total_trans);
^~~~~~~
drivers/thermal/thermal_sysfs.c:705:8: note: Call to function 'sprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
ret = sprintf(buf, "%u\n", stats->total_trans);
^~~~~~~
drivers/thermal/thermal_sysfs.c:724:10: warning: Call to function 'sprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += sprintf(buf + len, "state%u\t%llu\n", i,
^~~~~~~
drivers/thermal/thermal_sysfs.c:724:10: note: Call to function 'sprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
len += sprintf(buf + len, "state%u\t%llu\n", i,
^~~~~~~
> drivers/thermal/thermal_sysfs.c:744:2: warning: Call to function
'memset' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(stats->trans_table, 0,
^~~~~~
drivers/thermal/thermal_sysfs.c:744:2: note: Call to function 'memset' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(stats->trans_table, 0,
^~~~~~
drivers/thermal/thermal_sysfs.c:763:9: warning: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += snprintf(buf + len, PAGE_SIZE - len, " From : To\n");
^~~~~~~~
drivers/thermal/thermal_sysfs.c:763:9: note: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
len += snprintf(buf + len, PAGE_SIZE - len, " From : To\n");
^~~~~~~~
drivers/thermal/thermal_sysfs.c:764:9: warning: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += snprintf(buf + len, PAGE_SIZE - len, " : ");
^~~~~~~~
drivers/thermal/thermal_sysfs.c:764:9: note: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
len += snprintf(buf + len, PAGE_SIZE - len, " : ");
^~~~~~~~
drivers/thermal/thermal_sysfs.c:768:10: warning: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += snprintf(buf + len, PAGE_SIZE - len, "state%2u ",
i);
^~~~~~~~
drivers/thermal/thermal_sysfs.c:768:10: note: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
len += snprintf(buf + len, PAGE_SIZE - len, "state%2u ",
i);
^~~~~~~~
drivers/thermal/thermal_sysfs.c:773:9: warning: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += snprintf(buf + len, PAGE_SIZE - len, "\n");
^~~~~~~~
drivers/thermal/thermal_sysfs.c:773:9: note: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
len += snprintf(buf + len, PAGE_SIZE - len, "\n");
^~~~~~~~
drivers/thermal/thermal_sysfs.c:779:10: warning: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += snprintf(buf + len, PAGE_SIZE - len, "state%2u:", i);
^~~~~~~~
drivers/thermal/thermal_sysfs.c:779:10: note: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
len += snprintf(buf + len, PAGE_SIZE - len, "state%2u:", i);
^~~~~~~~
drivers/thermal/thermal_sysfs.c:784:11: warning: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += snprintf(buf + len, PAGE_SIZE - len, "%8u ",
^~~~~~~~
drivers/thermal/thermal_sysfs.c:784:11: note: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
len += snprintf(buf + len, PAGE_SIZE - len, "%8u ",
^~~~~~~~
drivers/thermal/thermal_sysfs.c:789:10: warning: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += snprintf(buf + len, PAGE_SIZE - len, "\n");
^~~~~~~~
drivers/thermal/thermal_sysfs.c:789:10: note: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
len += snprintf(buf + len, PAGE_SIZE - len, "\n");
^~~~~~~~
drivers/thermal/thermal_sysfs.c:884:9: warning: Call to function 'sprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", instance->trip);
^~~~~~~
drivers/thermal/thermal_sysfs.c:884:9: note: Call to function 'sprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
return sprintf(buf, "%d\n", instance->trip);
^~~~~~~
drivers/thermal/thermal_sysfs.c:894:9: warning: Call to function 'sprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", instance->weight);
^~~~~~~
drivers/thermal/thermal_sysfs.c:894:9: note: Call to function 'sprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
return sprintf(buf, "%d\n", instance->weight);
^~~~~~~
Suppressed 19 warnings (19 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
55 warnings generated.
fs/ext4/ioctl.c:42:2: warning: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(es->s_volume_name, (char *)arg, EXT4_LABEL_MAX);
^~~~~~
fs/ext4/ioctl.c:42:2: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(es->s_volume_name, (char *)arg, EXT4_LABEL_MAX);
^~~~~~
fs/ext4/ioctl.c:433:4: warning: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ei_bl->i_data, 0, sizeof(ei_bl->i_data));
^~~~~~
fs/ext4/ioctl.c:433:4: note: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(ei_bl->i_data, 0, sizeof(ei_bl->i_data));
^~~~~~
fs/ext4/ioctl.c:1117:2: warning: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(new_label + len, 0, EXT4_LABEL_MAX - len);
^~~~~~
fs/ext4/ioctl.c:1117:2: note: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(new_label + len, 0, EXT4_LABEL_MAX - len);
^~~~~~
fs/ext4/ioctl.c:1140:2: warning: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(label, 0, sizeof(label));
^~~~~~
fs/ext4/ioctl.c:1140:2: note: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(label, 0, sizeof(label));
^~~~~~
fs/ext4/ioctl.c:1142:2: warning: Call to function 'strncpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'strncpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(label, sbi->s_es->s_volume_name, EXT4_LABEL_MAX);
^~~~~~~
fs/ext4/ioctl.c:1142:2: note: Call to function 'strncpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'strncpy_s' in case of C11
strncpy(label, sbi->s_es->s_volume_name, EXT4_LABEL_MAX);
^~~~~~~
Suppressed 50 warnings (50 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
35 warnings generated.
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
35 warnings generated.
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
35 warnings generated.
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
49 warnings generated.
Suppressed 49 warnings (49 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
40 warnings generated.
> drivers/firmware/efi/memmap.c:319:3: warning: Call to function
'memcpy' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(new, old, old_memmap->desc_size);
^~~~~~
drivers/firmware/efi/memmap.c:319:3: note: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(new, old, old_memmap->desc_size);
^~~~~~
drivers/firmware/efi/memmap.c:335:4: warning: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(new, old, old_memmap->desc_size);
^~~~~~
drivers/firmware/efi/memmap.c:335:4: note: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(new, old, old_memmap->desc_size);
^~~~~~
drivers/firmware/efi/memmap.c:348:4: warning: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(new, old, old_memmap->desc_size);
^~~~~~
drivers/firmware/efi/memmap.c:348:4: note: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(new, old, old_memmap->desc_size);
^~~~~~
drivers/firmware/efi/memmap.c:356:4: warning: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(new, old, old_memmap->desc_size);
^~~~~~
drivers/firmware/efi/memmap.c:356:4: note: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(new, old, old_memmap->desc_size);
^~~~~~
drivers/firmware/efi/memmap.c:370:4: warning: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(new, old, old_memmap->desc_size);
^~~~~~
drivers/firmware/efi/memmap.c:370:4: note: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(new, old, old_memmap->desc_size);
^~~~~~
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
15 warnings generated.
drivers/auxdisplay/line-display.c:91:3: warning: Call to function 'memset' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(linedisp->buf, ' ', linedisp->num_chars);
^~~~~~
drivers/auxdisplay/line-display.c:91:3: note: Call to function 'memset' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(linedisp->buf, ' ', linedisp->num_chars);
^~~~~~
drivers/auxdisplay/line-display.c:212:2: warning: Call to function 'memset' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(linedisp, 0, sizeof(*linedisp));
^~~~~~
drivers/auxdisplay/line-display.c:212:2: note: Call to function 'memset' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(linedisp, 0, sizeof(*linedisp));
^~~~~~
Suppressed 13 warnings (13 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
36 warnings generated.
Suppressed 36 warnings (36 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
10 warnings generated.
kernel/rcu/sync.c:23:2: warning: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(rsp, 0, sizeof(*rsp));
^~~~~~
kernel/rcu/sync.c:23:2: note: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(rsp, 0, sizeof(*rsp));
^~~~~~
Suppressed 9 warnings (9 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
13 warnings generated.
Suppressed 13 warnings (13 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
53 warnings generated.
kernel/rcu/tree.c:3057:3: warning: 2nd function call argument is an uninitialized value
[clang-analyzer-core.CallAndMessage]
__call_rcu_nocb_wake(rdp, was_alldone, flags); /* unlocks */
^
kernel/rcu/tree.c:3106:2: note: Calling '__call_rcu'
__call_rcu(head, func);
^~~~~~~~~~~~~~~~~~~~~~
kernel/rcu/tree.c:3005:2: note: 'was_alldone' declared without an initial
value
bool was_alldone;
^~~~~~~~~~~~~~~~
kernel/rcu/tree.c:3008:2: note: Assuming '__ret_warn_on' is not equal to 0
WARN_ON_ONCE((unsigned long)head & (sizeof(void *) - 1));
^
include/asm-generic/bug.h:179:33: note: expanded from macro 'WARN_ON_ONCE'
#define WARN_ON_ONCE(condition) WARN_ON(condition)
^~~~~~~~~~~~~~~~~~
include/asm-generic/bug.h:167:2: note: expanded from macro 'WARN_ON'
unlikely(__ret_warn_on); \
^~~~~~~~~~~~~~~~~~~~~~~
include/linux/compiler.h:78:40: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^~~~
kernel/rcu/tree.c:3010:6: note: Calling 'debug_rcu_head_queue'
if (debug_rcu_head_queue(head)) {
^~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/rcu/rcu.h:193:2: note: Returning zero, which participates in a condition later
return 0;
^~~~~~~~
kernel/rcu/tree.c:3010:6: note: Returning from 'debug_rcu_head_queue'
if (debug_rcu_head_queue(head)) {
^~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/rcu/tree.c:3010:2: note: Taking false branch
if (debug_rcu_head_queue(head)) {
^
kernel/rcu/tree.c:3025:2: note: Loop condition is false. Exiting loop
local_irq_save(flags);
^
include/linux/irqflags.h:221:3: note: expanded from macro 'local_irq_save'
raw_local_irq_save(flags); \
--
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/udf/balloc.c:527:2: note: Loop condition is false. Execution continues on line 534
while (first_block != eloc.logicalBlockNum &&
^
fs/udf/balloc.c:534:6: note: Assuming 'first_block' is equal to field
'logicalBlockNum'
if (first_block == eloc.logicalBlockNum) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/udf/balloc.c:534:2: note: Taking true branch
if (first_block == eloc.logicalBlockNum) {
^
fs/udf/balloc.c:538:7: note: Assuming 'alloc_count' is >
'block_count'
if (alloc_count > block_count) {
^~~~~~~~~~~~~~~~~~~~~~~~~
fs/udf/balloc.c:538:3: note: Taking true branch
if (alloc_count > block_count) {
^
fs/udf/balloc.c:543:13: note: The result of the left shift is undefined because the
left operand is negative
(etype << 30) | elen, 1);
~~~~~ ^
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
76 warnings generated.
Suppressed 76 warnings (76 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
83 warnings generated.
Suppressed 83 warnings (83 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
47 warnings generated.
fs/jffs2/nodelist.c:600:9: warning: Access to field 'flash_offset' results in a
dereference of a null pointer (loaded from variable 'ref')
[clang-analyzer-core.NullDereference]
while (ref->flash_offset != REF_EMPTY_NODE) {
^
fs/jffs2/nodelist.c:665:6: note: Assuming 'size' is not equal to 0
if (!size)
^~~~~
fs/jffs2/nodelist.c:665:2: note: Taking false branch
if (!size)
^
fs/jffs2/nodelist.c:667:15: note: Assuming 'size' is <= field
'free_size'
if (unlikely(size > jeb->free_size)) {
^
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
fs/jffs2/nodelist.c:667:2: note: Taking false branch
if (unlikely(size > jeb->free_size)) {
^
fs/jffs2/nodelist.c:673:6: note: Assuming field 'last_node' is null
if (jeb->last_node && ref_obsolete(jeb->last_node)) {
^~~~~~~~~~~~~~
fs/jffs2/nodelist.c:673:21: note: Left side of '&&' is false
if (jeb->last_node && ref_obsolete(jeb->last_node)) {
^
fs/jffs2/nodelist.c:685:3: note: Calling 'jffs2_link_node_ref'
jffs2_link_node_ref(c, jeb, ofs, size, NULL);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/jffs2/nodelist.c:592:9: note: Assuming field 'allocated_refs' is not equal
to 0
BUG_ON(!jeb->allocated_refs);
^
include/asm-generic/bug.h:161:45: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^~~~~~~~~
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
fs/jffs2/nodelist.c:592:2: note: Taking false branch
BUG_ON(!jeb->allocated_refs);
^
include/asm-generic/bug.h:161:32: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^
fs/jffs2/nodelist.c:592:2: note: Loop condition is false. Exiting loop
BUG_ON(!jeb->allocated_refs);
^
include/asm-generic/bug.h:161:27: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^
fs/jffs2/nodelist.c:595:2: note: Null pointer value stored to 'ref'
ref = jeb->last_node;
^~~~~~~~~~~~~~~~~~~~
fs/jffs2/nodelist.c:597:2: note: Taking false branch
dbg_noderef("Last node at %p is (%08x,%p)\n", ref,
ref->flash_offset,
^
fs/jffs2/debug.h:134:31: note: expanded from macro 'dbg_noderef'
#define dbg_noderef(fmt, ...) no_printk(fmt, ##__VA_ARGS__)
^
include/linux/printk.h:131:2: note: expanded from macro 'no_printk'
if (0) \
^
fs/jffs2/nodelist.c:600:9: note: Access to field 'flash_offset' results in a
dereference of a null pointer (loaded from variable 'ref')
while (ref->flash_offset != REF_EMPTY_NODE) {
^~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
51 warnings generated.
> fs/jffs2/read.c:80:3: warning: Call to function 'memset'
is insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buf, 0, len);
^~~~~~
fs/jffs2/read.c:80:3: note: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(buf, 0, len);
^~~~~~
> fs/jffs2/read.c:143:3: warning: Call to function 'memcpy'
is insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, decomprbuf+ofs, len);
^~~~~~
fs/jffs2/read.c:143:3: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(buf, decomprbuf+ofs, len);
^~~~~~
fs/jffs2/read.c:187:4: warning: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buf, 0, holesize);
^~~~~~
fs/jffs2/read.c:187:4: note: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(buf, 0, holesize);
^~~~~~
fs/jffs2/read.c:196:4: warning: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buf, 0, holeend - offset);
^~~~~~
fs/jffs2/read.c:196:4: note: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(buf, 0, holeend - offset);
^~~~~~
fs/jffs2/read.c:217:5: warning: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buf, 0, readlen);
^~~~~~
fs/jffs2/read.c:217:5: note: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(buf, 0, readlen);
^~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
36 warnings generated.
kernel/resource.c:91:2: warning: The expression is an uninitialized value. The computed
value will also be garbage [clang-analyzer-core.uninitialized.Assign]
(*pos)++;
^
kernel/resource.c:1679:2: note: 'l' declared without an initial value
loff_t l;
^~~~~~~~
kernel/resource.c:1682:2: note: Loop condition is true. Entering loop body
for (p = p->child; p ; p = r_next(NULL, p, &l)) {
^
kernel/resource.c:1687:7: note: Assuming the condition is true
if (p->start >= addr + size)
^~~~~~~~~~~~~~~~~~~~~~~
kernel/resource.c:1687:3: note: Taking true branch
if (p->start >= addr + size)
^
kernel/resource.c:1688:4: note: Execution continues on line 1682
continue;
^
kernel/resource.c:1682:29: note: Calling 'r_next'
for (p = p->child; p ; p = r_next(NULL, p, &l)) {
^~~~~~~~~~~~~~~~~~~
kernel/resource.c:91:2: note: The expression is an uninitialized value. The computed
value will also be garbage
(*pos)++;
^~~~~~
kernel/resource.c:188:3: warning: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(res, 0, sizeof(struct resource));
^~~~~~
kernel/resource.c:188:3: note: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(res, 0, sizeof(struct resource));
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
103 warnings generated.
