* arch/mips/kernel/proc.c:61:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provide...
@ 2022-05-08 15:55 kernel test robot
0 siblings, 0 replies; 6+ messages in thread
From: kernel test robot @ 2022-05-08 15:55 UTC (permalink / raw)
To: kbuild
[-- Attachment #1: Type: text/plain, Size: 51701 bytes --]
CC: llvm(a)lists.linux.dev
CC: kbuild-all(a)lists.01.org
BCC: lkp(a)intel.com
CC: linux-kernel(a)vger.kernel.org
TO: Arnd Bergmann <arnd@arndb.de>
CC: Masahiro Yamada <masahiroy@kernel.org>
CC: Alex Shi <alexs@kernel.org>
CC: Nick Desaulniers <ndesaulniers@google.com>
CC: Miguel Ojeda <ojeda@kernel.org>
CC: Nathan Chancellor <nathan@kernel.org>
tree: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git master
head: 30c8e80f79329617012f07b09b70114592092ea4
commit: e8c07082a810fbb9db303a2b66b66b8d7e588b53 Kbuild: move to -std=gnu11
date: 8 weeks ago
:::::: branch date: 22 hours ago
:::::: commit date: 8 weeks ago
config: mips-randconfig-c004-20220508 (https://download.01.org/0day-ci/archive/20220508/202205082307.527CgV1v-lkp(a)intel.com/config)
compiler: clang version 15.0.0 (https://github.com/llvm/llvm-project af4cf1c6b8ed0d8102fc5e69acdc2fcbbcdaa9a7)
reproduce (this is a W=1 build):
wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross
chmod +x ~/bin/make.cross
# install mips cross compiling tool for clang build
# apt-get install binutils-mips-linux-gnu
# https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e8c07082a810fbb9db303a2b66b66b8d7e588b53
git remote add linus https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
git fetch --no-tags linus master
git checkout e8c07082a810fbb9db303a2b66b66b8d7e588b53
# save the config file
COMPILER_INSTALL_PATH=$HOME/0day COMPILER=clang make.cross ARCH=mips clang-analyzer
If you fix the issue, kindly add following tag as appropriate
Reported-by: kernel test robot <lkp@intel.com>
clang-analyzer warnings: (new ones prefixed by >>)
#define SYSCALL_DEFINE3(name, ...) SYSCALL_DEFINEx(3, _##name, __VA_ARGS__)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/syscalls.h:228:2: note: expanded from macro 'SYSCALL_DEFINEx'
__SYSCALL_DEFINEx(x, sname, __VA_ARGS__)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/syscalls.h:249:14: note: expanded from macro '__SYSCALL_DEFINEx'
long ret = __do_sys##name(__MAP(x,__SC_CAST,__VA_ARGS__));\
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
note: expanded from here
ipc/msg.c:649:9: note: Calling 'ksys_old_msgctl'
return ksys_old_msgctl(msqid, cmd, buf);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
ipc/msg.c:644:9: note: Calling 'ksys_msgctl'
return ksys_msgctl(msqid, cmd, buf, version);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
ipc/msg.c:597:6: note: Assuming 'msqid' is >= 0
if (msqid < 0 || cmd < 0)
^~~~~~~~~
ipc/msg.c:597:6: note: Left side of '||' is false
ipc/msg.c:597:19: note: Assuming 'cmd' is >= 0
if (msqid < 0 || cmd < 0)
^~~~~~~
ipc/msg.c:597:2: note: Taking false branch
if (msqid < 0 || cmd < 0)
^
ipc/msg.c:602:2: note: Control jumps to 'case 1:' at line 622
switch (cmd) {
^
ipc/msg.c:623:7: note: Calling 'copy_msqid_from_user'
if (copy_msqid_from_user(&msqid64, buf, version))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
ipc/msg.c:367:2: note: Control jumps to 'case 256:' @line 368
switch (version) {
^
ipc/msg.c:369:7: note: Calling 'copy_from_user'
if (copy_from_user(out, buf, sizeof(*out)))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/uaccess.h:191:2: note: Taking true branch
if (likely(check_copy_size(to, n, false)))
^
include/linux/uaccess.h:192:7: note: Calling '_copy_from_user'
n = _copy_from_user(to, from, n);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/uaccess.h:157:6: note: Left side of '&&' is true
if (!should_fail_usercopy() && likely(access_ok(from, n))) {
^
include/linux/uaccess.h:157:2: note: Taking true branch
if (!should_fail_usercopy() && likely(access_ok(from, n))) {
^
include/linux/uaccess.h:159:9: note: Calling 'raw_copy_from_user'
res = raw_copy_from_user(to, from, n);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
arch/mips/include/asm/uaccess.h:455:2: note: Returning without writing to 'to->msg_qbytes'
return __cu_len_r;
^
include/linux/uaccess.h:159:9: note: Returning from 'raw_copy_from_user'
res = raw_copy_from_user(to, from, n);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/uaccess.h:161:6: note: Assuming 'res' is 0
if (unlikely(res))
^
include/linux/compiler.h:48:24: note: expanded from macro 'unlikely'
# define unlikely(x) (__branch_check__(x, 0, __builtin_constant_p(x)))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/compiler.h:33:32: note: expanded from macro '__branch_check__'
______r = __builtin_expect(!!(x), expect); \
^~~~
include/linux/uaccess.h:161:2: note: Taking false branch
if (unlikely(res))
^
include/linux/uaccess.h:163:2: note: Returning without writing to 'to->msg_qbytes'
return res;
^
include/linux/uaccess.h:192:7: note: Returning from '_copy_from_user'
n = _copy_from_user(to, from, n);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/uaccess.h:193:2: note: Returning without writing to 'to->msg_qbytes'
return n;
^
ipc/msg.c:369:7: note: Returning from 'copy_from_user'
if (copy_from_user(out, buf, sizeof(*out)))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
ipc/msg.c:369:3: note: Taking false branch
if (copy_from_user(out, buf, sizeof(*out)))
^
ipc/msg.c:371:3: note: Returning without writing to 'out->msg_qbytes'
return 0;
^
ipc/msg.c:623:7: note: Returning from 'copy_msqid_from_user'
if (copy_msqid_from_user(&msqid64, buf, version))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
ipc/msg.c:623:3: note: Taking false branch
if (copy_msqid_from_user(&msqid64, buf, version))
^
ipc/msg.c:625:10: note: 5th function call argument is an uninitialized value
return msgctl_down(ns, msqid, cmd, &msqid64.msg_perm,
^
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
>> arch/mips/kernel/proc.c:61:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(fmt, "cpu model\t\t: %%s V%%d.%%d%s\n",
^~~~~~~
arch/mips/kernel/proc.c:61:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(fmt, "cpu model\t\t: %%s V%%d.%%d%s\n",
^~~~~~~
arch/mips/kernel/proc.c:296:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(fmt, "VCE%%c exceptions\t\t: %s\n",
^~~~~~~
arch/mips/kernel/proc.c:296:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(fmt, "VCE%%c exceptions\t\t: %s\n",
^~~~~~~
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
11 warnings generated.
Suppressed 11 warnings (11 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
40 warnings generated.
arch/mips/kernel/crash_dump.c:29:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, vaddr + offset, csize);
^~~~~~
arch/mips/kernel/crash_dump.c:29:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, vaddr + offset, csize);
^~~~~~
Suppressed 39 warnings (39 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
33 warnings generated.
fs/autofs/expire.c:546:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&pkt, 0, sizeof(pkt));
^~~~~~
fs/autofs/expire.c:546:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&pkt, 0, sizeof(pkt));
^~~~~~
fs/autofs/expire.c:556:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(pkt.name, dentry->d_name.name, pkt.len);
^~~~~~
fs/autofs/expire.c:556:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(pkt.name, dentry->d_name.name, pkt.len);
^~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
33 warnings generated.
fs/autofs/dev-ioctl.c:89:15: warning: The left operand of '<' is a garbage value [clang-analyzer-core.UndefinedBinaryOperatorResult]
if (tmp.size < AUTOFS_DEV_IOCTL_SIZE)
^
fs/autofs/dev-ioctl.c:693:8: note: Calling '_autofs_dev_ioctl'
err = _autofs_dev_ioctl(command, (struct autofs_dev_ioctl __user *) u);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/autofs/dev-ioctl.c:603:22: note: Left side of '&&' is true
cmd_first = _IOC_NR(AUTOFS_DEV_IOCTL_IOC_FIRST);
^
fs/autofs/autofs_i.h:33:37: note: expanded from macro 'AUTOFS_DEV_IOCTL_IOC_FIRST'
#define AUTOFS_DEV_IOCTL_IOC_FIRST (AUTOFS_DEV_IOCTL_VERSION)
^
include/uapi/linux/auto_dev-ioctl.h:161:2: note: expanded from macro 'AUTOFS_DEV_IOCTL_VERSION'
_IOWR(AUTOFS_IOCTL, \
^
include/uapi/asm-generic/ioctl.h:88:68: note: expanded from macro '_IOWR'
#define _IOWR(type,nr,size) _IOC(_IOC_READ|_IOC_WRITE,(type),(nr),(_IOC_TYPECHECK(size)))
^
include/asm-generic/ioctl.h:13:4: note: expanded from macro '_IOC_TYPECHECK'
((sizeof(t) == sizeof(t[1]) && \
^
fs/autofs/dev-ioctl.c:603:22: note: '?' condition is true
cmd_first = _IOC_NR(AUTOFS_DEV_IOCTL_IOC_FIRST);
^
fs/autofs/autofs_i.h:33:37: note: expanded from macro 'AUTOFS_DEV_IOCTL_IOC_FIRST'
#define AUTOFS_DEV_IOCTL_IOC_FIRST (AUTOFS_DEV_IOCTL_VERSION)
^
include/uapi/linux/auto_dev-ioctl.h:161:2: note: expanded from macro 'AUTOFS_DEV_IOCTL_VERSION'
_IOWR(AUTOFS_IOCTL, \
^
include/uapi/asm-generic/ioctl.h:88:68: note: expanded from macro '_IOWR'
#define _IOWR(type,nr,size) _IOC(_IOC_READ|_IOC_WRITE,(type),(nr),(_IOC_TYPECHECK(size)))
^
include/asm-generic/ioctl.h:13:3: note: expanded from macro '_IOC_TYPECHECK'
((sizeof(t) == sizeof(t[1]) && \
^
fs/autofs/dev-ioctl.c:606:38: note: Left side of '&&' is true
if (_IOC_TYPE(command) != _IOC_TYPE(AUTOFS_DEV_IOCTL_IOC_FIRST) ||
^
fs/autofs/autofs_i.h:33:37: note: expanded from macro 'AUTOFS_DEV_IOCTL_IOC_FIRST'
#define AUTOFS_DEV_IOCTL_IOC_FIRST (AUTOFS_DEV_IOCTL_VERSION)
^
include/uapi/linux/auto_dev-ioctl.h:161:2: note: expanded from macro 'AUTOFS_DEV_IOCTL_VERSION'
_IOWR(AUTOFS_IOCTL, \
^
include/uapi/asm-generic/ioctl.h:88:68: note: expanded from macro '_IOWR'
#define _IOWR(type,nr,size) _IOC(_IOC_READ|_IOC_WRITE,(type),(nr),(_IOC_TYPECHECK(size)))
--
^
include/linux/cred.h:321:2: note: expanded from macro '__task_cred'
rcu_dereference((task)->real_cred)
^
include/linux/rcupdate.h:603:28: note: expanded from macro 'rcu_dereference'
#define rcu_dereference(p) rcu_dereference_check(p, 0)
^
include/linux/rcupdate.h:532:5: note: expanded from macro 'rcu_dereference_check'
(c) || rcu_read_lock_held(), __rcu)
^
kernel/cred.c:361:22: note: Assuming the condition is false
inc_rlimit_ucounts(task_ucounts(p), UCOUNT_RLIMIT_NPROC, 1);
^
include/linux/cred.h:374:29: note: expanded from macro 'task_ucounts'
#define task_ucounts(task) (task_cred_xxx((task), ucounts))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/cred.h:367:11: note: expanded from macro 'task_cred_xxx'
___val = __task_cred((task))->xxx; \
^~~~~~~~~~~~~~~~~~~
include/linux/cred.h:321:2: note: expanded from macro '__task_cred'
rcu_dereference((task)->real_cred)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
note: (skipping 1 expansions in backtrace; use -fmacro-backtrace-limit=0 to see all)
include/linux/rcupdate.h:531:2: note: expanded from macro 'rcu_dereference_check'
__rcu_dereference_check((p), __UNIQUE_ID(rcu), \
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/rcupdate.h:392:19: note: expanded from macro '__rcu_dereference_check'
RCU_LOCKDEP_WARN(!(c), "suspicious rcu_dereference_check() usage"); \
~~~~~~~~~~~~~~~~~^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/rcupdate.h:319:8: note: expanded from macro 'RCU_LOCKDEP_WARN'
if ((c) && debug_lockdep_rcu_enabled() && !__warned) { \
^
kernel/cred.c:361:22: note: Left side of '&&' is false
inc_rlimit_ucounts(task_ucounts(p), UCOUNT_RLIMIT_NPROC, 1);
^
include/linux/cred.h:374:29: note: expanded from macro 'task_ucounts'
#define task_ucounts(task) (task_cred_xxx((task), ucounts))
^
include/linux/cred.h:367:11: note: expanded from macro 'task_cred_xxx'
___val = __task_cred((task))->xxx; \
^
include/linux/cred.h:321:2: note: expanded from macro '__task_cred'
rcu_dereference((task)->real_cred)
^
note: (skipping 1 expansions in backtrace; use -fmacro-backtrace-limit=0 to see all)
include/linux/rcupdate.h:531:2: note: expanded from macro 'rcu_dereference_check'
__rcu_dereference_check((p), __UNIQUE_ID(rcu), \
^
include/linux/rcupdate.h:392:2: note: expanded from macro '__rcu_dereference_check'
RCU_LOCKDEP_WARN(!(c), "suspicious rcu_dereference_check() usage"); \
^
include/linux/rcupdate.h:319:11: note: expanded from macro 'RCU_LOCKDEP_WARN'
if ((c) && debug_lockdep_rcu_enabled() && !__warned) { \
^
kernel/cred.c:361:22: note: Loop condition is false. Exiting loop
inc_rlimit_ucounts(task_ucounts(p), UCOUNT_RLIMIT_NPROC, 1);
^
include/linux/cred.h:374:29: note: expanded from macro 'task_ucounts'
#define task_ucounts(task) (task_cred_xxx((task), ucounts))
^
include/linux/cred.h:367:11: note: expanded from macro 'task_cred_xxx'
___val = __task_cred((task))->xxx; \
^
include/linux/cred.h:321:2: note: expanded from macro '__task_cred'
rcu_dereference((task)->real_cred)
^
note: (skipping 1 expansions in backtrace; use -fmacro-backtrace-limit=0 to see all)
include/linux/rcupdate.h:531:2: note: expanded from macro 'rcu_dereference_check'
__rcu_dereference_check((p), __UNIQUE_ID(rcu), \
^
include/linux/rcupdate.h:392:2: note: expanded from macro '__rcu_dereference_check'
RCU_LOCKDEP_WARN(!(c), "suspicious rcu_dereference_check() usage"); \
^
include/linux/rcupdate.h:317:2: note: expanded from macro 'RCU_LOCKDEP_WARN'
do { \
^
kernel/cred.c:361:22: note: Access to field 'ucounts' results in a dereference of a null pointer
inc_rlimit_ucounts(task_ucounts(p), UCOUNT_RLIMIT_NPROC, 1);
^
include/linux/cred.h:374:29: note: expanded from macro 'task_ucounts'
#define task_ucounts(task) (task_cred_xxx((task), ucounts))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/cred.h:367:11: note: expanded from macro 'task_cred_xxx'
___val = __task_cred((task))->xxx; \
^~~~~~~~~~~~~~~~~~~~~~~~
include/linux/cred.h:321:2: note: expanded from macro '__task_cred'
rcu_dereference((task)->real_cred)
^
include/linux/rcupdate.h:603:28: note: expanded from macro 'rcu_dereference'
#define rcu_dereference(p) rcu_dereference_check(p, 0)
^
include/linux/rcupdate.h:531:2: note: expanded from macro 'rcu_dereference_check'
__rcu_dereference_check((p), __UNIQUE_ID(rcu), \
^
include/linux/rcupdate.h:388:53: note: expanded from macro '__rcu_dereference_check'
#define __rcu_dereference_check(p, local, c, space) \
^
Suppressed 55 warnings (55 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
>> arch/mips/kernel/proc.c:61:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(fmt, "cpu model\t\t: %%s V%%d.%%d%s\n",
^~~~~~~
arch/mips/kernel/proc.c:61:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(fmt, "cpu model\t\t: %%s V%%d.%%d%s\n",
^~~~~~~
arch/mips/kernel/proc.c:296:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(fmt, "VCE%%c exceptions\t\t: %s\n",
^~~~~~~
arch/mips/kernel/proc.c:296:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(fmt, "VCE%%c exceptions\t\t: %s\n",
^~~~~~~
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
11 warnings generated.
Suppressed 11 warnings (11 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
40 warnings generated.
arch/mips/kernel/crash_dump.c:29:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, vaddr + offset, csize);
^~~~~~
arch/mips/kernel/crash_dump.c:29:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, vaddr + offset, csize);
^~~~~~
Suppressed 39 warnings (39 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
11 warnings generated.
Suppressed 11 warnings (11 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
lib/lz4/lz4_compress.c:449:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
LZ4_memcpy(op, anchor, lastRun);
^
lib/lz4/lz4defs.h:150:36: note: expanded from macro 'LZ4_memcpy'
#define LZ4_memcpy(dst, src, size) __builtin_memcpy(dst, src, size)
^~~~~~~~~~~~~~~~
lib/lz4/lz4_compress.c:449:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
LZ4_memcpy(op, anchor, lastRun);
^
lib/lz4/lz4defs.h:150:36: note: expanded from macro 'LZ4_memcpy'
#define LZ4_memcpy(dst, src, size) __builtin_memcpy(dst, src, size)
^~~~~~~~~~~~~~~~
lib/lz4/lz4_compress.c:711:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
LZ4_memcpy(op, anchor, lastRunSize);
^
lib/lz4/lz4defs.h:150:36: note: expanded from macro 'LZ4_memcpy'
#define LZ4_memcpy(dst, src, size) __builtin_memcpy(dst, src, size)
^~~~~~~~~~~~~~~~
lib/lz4/lz4_compress.c:711:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
LZ4_memcpy(op, anchor, lastRunSize);
^
lib/lz4/lz4defs.h:150:36: note: expanded from macro 'LZ4_memcpy'
#define LZ4_memcpy(dst, src, size) __builtin_memcpy(dst, src, size)
^~~~~~~~~~~~~~~~
lib/lz4/lz4_compress.c:772:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(LZ4_stream, 0, sizeof(LZ4_stream_t));
^~~~~~
lib/lz4/lz4_compress.c:772:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(LZ4_stream, 0, sizeof(LZ4_stream_t));
^~~~~~
lib/lz4/lz4_compress.c:848:2: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(safeBuffer, previousDictEnd - dictSize, dictSize);
^~~~~~~
lib/lz4/lz4_compress.c:848:2: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(safeBuffer, previousDictEnd - dictSize, dictSize);
^~~~~~~
Suppressed 31 warnings (30 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
arch/mips/kernel/process.c:126:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(childregs, 0, sizeof(struct pt_regs));
^~~~~~
arch/mips/kernel/process.c:126:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(childregs, 0, sizeof(struct pt_regs));
^~~~~~
arch/mips/kernel/process.c:574:27: warning: Dereference of null pointer [clang-analyzer-core.NullDereference]
unsigned long task_sp = *(unsigned long *)*sp;
^
arch/mips/kernel/process.c:665:6: note: Assuming field 'stack' is non-null
if (!task_stack_page(task))
vim +61 arch/mips/kernel/proc.c
^1da177e4c3f41 Linus Torvalds 2005-04-16 49
^1da177e4c3f41 Linus Torvalds 2005-04-16 50 /*
^1da177e4c3f41 Linus Torvalds 2005-04-16 51 * For the first processor also print the system type
^1da177e4c3f41 Linus Torvalds 2005-04-16 52 */
487d70d0b8bd1c Gabor Juhos 2010-11-23 53 if (n == 0) {
^1da177e4c3f41 Linus Torvalds 2005-04-16 54 seq_printf(m, "system type\t\t: %s\n", get_system_type());
487d70d0b8bd1c Gabor Juhos 2010-11-23 55 if (mips_get_machine_name())
487d70d0b8bd1c Gabor Juhos 2010-11-23 56 seq_printf(m, "machine\t\t\t: %s\n",
487d70d0b8bd1c Gabor Juhos 2010-11-23 57 mips_get_machine_name());
487d70d0b8bd1c Gabor Juhos 2010-11-23 58 }
^1da177e4c3f41 Linus Torvalds 2005-04-16 59
^1da177e4c3f41 Linus Torvalds 2005-04-16 60 seq_printf(m, "processor\t\t: %ld\n", n);
^1da177e4c3f41 Linus Torvalds 2005-04-16 @61 sprintf(fmt, "cpu model\t\t: %%s V%%d.%%d%s\n",
e04582b7bc70b4 Atsushi Nemoto 2006-10-09 62 cpu_data[n].options & MIPS_CPU_FPU ? " FPU V%d.%d" : "");
e47c659b55aff7 Johannes Dickgreber 2008-10-13 63 seq_printf(m, fmt, __cpu_name[n],
^1da177e4c3f41 Linus Torvalds 2005-04-16 64 (version >> 4) & 0x0f, version & 0x0f,
^1da177e4c3f41 Linus Torvalds 2005-04-16 65 (fp_vers >> 4) & 0x0f, fp_vers & 0x0f);
5636919b5c909f Ralf Baechle 2009-02-28 66 seq_printf(m, "BogoMIPS\t\t: %u.%02u\n",
0ac354801a8791 Ralf Baechle 2005-02-21 67 cpu_data[n].udelay_val / (500000/HZ),
0ac354801a8791 Ralf Baechle 2005-02-21 68 (cpu_data[n].udelay_val / (5000/HZ)) % 100);
^1da177e4c3f41 Linus Torvalds 2005-04-16 69 seq_printf(m, "wait instruction\t: %s\n", cpu_wait ? "yes" : "no");
^1da177e4c3f41 Linus Torvalds 2005-04-16 70 seq_printf(m, "microsecond timers\t: %s\n",
^1da177e4c3f41 Linus Torvalds 2005-04-16 71 cpu_has_counter ? "yes" : "no");
31aa36658a1232 Karl-Johan Karlsson 2006-10-08 72 seq_printf(m, "tlb_entries\t\t: %d\n", cpu_data[n].tlbsize);
^1da177e4c3f41 Linus Torvalds 2005-04-16 73 seq_printf(m, "extra interrupt vector\t: %s\n",
^1da177e4c3f41 Linus Torvalds 2005-04-16 74 cpu_has_divec ? "yes" : "no");
654f57bfb46799 David Daney 2008-09-23 75 seq_printf(m, "hardware watchpoint\t: %s",
654f57bfb46799 David Daney 2008-09-23 76 cpu_has_watch ? "yes, " : "no\n");
654f57bfb46799 David Daney 2008-09-23 77 if (cpu_has_watch) {
654f57bfb46799 David Daney 2008-09-23 78 seq_printf(m, "count: %d, address/irw mask: [",
654f57bfb46799 David Daney 2008-09-23 79 cpu_data[n].watch_reg_count);
654f57bfb46799 David Daney 2008-09-23 80 for (i = 0; i < cpu_data[n].watch_reg_count; i++)
654f57bfb46799 David Daney 2008-09-23 81 seq_printf(m, "%s0x%04x", i ? ", " : "",
654f57bfb46799 David Daney 2008-09-23 82 cpu_data[n].watch_reg_masks[i]);
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 83 seq_puts(m, "]\n");
654f57bfb46799 David Daney 2008-09-23 84 }
41315b6ec108e9 Aaro Koskinen 2013-12-31 85
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 86 seq_puts(m, "isa\t\t\t:");
e5f5a5b06e51a3 Maciej W. Rozycki 2017-07-08 87 if (cpu_has_mips_1)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 88 seq_puts(m, " mips1");
a96102be700f87 Steven J. Hill 2012-12-07 89 if (cpu_has_mips_2)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 90 seq_puts(m, " mips2");
a96102be700f87 Steven J. Hill 2012-12-07 91 if (cpu_has_mips_3)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 92 seq_puts(m, " mips3");