Suppressed 103 warnings (103 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
50 warnings generated.
Suppressed 50 warnings (50 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
54 warnings generated.
block/bfq-iosched.c:7185:9: warning: Call to function 'sprintf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(page, "%u\n", var);
^~~~~~~
block/bfq-iosched.c:7185:9: note: Call to function 'sprintf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
return sprintf(page, "%u\n", var);
^~~~~~~
Suppressed 53 warnings (53 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
53 warnings generated.
block/bfq-wf2q.c:263:7: warning: Access to field 'my_sched_data' results in a
dereference of a null pointer (loaded from variable 'entity')
[clang-analyzer-core.NullDereference]
if (!entity->my_sched_data)
^
block/bfq-wf2q.c:1508:2: note: 'entity' initialized to a null pointer value
struct bfq_entity *entity = NULL;
^~~~~~~~~~~~~~~~~~~~~~~~~
block/bfq-wf2q.c:1512:6: note: Assuming the condition is false
if (bfq_tot_busy_queues(bfqd) == 0)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
block/bfq-wf2q.c:1512:2: note: Taking false branch
if (bfq_tot_busy_queues(bfqd) == 0)
^
block/bfq-wf2q.c:1521:2: note: Loop condition is false. Execution continues on line
1582
for (; sd ; sd = entity->my_sched_data) {
^
block/bfq-wf2q.c:1582:28: note: Passing null pointer value via 1st parameter
'entity'
bfqq = bfq_entity_to_bfqq(entity);
^~~~~~
block/bfq-wf2q.c:1582:9: note: Calling 'bfq_entity_to_bfqq'
bfqq = bfq_entity_to_bfqq(entity);
^~~~~~~~~~~~~~~~~~~~~~~~~~
block/bfq-wf2q.c:263:7: note: Access to field 'my_sched_data' results in a
dereference of a null pointer (loaded from variable 'entity')
if (!entity->my_sched_data)
^~~~~~
Suppressed 52 warnings (52 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
53 warnings generated.
Suppressed 53 warnings (52 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
35 warnings generated.
> arch/riscv/kvm/../../../virt/kvm/coalesced_mmio.c:88:2: warning:
Call to function 'memcpy' is insecure as it does not provide security checks
introduced in the C11 standard. Replace with analogous functions that support length
arguments or provides boundary checks such as 'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ring->coalesced_mmio[insert].data, val, len);
^~~~~~
arch/riscv/kvm/../../../virt/kvm/coalesced_mmio.c:88:2: note: Call to function
'memcpy' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memcpy_s' in case of C11
memcpy(ring->coalesced_mmio[insert].data, val, len);
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
50 warnings generated.
Suppressed 50 warnings (50 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
61 warnings generated.
drivers/crypto/ccree/cc_hash.c:83:8: warning: Excessive padding in 'struct
cc_hash_ctx' (103 padding bytes, where 39 is optimal).
Optimal fields order:
opad_tmp_keys_dma_addr,
drvdata,
digest_buff_dma_addr,
hash_mode,
hw_mode,
inter_digestsize,
hash_len,
key_params,
setkey_comp,
is_hmac,
digest_buff,
opad_tmp_keys_buff,
consider reordering the fields or adding explicit padding members
[clang-analyzer-optin.performance.Padding]
struct cc_hash_ctx {
~~~~~~~^~~~~~~~~~~~~
drivers/crypto/ccree/cc_hash.c:83:8: note: Excessive padding in 'struct
cc_hash_ctx' (103 padding bytes, where 39 is optimal). Optimal fields order:
opad_tmp_keys_dma_addr, drvdata, digest_buff_dma_addr, hash_mode, hw_mode,
inter_digestsize, hash_len, key_params, setkey_comp, is_hmac, digest_buff,
opad_tmp_keys_buff, consider reordering the fields or adding explicit padding members
struct cc_hash_ctx {
~~~~~~~^~~~~~~~~~~~~
> drivers/crypto/ccree/cc_hash.c:140:2: warning: Call to function
'memset' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(state, 0, sizeof(*state));
^~~~~~
drivers/crypto/ccree/cc_hash.c:140:2: note: Call to function 'memset' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(state, 0, sizeof(*state));
^~~~~~
> drivers/crypto/ccree/cc_hash.c:149:4: warning: Call to function
'memcpy' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(state->digest_buff, ctx->digest_buff,
^~~~~~
drivers/crypto/ccree/cc_hash.c:149:4: note: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(state->digest_buff, ctx->digest_buff,
^~~~~~
drivers/crypto/ccree/cc_hash.c:153:5: warning: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(state->digest_bytes_len,
^~~~~~
drivers/crypto/ccree/cc_hash.c:153:5: note: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(state->digest_bytes_len,
^~~~~~
drivers/crypto/ccree/cc_hash.c:157:5: warning: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(state->digest_bytes_len,
^~~~~~
drivers/crypto/ccree/cc_hash.c:157:5: note: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(state->digest_bytes_len,
^~~~~~
drivers/crypto/ccree/cc_hash.c:167:4: warning: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(state->opad_digest_buff,
^~~~~~
drivers/crypto/ccree/cc_hash.c:167:4: note: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(state->opad_digest_buff,
^~~~~~
drivers/crypto/ccree/cc_hash.c:174:3: warning: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(state->digest_buff, larval, ctx->inter_digestsize);
^~~~~~
drivers/crypto/ccree/cc_hash.c:174:3: note: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(state->digest_buff, larval, ctx->inter_digestsize);
^~~~~~
drivers/crypto/ccree/cc_hash.c:278:3: warning: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(result, state->digest_result_buff, digestsize);
^~~~~~
drivers/crypto/ccree/cc_hash.c:278:3: note: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(result, state->digest_result_buff, digestsize);
^~~~~~
drivers/crypto/ccree/cc_hash.c:1033:2: warning: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ctx->opad_tmp_keys_buff, key, keylen);
^~~~~~
drivers/crypto/ccree/cc_hash.c:1033:2: note: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(ctx->opad_tmp_keys_buff, key, keylen);
^~~~~~
drivers/crypto/ccree/cc_hash.c:1035:3: warning: Call to function 'memset' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ctx->opad_tmp_keys_buff + 24, 0,
^~~~~~
drivers/crypto/ccree/cc_hash.c:1035:3: note: Call to function 'memset' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(ctx->opad_tmp_keys_buff + 24, 0,
^~~~~~
drivers/crypto/ccree/cc_hash.c:1144:17: warning: Value stored to 'dev' during
its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct device *dev = drvdata_to_dev(ctx->drvdata);
^~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/crypto/ccree/cc_hash.c:1144:17: note: Value stored to 'dev' during its
initialization is never read
struct device *dev = drvdata_to_dev(ctx->drvdata);
^~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/crypto/ccree/cc_hash.c:1508:2: warning: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(out, &tmp, sizeof(u32));
^~~~~~
drivers/crypto/ccree/cc_hash.c:1508:2: note: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(out, &tmp, sizeof(u32));
^~~~~~
drivers/crypto/ccree/cc_hash.c:1511:2: warning: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(out, state->digest_buff, ctx->inter_digestsize);
^~~~~~
drivers/crypto/ccree/cc_hash.c:1511:2: note: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(out, state->digest_buff, ctx->inter_digestsize);
^~~~~~
drivers/crypto/ccree/cc_hash.c:1514:2: warning: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(out, state->digest_bytes_len, ctx->hash_len);
^~~~~~
drivers/crypto/ccree/cc_hash.c:1514:2: note: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(out, state->digest_bytes_len, ctx->hash_len);
^~~~~~
drivers/crypto/ccree/cc_hash.c:1517:2: warning: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(out, &curr_buff_cnt, sizeof(u32));
^~~~~~
drivers/crypto/ccree/cc_hash.c:1517:2: note: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(out, &curr_buff_cnt, sizeof(u32));
^~~~~~
drivers/crypto/ccree/cc_hash.c:1520:2: warning: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(out, curr_buff, curr_buff_cnt);
^~~~~~
drivers/crypto/ccree/cc_hash.c:1520:2: note: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(out, curr_buff, curr_buff_cnt);
^~~~~~
drivers/crypto/ccree/cc_hash.c:1533:2: warning: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&tmp, in, sizeof(u32));
^~~~~~
drivers/crypto/ccree/cc_hash.c:1533:2: note: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(&tmp, in, sizeof(u32));
^~~~~~
drivers/crypto/ccree/cc_hash.c:1540:2: warning: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(state->digest_buff, in, ctx->inter_digestsize);
^~~~~~
drivers/crypto/ccree/cc_hash.c:1540:2: note: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(state->digest_buff, in, ctx->inter_digestsize);
^~~~~~
drivers/crypto/ccree/cc_hash.c:1543:2: warning: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(state->digest_bytes_len, in, ctx->hash_len);
^~~~~~
drivers/crypto/ccree/cc_hash.c:1543:2: note: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(state->digest_bytes_len, in, ctx->hash_len);
^~~~~~
drivers/crypto/ccree/cc_hash.c:1547:2: warning: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&tmp, in, sizeof(u32));
^~~~~~
drivers/crypto/ccree/cc_hash.c:1547:2: note: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(&tmp, in, sizeof(u32));
^~~~~~
drivers/crypto/ccree/cc_hash.c:1553:2: warning: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(state->buffers[0], in, tmp);
^~~~~~
drivers/crypto/ccree/cc_hash.c:1553:2: note: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(state->buffers[0], in, tmp);
^~~~~~
> drivers/crypto/ccree/cc_hash.c:1837:3: warning: Call to function
'snprintf' is insecure as it does not provide security checks introduced in the
C11 standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(alg->cra_name, CRYPTO_MAX_ALG_NAME, "%s",
^~~~~~~~
drivers/crypto/ccree/cc_hash.c:1837:3: note: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
snprintf(alg->cra_name, CRYPTO_MAX_ALG_NAME, "%s",
^~~~~~~~
drivers/crypto/ccree/cc_hash.c:1839:3: warning: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(alg->cra_driver_name, CRYPTO_MAX_ALG_NAME, "%s",
^~~~~~~~
drivers/crypto/ccree/cc_hash.c:1839:3: note: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
snprintf(alg->cra_driver_name, CRYPTO_MAX_ALG_NAME, "%s",
^~~~~~~~
drivers/crypto/ccree/cc_hash.c:1843:3: warning: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(alg->cra_name, CRYPTO_MAX_ALG_NAME, "%s",
^~~~~~~~
drivers/crypto/ccree/cc_hash.c:1843:3: note: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
snprintf(alg->cra_name, CRYPTO_MAX_ALG_NAME, "%s",
^~~~~~~~
drivers/crypto/ccree/cc_hash.c:1845:3: warning: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(alg->cra_driver_name, CRYPTO_MAX_ALG_NAME, "%s",
^~~~~~~~
drivers/crypto/ccree/cc_hash.c:1845:3: note: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
snprintf(alg->cra_driver_name, CRYPTO_MAX_ALG_NAME, "%s",
^~~~~~~~
drivers/crypto/ccree/cc_hash.c:2168:17: warning: Value stored to 'dev' during
its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct device *dev = drvdata_to_dev(ctx->drvdata);
^~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/crypto/ccree/cc_hash.c:2168:17: note: Value stored to 'dev' during its
initialization is never read
struct device *dev = drvdata_to_dev(ctx->drvdata);
^~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
50 warnings generated.
Suppressed 50 warnings (50 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
51 warnings generated.
fs/ext4/hash.c:221:5: warning: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, hinfo->seed, sizeof(buf));
^~~~~~
fs/ext4/hash.c:221:5: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(buf, hinfo->seed, sizeof(buf));
^~~~~~
Suppressed 50 warnings (50 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
53 warnings generated.
fs/ext4/ialloc.c:66:3: warning: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(bitmap + (i >> 3), 0xff, (end_bit - i) >> 3);
^~~~~~
fs/ext4/ialloc.c:66:3: note: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(bitmap + (i >> 3), 0xff, (end_bit - i) >> 3);
^~~~~~
fs/ext4/ialloc.c:172:3: warning: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(bh->b_data, 0, (EXT4_INODES_PER_GROUP(sb) + 7) / 8);
^~~~~~
fs/ext4/ialloc.c:172:3: note: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(bh->b_data, 0, (EXT4_INODES_PER_GROUP(sb) + 7) / 8);
^~~~~~
fs/ext4/ialloc.c:1255:2: warning: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ei->i_data, 0, sizeof(ei->i_data));
^~~~~~
fs/ext4/ialloc.c:1255:2: note: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(ei->i_data, 0, sizeof(ei->i_data));
^~~~~~
Suppressed 50 warnings (50 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
53 warnings generated.
fs/ext4/indirect.c:155:47: warning: The right operand of '+' is a garbage value
[clang-analyzer-core.UndefinedBinaryOperatorResult]
add_chain(chain, NULL, EXT4_I(inode)->i_data + *offsets);
^
fs/ext4/indirect.c:1236:6: note: Assuming 'end' is < 'max_block'
if (end >= max_block)
^~~~~~~~~~~~~~~~
fs/ext4/indirect.c:1236:2: note: Taking false branch
if (end >= max_block)
^
fs/ext4/indirect.c:1238:7: note: Assuming 'start' is < 'end'
if ((start >= end) || (start > max_block))
^~~~~~~~~~~~
fs/ext4/indirect.c:1238:6: note: Left side of '||' is false
if ((start >= end) || (start > max_block))
^
fs/ext4/indirect.c:1238:25: note: Assuming 'start' is <=
'max_block'
if ((start >= end) || (start > max_block))
^~~~~~~~~~~~~~~~~
fs/ext4/indirect.c:1238:2: note: Taking false branch
if ((start >= end) || (start > max_block))
^
fs/ext4/indirect.c:1241:6: note: Calling 'ext4_block_to_path'
n = ext4_block_to_path(inode, start, offsets, NULL);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/ext4/indirect.c:86:6: note: Assuming 'i_block' is >=
'direct_blocks'
if (i_block < direct_blocks) {
^~~~~~~~~~~~~~~~~~~~~~~
fs/ext4/indirect.c:86:2: note: Taking false branch
if (i_block < direct_blocks) {
^
fs/ext4/indirect.c:89:13: note: Assuming the condition is false
} else if ((i_block -= direct_blocks) < indirect_blocks) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/ext4/indirect.c:89:9: note: Taking false branch
} else if ((i_block -= direct_blocks) < indirect_blocks) {
--
^~~~~~
fs/ext4/indirect.c:364:3: note: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(bh->b_data, 0, bh->b_size);
^~~~~~
fs/ext4/indirect.c:603:2: warning: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&ar, 0, sizeof(ar));
^~~~~~
fs/ext4/indirect.c:603:2: note: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(&ar, 0, sizeof(ar));
^~~~~~
Suppressed 50 warnings (50 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
50 warnings generated.
block/blk-flush.c:440:2: warning: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&rq->flush, 0, sizeof(rq->flush));
^~~~~~
block/blk-flush.c:440:2: note: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(&rq->flush, 0, sizeof(rq->flush));
^~~~~~
Suppressed 49 warnings (49 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
48 warnings generated.
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
48 warnings generated.
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
51 warnings generated.
block/blk-map.c:32:2: warning: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(bmd->iov, data->iov, sizeof(struct iovec) * data->nr_segs);
^~~~~~
block/blk-map.c:32:2: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(bmd->iov, data->iov, sizeof(struct iovec) * data->nr_segs);
^~~~~~
block/blk-map.c:264:4: warning: Value stored to 'ret' is never read
[clang-analyzer-deadcode.DeadStores]
ret = -EINVAL;
^ ~~~~~~~
block/blk-map.c:264:4: note: Value stored to 'ret' is never read
ret = -EINVAL;
^ ~~~~~~~
block/blk-map.c:454:4: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(page_address(page), p, bytes);
^~~~~~
block/blk-map.c:454:4: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(page_address(page), p, bytes);
^~~~~~
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
51 warnings generated.
Suppressed 51 warnings (51 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
48 warnings generated.
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
50 warnings generated.
mm/vmscan.c:1524:2: warning: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(stat, 0, sizeof(*stat));
^~~~~~
mm/vmscan.c:1524:2: note: Call to function 'memset' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memset_s' in
case of C11
memset(stat, 0, sizeof(*stat));
^~~~~~
mm/vmscan.c:2954:2: warning: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(targets, nr, sizeof(nr));
^~~~~~
mm/vmscan.c:2954:2: note: Call to function 'memcpy' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memcpy_s' in
case of C11
memcpy(targets, nr, sizeof(nr));
^~~~~~
mm/vmscan.c:3200:2: warning: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&sc->nr, 0, sizeof(sc->nr));
^~~~~~
mm/vmscan.c:3200:2: note: Call to function 'memset' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memset_s' in
case of C11
memset(&sc->nr, 0, sizeof(sc->nr));
^~~~~~
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
15 warnings generated.
drivers/leds/trigger/ledtrig-cpu.c:54:7: warning: Value stored to 'is_active'
during its initialization is never read [clang-analyzer-deadcode.DeadStores]
bool is_active = trig->is_active;
^~~~~~~~~ ~~~~~~~~~~~~~~~
drivers/leds/trigger/ledtrig-cpu.c:54:7: note: Value stored to 'is_active'
during its initialization is never read
bool is_active = trig->is_active;
^~~~~~~~~ ~~~~~~~~~~~~~~~
drivers/leds/trigger/ledtrig-cpu.c:155:3: warning: Call to function 'snprintf'
is insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(trig->name, MAX_NAME_LEN, "cpu%d", cpu);
^~~~~~~~
drivers/leds/trigger/ledtrig-cpu.c:155:3: note: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
snprintf(trig->name, MAX_NAME_LEN, "cpu%d", cpu);
^~~~~~~~
Suppressed 13 warnings (13 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
35 warnings generated.
> drivers/leds/trigger/ledtrig-activity.c:159:9: warning: Call to
function 'sprintf' is insecure as it does not provide security checks introduced
in the C11 standard. Replace with analogous functions that support length arguments or
provides boundary checks such as 'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", activity_data->invert);
^~~~~~~
drivers/leds/trigger/ledtrig-activity.c:159:9: note: Call to function 'sprintf'
is insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
return sprintf(buf, "%u\n", activity_data->invert);
^~~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
13 warnings generated.
Suppressed 13 warnings (13 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
22 warnings generated.
Suppressed 22 warnings (22 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
22 warnings generated.
Suppressed 22 warnings (22 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
35 warnings generated.
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
46 warnings generated.
> drivers/firmware/efi/esrt.c:116:9: warning: Call to function
'sprintf' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
str += sprintf(str, "\n");
^~~~~~~
drivers/firmware/efi/esrt.c:116:9: note: Call to function 'sprintf' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
str += sprintf(str, "\n");
^~~~~~~
drivers/firmware/efi/esrt.c:132:1: warning: Call to function 'sprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
esre_attr_decl(fw_type, 32, "%u");
^
drivers/firmware/efi/esrt.c:126:9: note: expanded from macro 'esre_attr_decl'
return sprintf(buf, fmt "\n", \
^~~~~~~
drivers/firmware/efi/esrt.c:132:1: note: Call to function 'sprintf' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
esre_attr_decl(fw_type, 32, "%u");
^
drivers/firmware/efi/esrt.c:126:9: note: expanded from macro 'esre_attr_decl'
return sprintf(buf, fmt "\n", \
^~~~~~~
drivers/firmware/efi/esrt.c:133:1: warning: Call to function 'sprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
esre_attr_decl(fw_version, 32, "%u");
^
drivers/firmware/efi/esrt.c:126:9: note: expanded from macro 'esre_attr_decl'
return sprintf(buf, fmt "\n", \
^~~~~~~
drivers/firmware/efi/esrt.c:133:1: note: Call to function 'sprintf' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
esre_attr_decl(fw_version, 32, "%u");
^
drivers/firmware/efi/esrt.c:126:9: note: expanded from macro 'esre_attr_decl'
return sprintf(buf, fmt "\n", \
^~~~~~~
drivers/firmware/efi/esrt.c:134:1: warning: Call to function 'sprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
esre_attr_decl(lowest_supported_fw_version, 32, "%u");
^
drivers/firmware/efi/esrt.c:126:9: note: expanded from macro 'esre_attr_decl'
return sprintf(buf, fmt "\n", \
^~~~~~~
drivers/firmware/efi/esrt.c:134:1: note: Call to function 'sprintf' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
esre_attr_decl(lowest_supported_fw_version, 32, "%u");
^
drivers/firmware/efi/esrt.c:126:9: note: expanded from macro 'esre_attr_decl'
return sprintf(buf, fmt "\n", \
^~~~~~~
drivers/firmware/efi/esrt.c:135:1: warning: Call to function 'sprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
esre_attr_decl(capsule_flags, 32, "0x%x");
^
drivers/firmware/efi/esrt.c:126:9: note: expanded from macro 'esre_attr_decl'
return sprintf(buf, fmt "\n", \
^~~~~~~
drivers/firmware/efi/esrt.c:135:1: note: Call to function 'sprintf' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
esre_attr_decl(capsule_flags, 32, "0x%x");
^
drivers/firmware/efi/esrt.c:126:9: note: expanded from macro 'esre_attr_decl'
return sprintf(buf, fmt "\n", \
^~~~~~~
drivers/firmware/efi/esrt.c:136:1: warning: Call to function 'sprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
esre_attr_decl(last_attempt_version, 32, "%u");
^
drivers/firmware/efi/esrt.c:126:9: note: expanded from macro 'esre_attr_decl'
return sprintf(buf, fmt "\n", \
^~~~~~~
drivers/firmware/efi/esrt.c:136:1: note: Call to function 'sprintf' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
esre_attr_decl(last_attempt_version, 32, "%u");
^
drivers/firmware/efi/esrt.c:126:9: note: expanded from macro 'esre_attr_decl'
return sprintf(buf, fmt "\n", \
^~~~~~~
drivers/firmware/efi/esrt.c:137:1: warning: Call to function 'sprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
esre_attr_decl(last_attempt_status, 32, "%u");
^
drivers/firmware/efi/esrt.c:126:9: note: expanded from macro 'esre_attr_decl'
return sprintf(buf, fmt "\n", \
^~~~~~~
drivers/firmware/efi/esrt.c:137:1: note: Call to function 'sprintf' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
esre_attr_decl(last_attempt_status, 32, "%u");
^
drivers/firmware/efi/esrt.c:126:9: note: expanded from macro 'esre_attr_decl'
return sprintf(buf, fmt "\n", \
^~~~~~~
drivers/firmware/efi/esrt.c:205:1: warning: Call to function 'sprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
esrt_attr_decl(fw_resource_count, 32, "%u");
^
drivers/firmware/efi/esrt.c:200:9: note: expanded from macro 'esrt_attr_decl'
return sprintf(buf, fmt "\n", le##size##_to_cpu(esrt->name)); \
^~~~~~~
drivers/firmware/efi/esrt.c:205:1: note: Call to function 'sprintf' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
esrt_attr_decl(fw_resource_count, 32, "%u");
^
drivers/firmware/efi/esrt.c:200:9: note: expanded from macro 'esrt_attr_decl'
return sprintf(buf, fmt "\n", le##size##_to_cpu(esrt->name)); \
^~~~~~~
drivers/firmware/efi/esrt.c:206:1: warning: Call to function 'sprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
esrt_attr_decl(fw_resource_count_max, 32, "%u");
^
drivers/firmware/efi/esrt.c:200:9: note: expanded from macro 'esrt_attr_decl'
return sprintf(buf, fmt "\n", le##size##_to_cpu(esrt->name)); \
^~~~~~~
drivers/firmware/efi/esrt.c:206:1: note: Call to function 'sprintf' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
esrt_attr_decl(fw_resource_count_max, 32, "%u");
^
drivers/firmware/efi/esrt.c:200:9: note: expanded from macro 'esrt_attr_decl'
return sprintf(buf, fmt "\n", le##size##_to_cpu(esrt->name)); \
^~~~~~~
drivers/firmware/efi/esrt.c:207:1: warning: Call to function 'sprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
esrt_attr_decl(fw_resource_version, 64, "%llu");
^
drivers/firmware/efi/esrt.c:200:9: note: expanded from macro 'esrt_attr_decl'
return sprintf(buf, fmt "\n", le##size##_to_cpu(esrt->name)); \
^~~~~~~
drivers/firmware/efi/esrt.c:207:1: note: Call to function 'sprintf' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
esrt_attr_decl(fw_resource_version, 64, "%llu");
^
drivers/firmware/efi/esrt.c:200:9: note: expanded from macro 'esrt_attr_decl'
return sprintf(buf, fmt "\n", le##size##_to_cpu(esrt->name)); \
^~~~~~~
> drivers/firmware/efi/esrt.c:289:2: warning: Call to function
'memcpy' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&tmpesrt, va, sizeof(tmpesrt));
^~~~~~
drivers/firmware/efi/esrt.c:289:2: note: Call to function 'memcpy' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(&tmpesrt, va, sizeof(tmpesrt));
^~~~~~
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
35 warnings generated.
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
35 warnings generated.
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
49 warnings generated.
Suppressed 49 warnings (49 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
40 warnings generated.
drivers/crypto/ccree/cc_driver.c:105:17: warning: Value stored to 'dev' during
its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct device *dev = drvdata_to_dev(drvdata);
^~~ ~~~~~~~~~~~~~~~~~~~~~~~
drivers/crypto/ccree/cc_driver.c:105:17: note: Value stored to 'dev' during its
initialization is never read
struct device *dev = drvdata_to_dev(drvdata);
^~~ ~~~~~~~~~~~~~~~~~~~~~~~
> drivers/crypto/ccree/cc_driver.c:176:2: warning: Call to function
'snprintf' is insecure as it does not provide security checks introduced in the
C11 standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(prefix, sizeof(prefix), "%s[%zu]: ", name, len);
^~~~~~~~
drivers/crypto/ccree/cc_driver.c:176:2: note: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
snprintf(prefix, sizeof(prefix), "%s[%zu]: ", name, len);
^~~~~~~~
drivers/crypto/ccree/cc_driver.c:232:3: warning: Value stored to 'axi_err' is
never read [clang-analyzer-deadcode.DeadStores]
axi_err = cc_ioread(drvdata, CC_REG(AXIM_MON_ERR));
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/crypto/ccree/cc_driver.c:232:3: note: Value stored to 'axi_err' is
never read
axi_err = cc_ioread(drvdata, CC_REG(AXIM_MON_ERR));
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/crypto/ccree/cc_driver.c:276:17: warning: Value stored to 'dev' during
its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct device *dev = drvdata_to_dev(drvdata);
^~~ ~~~~~~~~~~~~~~~~~~~~~~~
drivers/crypto/ccree/cc_driver.c:276:17: note: Value stored to 'dev' during its
initialization is never read
struct device *dev = drvdata_to_dev(drvdata);
^~~ ~~~~~~~~~~~~~~~~~~~~~~~
Suppressed 36 warnings (36 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
35 warnings generated.
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
33 warnings generated.
drivers/of/base.c:1297:2: warning: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(it, 0, sizeof(*it));
^~~~~~
drivers/of/base.c:1297:2: note: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(it, 0, sizeof(*it));
^~~~~~
drivers/of/base.c:1887:2: warning: Call to function 'strncpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'strncpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(ap->stem, stem, stem_len);
^~~~~~~
drivers/of/base.c:1887:2: note: Call to function 'strncpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'strncpy_s' in case of C11
strncpy(ap->stem, stem, stem_len);
^~~~~~~
drivers/of/base.c:1958:3: warning: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ap, 0, sizeof(*ap) + len + 1);
^~~~~~
drivers/of/base.c:1958:3: note: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(ap, 0, sizeof(*ap) + len + 1);
^~~~~~
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
50 warnings generated.