a96102be700f87 Steven J. Hill 2012-12-07 93 if (cpu_has_mips_4)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 94 seq_puts(m, " mips4");
a96102be700f87 Steven J. Hill 2012-12-07 95 if (cpu_has_mips_5)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 96 seq_puts(m, " mips5");
a96102be700f87 Steven J. Hill 2012-12-07 97 if (cpu_has_mips32r1)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 98 seq_puts(m, " mips32r1");
a96102be700f87 Steven J. Hill 2012-12-07 99 if (cpu_has_mips32r2)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 100 seq_puts(m, " mips32r2");
ab7c01fdc3cfe0 Serge Semin 2020-05-21 101 if (cpu_has_mips32r5)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 102 seq_puts(m, " mips32r5");
515a6393dbac4f Markos Chandras 2014-11-14 103 if (cpu_has_mips32r6)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 104 seq_puts(m, " mips32r6");
a96102be700f87 Steven J. Hill 2012-12-07 105 if (cpu_has_mips64r1)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 106 seq_puts(m, " mips64r1");
a96102be700f87 Steven J. Hill 2012-12-07 107 if (cpu_has_mips64r2)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 108 seq_puts(m, " mips64r2");
ab7c01fdc3cfe0 Serge Semin 2020-05-21 109 if (cpu_has_mips64r5)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 110 seq_puts(m, " mips64r5");
515a6393dbac4f Markos Chandras 2014-11-14 111 if (cpu_has_mips64r6)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 112 seq_puts(m, " mips64r6");
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 113 seq_puts(m, "\n");
981ef0de49869c Ralf Baechle 2012-08-20 114
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 115 seq_puts(m, "ASEs implemented\t:");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 116 if (cpu_has_mips16)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 117 seq_puts(m, " mips16");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 118 if (cpu_has_mips16e2)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 119 seq_puts(m, " mips16e2");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 120 if (cpu_has_mdmx)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 121 seq_puts(m, " mdmx");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 122 if (cpu_has_mips3d)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 123 seq_puts(m, " mips3d");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 124 if (cpu_has_smartmips)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 125 seq_puts(m, " smartmips");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 126 if (cpu_has_dsp)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 127 seq_puts(m, " dsp");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 128 if (cpu_has_dsp2)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 129 seq_puts(m, " dsp2");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 130 if (cpu_has_dsp3)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 131 seq_puts(m, " dsp3");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 132 if (cpu_has_mipsmt)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 133 seq_puts(m, " mt");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 134 if (cpu_has_mmips)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 135 seq_puts(m, " micromips");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 136 if (cpu_has_vz)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 137 seq_puts(m, " vz");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 138 if (cpu_has_msa)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 139 seq_puts(m, " msa");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 140 if (cpu_has_eva)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 141 seq_puts(m, " eva");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 142 if (cpu_has_htw)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 143 seq_puts(m, " htw");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 144 if (cpu_has_xpa)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 145 seq_puts(m, " xpa");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 146 if (cpu_has_loongson_mmi)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 147 seq_puts(m, " loongson-mmi");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 148 if (cpu_has_loongson_cam)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 149 seq_puts(m, " loongson-cam");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 150 if (cpu_has_loongson_ext)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 151 seq_puts(m, " loongson-ext");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 152 if (cpu_has_loongson_ext2)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 153 seq_puts(m, " loongson-ext2");
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 154 seq_puts(m, "\n");
981ef0de49869c Ralf Baechle 2012-08-20 155
bce860833ab1e4 Steven J. Hill 2013-03-25 156 if (cpu_has_mmips) {
bce860833ab1e4 Steven J. Hill 2013-03-25 157 seq_printf(m, "micromips kernel\t: %s\n",
bce860833ab1e4 Steven J. Hill 2013-03-25 158 (read_c0_config3() & MIPS_CONF3_ISA_OE) ? "yes" : "no");
bce860833ab1e4 Steven J. Hill 2013-03-25 159 }
626bfa03729959 Hauke Mehrtens 2021-10-13 160
626bfa03729959 Hauke Mehrtens 2021-10-13 161 seq_puts(m, "Options implemented\t:");
626bfa03729959 Hauke Mehrtens 2021-10-13 162 if (cpu_has_tlb)
626bfa03729959 Hauke Mehrtens 2021-10-13 163 seq_puts(m, " tlb");
626bfa03729959 Hauke Mehrtens 2021-10-13 164 if (cpu_has_ftlb)
626bfa03729959 Hauke Mehrtens 2021-10-13 165 seq_puts(m, " ftlb");
626bfa03729959 Hauke Mehrtens 2021-10-13 166 if (cpu_has_tlbinv)
626bfa03729959 Hauke Mehrtens 2021-10-13 167 seq_puts(m, " tlbinv");
626bfa03729959 Hauke Mehrtens 2021-10-13 168 if (cpu_has_segments)
626bfa03729959 Hauke Mehrtens 2021-10-13 169 seq_puts(m, " segments");
626bfa03729959 Hauke Mehrtens 2021-10-13 170 if (cpu_has_rixiex)
626bfa03729959 Hauke Mehrtens 2021-10-13 171 seq_puts(m, " rixiex");
626bfa03729959 Hauke Mehrtens 2021-10-13 172 if (cpu_has_ldpte)
626bfa03729959 Hauke Mehrtens 2021-10-13 173 seq_puts(m, " ldpte");
626bfa03729959 Hauke Mehrtens 2021-10-13 174 if (cpu_has_maar)
626bfa03729959 Hauke Mehrtens 2021-10-13 175 seq_puts(m, " maar");
626bfa03729959 Hauke Mehrtens 2021-10-13 176 if (cpu_has_rw_llb)
626bfa03729959 Hauke Mehrtens 2021-10-13 177 seq_puts(m, " rw_llb");
626bfa03729959 Hauke Mehrtens 2021-10-13 178 if (cpu_has_4kex)
626bfa03729959 Hauke Mehrtens 2021-10-13 179 seq_puts(m, " 4kex");
626bfa03729959 Hauke Mehrtens 2021-10-13 180 if (cpu_has_3k_cache)
626bfa03729959 Hauke Mehrtens 2021-10-13 181 seq_puts(m, " 3k_cache");
626bfa03729959 Hauke Mehrtens 2021-10-13 182 if (cpu_has_4k_cache)
626bfa03729959 Hauke Mehrtens 2021-10-13 183 seq_puts(m, " 4k_cache");
626bfa03729959 Hauke Mehrtens 2021-10-13 184 if (cpu_has_tx39_cache)
626bfa03729959 Hauke Mehrtens 2021-10-13 185 seq_puts(m, " tx39_cache");
626bfa03729959 Hauke Mehrtens 2021-10-13 186 if (cpu_has_octeon_cache)
626bfa03729959 Hauke Mehrtens 2021-10-13 187 seq_puts(m, " octeon_cache");
1cab5bd69eb1f9 Tiezhu Yang 2021-11-25 188 if (raw_cpu_has_fpu)
626bfa03729959 Hauke Mehrtens 2021-10-13 189 seq_puts(m, " fpu");
626bfa03729959 Hauke Mehrtens 2021-10-13 190 if (cpu_has_32fpr)
626bfa03729959 Hauke Mehrtens 2021-10-13 191 seq_puts(m, " 32fpr");
626bfa03729959 Hauke Mehrtens 2021-10-13 192 if (cpu_has_cache_cdex_p)
626bfa03729959 Hauke Mehrtens 2021-10-13 193 seq_puts(m, " cache_cdex_p");
626bfa03729959 Hauke Mehrtens 2021-10-13 194 if (cpu_has_cache_cdex_s)
626bfa03729959 Hauke Mehrtens 2021-10-13 195 seq_puts(m, " cache_cdex_s");
626bfa03729959 Hauke Mehrtens 2021-10-13 196 if (cpu_has_prefetch)
626bfa03729959 Hauke Mehrtens 2021-10-13 197 seq_puts(m, " prefetch");
626bfa03729959 Hauke Mehrtens 2021-10-13 198 if (cpu_has_mcheck)
626bfa03729959 Hauke Mehrtens 2021-10-13 199 seq_puts(m, " mcheck");
626bfa03729959 Hauke Mehrtens 2021-10-13 200 if (cpu_has_ejtag)
626bfa03729959 Hauke Mehrtens 2021-10-13 201 seq_puts(m, " ejtag");
626bfa03729959 Hauke Mehrtens 2021-10-13 202 if (cpu_has_llsc)
626bfa03729959 Hauke Mehrtens 2021-10-13 203 seq_puts(m, " llsc");
626bfa03729959 Hauke Mehrtens 2021-10-13 204 if (cpu_has_guestctl0ext)
626bfa03729959 Hauke Mehrtens 2021-10-13 205 seq_puts(m, " guestctl0ext");
626bfa03729959 Hauke Mehrtens 2021-10-13 206 if (cpu_has_guestctl1)
626bfa03729959 Hauke Mehrtens 2021-10-13 207 seq_puts(m, " guestctl1");
626bfa03729959 Hauke Mehrtens 2021-10-13 208 if (cpu_has_guestctl2)
626bfa03729959 Hauke Mehrtens 2021-10-13 209 seq_puts(m, " guestctl2");
626bfa03729959 Hauke Mehrtens 2021-10-13 210 if (cpu_has_guestid)
626bfa03729959 Hauke Mehrtens 2021-10-13 211 seq_puts(m, " guestid");
626bfa03729959 Hauke Mehrtens 2021-10-13 212 if (cpu_has_drg)
626bfa03729959 Hauke Mehrtens 2021-10-13 213 seq_puts(m, " drg");
626bfa03729959 Hauke Mehrtens 2021-10-13 214 if (cpu_has_rixi)
626bfa03729959 Hauke Mehrtens 2021-10-13 215 seq_puts(m, " rixi");
626bfa03729959 Hauke Mehrtens 2021-10-13 216 if (cpu_has_lpa)
626bfa03729959 Hauke Mehrtens 2021-10-13 217 seq_puts(m, " lpa");
626bfa03729959 Hauke Mehrtens 2021-10-13 218 if (cpu_has_mvh)
626bfa03729959 Hauke Mehrtens 2021-10-13 219 seq_puts(m, " mvh");
626bfa03729959 Hauke Mehrtens 2021-10-13 220 if (cpu_has_vtag_icache)
626bfa03729959 Hauke Mehrtens 2021-10-13 221 seq_puts(m, " vtag_icache");
626bfa03729959 Hauke Mehrtens 2021-10-13 222 if (cpu_has_dc_aliases)
626bfa03729959 Hauke Mehrtens 2021-10-13 223 seq_puts(m, " dc_aliases");
626bfa03729959 Hauke Mehrtens 2021-10-13 224 if (cpu_has_ic_fills_f_dc)
626bfa03729959 Hauke Mehrtens 2021-10-13 225 seq_puts(m, " ic_fills_f_dc");
626bfa03729959 Hauke Mehrtens 2021-10-13 226 if (cpu_has_pindexed_dcache)
626bfa03729959 Hauke Mehrtens 2021-10-13 227 seq_puts(m, " pindexed_dcache");
626bfa03729959 Hauke Mehrtens 2021-10-13 228 if (cpu_has_userlocal)
626bfa03729959 Hauke Mehrtens 2021-10-13 229 seq_puts(m, " userlocal");
626bfa03729959 Hauke Mehrtens 2021-10-13 230 if (cpu_has_nofpuex)
626bfa03729959 Hauke Mehrtens 2021-10-13 231 seq_puts(m, " nofpuex");
626bfa03729959 Hauke Mehrtens 2021-10-13 232 if (cpu_has_vint)
626bfa03729959 Hauke Mehrtens 2021-10-13 233 seq_puts(m, " vint");
626bfa03729959 Hauke Mehrtens 2021-10-13 234 if (cpu_has_veic)
626bfa03729959 Hauke Mehrtens 2021-10-13 235 seq_puts(m, " veic");
626bfa03729959 Hauke Mehrtens 2021-10-13 236 if (cpu_has_inclusive_pcaches)
626bfa03729959 Hauke Mehrtens 2021-10-13 237 seq_puts(m, " inclusive_pcaches");
626bfa03729959 Hauke Mehrtens 2021-10-13 238 if (cpu_has_perf_cntr_intr_bit)