> fs/omfs/dir.c:94:2: warning: Call to function 'memset' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(bh->b_data, 0, sizeof(struct omfs_inode));
^~~~~~
fs/omfs/dir.c:94:2: note: Call to function 'memset' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memset_s' in
case of C11
memset(bh->b_data, 0, sizeof(struct omfs_inode));
^~~~~~
fs/omfs/dir.c:97:3: warning: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&bh->b_data[OMFS_DIR_START], 0xff,
^~~~~~
fs/omfs/dir.c:97:3: note: Call to function 'memset' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memset_s' in
case of C11
memset(&bh->b_data[OMFS_DIR_START], 0xff,
^~~~~~
> fs/omfs/dir.c:139:2: warning: Call to function 'memcpy'
is insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(oi->i_name, name, namelen);
^~~~~~
fs/omfs/dir.c:139:2: note: Call to function 'memcpy' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memcpy_s' in
case of C11
memcpy(oi->i_name, name, namelen);
^~~~~~
fs/omfs/dir.c:140:2: warning: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(oi->i_name + namelen, 0, OMFS_NAMELEN - namelen);
^~~~~~
fs/omfs/dir.c:140:2: note: Call to function 'memset' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memset_s' in
case of C11
memset(oi->i_name + namelen, 0, OMFS_NAMELEN - namelen);
^~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
50 warnings generated.
fs/xfs/scrub/parent.c:196:13: warning: The left operand of '!=' is a garbage
value [clang-analyzer-core.UndefinedBinaryOperatorResult]
if (nlink != expected_nlink)
^
fs/xfs/scrub/parent.c:276:7: note: Assuming the condition is true
if (!S_ISDIR(VFS_I(sc->ip)->i_mode))
^
include/uapi/linux/stat.h:23:21: note: expanded from macro 'S_ISDIR'
#define S_ISDIR(m) (((m) & S_IFMT) == S_IFDIR)
^~~~~~~~~~~~~~~~~~~~~~~~~
fs/xfs/scrub/parent.c:276:2: note: Taking false branch
if (!S_ISDIR(VFS_I(sc->ip)->i_mode))
^
fs/xfs/scrub/parent.c:280:6: note: Assuming the condition is false
if (!xfs_verify_dir_ino(mp, sc->ip->i_ino)) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/xfs/scrub/parent.c:280:2: note: Taking false branch
if (!xfs_verify_dir_ino(mp, sc->ip->i_ino)) {
^
fs/xfs/scrub/parent.c:297:6: note: Assuming the condition is false
if (!xchk_fblock_process_error(sc, XFS_DATA_FORK, 0, &error))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/xfs/scrub/parent.c:297:2: note: Taking false branch
if (!xchk_fblock_process_error(sc, XFS_DATA_FORK, 0, &error))
^
fs/xfs/scrub/parent.c:299:6: note: Assuming the condition is false
if (!xfs_verify_dir_ino(mp, dnum)) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/xfs/scrub/parent.c:299:2: note: Taking false branch
if (!xfs_verify_dir_ino(mp, dnum)) {
^
fs/xfs/scrub/parent.c:305:6: note: Assuming field 'ip' is not equal to field
'm_rootip'
if (sc->ip == mp->m_rootip) {
^~~~~~~~~~~~~~~~~~~~~~
fs/xfs/scrub/parent.c:305:2: note: Taking false branch
if (sc->ip == mp->m_rootip) {
^
fs/xfs/scrub/parent.c:313:11: note: Calling 'xchk_parent_validate'
error = xchk_parent_validate(sc, dnum, &try_again);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/xfs/scrub/parent.c:137:2: note: 'nlink' declared without an initial value
xfs_nlink_t nlink;
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/xfs/scrub/parent.c:142:6: note: Assuming the condition is false
if (sc->sm->sm_flags & XFS_SCRUB_OFLAG_CORRUPT)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/xfs/scrub/parent.c:142:2: note: Taking false branch
if (sc->sm->sm_flags & XFS_SCRUB_OFLAG_CORRUPT)
^
fs/xfs/scrub/parent.c:146:6: note: Assuming 'dnum' is not equal to field
'i_ino'
if (sc->ip->i_ino == dnum) {
^~~~~~~~~~~~~~~~~~~~~
fs/xfs/scrub/parent.c:146:2: note: Taking false branch
if (sc->ip->i_ino == dnum) {
^
fs/xfs/scrub/parent.c:155:19: note: Assuming field 'i_nlink' is not equal to 0
expected_nlink = VFS_I(sc->ip)->i_nlink == 0 ? 0 : 1;
^~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/xfs/scrub/parent.c:155:19: note: '?' condition is false
fs/xfs/scrub/parent.c:172:6: note: Assuming the condition is false
if (error == -EINVAL || error == -ENOENT) {
^~~~~~~~~~~~~~~~
fs/xfs/scrub/parent.c:172:6: note: Left side of '||' is false
fs/xfs/scrub/parent.c:172:26: note: Assuming the condition is false
if (error == -EINVAL || error == -ENOENT) {
^~~~~~~~~~~~~~~~
fs/xfs/scrub/parent.c:172:2: note: Taking false branch
if (error == -EINVAL || error == -ENOENT) {
^
fs/xfs/scrub/parent.c:177:6: note: Assuming the condition is false
if (!xchk_fblock_xref_process_error(sc, XFS_DATA_FORK, 0, &error))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/xfs/scrub/parent.c:177:2: note: Taking false branch
if (!xchk_fblock_xref_process_error(sc, XFS_DATA_FORK, 0, &error))
^
fs/xfs/scrub/parent.c:179:6: note: Assuming 'dp' is not equal to field
'ip'
if (dp == sc->ip || !S_ISDIR(VFS_I(dp)->i_mode)) {
^~~~~~~~~~~~
fs/xfs/scrub/parent.c:179:6: note: Left side of '||' is false
fs/xfs/scrub/parent.c:179:23: note: Assuming the condition is true
if (dp == sc->ip || !S_ISDIR(VFS_I(dp)->i_mode)) {
^
include/uapi/linux/stat.h:23:21: note: expanded from macro 'S_ISDIR'
#define S_ISDIR(m) (((m) & S_IFMT) == S_IFDIR)
--
#define VERBOSE_TOROUT_STRING(s) \
^
kernel/locking/locktorture.c:821:3: note: Calling 'lock_torture_stats_print'
lock_torture_stats_print();
^~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/locking/locktorture.c:781:6: note: Assuming field 'readlock' is null
if (cxt.cur_ops->readlock)
^~~~~~~~~~~~~~~~~~~~~
kernel/locking/locktorture.c:781:2: note: Taking false branch
if (cxt.cur_ops->readlock)
^
kernel/locking/locktorture.c:784:8: note: Calling 'kmalloc'
buf = kmalloc(size, GFP_KERNEL);
^~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/slab.h:569:2: note: Taking false branch
if (__builtin_constant_p(size)) {
^
include/linux/slab.h:586:9: note: Value assigned to 'cxt.lwsa'
return __kmalloc(size, flags);
^~~~~~~~~~~~~~~~~~~~~~
include/linux/slab.h:586:2: note: Returning pointer, which participates in a condition
later
return __kmalloc(size, flags);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/locking/locktorture.c:784:8: note: Returning from 'kmalloc'
buf = kmalloc(size, GFP_KERNEL);
^~~~~~~~~~~~~~~~~~~~~~~~~
kernel/locking/locktorture.c:785:6: note: Assuming 'buf' is non-null
if (!buf) {
^~~~
kernel/locking/locktorture.c:785:2: note: Taking false branch
if (!buf) {
^
kernel/locking/locktorture.c:791:29: note: Passing value via 2nd parameter
'statp'
__torture_print_stats(buf, cxt.lwsa, true);
^~~~~~~~
kernel/locking/locktorture.c:791:2: note: Calling '__torture_print_stats'
__torture_print_stats(buf, cxt.lwsa, true);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/locking/locktorture.c:744:22: note: Assuming 'statp' is null
long max = 0, min = statp ? data_race(statp[0].n_lock_acquired) : 0;
^~~~~
kernel/locking/locktorture.c:744:22: note: '?' condition is false
kernel/locking/locktorture.c:747:13: note: 'write' is true
n_stress = write ? cxt.nrealwriters_stress : cxt.nrealreaders_stress;
^~~~~
kernel/locking/locktorture.c:747:13: note: '?' condition is true
kernel/locking/locktorture.c:748:14: note: Assuming 'i' is <
'n_stress'
for (i = 0; i < n_stress; i++) {
^~~~~~~~~~~~
kernel/locking/locktorture.c:748:2: note: Loop condition is true. Entering loop body
for (i = 0; i < n_stress; i++) {
^
kernel/locking/locktorture.c:749:17: note: Dereference of null pointer
if (data_race(statp[i].n_lock_fail))
^
include/linux/compiler.h:218:3: note: expanded from macro 'data_race'
expr; \
^~~~
kernel/locking/locktorture.c:758:2: warning: Value stored to 'page' is never
read [clang-analyzer-deadcode.DeadStores]
page += sprintf(page,
^ ~~~~~~~~~~~~~
kernel/locking/locktorture.c:758:2: note: Value stored to 'page' is never read
page += sprintf(page,
^ ~~~~~~~~~~~~~
kernel/locking/locktorture.c:758:10: warning: Call to function 'sprintf' is
insecure as it does not provide bounding of the memory buffer or security checks
introduced in the C11 standard. Replace with analogous functions that support length
arguments or provides boundary checks such as 'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
page += sprintf(page,
^~~~~~~
kernel/locking/locktorture.c:758:10: note: Call to function 'sprintf' is
insecure as it does not provide bounding of the memory buffer or security checks
introduced in the C11 standard. Replace with analogous functions that support length
arguments or provides boundary checks such as 'sprintf_s' in case of C11
page += sprintf(page,
^~~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
16 warnings generated.
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
35 warnings generated.
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
> drivers/base/arch_topology.c:464:3: warning: Call to function
'snprintf' is insecure as it does not provide security checks introduced in the
C11 standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(name, sizeof(name), "thread%d", i);
^~~~~~~~
drivers/base/arch_topology.c:464:3: note: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
snprintf(name, sizeof(name), "thread%d", i);
^~~~~~~~
drivers/base/arch_topology.c:518:3: warning: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(name, sizeof(name), "cluster%d", i);
^~~~~~~~
drivers/base/arch_topology.c:518:3: note: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
snprintf(name, sizeof(name), "cluster%d", i);
^~~~~~~~
drivers/base/arch_topology.c:533:3: warning: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(name, sizeof(name), "core%d", i);
^~~~~~~~
drivers/base/arch_topology.c:533:3: note: Call to function 'snprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
snprintf(name, sizeof(name), "core%d", i);
^~~~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
36 warnings generated.
Suppressed 36 warnings (36 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
55 warnings generated.
drivers/block/brd.c:205:2: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dst + offset, src, copy);
^~~~~~
drivers/block/brd.c:205:2: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(dst + offset, src, copy);
^~~~~~
drivers/block/brd.c:216:3: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dst, src, copy);
^~~~~~
drivers/block/brd.c:216:3: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(dst, src, copy);
^~~~~~
drivers/block/brd.c:236:3: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dst, src + offset, copy);
^~~~~~
drivers/block/brd.c:236:3: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(dst, src + offset, copy);
^~~~~~
drivers/block/brd.c:239:3: warning: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(dst, 0, copy);
^~~~~~
drivers/block/brd.c:239:3: note: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(dst, 0, copy);
^~~~~~
drivers/block/brd.c:248:4: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dst, src, copy);
^~~~~~
drivers/block/brd.c:248:4: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(dst, src, copy);
^~~~~~
drivers/block/brd.c:251:4: warning: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(dst, 0, copy);
^~~~~~
drivers/block/brd.c:251:4: note: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(dst, 0, copy);
^~~~~~
drivers/block/brd.c:386:2: warning: Call to function 'snprintf' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(buf, DISK_NAME_LEN, "ram%d", i);
^~~~~~~~
drivers/block/brd.c:386:2: note: Call to function 'snprintf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
snprintf(buf, DISK_NAME_LEN, "ram%d", i);
^~~~~~~~
drivers/block/brd.c:459:18: warning: The result of the left shift is undefined due to
shifting by '32', which is greater or equal to the width of type 'unsigned
long' [clang-analyzer-core.UndefinedBinaryOperatorResult]
max_part = 1UL << fls(max_part);
^
drivers/block/brd.c:472:2: note: Calling 'brd_check_and_reset_par'
brd_check_and_reset_par();
^~~~~~~~~~~~~~~~~~~~~~~~~
drivers/block/brd.c:451:15: note: Assuming 'max_part' is not equal to 0
if (unlikely(!max_part))
^
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
drivers/block/brd.c:451:2: note: Taking false branch
if (unlikely(!max_part))
^
drivers/block/brd.c:458:6: note: Assuming the condition is true
if ((1U << MINORBITS) % max_part != 0)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/block/brd.c:458:2: note: Taking true branch
if ((1U << MINORBITS) % max_part != 0)
^
drivers/block/brd.c:459:21: note: Calling 'fls'
max_part = 1UL << fls(max_part);
^~~~~~~~~~~~~
include/asm-generic/bitops/fls.h:15:2: note: 'r' initialized to 32
int r = 32;
^~~~~
include/asm-generic/bitops/fls.h:17:7: note: 'x' is not equal to 0, which
participates in a condition later
if (!x)
^
include/asm-generic/bitops/fls.h:17:2: note: Taking false branch
if (!x)
^
include/asm-generic/bitops/fls.h:19:6: note: Assuming the condition is false
if (!(x & 0xffff0000u)) {
^~~~~~~~~~~~~~~~~~
include/asm-generic/bitops/fls.h:19:2: note: Taking false branch
if (!(x & 0xffff0000u)) {
^
include/asm-generic/bitops/fls.h:23:6: note: Assuming the condition is false
if (!(x & 0xff000000u)) {
^~~~~~~~~~~~~~~~~~
include/asm-generic/bitops/fls.h:23:2: note: Taking false branch
if (!(x & 0xff000000u)) {
^
include/asm-generic/bitops/fls.h:27:6: note: Assuming the condition is false
if (!(x & 0xf0000000u)) {
^~~~~~~~~~~~~~~~~~
include/asm-generic/bitops/fls.h:27:2: note: Taking false branch
if (!(x & 0xf0000000u)) {
^
include/asm-generic/bitops/fls.h:31:6: note: Assuming the condition is false
if (!(x & 0xc0000000u)) {
^~~~~~~~~~~~~~~~~~
include/asm-generic/bitops/fls.h:31:2: note: Taking false branch
if (!(x & 0xc0000000u)) {
^
include/asm-generic/bitops/fls.h:35:6: note: Assuming the condition is false
if (!(x & 0x80000000u)) {
^~~~~~~~~~~~~~~~~~
include/asm-generic/bitops/fls.h:35:2: note: Taking false branch
if (!(x & 0x80000000u)) {
^
include/asm-generic/bitops/fls.h:39:2: note: Returning the value 32 (loaded from
'r')
return r;
^~~~~~~~
drivers/block/brd.c:459:21: note: Returning from 'fls'
max_part = 1UL << fls(max_part);
^~~~~~~~~~~~~
drivers/block/brd.c:459:18: note: The result of the left shift is undefined due to
shifting by '32', which is greater or equal to the width of type 'unsigned
long'
max_part = 1UL << fls(max_part);
^ ~~~~~~~~~~~~~
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
13 warnings generated.
Suppressed 13 warnings (13 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
13 warnings generated.
Suppressed 13 warnings (13 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
58 warnings generated.
fs/ufs/inode.c:78:9: warning: Excessive padding in 'Indirect' (8 padding bytes,
where 0 is optimal).