626bfa03729959 Hauke Mehrtens 2021-10-13 239 seq_puts(m, " perf_cntr_intr_bit");
626bfa03729959 Hauke Mehrtens 2021-10-13 240 if (cpu_has_ufr)
626bfa03729959 Hauke Mehrtens 2021-10-13 241 seq_puts(m, " ufr");
626bfa03729959 Hauke Mehrtens 2021-10-13 242 if (cpu_has_fre)
626bfa03729959 Hauke Mehrtens 2021-10-13 243 seq_puts(m, " fre");
626bfa03729959 Hauke Mehrtens 2021-10-13 244 if (cpu_has_cdmm)
626bfa03729959 Hauke Mehrtens 2021-10-13 245 seq_puts(m, " cdmm");
626bfa03729959 Hauke Mehrtens 2021-10-13 246 if (cpu_has_small_pages)
626bfa03729959 Hauke Mehrtens 2021-10-13 247 seq_puts(m, " small_pages");
626bfa03729959 Hauke Mehrtens 2021-10-13 248 if (cpu_has_nan_legacy)
626bfa03729959 Hauke Mehrtens 2021-10-13 249 seq_puts(m, " nan_legacy");
626bfa03729959 Hauke Mehrtens 2021-10-13 250 if (cpu_has_nan_2008)
626bfa03729959 Hauke Mehrtens 2021-10-13 251 seq_puts(m, " nan_2008");
626bfa03729959 Hauke Mehrtens 2021-10-13 252 if (cpu_has_ebase_wg)
626bfa03729959 Hauke Mehrtens 2021-10-13 253 seq_puts(m, " ebase_wg");
626bfa03729959 Hauke Mehrtens 2021-10-13 254 if (cpu_has_badinstr)
626bfa03729959 Hauke Mehrtens 2021-10-13 255 seq_puts(m, " badinstr");
626bfa03729959 Hauke Mehrtens 2021-10-13 256 if (cpu_has_badinstrp)
626bfa03729959 Hauke Mehrtens 2021-10-13 257 seq_puts(m, " badinstrp");
626bfa03729959 Hauke Mehrtens 2021-10-13 258 if (cpu_has_contextconfig)
626bfa03729959 Hauke Mehrtens 2021-10-13 259 seq_puts(m, " contextconfig");
626bfa03729959 Hauke Mehrtens 2021-10-13 260 if (cpu_has_perf)
626bfa03729959 Hauke Mehrtens 2021-10-13 261 seq_puts(m, " perf");
626bfa03729959 Hauke Mehrtens 2021-10-13 262 if (cpu_has_mac2008_only)
626bfa03729959 Hauke Mehrtens 2021-10-13 263 seq_puts(m, " mac2008_only");
626bfa03729959 Hauke Mehrtens 2021-10-13 264 if (cpu_has_ftlbparex)
626bfa03729959 Hauke Mehrtens 2021-10-13 265 seq_puts(m, " ftlbparex");
626bfa03729959 Hauke Mehrtens 2021-10-13 266 if (cpu_has_gsexcex)
626bfa03729959 Hauke Mehrtens 2021-10-13 267 seq_puts(m, " gsexcex");
626bfa03729959 Hauke Mehrtens 2021-10-13 268 if (cpu_has_shared_ftlb_ram)
626bfa03729959 Hauke Mehrtens 2021-10-13 269 seq_puts(m, " shared_ftlb_ram");
626bfa03729959 Hauke Mehrtens 2021-10-13 270 if (cpu_has_shared_ftlb_entries)
626bfa03729959 Hauke Mehrtens 2021-10-13 271 seq_puts(m, " shared_ftlb_entries");
626bfa03729959 Hauke Mehrtens 2021-10-13 272 if (cpu_has_mipsmt_pertccounters)
626bfa03729959 Hauke Mehrtens 2021-10-13 273 seq_puts(m, " mipsmt_pertccounters");
626bfa03729959 Hauke Mehrtens 2021-10-13 274 if (cpu_has_mmid)
626bfa03729959 Hauke Mehrtens 2021-10-13 275 seq_puts(m, " mmid");
626bfa03729959 Hauke Mehrtens 2021-10-13 276 if (cpu_has_mm_sysad)
626bfa03729959 Hauke Mehrtens 2021-10-13 277 seq_puts(m, " mm_sysad");
626bfa03729959 Hauke Mehrtens 2021-10-13 278 if (cpu_has_mm_full)
626bfa03729959 Hauke Mehrtens 2021-10-13 279 seq_puts(m, " mm_full");
626bfa03729959 Hauke Mehrtens 2021-10-13 280 seq_puts(m, "\n");
626bfa03729959 Hauke Mehrtens 2021-10-13 281
f6771dbb27c704 Ralf Baechle 2007-11-08 282 seq_printf(m, "shadow register sets\t: %d\n",
f6771dbb27c704 Ralf Baechle 2007-11-08 283 cpu_data[n].srsets);
e77c32fe284a4d David Daney 2010-12-21 284 seq_printf(m, "kscratch registers\t: %d\n",
e77c32fe284a4d David Daney 2010-12-21 285 hweight8(cpu_data[n].kscratch_mask));
bda4584cd943d7 Huacai Chen 2014-06-26 286 seq_printf(m, "package\t\t\t: %d\n", cpu_data[n].package);
f875a832d20285 Paul Burton 2017-08-12 287 seq_printf(m, "core\t\t\t: %d\n", cpu_core(&cpu_data[n]));
5508d456e9992b Ralf Baechle 2014-04-03 288
:::::: The code@line 61 was first introduced by commit
:::::: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 Linux-2.6.12-rc2
:::::: TO: Linus Torvalds <torvalds@ppc970.osdl.org>
:::::: CC: Linus Torvalds <torvalds@ppc970.osdl.org>
--
0-DAY CI Kernel Test Service
https://01.org/lkp
^ permalink raw reply [flat|nested] 6+ messages in thread
* arch/mips/kernel/proc.c:61:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provide...
@ 2022-05-31 22:52 kernel test robot
0 siblings, 0 replies; 6+ messages in thread
From: kernel test robot @ 2022-05-31 22:52 UTC (permalink / raw)
To: kbuild
[-- Attachment #1: Type: text/plain, Size: 43333 bytes --]
::::::
:::::: Manual check reason: "low confidence static check first_new_problem: arch/mips/kernel/proc.c:61:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]"
::::::
CC: llvm(a)lists.linux.dev
CC: kbuild-all(a)lists.01.org
BCC: lkp(a)intel.com
CC: linux-kernel(a)vger.kernel.org
TO: Arnd Bergmann <arnd@arndb.de>
CC: Masahiro Yamada <masahiroy@kernel.org>
CC: Alex Shi <alexs@kernel.org>
CC: Nick Desaulniers <ndesaulniers@google.com>
CC: Miguel Ojeda <ojeda@kernel.org>
CC: Nathan Chancellor <nathan@kernel.org>
tree: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git master
head: e1cbc3b96a9974746b2a80c3a6c8a0f7eff7b1b5
commit: e8c07082a810fbb9db303a2b66b66b8d7e588b53 Kbuild: move to -std=gnu11
date: 3 months ago
:::::: branch date: 6 hours ago
:::::: commit date: 3 months ago
config: mips-randconfig-c004-20220531 (https://download.01.org/0day-ci/archive/20220601/202206010621.oF970f8F-lkp(a)intel.com/config)
compiler: clang version 15.0.0 (https://github.com/llvm/llvm-project c825abd6b0198fb088d9752f556a70705bc99dfd)
reproduce (this is a W=1 build):
wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross
chmod +x ~/bin/make.cross
# install mips cross compiling tool for clang build
# apt-get install binutils-mipsel-linux-gnu
# https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e8c07082a810fbb9db303a2b66b66b8d7e588b53
git remote add linus https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
git fetch --no-tags linus master
git checkout e8c07082a810fbb9db303a2b66b66b8d7e588b53
# save the config file
COMPILER_INSTALL_PATH=$HOME/0day COMPILER=clang make.cross ARCH=mips clang-analyzer
If you fix the issue, kindly add following tag where applicable
Reported-by: kernel test robot <lkp@intel.com>
clang-analyzer warnings: (new ones prefixed by >>)
^~~~~~
arch/mips/mm/tlbex.c:1940:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(relocs, 0, sizeof(relocs));
^~~~~~
arch/mips/mm/tlbex.c:1940:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(relocs, 0, sizeof(relocs));
^~~~~~
arch/mips/mm/tlbex.c:1968:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(p, 0, handle_tlbs_end - (char *)p);
^~~~~~
arch/mips/mm/tlbex.c:1968:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(p, 0, handle_tlbs_end - (char *)p);
^~~~~~
arch/mips/mm/tlbex.c:1969:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(labels, 0, sizeof(labels));
^~~~~~
arch/mips/mm/tlbex.c:1969:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(labels, 0, sizeof(labels));
^~~~~~
arch/mips/mm/tlbex.c:1970:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(relocs, 0, sizeof(relocs));
^~~~~~
arch/mips/mm/tlbex.c:1970:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(relocs, 0, sizeof(relocs));
^~~~~~
arch/mips/mm/tlbex.c:1998:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(p, 0, handle_tlbm_end - (char *)p);
^~~~~~
arch/mips/mm/tlbex.c:1998:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(p, 0, handle_tlbm_end - (char *)p);
^~~~~~
arch/mips/mm/tlbex.c:1999:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(labels, 0, sizeof(labels));
^~~~~~
arch/mips/mm/tlbex.c:1999:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(labels, 0, sizeof(labels));
^~~~~~
arch/mips/mm/tlbex.c:2000:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(relocs, 0, sizeof(relocs));
^~~~~~
arch/mips/mm/tlbex.c:2000:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(relocs, 0, sizeof(relocs));
^~~~~~
arch/mips/mm/tlbex.c:2115:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(p, 0, handle_tlbl_end - (char *)p);
^~~~~~
arch/mips/mm/tlbex.c:2115:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(p, 0, handle_tlbl_end - (char *)p);
^~~~~~
arch/mips/mm/tlbex.c:2116:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(labels, 0, sizeof(labels));
^~~~~~
arch/mips/mm/tlbex.c:2116:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(labels, 0, sizeof(labels));
^~~~~~
arch/mips/mm/tlbex.c:2117:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(relocs, 0, sizeof(relocs));
^~~~~~
arch/mips/mm/tlbex.c:2117:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(relocs, 0, sizeof(relocs));
^~~~~~
arch/mips/mm/tlbex.c:2316:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(p, 0, handle_tlbs_end - (char *)p);
^~~~~~
arch/mips/mm/tlbex.c:2316:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(p, 0, handle_tlbs_end - (char *)p);
^~~~~~
arch/mips/mm/tlbex.c:2317:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(labels, 0, sizeof(labels));
^~~~~~
arch/mips/mm/tlbex.c:2317:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(labels, 0, sizeof(labels));
^~~~~~
arch/mips/mm/tlbex.c:2318:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(relocs, 0, sizeof(relocs));
^~~~~~
arch/mips/mm/tlbex.c:2318:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(relocs, 0, sizeof(relocs));
^~~~~~
arch/mips/mm/tlbex.c:2372:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(p, 0, handle_tlbm_end - (char *)p);
^~~~~~
arch/mips/mm/tlbex.c:2372:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(p, 0, handle_tlbm_end - (char *)p);
^~~~~~
arch/mips/mm/tlbex.c:2373:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(labels, 0, sizeof(labels));
^~~~~~
arch/mips/mm/tlbex.c:2373:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(labels, 0, sizeof(labels));
^~~~~~
arch/mips/mm/tlbex.c:2374:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(relocs, 0, sizeof(relocs));
^~~~~~
arch/mips/mm/tlbex.c:2374:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(relocs, 0, sizeof(relocs));
^~~~~~
Suppressed 35 warnings (31 in non-user code, 4 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
>> arch/mips/kernel/proc.c:61:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(fmt, "cpu model\t\t: %%s V%%d.%%d%s\n",
^~~~~~~
arch/mips/kernel/proc.c:61:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(fmt, "cpu model\t\t: %%s V%%d.%%d%s\n",
^~~~~~~
arch/mips/kernel/proc.c:296:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(fmt, "VCE%%c exceptions\t\t: %s\n",
^~~~~~~
arch/mips/kernel/proc.c:296:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(fmt, "VCE%%c exceptions\t\t: %s\n",
^~~~~~~
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
1 warning generated.