Optimal fields order:
,
p,
bh,
consider reordering the fields or adding explicit padding members
[clang-analyzer-optin.performance.Padding]
typedef struct {
^~~~~~~~
fs/ufs/inode.c:78:9: note: Excessive padding in 'Indirect' (8 padding bytes,
where 0 is optimal). Optimal fields order: , p, bh, consider reordering the fields or
adding explicit padding members
typedef struct {
^~~~~~~~
> fs/ufs/inode.c:596:3: warning: Call to function 'memcpy'
is insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ufsi->i_u1.i_data, &ufs_inode->ui_u2.ui_addr,
^~~~~~
fs/ufs/inode.c:596:3: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(ufsi->i_u1.i_data, &ufs_inode->ui_u2.ui_addr,
^~~~~~
fs/ufs/inode.c:599:3: warning: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ufsi->i_u1.i_symlink, ufs_inode->ui_u2.ui_symlink,
^~~~~~
fs/ufs/inode.c:599:3: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(ufsi->i_u1.i_symlink, ufs_inode->ui_u2.ui_symlink,
^~~~~~
fs/ufs/inode.c:643:3: warning: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ufsi->i_u1.u2_i_data, &ufs2_inode->ui_u2.ui_addr,
^~~~~~
fs/ufs/inode.c:643:3: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(ufsi->i_u1.u2_i_data, &ufs2_inode->ui_u2.ui_addr,
^~~~~~
fs/ufs/inode.c:646:3: warning: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ufsi->i_u1.i_symlink, ufs2_inode->ui_u2.ui_symlink,
^~~~~~
fs/ufs/inode.c:646:3: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(ufsi->i_u1.i_symlink, ufs2_inode->ui_u2.ui_symlink,
^~~~~~
fs/ufs/inode.c:746:3: warning: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&ufs_inode->ui_u2.ui_addr, ufsi->i_u1.i_data,
^~~~~~
fs/ufs/inode.c:746:3: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(&ufs_inode->ui_u2.ui_addr, ufsi->i_u1.i_data,
^~~~~~
fs/ufs/inode.c:750:3: warning: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&ufs_inode->ui_u2.ui_symlink, ufsi->i_u1.i_symlink,
^~~~~~
fs/ufs/inode.c:750:3: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(&ufs_inode->ui_u2.ui_symlink, ufsi->i_u1.i_symlink,
^~~~~~
> fs/ufs/inode.c:755:3: warning: Call to function 'memset'
is insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset (ufs_inode, 0, sizeof(struct ufs_inode));
^~~~~~
fs/ufs/inode.c:755:3: note: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset (ufs_inode, 0, sizeof(struct ufs_inode));
^~~~~~
fs/ufs/inode.c:786:3: warning: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&ufs_inode->ui_u2.ui_addr, ufsi->i_u1.u2_i_data,
^~~~~~
fs/ufs/inode.c:786:3: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(&ufs_inode->ui_u2.ui_addr, ufsi->i_u1.u2_i_data,
^~~~~~
fs/ufs/inode.c:789:3: warning: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&ufs_inode->ui_u2.ui_symlink, ufsi->i_u1.i_symlink,
^~~~~~
fs/ufs/inode.c:789:3: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(&ufs_inode->ui_u2.ui_symlink, ufsi->i_u1.i_symlink,
^~~~~~
fs/ufs/inode.c:794:3: warning: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset (ufs_inode, 0, sizeof(struct ufs2_inode));
^~~~~~
fs/ufs/inode.c:794:3: note: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset (ufs_inode, 0, sizeof(struct ufs2_inode));
^~~~~~
fs/ufs/inode.c:1104:10: warning: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(bh->b_data, 0, sb->s_blocksize);
^~~~~~
fs/ufs/inode.c:1104:10: note: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(bh->b_data, 0, sb->s_blocksize);
^~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
2 warnings generated.
Suppressed 2 warnings (2 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
9 warnings generated.
Suppressed 9 warnings (9 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
57 warnings generated.
fs/jffs2/nodelist.h:106:6: warning: Access to field 'flash_offset' results in a
dereference of a null pointer (loaded from variable 'ref')
[clang-analyzer-core.NullDereference]
if (ref->flash_offset == REF_LINK_NODE) {
^
fs/jffs2/wbuf.c:288:6: note: Assuming the condition is false
if (c->wbuf_ofs % c->mtd->erasesize)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/jffs2/wbuf.c:288:2: note: Taking false branch
if (c->wbuf_ofs % c->mtd->erasesize)
^
fs/jffs2/wbuf.c:294:10: note: Assuming the condition is true
BUG_ON(!ref_obsolete(jeb->last_node));
^
fs/jffs2/nodelist.h:138:28: note: expanded from macro 'ref_obsolete'
#define ref_obsolete(ref) (((ref)->flash_offset & 3) == REF_OBSOLETE)
^
include/asm-generic/bug.h:161:45: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
~~~~~~~~~^~~~~~~~~~
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
fs/jffs2/wbuf.c:294:2: note: Taking false branch
BUG_ON(!ref_obsolete(jeb->last_node));
^
include/asm-generic/bug.h:161:32: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^
fs/jffs2/wbuf.c:294:2: note: Loop condition is false. Exiting loop
BUG_ON(!ref_obsolete(jeb->last_node));
^
include/asm-generic/bug.h:161:27: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^
fs/jffs2/wbuf.c:298:2: note: Loop condition is true. Entering loop body
for (next = raw = jeb->first_node; next; raw = next) {
^
fs/jffs2/wbuf.c:301:7: note: Assuming the condition is false
if (ref_obsolete(raw) ||
^
fs/jffs2/nodelist.h:138:28: note: expanded from macro 'ref_obsolete'
#define ref_obsolete(ref) (((ref)->flash_offset & 3) == REF_OBSOLETE)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/jffs2/wbuf.c:301:7: note: Left side of '||' is false
if (ref_obsolete(raw) ||
^
fs/jffs2/nodelist.h:138:27: note: expanded from macro 'ref_obsolete'
#define ref_obsolete(ref) (((ref)->flash_offset & 3) == REF_OBSOLETE)
^
fs/jffs2/wbuf.c:302:8: note: 'next' is null
(next && ref_offset(next) <= c->wbuf_ofs)) {
^~~~
fs/jffs2/wbuf.c:302:13: note: Left side of '&&' is false
(next && ref_offset(next) <= c->wbuf_ofs)) {
^
fs/jffs2/wbuf.c:309:3: note: Taking false branch
dbg_noderef("First node to be recovered is at
0x%08x(%d)-0x%08x\n",
^
fs/jffs2/debug.h:134:31: note: expanded from macro 'dbg_noderef'
#define dbg_noderef(fmt, ...) no_printk(fmt, ##__VA_ARGS__)
^
include/linux/printk.h:131:2: note: expanded from macro 'no_printk'
if (0) \
^
fs/jffs2/wbuf.c:314:3: note: Execution continues on line 317
break;
^
fs/jffs2/wbuf.c:317:7: note: 'first_raw' is non-null
if (!first_raw) {
^~~~~~~~~
fs/jffs2/wbuf.c:317:2: note: Taking false branch
if (!first_raw) {
^
fs/jffs2/wbuf.c:329:2: note: Loop condition is true. Entering loop body
while ((raw = ref_next(raw)) != jeb->last_node)
^
fs/jffs2/wbuf.c:329:16: note: Calling 'ref_next'
while ((raw = ref_next(raw)) != jeb->last_node)
^~~~~~~~~~~~~
fs/jffs2/nodelist.h:103:2: note: Null pointer value stored to 'ref'
ref++;
^~~~~
fs/jffs2/nodelist.h:106:6: note: Access to field 'flash_offset' results in a
dereference of a null pointer (loaded from variable 'ref')
if (ref->flash_offset == REF_LINK_NODE) {
^~~
> fs/jffs2/wbuf.c:382:4: warning: Call to function 'memcpy'
is insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf + (c->wbuf_ofs - start), c->wbuf, end - c->wbuf_ofs);
^~~~~~
fs/jffs2/wbuf.c:382:4: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(buf + (c->wbuf_ofs - start), c->wbuf, end -
c->wbuf_ofs);
^~~~~~
> fs/jffs2/wbuf.c:446:3: warning: Call to function
'memmove' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memmove_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(c->wbuf, rewrite_buf + towrite, c->wbuf_len);
^~~~~~~
fs/jffs2/wbuf.c:446:3: note: Call to function 'memmove' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memmove_s' in case of C11
memmove(c->wbuf, rewrite_buf + towrite, c->wbuf_len);
^~~~~~~
fs/jffs2/wbuf.c:451:4: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(c->wbuf, buf, end-start);
^~~~~~
fs/jffs2/wbuf.c:451:4: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(c->wbuf, buf, end-start);
^~~~~~
fs/jffs2/wbuf.c:453:4: warning: Call to function 'memmove' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memmove_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(c->wbuf, c->wbuf + (start - c->wbuf_ofs), end
- start);
^~~~~~~
fs/jffs2/wbuf.c:453:4: note: Call to function 'memmove' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memmove_s' in case of C11
memmove(c->wbuf, c->wbuf + (start - c->wbuf_ofs), end
- start);
^~~~~~~
> fs/jffs2/wbuf.c:614:3: warning: Call to function 'memset'
is insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(c->wbuf + c->wbuf_len, 0, c->wbuf_pagesize - c->wbuf_len);
^~~~~~
fs/jffs2/wbuf.c:614:3: note: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(c->wbuf + c->wbuf_len, 0, c->wbuf_pagesize -
c->wbuf_len);
^~~~~~
fs/jffs2/wbuf.c:691:2: warning: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(c->wbuf,0xff,c->wbuf_pagesize);
^~~~~~
fs/jffs2/wbuf.c:691:2: note: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(c->wbuf,0xff,c->wbuf_pagesize);
^~~~~~
fs/jffs2/wbuf.c:789:2: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(c->wbuf + c->wbuf_len, buf, len);
^~~~~~
fs/jffs2/wbuf.c:789:2: note: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(c->wbuf + c->wbuf_len, buf, len);
^~~~~~
fs/jffs2/wbuf.c:813:3: warning: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(c->wbuf,0xff,c->wbuf_pagesize);
^~~~~~
fs/jffs2/wbuf.c:813:3: note: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(c->wbuf,0xff,c->wbuf_pagesize);
^~~~~~
fs/jffs2/wbuf.c:876:39: warning: Division by zero [clang-analyzer-core.DivideZero]
ret = mtd_write(c->mtd, outvec_to, PAGE_DIV(vlen),
^
fs/jffs2/wbuf.c:35:43: note: expanded from macro 'PAGE_DIV'
#define PAGE_DIV(x) ( ((unsigned long)(x) / (unsigned long)(c->wbuf_pagesize)) *
(unsigned long)(c->wbuf_pagesize) )
^
fs/jffs2/wbuf.c:946:30: note: Assuming field 'wbuf' is not equal to null
if (!jffs2_is_writebuffered(c))
^
fs/jffs2/os-linux.h:103:36: note: expanded from macro 'jffs2_is_writebuffered'
#define jffs2_is_writebuffered(c) (c->wbuf != NULL)
^~~~~~~~~~~~~~~
fs/jffs2/wbuf.c:946:2: note: Taking false branch
if (!jffs2_is_writebuffered(c))
^
fs/jffs2/wbuf.c:951:9: note: Calling 'jffs2_flash_writev'
return jffs2_flash_writev(c, vecs, 1, ofs, retlen, 0);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/jffs2/wbuf.c:804:7: note: Field 'wbuf' is not equal to null
if (!jffs2_is_writebuffered(c))
^
fs/jffs2/os-linux.h:103:39: note: expanded from macro 'jffs2_is_writebuffered'
#define jffs2_is_writebuffered(c) (c->wbuf != NULL)
^
fs/jffs2/wbuf.c:804:2: note: Taking false branch
if (!jffs2_is_writebuffered(c))
^
fs/jffs2/wbuf.c:810:6: note: Assuming field 'wbuf_ofs' is not equal to -1
if (c->wbuf_ofs == 0xFFFFFFFF) {
^~~~~~~~~~~~~~~~~~~~~~~~~
fs/jffs2/wbuf.c:810:2: note: Taking false branch
if (c->wbuf_ofs == 0xFFFFFFFF) {
^
fs/jffs2/wbuf.c:823:6: note: Assuming the condition is false
if (SECTOR_ADDR(to) != SECTOR_ADDR(c->wbuf_ofs)) {
^
fs/jffs2/os-linux.h:65:24: note: expanded from macro 'SECTOR_ADDR'
#define SECTOR_ADDR(x) ( (((unsigned long)(x) / c->sector_size) * c->sector_size)
)
^
fs/jffs2/wbuf.c:823:2: note: Taking false branch
if (SECTOR_ADDR(to) != SECTOR_ADDR(c->wbuf_ofs)) {
^
fs/jffs2/wbuf.c:837:6: note: Assuming the condition is false
if (to != PAD(c->wbuf_ofs + c->wbuf_len)) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/jffs2/wbuf.c:837:2: note: Taking false branch
if (to != PAD(c->wbuf_ofs + c->wbuf_len)) {
^
fs/jffs2/wbuf.c:848:6: note: Assuming the condition is false
if (c->wbuf_len != PAGE_MOD(to)) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/jffs2/wbuf.c:848:2: note: Taking false branch
if (c->wbuf_len != PAGE_MOD(to)) {
^
fs/jffs2/wbuf.c:859:2: note: Loop condition is true. Entering loop body
for (invec = 0; invec < count; invec++) {
^
fs/jffs2/wbuf.c:863:17: note: Calling 'jffs2_fill_wbuf'
wbuf_retlen = jffs2_fill_wbuf(c, v, vlen);
^~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/jffs2/wbuf.c:784:6: note: Assuming 'len' is 0
if (len && !c->wbuf_len && (len >= c->wbuf_pagesize))
^~~
fs/jffs2/wbuf.c:784:10: note: Left side of '&&' is false
if (len && !c->wbuf_len && (len >= c->wbuf_pagesize))
^
fs/jffs2/wbuf.c:787:2: note: Taking false branch
if (len > (c->wbuf_pagesize - c->wbuf_len))
^
fs/jffs2/wbuf.c:791:2: note: Returning without writing to
'c->wbuf_pagesize'
return len;
^
fs/jffs2/wbuf.c:863:17: note: Returning from 'jffs2_fill_wbuf'
wbuf_retlen = jffs2_fill_wbuf(c, v, vlen);
^~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/jffs2/wbuf.c:865:7: note: Assuming field 'wbuf_len' is equal to field
'wbuf_pagesize'
if (c->wbuf_len == c->wbuf_pagesize) {
--
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/sched/cpudeadline.c:122:2: note: Taking true branch
if (later_mask &&
^
kernel/sched/cpudeadline.c:127:8: note: Left side of '&&' is false
if (!static_branch_unlikely(&sched_asym_cpucapacity))
^
include/linux/jump_label.h:508:52: note: expanded from macro
'static_branch_unlikely'
#define static_branch_unlikely(x)
unlikely_notrace(static_key_enabled(&(x)->key))
^
include/linux/jump_label.h:416:67: note: expanded from macro
'static_key_enabled'
if (!__builtin_types_compatible_p(typeof(*x), struct static_key) &&
\
^
kernel/sched/cpudeadline.c:127:8: note: Assuming the condition is true
if (!static_branch_unlikely(&sched_asym_cpucapacity))
^
include/linux/jump_label.h:508:52: note: expanded from macro
'static_branch_unlikely'
#define static_branch_unlikely(x)
unlikely_notrace(static_key_enabled(&(x)->key))
~~~~~~~~~~~~~~~~~^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/jump_label.h:420:2: note: expanded from macro
'static_key_enabled'
static_key_count((struct static_key *)x) > 0; \
^
include/linux/compiler.h:80:39: note: expanded from macro 'unlikely_notrace'
# define unlikely_notrace(x) unlikely(x)
~~~~~~~~~^~
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
kernel/sched/cpudeadline.c:127:3: note: Taking false branch
if (!static_branch_unlikely(&sched_asym_cpucapacity))
^
kernel/sched/cpudeadline.c:131:3: note: Assuming 'cpu' is >=
'nr_cpu_ids'
for_each_cpu(cpu, later_mask) {
^
include/linux/cpumask.h:278:3: note: expanded from macro 'for_each_cpu'
(cpu) < nr_cpu_ids;)
^~~~~~~~~~~~~~~~~~
kernel/sched/cpudeadline.c:131:3: note: Loop condition is false. Execution continues on
line 145
for_each_cpu(cpu, later_mask) {
^
include/linux/cpumask.h:276:2: note: expanded from macro 'for_each_cpu'
for ((cpu) = -1; \
^
kernel/sched/cpudeadline.c:145:3: note: Taking true branch
if (cpumask_empty(later_mask))
^
kernel/sched/cpudeadline.c:146:4: note: Calling 'cpumask_set_cpu'
cpumask_set_cpu(max_cpu, later_mask);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/cpumask.h:346:2: note: Calling 'set_bit'
set_bit(cpumask_check(cpu), cpumask_bits(dstp));
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
arch/riscv/include/asm/bitops.h:115:2: note: The result of the left shift is undefined
because the right operand is negative
__op_bit(or, __NOP, nr, addr);
^
arch/riscv/include/asm/bitops.h:58:2: note: expanded from macro '__op_bit'
__op_bit_ord(op, mod, nr, addr, )
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
arch/riscv/include/asm/bitops.h:52:14: note: expanded from macro
'__op_bit_ord'
: "r" (mod(BIT_MASK(nr))) \
~~~~^~~~~~~~~~~~~
include/linux/bits.h:10:30: note: expanded from macro 'BIT_MASK'
#define BIT_MASK(nr) (UL(1) << ((nr) % BITS_PER_LONG))
^
arch/riscv/include/asm/bitops.h:61:19: note: expanded from macro '__NOP'
#define __NOP(x) (x)
^
Suppressed 68 warnings (68 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
38 warnings generated.