Suppressed 1 warnings (1 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
39 warnings generated.
Suppressed 39 warnings (39 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
15 warnings generated.
Suppressed 15 warnings (15 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
Suppressed 32 warnings (31 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
55 warnings generated.
fs/btrfs/sysfs.c:626:8: warning: Dereference of null pointer (loaded from variable 'value_ptr') [clang-analyzer-core.NullDereference]
val = *value_ptr;
^
fs/btrfs/sysfs.c:644:34: note: Calling 'to_fs_info'
struct btrfs_fs_info *fs_info = to_fs_info(kobj->parent);
^~~~~~~~~~~~~~~~~~~~~~~~
fs/btrfs/sysfs.c:1097:6: note: Assuming the condition is false
if (kobj->ktype != &btrfs_ktype)
^~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/btrfs/sysfs.c:1097:2: note: Taking false branch
if (kobj->ktype != &btrfs_ktype)
^
fs/btrfs/sysfs.c:1099:2: note: Returning pointer
return to_fs_devs(kobj)->fs_info;
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/btrfs/sysfs.c:644:34: note: Returning from 'to_fs_info'
struct btrfs_fs_info *fs_info = to_fs_info(kobj->parent);
^~~~~~~~~~~~~~~~~~~~~~~~
fs/btrfs/sysfs.c:644:2: note: 'fs_info' initialized here
struct btrfs_fs_info *fs_info = to_fs_info(kobj->parent);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/btrfs/sysfs.c:645:2: note: 'block_rsv' initialized here
struct btrfs_block_rsv *block_rsv = &fs_info->global_block_rsv;
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/btrfs/sysfs.c:646:24: note: Passing value via 1st parameter 'value_ptr'
return btrfs_show_u64(&block_rsv->reserved, &block_rsv->lock, buf);
^~~~~~~~~~~~~~~~~~~~
fs/btrfs/sysfs.c:646:9: note: Calling 'btrfs_show_u64'
return btrfs_show_u64(&block_rsv->reserved, &block_rsv->lock, buf);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/btrfs/sysfs.c:624:6: note: Assuming 'lock' is null
if (lock)
^~~~
fs/btrfs/sysfs.c:624:2: note: Taking false branch
if (lock)
^
fs/btrfs/sysfs.c:626:8: note: Dereference of null pointer (loaded from variable 'value_ptr')
val = *value_ptr;
^~~~~~~~~~
fs/btrfs/sysfs.c:802:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(fs_info->super_copy->label, 0, BTRFS_LABEL_SIZE);
^~~~~~
fs/btrfs/sysfs.c:802:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(fs_info->super_copy->label, 0, BTRFS_LABEL_SIZE);
^~~~~~
fs/btrfs/sysfs.c:803:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(fs_info->super_copy->label, buf, p_len);
^~~~~~
fs/btrfs/sysfs.c:803:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(fs_info->super_copy->label, buf, p_len);
^~~~~~
fs/btrfs/sysfs.c:1079:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&fs_devs->fsid_kobj, 0, sizeof(struct kobject));
^~~~~~
fs/btrfs/sysfs.c:1079:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&fs_devs->fsid_kobj, 0, sizeof(struct kobject));
^~~~~~
fs/btrfs/sysfs.c:1280:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(btrfs_feature_attrs, 0, sizeof(btrfs_feature_attrs));
^~~~~~
fs/btrfs/sysfs.c:1280:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(btrfs_feature_attrs, 0, sizeof(btrfs_feature_attrs));
^~~~~~
fs/btrfs/sysfs.c:1281:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(btrfs_unknown_feature_names, 0,
vim +61 arch/mips/kernel/proc.c
^1da177e4c3f41 Linus Torvalds 2005-04-16 49
^1da177e4c3f41 Linus Torvalds 2005-04-16 50 /*
^1da177e4c3f41 Linus Torvalds 2005-04-16 51 * For the first processor also print the system type
^1da177e4c3f41 Linus Torvalds 2005-04-16 52 */
487d70d0b8bd1c Gabor Juhos 2010-11-23 53 if (n == 0) {
^1da177e4c3f41 Linus Torvalds 2005-04-16 54 seq_printf(m, "system type\t\t: %s\n", get_system_type());
487d70d0b8bd1c Gabor Juhos 2010-11-23 55 if (mips_get_machine_name())
487d70d0b8bd1c Gabor Juhos 2010-11-23 56 seq_printf(m, "machine\t\t\t: %s\n",
487d70d0b8bd1c Gabor Juhos 2010-11-23 57 mips_get_machine_name());
487d70d0b8bd1c Gabor Juhos 2010-11-23 58 }
^1da177e4c3f41 Linus Torvalds 2005-04-16 59
^1da177e4c3f41 Linus Torvalds 2005-04-16 60 seq_printf(m, "processor\t\t: %ld\n", n);
^1da177e4c3f41 Linus Torvalds 2005-04-16 @61 sprintf(fmt, "cpu model\t\t: %%s V%%d.%%d%s\n",
e04582b7bc70b4 Atsushi Nemoto 2006-10-09 62 cpu_data[n].options & MIPS_CPU_FPU ? " FPU V%d.%d" : "");
e47c659b55aff7 Johannes Dickgreber 2008-10-13 63 seq_printf(m, fmt, __cpu_name[n],
^1da177e4c3f41 Linus Torvalds 2005-04-16 64 (version >> 4) & 0x0f, version & 0x0f,
^1da177e4c3f41 Linus Torvalds 2005-04-16 65 (fp_vers >> 4) & 0x0f, fp_vers & 0x0f);
5636919b5c909f Ralf Baechle 2009-02-28 66 seq_printf(m, "BogoMIPS\t\t: %u.%02u\n",
0ac354801a8791 Ralf Baechle 2005-02-21 67 cpu_data[n].udelay_val / (500000/HZ),
0ac354801a8791 Ralf Baechle 2005-02-21 68 (cpu_data[n].udelay_val / (5000/HZ)) % 100);
^1da177e4c3f41 Linus Torvalds 2005-04-16 69 seq_printf(m, "wait instruction\t: %s\n", cpu_wait ? "yes" : "no");
^1da177e4c3f41 Linus Torvalds 2005-04-16 70 seq_printf(m, "microsecond timers\t: %s\n",
^1da177e4c3f41 Linus Torvalds 2005-04-16 71 cpu_has_counter ? "yes" : "no");
31aa36658a1232 Karl-Johan Karlsson 2006-10-08 72 seq_printf(m, "tlb_entries\t\t: %d\n", cpu_data[n].tlbsize);
^1da177e4c3f41 Linus Torvalds 2005-04-16 73 seq_printf(m, "extra interrupt vector\t: %s\n",
^1da177e4c3f41 Linus Torvalds 2005-04-16 74 cpu_has_divec ? "yes" : "no");
654f57bfb46799 David Daney 2008-09-23 75 seq_printf(m, "hardware watchpoint\t: %s",
654f57bfb46799 David Daney 2008-09-23 76 cpu_has_watch ? "yes, " : "no\n");
654f57bfb46799 David Daney 2008-09-23 77 if (cpu_has_watch) {
654f57bfb46799 David Daney 2008-09-23 78 seq_printf(m, "count: %d, address/irw mask: [",
654f57bfb46799 David Daney 2008-09-23 79 cpu_data[n].watch_reg_count);
654f57bfb46799 David Daney 2008-09-23 80 for (i = 0; i < cpu_data[n].watch_reg_count; i++)
654f57bfb46799 David Daney 2008-09-23 81 seq_printf(m, "%s0x%04x", i ? ", " : "",
654f57bfb46799 David Daney 2008-09-23 82 cpu_data[n].watch_reg_masks[i]);
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 83 seq_puts(m, "]\n");
654f57bfb46799 David Daney 2008-09-23 84 }
41315b6ec108e9 Aaro Koskinen 2013-12-31 85
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 86 seq_puts(m, "isa\t\t\t:");
e5f5a5b06e51a3 Maciej W. Rozycki 2017-07-08 87 if (cpu_has_mips_1)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 88 seq_puts(m, " mips1");
a96102be700f87 Steven J. Hill 2012-12-07 89 if (cpu_has_mips_2)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 90 seq_puts(m, " mips2");
a96102be700f87 Steven J. Hill 2012-12-07 91 if (cpu_has_mips_3)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 92 seq_puts(m, " mips3");
a96102be700f87 Steven J. Hill 2012-12-07 93 if (cpu_has_mips_4)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 94 seq_puts(m, " mips4");
a96102be700f87 Steven J. Hill 2012-12-07 95 if (cpu_has_mips_5)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 96 seq_puts(m, " mips5");
a96102be700f87 Steven J. Hill 2012-12-07 97 if (cpu_has_mips32r1)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 98 seq_puts(m, " mips32r1");
a96102be700f87 Steven J. Hill 2012-12-07 99 if (cpu_has_mips32r2)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 100 seq_puts(m, " mips32r2");
ab7c01fdc3cfe0 Serge Semin 2020-05-21 101 if (cpu_has_mips32r5)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 102 seq_puts(m, " mips32r5");
515a6393dbac4f Markos Chandras 2014-11-14 103 if (cpu_has_mips32r6)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 104 seq_puts(m, " mips32r6");
a96102be700f87 Steven J. Hill 2012-12-07 105 if (cpu_has_mips64r1)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 106 seq_puts(m, " mips64r1");
a96102be700f87 Steven J. Hill 2012-12-07 107 if (cpu_has_mips64r2)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 108 seq_puts(m, " mips64r2");
ab7c01fdc3cfe0 Serge Semin 2020-05-21 109 if (cpu_has_mips64r5)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 110 seq_puts(m, " mips64r5");
515a6393dbac4f Markos Chandras 2014-11-14 111 if (cpu_has_mips64r6)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 112 seq_puts(m, " mips64r6");
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 113 seq_puts(m, "\n");
981ef0de49869c Ralf Baechle 2012-08-20 114