fs/d_path.c:50:3: warning: Call to function 'memset' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memset_s' in
case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(dst, 'x', len);
^~~~~~
fs/d_path.c:50:3: note: Call to function 'memset' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memset_s' in
case of C11
memset(dst, 'x', len);
^~~~~~
fs/d_path.c:308:7: warning: Call to function 'vsnprintf' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'vsnprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sz = vsnprintf(temp, sizeof(temp), fmt, args) + 1;
^~~~~~~~~
fs/d_path.c:308:7: note: Call to function 'vsnprintf' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'vsnprintf_s' in case of C11
sz = vsnprintf(temp, sizeof(temp), fmt, args) + 1;
^~~~~~~~~
fs/d_path.c:315:9: warning: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return memcpy(buffer, temp, sz);
^~~~~~
fs/d_path.c:315:9: note: Call to function 'memcpy' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memcpy_s' in
case of C11
return memcpy(buffer, temp, sz);
^~~~~~
Suppressed 35 warnings (34 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
50 warnings generated.
Suppressed 50 warnings (50 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
63 warnings generated.
> fs/orangefs/namei.c:44:2: warning: Call to function
'strncpy' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'strncpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(new_op->upcall.req.create.d_name,
^~~~~~~
fs/orangefs/namei.c:44:2: note: Call to function 'strncpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'strncpy_s' in case of C11
strncpy(new_op->upcall.req.create.d_name,
^~~~~~~
> fs/orangefs/namei.c:86:2: warning: Call to function
'memset' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&iattr, 0, sizeof iattr);
^~~~~~
fs/orangefs/namei.c:86:2: note: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(&iattr, 0, sizeof iattr);
^~~~~~
fs/orangefs/namei.c:140:2: warning: Call to function 'strncpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'strncpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(new_op->upcall.req.lookup.d_name, dentry->d_name.name,
^~~~~~~
fs/orangefs/namei.c:140:2: note: Call to function 'strncpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'strncpy_s' in case of C11
strncpy(new_op->upcall.req.lookup.d_name, dentry->d_name.name,
^~~~~~~
fs/orangefs/namei.c:195:2: warning: Call to function 'strncpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'strncpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(new_op->upcall.req.remove.d_name, dentry->d_name.name,
^~~~~~~
fs/orangefs/namei.c:195:2: note: Call to function 'strncpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'strncpy_s' in case of C11
strncpy(new_op->upcall.req.remove.d_name, dentry->d_name.name,
^~~~~~~
fs/orangefs/namei.c:211:3: warning: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&iattr, 0, sizeof iattr);
^~~~~~
fs/orangefs/namei.c:211:3: note: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(&iattr, 0, sizeof iattr);
^~~~~~
fs/orangefs/namei.c:250:2: warning: Call to function 'strncpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'strncpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(new_op->upcall.req.sym.entry_name,
^~~~~~~
fs/orangefs/namei.c:250:2: note: Call to function 'strncpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'strncpy_s' in case of C11
strncpy(new_op->upcall.req.sym.entry_name,
^~~~~~~
fs/orangefs/namei.c:253:2: warning: Call to function 'strncpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'strncpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(new_op->upcall.req.sym.target, symname, ORANGEFS_NAME_MAX - 1);
^~~~~~~
fs/orangefs/namei.c:253:2: note: Call to function 'strncpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'strncpy_s' in case of C11
strncpy(new_op->upcall.req.sym.target, symname, ORANGEFS_NAME_MAX - 1);
^~~~~~~
fs/orangefs/namei.c:298:2: warning: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&iattr, 0, sizeof iattr);
^~~~~~
fs/orangefs/namei.c:298:2: note: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(&iattr, 0, sizeof iattr);
^~~~~~
fs/orangefs/namei.c:327:2: warning: Call to function 'strncpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'strncpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(new_op->upcall.req.mkdir.d_name,
^~~~~~~
fs/orangefs/namei.c:327:2: note: Call to function 'strncpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'strncpy_s' in case of C11
strncpy(new_op->upcall.req.mkdir.d_name,
^~~~~~~
fs/orangefs/namei.c:369:2: warning: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&iattr, 0, sizeof iattr);
^~~~~~
fs/orangefs/namei.c:369:2: note: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(&iattr, 0, sizeof iattr);
^~~~~~
fs/orangefs/namei.c:396:2: warning: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&iattr, 0, sizeof iattr);
^~~~~~
fs/orangefs/namei.c:396:2: note: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(&iattr, 0, sizeof iattr);
^~~~~~
fs/orangefs/namei.c:408:2: warning: Call to function 'strncpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'strncpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(new_op->upcall.req.rename.d_old_name,
^~~~~~~
fs/orangefs/namei.c:408:2: note: Call to function 'strncpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'strncpy_s' in case of C11
strncpy(new_op->upcall.req.rename.d_old_name,
^~~~~~~
fs/orangefs/namei.c:411:2: warning: Call to function 'strncpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'strncpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(new_op->upcall.req.rename.d_new_name,
^~~~~~~
fs/orangefs/namei.c:411:2: note: Call to function 'strncpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'strncpy_s' in case of C11
strncpy(new_op->upcall.req.rename.d_new_name,
^~~~~~~
Suppressed 50 warnings (50 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
81 warnings generated.
> fs/ecryptfs/keystore.c:179:2: warning: Call to function
'memcpy' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&message[i], signature, ECRYPTFS_SIG_SIZE_HEX);
^~~~~~
fs/ecryptfs/keystore.c:179:2: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(&message[i], signature, ECRYPTFS_SIG_SIZE_HEX);
^~~~~~
fs/ecryptfs/keystore.c:190:2: warning: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&message[i], session_key->encrypted_key,
^~~~~~
fs/ecryptfs/keystore.c:190:2: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(&message[i], session_key->encrypted_key,
^~~~~~
fs/ecryptfs/keystore.c:266:2: warning: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(session_key->decrypted_key, &data[i],
^~~~~~
fs/ecryptfs/keystore.c:266:2: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(session_key->decrypted_key, &data[i],
^~~~~~
fs/ecryptfs/keystore.c:322:2: warning: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&message[i], signature, ECRYPTFS_SIG_SIZE_HEX);
^~~~~~
fs/ecryptfs/keystore.c:322:2: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(&message[i], signature, ECRYPTFS_SIG_SIZE_HEX);
^~~~~~
fs/ecryptfs/keystore.c:334:2: warning: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&message[i], crypt_stat->key, crypt_stat->key_size);
^~~~~~
fs/ecryptfs/keystore.c:334:2: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(&message[i], crypt_stat->key, crypt_stat->key_size);
^~~~~~
fs/ecryptfs/keystore.c:406:2: warning: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(key_rec->enc_key, &data[i], key_rec->enc_key_size);
^~~~~~
fs/ecryptfs/keystore.c:406:2: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(key_rec->enc_key, &data[i], key_rec->enc_key_size);
^~~~~~
fs/ecryptfs/keystore.c:784:4: warning: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(s->hash, s->tmp_hash,
^~~~~~
fs/ecryptfs/keystore.c:784:4: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(s->hash, s->tmp_hash,
^~~~~~
fs/ecryptfs/keystore.c:790:2: warning: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&s->block_aligned_filename[s->num_rand_bytes], filename,
^~~~~~
fs/ecryptfs/keystore.c:790:2: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(&s->block_aligned_filename[s->num_rand_bytes], filename,
^~~~~~
fs/ecryptfs/keystore.c:1076:2: warning: Call to function 'memcpy' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy((*filename), &s->decrypted_filename[s->i], (*filename_size));
^~~~~~
fs/ecryptfs/keystore.c:1076:2: note: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy((*filename), &s->decrypted_filename[s->i], (*filename_size));
^~~~~~
fs/ecryptfs/keystore.c:1170:2: warning: Call to function 'memcpy' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(crypt_stat->key, auth_tok->session_key.decrypted_key,
^~~~~~
fs/ecryptfs/keystore.c:1170:2: note: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(crypt_stat->key, auth_tok->session_key.decrypted_key,
^~~~~~
fs/ecryptfs/keystore.c:1310:2: warning: Call to function 'memcpy' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy((*new_auth_tok)->session_key.encrypted_key,
^~~~~~
fs/ecryptfs/keystore.c:1310:2: note: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy((*new_auth_tok)->session_key.encrypted_key,
^~~~~~
> fs/ecryptfs/keystore.c:1327:2: warning: Call to function
'memset' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(auth_tok_list_item, 0,
^~~~~~
fs/ecryptfs/keystore.c:1327:2: note: Call to function 'memset' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(auth_tok_list_item, 0,
^~~~~~
fs/ecryptfs/keystore.c:1464:3: warning: Call to function 'memcpy' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy((*new_auth_tok)->token.password.salt,
^~~~~~
fs/ecryptfs/keystore.c:1464:3: note: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy((*new_auth_tok)->token.password.salt,
^~~~~~
fs/ecryptfs/keystore.c:1475:3: warning: Call to function 'memcpy' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy((*new_auth_tok)->session_key.encrypted_key,
^~~~~~
fs/ecryptfs/keystore.c:1475:3: note: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy((*new_auth_tok)->session_key.encrypted_key,
^~~~~~
fs/ecryptfs/keystore.c:1503:2: warning: Call to function 'memset' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(auth_tok_list_item, 0,
^~~~~~
fs/ecryptfs/keystore.c:1503:2: note: Call to function 'memset' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(auth_tok_list_item, 0,
^~~~~~
fs/ecryptfs/keystore.c:1599:2: warning: Call to function 'memcpy' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(contents, &data[(*packet_size)], (*tag_11_contents_size));
^~~~~~
fs/ecryptfs/keystore.c:1599:2: note: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(contents, &data[(*packet_size)], (*tag_11_contents_size));
^~~~~~
fs/ecryptfs/keystore.c:1726:2: warning: Call to function 'memcpy' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(crypt_stat->key, auth_tok->session_key.decrypted_key,
^~~~~~
fs/ecryptfs/keystore.c:1726:2: note: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(crypt_stat->key, auth_tok->session_key.decrypted_key,
^~~~~~
fs/ecryptfs/keystore.c:1887:4: warning: Value stored to 'found_auth_tok' is
never read [clang-analyzer-deadcode.DeadStores]
found_auth_tok = 1;
^ ~
fs/ecryptfs/keystore.c:1887:4: note: Value stored to 'found_auth_tok' is never
read
found_auth_tok = 1;
^ ~
fs/ecryptfs/keystore.c:1899:3: warning: Call to function 'memcpy' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&(candidate_auth_tok->token.private_key),
^~~~~~
fs/ecryptfs/keystore.c:1899:3: note: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(&(candidate_auth_tok->token.private_key),
^~~~~~
fs/ecryptfs/keystore.c:1907:3: warning: Call to function 'memcpy' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&(candidate_auth_tok->token.password),
^~~~~~
fs/ecryptfs/keystore.c:1907:3: note: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(&(candidate_auth_tok->token.password),
^~~~~~
fs/ecryptfs/keystore.c:2038:3: warning: Call to function 'memcpy' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(key_rec->enc_key,
^~~~~~
fs/ecryptfs/keystore.c:2038:3: note: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(key_rec->enc_key,
^~~~~~
fs/ecryptfs/keystore.c:2086:2: warning: Call to function 'memcpy' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&dest[(*packet_size)], key_rec->sig, ECRYPTFS_SIG_SIZE);
^~~~~~
fs/ecryptfs/keystore.c:2086:2: note: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(&dest[(*packet_size)], key_rec->sig, ECRYPTFS_SIG_SIZE);
^~~~~~
fs/ecryptfs/keystore.c:2089:2: warning: Call to function 'memcpy' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&dest[(*packet_size)], key_rec->enc_key,
^~~~~~
fs/ecryptfs/keystore.c:2089:2: note: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(&dest[(*packet_size)], key_rec->enc_key,
^~~~~~
fs/ecryptfs/keystore.c:2147:2: warning: Call to function 'memcpy' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&dest[(*packet_length)], "_CONSOLE", 8);
^~~~~~
fs/ecryptfs/keystore.c:2147:2: note: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(&dest[(*packet_length)], "_CONSOLE", 8);
^~~~~~
fs/ecryptfs/keystore.c:2149:2: warning: Call to function 'memset' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&dest[(*packet_length)], 0x00, 4);
^~~~~~
fs/ecryptfs/keystore.c:2149:2: note: Call to function 'memset' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(&dest[(*packet_length)], 0x00, 4);
^~~~~~
fs/ecryptfs/keystore.c:2151:2: warning: Call to function 'memcpy' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&dest[(*packet_length)], contents, contents_length);
^~~~~~
fs/ecryptfs/keystore.c:2151:2: note: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(&dest[(*packet_length)], contents, contents_length);
^~~~~~
fs/ecryptfs/keystore.c:2220:3: warning: Call to function 'memset' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset((crypt_stat->key + 24), 0, 8);
^~~~~~
fs/ecryptfs/keystore.c:2220:3: note: Call to function 'memset' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset((crypt_stat->key + 24), 0, 8);
^~~~~~
fs/ecryptfs/keystore.c:2235:3: warning: Call to function 'memcpy' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(key_rec->enc_key,
^~~~~~
fs/ecryptfs/keystore.c:2235:3: note: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(key_rec->enc_key,
--
^~~~~~~~~~~~~~~
include/linux/bitops.h:154:2: note: Taking true branch
if (sizeof(l) == 4)
^
include/linux/bitops.h:155:10: note: Calling 'fls'
return fls(l);
^~~~~~
include/asm-generic/bitops/fls.h:15:2: note: 'r' initialized to 32
int r = 32;
^~~~~
include/asm-generic/bitops/fls.h:17:6: note: Assuming 'x' is not equal to 0,
which participates in a condition later
if (!x)
^~
include/asm-generic/bitops/fls.h:17:2: note: Taking false branch
if (!x)
^
include/asm-generic/bitops/fls.h:19:6: note: Assuming the condition is false
if (!(x & 0xffff0000u)) {
^~~~~~~~~~~~~~~~~~
include/asm-generic/bitops/fls.h:19:2: note: Taking false branch
if (!(x & 0xffff0000u)) {
^
include/asm-generic/bitops/fls.h:23:6: note: Assuming the condition is false
if (!(x & 0xff000000u)) {
^~~~~~~~~~~~~~~~~~
include/asm-generic/bitops/fls.h:23:2: note: Taking false branch
if (!(x & 0xff000000u)) {
^
include/asm-generic/bitops/fls.h:27:6: note: Assuming the condition is false
if (!(x & 0xf0000000u)) {
^~~~~~~~~~~~~~~~~~
include/asm-generic/bitops/fls.h:27:2: note: Taking false branch
if (!(x & 0xf0000000u)) {
^
include/asm-generic/bitops/fls.h:31:6: note: Assuming the condition is false
if (!(x & 0xc0000000u)) {
^~~~~~~~~~~~~~~~~~
include/asm-generic/bitops/fls.h:31:2: note: Taking false branch
if (!(x & 0xc0000000u)) {
^
include/asm-generic/bitops/fls.h:35:6: note: Assuming the condition is false
if (!(x & 0x80000000u)) {
^~~~~~~~~~~~~~~~~~
include/asm-generic/bitops/fls.h:35:2: note: Taking false branch
if (!(x & 0x80000000u)) {
^
include/asm-generic/bitops/fls.h:39:2: note: Returning the value 32 (loaded from
'r')
return r;
^~~~~~~~
include/linux/bitops.h:155:10: note: Returning from 'fls'
return fls(l);
^~~~~~
include/linux/bitops.h:155:3: note: Returning the value 32
return fls(l);
^~~~~~~~~~~~~
include/linux/log2.h:57:16: note: Returning from 'fls_long'
return 1UL << fls_long(n - 1);
^~~~~~~~~~~~~~~
include/linux/log2.h:57:13: note: The result of the left shift is undefined due to
shifting by '32', which is greater or equal to the width of type 'unsigned
long'
return 1UL << fls_long(n - 1);
^ ~~~~~~~~~~~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
48 warnings generated.
mm/mempool.c:333:2: warning: Call to function 'memcpy' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(new_elements, pool->elements,
^~~~~~
mm/mempool.c:333:2: note: Call to function 'memcpy' is insecure as it does not
provide security checks introduced in the C11 standard. Replace with analogous functions
that support length arguments or provides boundary checks such as 'memcpy_s' in
case of C11
memcpy(new_elements, pool->elements,
^~~~~~
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
50 warnings generated.
mm/oom_kill.c:258:17: warning: Value stored to 'highest_zoneidx' during its
initialization is never read [clang-analyzer-deadcode.DeadStores]
enum zone_type highest_zoneidx = gfp_zone(oc->gfp_mask);
^~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~
mm/oom_kill.c:258:17: note: Value stored to 'highest_zoneidx' during its
initialization is never read
enum zone_type highest_zoneidx = gfp_zone(oc->gfp_mask);
^~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~
Suppressed 49 warnings (49 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
35 warnings generated.
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
36 warnings generated.
drivers/spi/spi-tle62x0.c:122:9: warning: Call to function 'sprintf' is
insecure as it does not provide bounding of the memory buffer or security checks
introduced in the C11 standard. Replace with analogous functions that support length
arguments or provides boundary checks such as 'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
bp += sprintf(bp, "%s ", decode_fault(fault >> (ptr *
2)));
^~~~~~~
drivers/spi/spi-tle62x0.c:122:9: note: Call to function 'sprintf' is insecure
as it does not provide bounding of the memory buffer or security checks introduced in the
C11 standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'sprintf_s' in case of C11
bp += sprintf(bp, "%s ", decode_fault(fault >> (ptr *
2)));
^~~~~~~
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
38 warnings generated.
> drivers/spi/spi-zynqmp-gqspi.c:347:2: warning: Call to function
'memcpy' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(xqspi->rxbuf, &data, size);
^~~~~~
drivers/spi/spi-zynqmp-gqspi.c:347:2: note: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(xqspi->rxbuf, &data, size);
^~~~~~
drivers/spi/spi-zynqmp-gqspi.c:513:4: warning: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&intermediate, xqspi->txbuf, 4);
^~~~~~
drivers/spi/spi-zynqmp-gqspi.c:513:4: note: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(&intermediate, xqspi->txbuf, 4);
^~~~~~
drivers/spi/spi-zynqmp-gqspi.c:518:4: warning: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&intermediate, xqspi->txbuf,
^~~~~~
drivers/spi/spi-zynqmp-gqspi.c:518:4: note: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(&intermediate, xqspi->txbuf,
^~~~~~
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
20 warnings generated.
crypto/streebog_generic.c:914:2: warning: Call to function 'memset' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ctx, 0, sizeof(struct streebog_state));
^~~~~~
crypto/streebog_generic.c:914:2: note: Call to function 'memset' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(ctx, 0, sizeof(struct streebog_state));
^~~~~~
crypto/streebog_generic.c:927:2: warning: Call to function 'memset' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ctx->buffer + ctx->fillsize, 0,
^~~~~~
crypto/streebog_generic.c:927:2: note: Call to function 'memset' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(ctx->buffer + ctx->fillsize, 0,
^~~~~~
crypto/streebog_generic.c:979:2: warning: Call to function 'memcpy' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&m, data, sizeof(m));
^~~~~~
crypto/streebog_generic.c:979:2: note: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(&m, data, sizeof(m));
^~~~~~
crypto/streebog_generic.c:999:2: warning: Call to function 'memcpy' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&ctx->hash, &ctx->h, sizeof(struct streebog_uint512));
^~~~~~
crypto/streebog_generic.c:999:2: note: Call to function 'memcpy' is insecure as
it does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(&ctx->hash, &ctx->h, sizeof(struct streebog_uint512));
^~~~~~
crypto/streebog_generic.c:1012:3: warning: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&ctx->buffer[ctx->fillsize], data, chunksize);
^~~~~~
crypto/streebog_generic.c:1012:3: note: Call to function 'memcpy' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(&ctx->buffer[ctx->fillsize], data, chunksize);
^~~~~~
crypto/streebog_generic.c:1030:3: warning: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&ctx->buffer, data, len);
^~~~~~
crypto/streebog_generic.c:1030:3: note: Call to function 'memcpy' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(&ctx->buffer, data, len);
^~~~~~
crypto/streebog_generic.c:1043:3: warning: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(digest, &ctx->hash.qword[4], STREEBOG256_DIGEST_SIZE);
^~~~~~
crypto/streebog_generic.c:1043:3: note: Call to function 'memcpy' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(digest, &ctx->hash.qword[4], STREEBOG256_DIGEST_SIZE);
^~~~~~
crypto/streebog_generic.c:1045:3: warning: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(digest, &ctx->hash.qword[0], STREEBOG512_DIGEST_SIZE);
^~~~~~
crypto/streebog_generic.c:1045:3: note: Call to function 'memcpy' is insecure
as it does not provide security checks introduced in the C11 standard. Replace with
analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(digest, &ctx->hash.qword[0], STREEBOG512_DIGEST_SIZE);
^~~~~~
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
47 warnings generated.
fs/bfs/dir.c:228:2: warning: Value stored to 'error' is never read
[clang-analyzer-deadcode.DeadStores]
error = -EPERM;
^ ~~~~~~
fs/bfs/dir.c:228:2: note: Value stored to 'error' is never read
error = -EPERM;
^ ~~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
48 warnings generated.
fs/ecryptfs/inode.c:933:4: warning: Value stored to 'rc' is never read
[clang-analyzer-deadcode.DeadStores]
rc = 0;
^ ~
fs/ecryptfs/inode.c:933:4: note: Value stored to 'rc' is never read
rc = 0;
^ ~
> fs/ecryptfs/inode.c:949:2: warning: Call to function
'memcpy' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&lower_ia, ia, sizeof(lower_ia));
^~~~~~
fs/ecryptfs/inode.c:949:2: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(&lower_ia, ia, sizeof(lower_ia));
^~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
70 warnings generated.
> fs/ecryptfs/main.c:215:2: warning: Call to function
'memset' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset((void *)mount_crypt_stat, 0,
^~~~~~
fs/ecryptfs/main.c:215:2: note: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset((void *)mount_crypt_stat, 0,
^~~~~~
> fs/ecryptfs/main.c:299:4: warning: Call to function
'strncpy' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'strncpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(cipher_name_dst, cipher_name_src,
^~~~~~~
fs/ecryptfs/main.c:299:4: note: Call to function 'strncpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'strncpy_s' in case of C11
strncpy(cipher_name_dst, cipher_name_src,
^~~~~~~
fs/ecryptfs/main.c:331:4: warning: Call to function 'strncpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'strncpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(fnek_dst, fnek_src, ECRYPTFS_SIG_SIZE_HEX);
^~~~~~~
fs/ecryptfs/main.c:331:4: note: Call to function 'strncpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'strncpy_s' in case of C11
strncpy(fnek_dst, fnek_src, ECRYPTFS_SIG_SIZE_HEX);
^~~~~~~
fs/ecryptfs/main.c:353:4: warning: Call to function 'strncpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'strncpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(fn_cipher_name_dst, fn_cipher_name_src,
^~~~~~~
fs/ecryptfs/main.c:353:4: note: Call to function 'strncpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'strncpy_s' in case of C11
strncpy(fn_cipher_name_dst, fn_cipher_name_src,
^~~~~~~
fs/ecryptfs/main.c:401:3: warning: Call to function 'strcpy' is insecure as it
does not provide bounding of the memory buffer. Replace unbounded copy functions with
analogous functions that support length arguments such as 'strlcpy'. CWE-119
[clang-analyzer-security.insecureAPI.strcpy]
strcpy(mount_crypt_stat->global_default_fn_cipher_name,
^~~~~~
fs/ecryptfs/main.c:401:3: note: Call to function 'strcpy' is insecure as it
does not provide bounding of the memory buffer. Replace unbounded copy functions with
analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(mount_crypt_stat->global_default_fn_cipher_name,
^~~~~~
> fs/ecryptfs/main.c:772:9: warning: Call to function
'snprintf' is insecure as it does not provide security checks introduced in the
C11 standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'snprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(buff, PAGE_SIZE, "%d\n", ECRYPTFS_VERSIONING_MASK);
^~~~~~~~
fs/ecryptfs/main.c:772:9: note: Call to function 'snprintf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'snprintf_s' in case of C11
return snprintf(buff, PAGE_SIZE, "%d\n", ECRYPTFS_VERSIONING_MASK);
^~~~~~~~
Suppressed 64 warnings (64 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
36 warnings generated.
kernel/params.c:279:3: warning: Call to function 'strcpy' is insecure as it
does not provide bounding of the memory buffer. Replace unbounded copy functions with
analogous functions that support length arguments such as 'strlcpy'. CWE-119
[clang-analyzer-security.insecureAPI.strcpy]
strcpy(*(char **)kp->arg, val);
^~~~~~
kernel/params.c:279:3: note: Call to function 'strcpy' is insecure as it does
not provide bounding of the memory buffer. Replace unbounded copy functions with analogous
functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(*(char **)kp->arg, val);
^~~~~~
kernel/params.c:320:9: warning: Call to function 'sprintf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buffer, "%c\n", *(bool *)kp->arg ? 'Y' :
'N');
^~~~~~~
kernel/params.c:320:9: note: Call to function 'sprintf' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
return sprintf(buffer, "%c\n", *(bool *)kp->arg ? 'Y' :
'N');
^~~~~~~
kernel/params.c:379:9: warning: Call to function 'sprintf' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buffer, "%c\n", (*(bool *)kp->arg) ? 'N' :
'Y');
^~~~~~~
kernel/params.c:379:9: note: Call to function 'sprintf' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'sprintf_s' in case of C11
return sprintf(buffer, "%c\n", (*(bool *)kp->arg) ? 'N' :
'Y');
^~~~~~~
kernel/params.c:519:2: warning: Call to function 'strcpy' is insecure as it
does not provide bounding of the memory buffer. Replace unbounded copy functions with
analogous functions that support length arguments such as 'strlcpy'. CWE-119
[clang-analyzer-security.insecureAPI.strcpy]
strcpy(kps->string, val);
^~~~~~
kernel/params.c:519:2: note: Call to function 'strcpy' is insecure as it does
not provide bounding of the memory buffer. Replace unbounded copy functions with analogous
functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(kps->string, val);
^~~~~~
kernel/params.c:668:2: warning: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&mk->mp->attrs[mk->mp->num], 0,
sizeof(mk->mp->attrs[0]));
^~~~~~
kernel/params.c:668:2: note: Call to function 'memset' is insecure as it does
not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(&mk->mp->attrs[mk->mp->num], 0,
sizeof(mk->mp->attrs[0]));
^~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
35 warnings generated.