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 115 seq_puts(m, "ASEs implemented\t:");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 116 if (cpu_has_mips16)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 117 seq_puts(m, " mips16");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 118 if (cpu_has_mips16e2)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 119 seq_puts(m, " mips16e2");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 120 if (cpu_has_mdmx)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 121 seq_puts(m, " mdmx");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 122 if (cpu_has_mips3d)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 123 seq_puts(m, " mips3d");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 124 if (cpu_has_smartmips)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 125 seq_puts(m, " smartmips");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 126 if (cpu_has_dsp)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 127 seq_puts(m, " dsp");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 128 if (cpu_has_dsp2)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 129 seq_puts(m, " dsp2");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 130 if (cpu_has_dsp3)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 131 seq_puts(m, " dsp3");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 132 if (cpu_has_mipsmt)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 133 seq_puts(m, " mt");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 134 if (cpu_has_mmips)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 135 seq_puts(m, " micromips");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 136 if (cpu_has_vz)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 137 seq_puts(m, " vz");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 138 if (cpu_has_msa)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 139 seq_puts(m, " msa");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 140 if (cpu_has_eva)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 141 seq_puts(m, " eva");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 142 if (cpu_has_htw)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 143 seq_puts(m, " htw");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 144 if (cpu_has_xpa)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 145 seq_puts(m, " xpa");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 146 if (cpu_has_loongson_mmi)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 147 seq_puts(m, " loongson-mmi");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 148 if (cpu_has_loongson_cam)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 149 seq_puts(m, " loongson-cam");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 150 if (cpu_has_loongson_ext)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 151 seq_puts(m, " loongson-ext");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 152 if (cpu_has_loongson_ext2)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 153 seq_puts(m, " loongson-ext2");
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 154 seq_puts(m, "\n");
981ef0de49869c Ralf Baechle 2012-08-20 155
bce860833ab1e4 Steven J. Hill 2013-03-25 156 if (cpu_has_mmips) {
bce860833ab1e4 Steven J. Hill 2013-03-25 157 seq_printf(m, "micromips kernel\t: %s\n",
bce860833ab1e4 Steven J. Hill 2013-03-25 158 (read_c0_config3() & MIPS_CONF3_ISA_OE) ? "yes" : "no");
bce860833ab1e4 Steven J. Hill 2013-03-25 159 }
626bfa03729959 Hauke Mehrtens 2021-10-13 160
626bfa03729959 Hauke Mehrtens 2021-10-13 161 seq_puts(m, "Options implemented\t:");
626bfa03729959 Hauke Mehrtens 2021-10-13 162 if (cpu_has_tlb)
626bfa03729959 Hauke Mehrtens 2021-10-13 163 seq_puts(m, " tlb");
626bfa03729959 Hauke Mehrtens 2021-10-13 164 if (cpu_has_ftlb)
626bfa03729959 Hauke Mehrtens 2021-10-13 165 seq_puts(m, " ftlb");
626bfa03729959 Hauke Mehrtens 2021-10-13 166 if (cpu_has_tlbinv)
626bfa03729959 Hauke Mehrtens 2021-10-13 167 seq_puts(m, " tlbinv");
626bfa03729959 Hauke Mehrtens 2021-10-13 168 if (cpu_has_segments)
626bfa03729959 Hauke Mehrtens 2021-10-13 169 seq_puts(m, " segments");
626bfa03729959 Hauke Mehrtens 2021-10-13 170 if (cpu_has_rixiex)
626bfa03729959 Hauke Mehrtens 2021-10-13 171 seq_puts(m, " rixiex");
626bfa03729959 Hauke Mehrtens 2021-10-13 172 if (cpu_has_ldpte)
626bfa03729959 Hauke Mehrtens 2021-10-13 173 seq_puts(m, " ldpte");
626bfa03729959 Hauke Mehrtens 2021-10-13 174 if (cpu_has_maar)
626bfa03729959 Hauke Mehrtens 2021-10-13 175 seq_puts(m, " maar");
626bfa03729959 Hauke Mehrtens 2021-10-13 176 if (cpu_has_rw_llb)
626bfa03729959 Hauke Mehrtens 2021-10-13 177 seq_puts(m, " rw_llb");
626bfa03729959 Hauke Mehrtens 2021-10-13 178 if (cpu_has_4kex)
626bfa03729959 Hauke Mehrtens 2021-10-13 179 seq_puts(m, " 4kex");
626bfa03729959 Hauke Mehrtens 2021-10-13 180 if (cpu_has_3k_cache)
626bfa03729959 Hauke Mehrtens 2021-10-13 181 seq_puts(m, " 3k_cache");
626bfa03729959 Hauke Mehrtens 2021-10-13 182 if (cpu_has_4k_cache)
626bfa03729959 Hauke Mehrtens 2021-10-13 183 seq_puts(m, " 4k_cache");
626bfa03729959 Hauke Mehrtens 2021-10-13 184 if (cpu_has_tx39_cache)
626bfa03729959 Hauke Mehrtens 2021-10-13 185 seq_puts(m, " tx39_cache");
626bfa03729959 Hauke Mehrtens 2021-10-13 186 if (cpu_has_octeon_cache)
626bfa03729959 Hauke Mehrtens 2021-10-13 187 seq_puts(m, " octeon_cache");
1cab5bd69eb1f9 Tiezhu Yang 2021-11-25 188 if (raw_cpu_has_fpu)
626bfa03729959 Hauke Mehrtens 2021-10-13 189 seq_puts(m, " fpu");
626bfa03729959 Hauke Mehrtens 2021-10-13 190 if (cpu_has_32fpr)
626bfa03729959 Hauke Mehrtens 2021-10-13 191 seq_puts(m, " 32fpr");
626bfa03729959 Hauke Mehrtens 2021-10-13 192 if (cpu_has_cache_cdex_p)
626bfa03729959 Hauke Mehrtens 2021-10-13 193 seq_puts(m, " cache_cdex_p");
626bfa03729959 Hauke Mehrtens 2021-10-13 194 if (cpu_has_cache_cdex_s)
626bfa03729959 Hauke Mehrtens 2021-10-13 195 seq_puts(m, " cache_cdex_s");
626bfa03729959 Hauke Mehrtens 2021-10-13 196 if (cpu_has_prefetch)
626bfa03729959 Hauke Mehrtens 2021-10-13 197 seq_puts(m, " prefetch");
626bfa03729959 Hauke Mehrtens 2021-10-13 198 if (cpu_has_mcheck)
626bfa03729959 Hauke Mehrtens 2021-10-13 199 seq_puts(m, " mcheck");
626bfa03729959 Hauke Mehrtens 2021-10-13 200 if (cpu_has_ejtag)
626bfa03729959 Hauke Mehrtens 2021-10-13 201 seq_puts(m, " ejtag");
626bfa03729959 Hauke Mehrtens 2021-10-13 202 if (cpu_has_llsc)
626bfa03729959 Hauke Mehrtens 2021-10-13 203 seq_puts(m, " llsc");
626bfa03729959 Hauke Mehrtens 2021-10-13 204 if (cpu_has_guestctl0ext)
626bfa03729959 Hauke Mehrtens 2021-10-13 205 seq_puts(m, " guestctl0ext");
626bfa03729959 Hauke Mehrtens 2021-10-13 206 if (cpu_has_guestctl1)
626bfa03729959 Hauke Mehrtens 2021-10-13 207 seq_puts(m, " guestctl1");
626bfa03729959 Hauke Mehrtens 2021-10-13 208 if (cpu_has_guestctl2)
626bfa03729959 Hauke Mehrtens 2021-10-13 209 seq_puts(m, " guestctl2");
626bfa03729959 Hauke Mehrtens 2021-10-13 210 if (cpu_has_guestid)
626bfa03729959 Hauke Mehrtens 2021-10-13 211 seq_puts(m, " guestid");
626bfa03729959 Hauke Mehrtens 2021-10-13 212 if (cpu_has_drg)
626bfa03729959 Hauke Mehrtens 2021-10-13 213 seq_puts(m, " drg");
626bfa03729959 Hauke Mehrtens 2021-10-13 214 if (cpu_has_rixi)
626bfa03729959 Hauke Mehrtens 2021-10-13 215 seq_puts(m, " rixi");
626bfa03729959 Hauke Mehrtens 2021-10-13 216 if (cpu_has_lpa)
626bfa03729959 Hauke Mehrtens 2021-10-13 217 seq_puts(m, " lpa");
626bfa03729959 Hauke Mehrtens 2021-10-13 218 if (cpu_has_mvh)
626bfa03729959 Hauke Mehrtens 2021-10-13 219 seq_puts(m, " mvh");
626bfa03729959 Hauke Mehrtens 2021-10-13 220 if (cpu_has_vtag_icache)
626bfa03729959 Hauke Mehrtens 2021-10-13 221 seq_puts(m, " vtag_icache");
626bfa03729959 Hauke Mehrtens 2021-10-13 222 if (cpu_has_dc_aliases)
626bfa03729959 Hauke Mehrtens 2021-10-13 223 seq_puts(m, " dc_aliases");
626bfa03729959 Hauke Mehrtens 2021-10-13 224 if (cpu_has_ic_fills_f_dc)
626bfa03729959 Hauke Mehrtens 2021-10-13 225 seq_puts(m, " ic_fills_f_dc");
626bfa03729959 Hauke Mehrtens 2021-10-13 226 if (cpu_has_pindexed_dcache)
626bfa03729959 Hauke Mehrtens 2021-10-13 227 seq_puts(m, " pindexed_dcache");
626bfa03729959 Hauke Mehrtens 2021-10-13 228 if (cpu_has_userlocal)
626bfa03729959 Hauke Mehrtens 2021-10-13 229 seq_puts(m, " userlocal");
626bfa03729959 Hauke Mehrtens 2021-10-13 230 if (cpu_has_nofpuex)
626bfa03729959 Hauke Mehrtens 2021-10-13 231 seq_puts(m, " nofpuex");
626bfa03729959 Hauke Mehrtens 2021-10-13 232 if (cpu_has_vint)
626bfa03729959 Hauke Mehrtens 2021-10-13 233 seq_puts(m, " vint");
626bfa03729959 Hauke Mehrtens 2021-10-13 234 if (cpu_has_veic)
626bfa03729959 Hauke Mehrtens 2021-10-13 235 seq_puts(m, " veic");
626bfa03729959 Hauke Mehrtens 2021-10-13 236 if (cpu_has_inclusive_pcaches)
626bfa03729959 Hauke Mehrtens 2021-10-13 237 seq_puts(m, " inclusive_pcaches");
626bfa03729959 Hauke Mehrtens 2021-10-13 238 if (cpu_has_perf_cntr_intr_bit)
626bfa03729959 Hauke Mehrtens 2021-10-13 239 seq_puts(m, " perf_cntr_intr_bit");
626bfa03729959 Hauke Mehrtens 2021-10-13 240 if (cpu_has_ufr)
626bfa03729959 Hauke Mehrtens 2021-10-13 241 seq_puts(m, " ufr");
626bfa03729959 Hauke Mehrtens 2021-10-13 242 if (cpu_has_fre)
626bfa03729959 Hauke Mehrtens 2021-10-13 243 seq_puts(m, " fre");
626bfa03729959 Hauke Mehrtens 2021-10-13 244 if (cpu_has_cdmm)
626bfa03729959 Hauke Mehrtens 2021-10-13 245 seq_puts(m, " cdmm");
626bfa03729959 Hauke Mehrtens 2021-10-13 246 if (cpu_has_small_pages)
626bfa03729959 Hauke Mehrtens 2021-10-13 247 seq_puts(m, " small_pages");
626bfa03729959 Hauke Mehrtens 2021-10-13 248 if (cpu_has_nan_legacy)
626bfa03729959 Hauke Mehrtens 2021-10-13 249 seq_puts(m, " nan_legacy");
626bfa03729959 Hauke Mehrtens 2021-10-13 250 if (cpu_has_nan_2008)
626bfa03729959 Hauke Mehrtens 2021-10-13 251 seq_puts(m, " nan_2008");
626bfa03729959 Hauke Mehrtens 2021-10-13 252 if (cpu_has_ebase_wg)
626bfa03729959 Hauke Mehrtens 2021-10-13 253 seq_puts(m, " ebase_wg");
626bfa03729959 Hauke Mehrtens 2021-10-13 254 if (cpu_has_badinstr)
626bfa03729959 Hauke Mehrtens 2021-10-13 255 seq_puts(m, " badinstr");