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
35 warnings generated.
kernel/irq/irqdomain.c:618:2: warning: Value stored to 'of_node' is never read
[clang-analyzer-deadcode.DeadStores]
of_node = irq_domain_get_of_node(domain);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/irq/irqdomain.c:618:2: note: Value stored to 'of_node' is never read
of_node = irq_domain_get_of_node(domain);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
19 warnings generated.
Suppressed 19 warnings (19 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
22 warnings generated.
Suppressed 22 warnings (22 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
21 warnings generated.
Suppressed 21 warnings (21 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
48 warnings generated.
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
63 warnings generated.
include/linux/math64.h:92:15: warning: Division by zero
[clang-analyzer-core.DivideZero]
*remainder = do_div(dividend, divisor);
^
include/asm-generic/div64.h:235:25: note: expanded from macro 'do_div'
__rem = (uint32_t)(n) % __base; \
^
fs/f2fs/debug.c:349:2: note: Loop condition is true. Entering loop body
list_for_each_entry(si, &f2fs_stat_list, stat_list) {
--
fs/f2fs/debug.c:372:7: note: Assuming the condition is false
if (test_opt(si->sbi, DISCARD))
^
fs/f2fs/f2fs.h:112:32: note: expanded from macro 'test_opt'
#define test_opt(sbi, option) (F2FS_OPTION(sbi).opt & F2FS_MOUNT_##option)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/f2fs/f2fs.h:109:26: note: expanded from macro 'F2FS_OPTION'
#define F2FS_OPTION(sbi) ((sbi)->mount_opt)
^
fs/f2fs/debug.c:372:3: note: Taking false branch
if (test_opt(si->sbi, DISCARD))
^
fs/f2fs/debug.c:501:5: note: Assuming field 'total_ext' is not equal to 0
!si->total_ext ? 0 :
^~~~~~~~~~~~~~
fs/f2fs/debug.c:501:5: note: '?' condition is false
fs/f2fs/debug.c:543:15: note: Assuming 'j' is >= field 'util_valid'
for (j = 0; j < si->util_valid; j++)
^~~~~~~~~~~~~~~~~~
fs/f2fs/debug.c:543:3: note: Loop condition is false. Execution continues on line 545
for (j = 0; j < si->util_valid; j++)
^
fs/f2fs/debug.c:547:15: note: Assuming 'j' is >= field
'util_invalid'
for (j = 0; j < si->util_invalid; j++)
^~~~~~~~~~~~~~~~~~~~
fs/f2fs/debug.c:547:3: note: Loop condition is false. Execution continues on line 549
for (j = 0; j < si->util_invalid; j++)
^
fs/f2fs/debug.c:551:15: note: Assuming 'j' is >= field 'util_free'
for (j = 0; j < si->util_free; j++)
^~~~~~~~~~~~~~~~~
fs/f2fs/debug.c:551:3: note: Loop condition is false. Execution continues on line 553
for (j = 0; j < si->util_free; j++)
^
fs/f2fs/debug.c:561:3: note: Calling 'f2fs_update_sit_info'
f2fs_update_sit_info(si->sbi);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/f2fs/debug.c:38:2: note: 'ndirty' initialized to 0
int ndirty = 0;
^~~~~~~~~~
fs/f2fs/debug.c:44:18: note: Assuming 'segno' is >= field
'main_segments'
for (segno = 0; segno < MAIN_SEGS(sbi); segno += sbi->segs_per_sec) {
^~~~~~~~~~~~~~~~~~~~~~
fs/f2fs/debug.c:44:2: note: Loop condition is false. Execution continues on line 54
for (segno = 0; segno < MAIN_SEGS(sbi); segno += sbi->segs_per_sec) {
^
fs/f2fs/debug.c:56:6: note: Assuming field 'dirty_count' is not equal to 0
if (si->dirty_count)
^~~~~~~~~~~~~~~
fs/f2fs/debug.c:56:2: note: Taking true branch
if (si->dirty_count)
^
fs/f2fs/debug.c:57:44: note: Passing the value 0 via 2nd parameter 'divisor'
si->avg_vblocks = div_u64(total_vblocks, ndirty);
^~~~~~
fs/f2fs/debug.c:57:21: note: Calling 'div_u64'
si->avg_vblocks = div_u64(total_vblocks, ndirty);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/math64.h:128:31: note: Passing the value 0 via 2nd parameter
'divisor'
return div_u64_rem(dividend, divisor, &remainder);
^~~~~~~
include/linux/math64.h:128:9: note: Calling 'div_u64_rem'
return div_u64_rem(dividend, divisor, &remainder);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/math64.h:92:15: note: '__base' initialized to 0
*remainder = do_div(dividend, divisor);
^
include/asm-generic/div64.h:220:2: note: expanded from macro 'do_div'
uint32_t __base = (base); \
^~~~~~~~~~~~~~~
include/linux/math64.h:92:15: note: Left side of '&&' is false
*remainder = do_div(dividend, divisor);
^
include/asm-generic/div64.h:223:35: note: expanded from macro 'do_div'
if (__builtin_constant_p(__base) && \
^
include/linux/math64.h:92:15: note: Left side of '&&' is false
*remainder = do_div(dividend, divisor);
^
include/asm-generic/div64.h:227:42: note: expanded from macro 'do_div'
} else if (__builtin_constant_p(__base) && \
^
include/linux/math64.h:92:15: note: Taking true branch
*remainder = do_div(dividend, divisor);
^
include/asm-generic/div64.h:234:9: note: expanded from macro 'do_div'
} else if (likely(((n) >> 32) == 0)) { \
^
include/linux/math64.h:92:15: note: Division by zero
*remainder = do_div(dividend, divisor);
^
include/asm-generic/div64.h:235:25: note: expanded from macro 'do_div'
__rem = (uint32_t)(n) % __base; \
~~~~~~~~~~~~~~^~~~~~~~
Suppressed 62 warnings (62 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
50 warnings generated.
Suppressed 50 warnings (50 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
65 warnings generated.
> fs/orangefs/xattr.c:141:4: warning: Call to function
'memcpy' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buffer, cx->val, cx->length);
^~~~~~
fs/orangefs/xattr.c:141:4: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(buffer, cx->val, cx->length);
^~~~~~
> fs/orangefs/xattr.c:142:4: warning: Call to function
'memset' is insecure as it does not provide security checks introduced in the C11
standard. Replace with analogous functions that support length arguments or provides
boundary checks such as 'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buffer + cx->length, 0, size - cx->length);
^~~~~~
fs/orangefs/xattr.c:142:4: note: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(buffer + cx->length, 0, size - cx->length);
^~~~~~
fs/orangefs/xattr.c:153:2: warning: Call to function 'strcpy' is insecure as it
does not provide bounding of the memory buffer. Replace unbounded copy functions with
analogous functions that support length arguments such as 'strlcpy'. CWE-119
[clang-analyzer-security.insecureAPI.strcpy]
strcpy(new_op->upcall.req.getxattr.key, name);
^~~~~~
fs/orangefs/xattr.c:153:2: note: Call to function 'strcpy' is insecure as it
does not provide bounding of the memory buffer. Replace unbounded copy functions with
analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(new_op->upcall.req.getxattr.key, name);
^~~~~~
fs/orangefs/xattr.c:174:5: warning: Call to function 'strcpy' is insecure as it
does not provide bounding of the memory buffer. Replace unbounded copy functions with
analogous functions that support length arguments such as 'strlcpy'. CWE-119
[clang-analyzer-security.insecureAPI.strcpy]
strcpy(cx->key, name);
^~~~~~
fs/orangefs/xattr.c:174:5: note: Call to function 'strcpy' is insecure as it
does not provide bounding of the memory buffer. Replace unbounded copy functions with
analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(cx->key, name);
^~~~~~
fs/orangefs/xattr.c:206:2: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buffer, new_op->downcall.resp.getxattr.val, length);
^~~~~~
fs/orangefs/xattr.c:206:2: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(buffer, new_op->downcall.resp.getxattr.val, length);
^~~~~~
fs/orangefs/xattr.c:207:2: warning: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buffer + length, 0, size - length);
^~~~~~
fs/orangefs/xattr.c:207:2: note: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(buffer + length, 0, size - length);
^~~~~~
fs/orangefs/xattr.c:221:3: warning: Call to function 'strcpy' is insecure as it
does not provide bounding of the memory buffer. Replace unbounded copy functions with
analogous functions that support length arguments such as 'strlcpy'. CWE-119
[clang-analyzer-security.insecureAPI.strcpy]
strcpy(cx->key, name);
^~~~~~
fs/orangefs/xattr.c:221:3: note: Call to function 'strcpy' is insecure as it
does not provide bounding of the memory buffer. Replace unbounded copy functions with
analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(cx->key, name);
^~~~~~
fs/orangefs/xattr.c:222:3: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(cx->val, buffer, length);
^~~~~~
fs/orangefs/xattr.c:222:3: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(cx->val, buffer, length);
^~~~~~
fs/orangefs/xattr.c:228:4: warning: Call to function 'strcpy' is insecure as it
does not provide bounding of the memory buffer. Replace unbounded copy functions with
analogous functions that support length arguments such as 'strlcpy'. CWE-119
[clang-analyzer-security.insecureAPI.strcpy]
strcpy(cx->key, name);
^~~~~~
fs/orangefs/xattr.c:228:4: note: Call to function 'strcpy' is insecure as it
does not provide bounding of the memory buffer. Replace unbounded copy functions with
analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(cx->key, name);
^~~~~~
fs/orangefs/xattr.c:229:4: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(cx->val, buffer, length);
^~~~~~
fs/orangefs/xattr.c:229:4: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(cx->val, buffer, length);
^~~~~~
fs/orangefs/xattr.c:268:2: warning: Call to function 'strcpy' is insecure as it
does not provide bounding of the memory buffer. Replace unbounded copy functions with
analogous functions that support length arguments such as 'strlcpy'. CWE-119
[clang-analyzer-security.insecureAPI.strcpy]
strcpy(new_op->upcall.req.removexattr.key, name);
^~~~~~
fs/orangefs/xattr.c:268:2: note: Call to function 'strcpy' is insecure as it
does not provide bounding of the memory buffer. Replace unbounded copy functions with
analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(new_op->upcall.req.removexattr.key, name);
^~~~~~
fs/orangefs/xattr.c:362:2: warning: Call to function 'strcpy' is insecure as it
does not provide bounding of the memory buffer. Replace unbounded copy functions with
analogous functions that support length arguments such as 'strlcpy'. CWE-119
[clang-analyzer-security.insecureAPI.strcpy]
strcpy(new_op->upcall.req.setxattr.keyval.key, name);
^~~~~~
fs/orangefs/xattr.c:362:2: note: Call to function 'strcpy' is insecure as it
does not provide bounding of the memory buffer. Replace unbounded copy functions with
analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(new_op->upcall.req.setxattr.keyval.key, name);
^~~~~~
fs/orangefs/xattr.c:364:2: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(new_op->upcall.req.setxattr.keyval.val, value, size);
^~~~~~
fs/orangefs/xattr.c:364:2: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(new_op->upcall.req.setxattr.keyval.val, value, size);
^~~~~~
fs/orangefs/xattr.c:430:3: warning: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buffer, 0, size);
^~~~~~
fs/orangefs/xattr.c:430:3: note: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memset_s' in case of C11
memset(buffer, 0, size);
^~~~~~
fs/orangefs/xattr.c:492:4: warning: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buffer + total,
^~~~~~
fs/orangefs/xattr.c:492:4: note: Call to function 'memcpy' is insecure as it
does not provide security checks introduced in the C11 standard. Replace with analogous
functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(buffer + total,
^~~~~~
Suppressed 50 warnings (50 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
50 warnings generated.
> drivers/crypto/ccree/cc_buffer_mgr.c:1174:4: warning: Call to
function 'memcpy' is insecure as it does not provide security checks introduced in
the C11 standard. Replace with analogous functions that support length arguments or
provides boundary checks such as 'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(areq_ctx->buff_sg, src,
^~~~~~
drivers/crypto/ccree/cc_buffer_mgr.c:1174:4: note: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(areq_ctx->buff_sg, src,
^~~~~~
drivers/crypto/ccree/cc_buffer_mgr.c:1287:4: warning: Call to function 'memcpy'
is insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(areq_ctx->buff_sg, src,
^~~~~~
drivers/crypto/ccree/cc_buffer_mgr.c:1287:4: note: Call to function 'memcpy' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'memcpy_s' in case of C11
memcpy(areq_ctx->buff_sg, src,
^~~~~~
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
19 warnings generated.
drivers/input/gameport/gameport.c:462:9: warning: Call to function 'sprintf' is
insecure as it does not provide bounding of the memory buffer or security checks
introduced in the C11 standard. Replace with analogous functions that support length
arguments or provides boundary checks such as 'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", gameport->name);
^~~~~~~
drivers/input/gameport/gameport.c:462:9: note: Call to function 'sprintf' is
insecure as it does not provide bounding of the memory buffer or security checks
introduced in the C11 standard. Replace with analogous functions that support length
arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", gameport->name);
^~~~~~~
drivers/input/gameport/gameport.c:516:2: warning: Call to function 'vsnprintf'
is insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'vsnprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
vsnprintf(gameport->phys, sizeof(gameport->phys), fmt, args);
^~~~~~~~~
drivers/input/gameport/gameport.c:516:2: note: Call to function 'vsnprintf' is
insecure as it does not provide security checks introduced in the C11 standard. Replace
with analogous functions that support length arguments or provides boundary checks such as
'vsnprintf_s' in case of C11
vsnprintf(gameport->phys, sizeof(gameport->phys), fmt, args);
^~~~~~~~~
drivers/input/gameport/gameport.c:681:9: warning: Call to function 'sprintf' is
insecure as it does not provide bounding of the memory buffer or security checks
introduced in the C11 standard. Replace with analogous functions that support length
arguments or provides boundary checks such as 'sprintf_s' in case of C11
[clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", driver->description ?
driver->description : "(none)");
^~~~~~~
drivers/input/gameport/gameport.c:681:9: note: Call to function 'sprintf' is
insecure as it does not provide bounding of the memory buffer or security checks
introduced in the C11 standard. Replace with analogous functions that support length
arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", driver->description ?
driver->description : "(none)");
^~~~~~~
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
48 warnings generated.
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use
-system-headers to display errors from system headers as well.
49 warnings generated.
fs/direct-io.c:1160:2: warning: Call to function 'memset' is insecure as it
does not provide security checks introduced in the C11 standard. R