626bfa03729959 Hauke Mehrtens 2021-10-13 256 if (cpu_has_badinstrp)
626bfa03729959 Hauke Mehrtens 2021-10-13 257 seq_puts(m, " badinstrp");
626bfa03729959 Hauke Mehrtens 2021-10-13 258 if (cpu_has_contextconfig)
626bfa03729959 Hauke Mehrtens 2021-10-13 259 seq_puts(m, " contextconfig");
626bfa03729959 Hauke Mehrtens 2021-10-13 260 if (cpu_has_perf)
626bfa03729959 Hauke Mehrtens 2021-10-13 261 seq_puts(m, " perf");
626bfa03729959 Hauke Mehrtens 2021-10-13 262 if (cpu_has_mac2008_only)
626bfa03729959 Hauke Mehrtens 2021-10-13 263 seq_puts(m, " mac2008_only");
626bfa03729959 Hauke Mehrtens 2021-10-13 264 if (cpu_has_ftlbparex)
626bfa03729959 Hauke Mehrtens 2021-10-13 265 seq_puts(m, " ftlbparex");
626bfa03729959 Hauke Mehrtens 2021-10-13 266 if (cpu_has_gsexcex)
626bfa03729959 Hauke Mehrtens 2021-10-13 267 seq_puts(m, " gsexcex");
626bfa03729959 Hauke Mehrtens 2021-10-13 268 if (cpu_has_shared_ftlb_ram)
626bfa03729959 Hauke Mehrtens 2021-10-13 269 seq_puts(m, " shared_ftlb_ram");
626bfa03729959 Hauke Mehrtens 2021-10-13 270 if (cpu_has_shared_ftlb_entries)
626bfa03729959 Hauke Mehrtens 2021-10-13 271 seq_puts(m, " shared_ftlb_entries");
626bfa03729959 Hauke Mehrtens 2021-10-13 272 if (cpu_has_mipsmt_pertccounters)
626bfa03729959 Hauke Mehrtens 2021-10-13 273 seq_puts(m, " mipsmt_pertccounters");
626bfa03729959 Hauke Mehrtens 2021-10-13 274 if (cpu_has_mmid)
626bfa03729959 Hauke Mehrtens 2021-10-13 275 seq_puts(m, " mmid");
626bfa03729959 Hauke Mehrtens 2021-10-13 276 if (cpu_has_mm_sysad)
626bfa03729959 Hauke Mehrtens 2021-10-13 277 seq_puts(m, " mm_sysad");
626bfa03729959 Hauke Mehrtens 2021-10-13 278 if (cpu_has_mm_full)
626bfa03729959 Hauke Mehrtens 2021-10-13 279 seq_puts(m, " mm_full");
626bfa03729959 Hauke Mehrtens 2021-10-13 280 seq_puts(m, "\n");
626bfa03729959 Hauke Mehrtens 2021-10-13 281
f6771dbb27c704 Ralf Baechle 2007-11-08 282 seq_printf(m, "shadow register sets\t: %d\n",
f6771dbb27c704 Ralf Baechle 2007-11-08 283 cpu_data[n].srsets);
e77c32fe284a4d David Daney 2010-12-21 284 seq_printf(m, "kscratch registers\t: %d\n",
e77c32fe284a4d David Daney 2010-12-21 285 hweight8(cpu_data[n].kscratch_mask));
bda4584cd943d7 Huacai Chen 2014-06-26 286 seq_printf(m, "package\t\t\t: %d\n", cpu_data[n].package);
f875a832d20285 Paul Burton 2017-08-12 287 seq_printf(m, "core\t\t\t: %d\n", cpu_core(&cpu_data[n]));
5508d456e9992b Ralf Baechle 2014-04-03 288
:::::: The code@line 61 was first introduced by commit
:::::: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 Linux-2.6.12-rc2
:::::: TO: Linus Torvalds <torvalds@ppc970.osdl.org>
:::::: CC: Linus Torvalds <torvalds@ppc970.osdl.org>
--
0-DAY CI Kernel Test Service
https://01.org/lkp
^ permalink raw reply [flat|nested] 6+ messages in thread
* arch/mips/kernel/proc.c:61:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provide...
@ 2022-05-11 5:02 kernel test robot
0 siblings, 0 replies; 6+ messages in thread
From: kernel test robot @ 2022-05-11 5:02 UTC (permalink / raw)
To: kbuild
[-- Attachment #1: Type: text/plain, Size: 67330 bytes --]
CC: llvm(a)lists.linux.dev
CC: kbuild-all(a)lists.01.org
BCC: lkp(a)intel.com
CC: linux-kernel(a)vger.kernel.org
TO: Arnd Bergmann <arnd@arndb.de>
CC: Masahiro Yamada <masahiroy@kernel.org>
CC: Alex Shi <alexs@kernel.org>
CC: Nick Desaulniers <ndesaulniers@google.com>
CC: Miguel Ojeda <ojeda@kernel.org>
CC: Nathan Chancellor <nathan@kernel.org>
tree: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git master
head: feb9c5e19e913b53cb536a7aa7c9f20107bb51ec
commit: e8c07082a810fbb9db303a2b66b66b8d7e588b53 Kbuild: move to -std=gnu11
date: 8 weeks ago
:::::: branch date: 11 hours ago
:::::: commit date: 8 weeks ago
config: mips-randconfig-c004-20220508 (https://download.01.org/0day-ci/archive/20220511/202205111251.wBKtHLFV-lkp(a)intel.com/config)
compiler: clang version 15.0.0 (https://github.com/llvm/llvm-project af4cf1c6b8ed0d8102fc5e69acdc2fcbbcdaa9a7)
reproduce (this is a W=1 build):
wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross
chmod +x ~/bin/make.cross
# install mips cross compiling tool for clang build
# apt-get install binutils-mips-linux-gnu
# https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e8c07082a810fbb9db303a2b66b66b8d7e588b53
git remote add linus https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
git fetch --no-tags linus master
git checkout e8c07082a810fbb9db303a2b66b66b8d7e588b53
# save the config file
COMPILER_INSTALL_PATH=$HOME/0day COMPILER=clang make.cross ARCH=mips clang-analyzer
If you fix the issue, kindly add following tag as appropriate
Reported-by: kernel test robot <lkp@intel.com>
clang-analyzer warnings: (new ones prefixed by >>)
^~~~~~
crypto/skcipher.c:210:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(walk->oiv, walk->iv, walk->ivsize);
^~~~~~
crypto/skcipher.c:210:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(walk->oiv, walk->iv, walk->ivsize);
^~~~~~
crypto/skcipher.c:292:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(tmp, walk->src.virt.addr, walk->nbytes);
^~~~~~
crypto/skcipher.c:292:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(tmp, walk->src.virt.addr, walk->nbytes);
^~~~~~
crypto/skcipher.c:428:13: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
walk->iv = memcpy(iv, walk->iv, walk->ivsize);
^~~~~~
crypto/skcipher.c:428:13: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
walk->iv = memcpy(iv, walk->iv, walk->ivsize);
^~~~~~
crypto/skcipher.c:588:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(alignbuffer, key, keylen);
^~~~~~
crypto/skcipher.c:588:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(alignbuffer, key, keylen);
^~~~~~
Suppressed 59 warnings (59 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
fs/proc/thread_self.c:25:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(name, "%u/task/%u", tgid, pid);
^~~~~~~
fs/proc/thread_self.c:25:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(name, "%u/task/%u", tgid, pid);
^~~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
49 warnings generated.
fs/proc/vmcore.c:154:5: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buf, 0, nr_bytes);
^~~~~~
fs/proc/vmcore.c:154:5: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(buf, 0, nr_bytes);
^~~~~~
fs/proc/vmcore.c:244:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(target, src, size);
^~~~~~
fs/proc/vmcore.c:244:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(target, src, size);
^~~~~~
fs/proc/vmcore.c:901:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(tmp, &phdr, sizeof(phdr));
^~~~~~
fs/proc/vmcore.c:901:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(tmp, &phdr, sizeof(phdr));
^~~~~~
fs/proc/vmcore.c:907:2: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(tmp, tmp+i, ((*elfsz)-sizeof(Elf64_Ehdr)-sizeof(Elf64_Phdr)));
^~~~~~~
fs/proc/vmcore.c:907:2: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(tmp, tmp+i, ((*elfsz)-sizeof(Elf64_Ehdr)-sizeof(Elf64_Phdr)));
^~~~~~~
fs/proc/vmcore.c:908:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(elfptr + *elfsz, 0, i);
^~~~~~
fs/proc/vmcore.c:908:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(elfptr + *elfsz, 0, i);
^~~~~~
fs/proc/vmcore.c:1092:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(tmp, &phdr, sizeof(phdr));
^~~~~~
fs/proc/vmcore.c:1092:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(tmp, &phdr, sizeof(phdr));
^~~~~~
fs/proc/vmcore.c:1098:2: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(tmp, tmp+i, ((*elfsz)-sizeof(Elf32_Ehdr)-sizeof(Elf32_Phdr)));
^~~~~~~
fs/proc/vmcore.c:1098:2: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(tmp, tmp+i, ((*elfsz)-sizeof(Elf32_Ehdr)-sizeof(Elf32_Phdr)));
^~~~~~~
fs/proc/vmcore.c:1099:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(elfptr + *elfsz, 0, i);
^~~~~~
fs/proc/vmcore.c:1099:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(elfptr + *elfsz, 0, i);
^~~~~~
fs/proc/vmcore.c:1390:2: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy((char *)vdd_hdr->name, VMCOREDD_NOTE_NAME,
^~~~~~~
fs/proc/vmcore.c:1390:2: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy((char *)vdd_hdr->name, VMCOREDD_NOTE_NAME,
^~~~~~~
fs/proc/vmcore.c:1392:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(vdd_hdr->dump_name, data->dump_name, sizeof(vdd_hdr->dump_name));
^~~~~~
fs/proc/vmcore.c:1392:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(vdd_hdr->dump_name, data->dump_name, sizeof(vdd_hdr->dump_name));
^~~~~~
Suppressed 39 warnings (39 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
>> arch/mips/kernel/proc.c:61:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(fmt, "cpu model\t\t: %%s V%%d.%%d%s\n",
^~~~~~~
arch/mips/kernel/proc.c:61:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(fmt, "cpu model\t\t: %%s V%%d.%%d%s\n",
^~~~~~~
arch/mips/kernel/proc.c:296:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(fmt, "VCE%%c exceptions\t\t: %s\n",
^~~~~~~
arch/mips/kernel/proc.c:296:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(fmt, "VCE%%c exceptions\t\t: %s\n",
^~~~~~~
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
11 warnings generated.
Suppressed 11 warnings (11 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
40 warnings generated.
arch/mips/kernel/crash_dump.c:29:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, vaddr + offset, csize);
^~~~~~
arch/mips/kernel/crash_dump.c:29:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, vaddr + offset, csize);
^~~~~~
Suppressed 39 warnings (39 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
81 warnings generated.
kernel/bpf/core.c:237:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(fp, fp_old, fp_old->pages * PAGE_SIZE);
^~~~~~
kernel/bpf/core.c:237:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(fp, fp_old, fp_old->pages * PAGE_SIZE);
^~~~~~
kernel/bpf/core.c:284:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ws, 0, sizeof(ws));
^~~~~~
kernel/bpf/core.c:284:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(ws, 0, sizeof(ws));
^~~~~~
kernel/bpf/core.c:311:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&raw[psize], 0, raw_size - psize);
^~~~~~
kernel/bpf/core.c:311:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&raw[psize], 0, raw_size - psize);
^~~~~~
kernel/bpf/core.c:333:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(fp->tag, result, sizeof(fp->tag));
^~~~~~
kernel/bpf/core.c:333:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(fp->tag, result, sizeof(fp->tag));
^~~~~~
kernel/bpf/core.c:452:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(prog->insnsi + off, patch, sizeof(*patch));
^~~~~~
kernel/bpf/core.c:452:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(prog->insnsi + off, patch, sizeof(*patch));
^~~~~~
kernel/bpf/core.c:488:2: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(prog_adj->insnsi + off + len, prog_adj->insnsi + off + 1,
^~~~~~~
kernel/bpf/core.c:488:2: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(prog_adj->insnsi + off + len, prog_adj->insnsi + off + 1,
^~~~~~~
kernel/bpf/core.c:490:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(prog_adj->insnsi + off, patch, sizeof(*patch) * len);
^~~~~~
kernel/bpf/core.c:490:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(prog_adj->insnsi + off, patch, sizeof(*patch) * len);
^~~~~~
kernel/bpf/core.c:508:2: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(prog->insnsi + off, prog->insnsi + off + cnt,
^~~~~~~
kernel/bpf/core.c:508:2: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(prog->insnsi + off, prog->insnsi + off + cnt,
^~~~~~~
kernel/bpf/core.c:1370:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(dst, 0, size);
^~~~~~
kernel/bpf/core.c:1370:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(dst, 0, size);
^~~~~~
Suppressed 72 warnings (71 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
49 warnings generated.
crypto/chacha20poly1305.c:89:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(iv, &leicb, sizeof(leicb));
^~~~~~
crypto/chacha20poly1305.c:89:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(iv, &leicb, sizeof(leicb));
--
^~~~~~~~
include/linux/bitops.h:155:10: note: Returning from 'fls'
return fls(l);
^~~~~~
include/linux/bitops.h:155:3: note: Returning the value 32
return fls(l);
^~~~~~~~~~~~~
include/linux/log2.h:57:16: note: Returning from 'fls_long'
return 1UL << fls_long(n - 1);
^~~~~~~~~~~~~~~
include/linux/log2.h:57:13: note: The result of the left shift is undefined due to shifting by '32', which is greater or equal to the width of type 'unsigned long'
return 1UL << fls_long(n - 1);
^ ~~~~~~~~~~~~~~~
include/linux/log2.h:67:13: warning: The result of the left shift is undefined due to shifting by '4294967295', which is greater or equal to the width of type 'unsigned long' [clang-analyzer-core.UndefinedBinaryOperatorResult]
return 1UL << (fls_long(n) - 1);
^
lib/kfifo.c:71:2: note: Taking true branch
if (!is_power_of_2(size))
^
lib/kfifo.c:72:10: note: '?' condition is false
size = rounddown_pow_of_two(size);
^
include/linux/log2.h:193:2: note: expanded from macro 'rounddown_pow_of_two'
__builtin_constant_p(n) ? ( \
^
lib/kfifo.c:72:10: note: Calling '__rounddown_pow_of_two'
size = rounddown_pow_of_two(size);
^
include/linux/log2.h:195:2: note: expanded from macro 'rounddown_pow_of_two'
__rounddown_pow_of_two(n) \
^~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/log2.h:67:13: note: The result of the left shift is undefined due to shifting by '4294967295', which is greater or equal to the width of type 'unsigned long'
return 1UL << (fls_long(n) - 1);
^ ~~~~~~~~~~~~~~~~~
lib/kfifo.c:104:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(fifo->data + off, src, l);
^~~~~~
lib/kfifo.c:104:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(fifo->data + off, src, l);
^~~~~~
lib/kfifo.c:105:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(fifo->data, src + l, len - l);
^~~~~~
lib/kfifo.c:105:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(fifo->data, src + l, len - l);
^~~~~~
lib/kfifo.c:143:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dst, fifo->data + off, l);
^~~~~~
lib/kfifo.c:143:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dst, fifo->data + off, l);
^~~~~~
lib/kfifo.c:144:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dst + l, fifo->data, len - l);
^~~~~~
lib/kfifo.c:144:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dst + l, fifo->data, len - l);
^~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
38 warnings generated.
crypto/wp512.c:993:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(wctx->bitLength, 0, 32);
^~~~~~
crypto/wp512.c:993:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(wctx->bitLength, 0, 32);
^~~~~~
crypto/wp512.c:1079:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&buffer[bufferPos], 0, WP512_BLOCK_SIZE - bufferPos);
^~~~~~
crypto/wp512.c:1079:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&buffer[bufferPos], 0, WP512_BLOCK_SIZE - bufferPos);
^~~~~~
crypto/wp512.c:1084:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&buffer[bufferPos], 0,
^~~~~~
crypto/wp512.c:1084:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&buffer[bufferPos], 0,
^~~~~~
crypto/wp512.c:1087:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&buffer[WP512_BLOCK_SIZE - WP512_LENGTHBYTES],
^~~~~~
crypto/wp512.c:1087:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&buffer[WP512_BLOCK_SIZE - WP512_LENGTHBYTES],
^~~~~~
crypto/wp512.c:1103:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(out, D, WP384_DIGEST_SIZE);
^~~~~~
crypto/wp512.c:1103:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(out, D, WP384_DIGEST_SIZE);
^~~~~~
crypto/wp512.c:1114:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(out, D, WP256_DIGEST_SIZE);
^~~~~~
crypto/wp512.c:1114:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(out, D, WP256_DIGEST_SIZE);
^~~~~~
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
>> arch/mips/kernel/proc.c:61:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(fmt, "cpu model\t\t: %%s V%%d.%%d%s\n",
^~~~~~~
arch/mips/kernel/proc.c:61:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(fmt, "cpu model\t\t: %%s V%%d.%%d%s\n",
^~~~~~~
arch/mips/kernel/proc.c:296:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(fmt, "VCE%%c exceptions\t\t: %s\n",
^~~~~~~
arch/mips/kernel/proc.c:296:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(fmt, "VCE%%c exceptions\t\t: %s\n",
^~~~~~~
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
11 warnings generated.
Suppressed 11 warnings (11 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
40 warnings generated.
arch/mips/kernel/crash_dump.c:29:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, vaddr + offset, csize);
^~~~~~
arch/mips/kernel/crash_dump.c:29:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, vaddr + offset, csize);
^~~~~~
Suppressed 39 warnings (39 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
49 warnings generated.
crypto/chacha20poly1305.c:89:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(iv, &leicb, sizeof(leicb));
^~~~~~
crypto/chacha20poly1305.c:89:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(iv, &leicb, sizeof(leicb));
^~~~~~
crypto/chacha20poly1305.c:90:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(iv + sizeof(leicb), ctx->salt, ctx->saltlen);
^~~~~~
crypto/chacha20poly1305.c:90:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(iv + sizeof(leicb), ctx->salt, ctx->saltlen);
^~~~~~
crypto/chacha20poly1305.c:91:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(iv + sizeof(leicb) + ctx->saltlen, req->iv,
^~~~~~
crypto/chacha20poly1305.c:91:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(iv + sizeof(leicb) + ctx->saltlen, req->iv,
^~~~~~
crypto/chacha20poly1305.c:208:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(preq->pad, 0, sizeof(preq->pad));
^~~~~~
crypto/chacha20poly1305.c:208:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(preq->pad, 0, sizeof(preq->pad));
^~~~~~
crypto/chacha20poly1305.c:267:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(preq->pad, 0, sizeof(preq->pad));
^~~~~~
crypto/chacha20poly1305.c:267:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(preq->pad, 0, sizeof(preq->pad));
^~~~~~
crypto/chacha20poly1305.c:376:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(rctx->key, 0, sizeof(rctx->key));
^~~~~~
crypto/chacha20poly1305.c:376:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(rctx->key, 0, sizeof(rctx->key));
^~~~~~
crypto/chacha20poly1305.c:483:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ctx->salt, key + keylen, ctx->saltlen);
^~~~~~
crypto/chacha20poly1305.c:483:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ctx->salt, key + keylen, ctx->saltlen);
^~~~~~
crypto/chacha20poly1305.c:601:6: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (snprintf(inst->alg.base.cra_name, CRYPTO_MAX_ALG_NAME,
^~~~~~~~
crypto/chacha20poly1305.c:601:6: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
if (snprintf(inst->alg.base.cra_name, CRYPTO_MAX_ALG_NAME,
^~~~~~~~
crypto/chacha20poly1305.c:605:6: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (snprintf(inst->alg.base.cra_driver_name, CRYPTO_MAX_ALG_NAME,
^~~~~~~~
crypto/chacha20poly1305.c:605:6: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
if (snprintf(inst->alg.base.cra_driver_name, CRYPTO_MAX_ALG_NAME,
^~~~~~~~
Suppressed 40 warnings (40 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
vim +61 arch/mips/kernel/proc.c
^1da177e4c3f41 Linus Torvalds 2005-04-16 49
^1da177e4c3f41 Linus Torvalds 2005-04-16 50 /*
^1da177e4c3f41 Linus Torvalds 2005-04-16 51 * For the first processor also print the system type
^1da177e4c3f41 Linus Torvalds 2005-04-16 52 */
487d70d0b8bd1c Gabor Juhos 2010-11-23 53 if (n == 0) {
^1da177e4c3f41 Linus Torvalds 2005-04-16 54 seq_printf(m, "system type\t\t: %s\n", get_system_type());
487d70d0b8bd1c Gabor Juhos 2010-11-23 55 if (mips_get_machine_name())
487d70d0b8bd1c Gabor Juhos 2010-11-23 56 seq_printf(m, "machine\t\t\t: %s\n",
487d70d0b8bd1c Gabor Juhos 2010-11-23 57 mips_get_machine_name());
487d70d0b8bd1c Gabor Juhos 2010-11-23 58 }
^1da177e4c3f41 Linus Torvalds 2005-04-16 59
^1da177e4c3f41 Linus Torvalds 2005-04-16 60 seq_printf(m, "processor\t\t: %ld\n", n);
^1da177e4c3f41 Linus Torvalds 2005-04-16 @61 sprintf(fmt, "cpu model\t\t: %%s V%%d.%%d%s\n",
e04582b7bc70b4 Atsushi Nemoto 2006-10-09 62 cpu_data[n].options & MIPS_CPU_FPU ? " FPU V%d.%d" : "");
e47c659b55aff7 Johannes Dickgreber 2008-10-13 63 seq_printf(m, fmt, __cpu_name[n],
^1da177e4c3f41 Linus Torvalds 2005-04-16 64 (version >> 4) & 0x0f, version & 0x0f,
^1da177e4c3f41 Linus Torvalds 2005-04-16 65 (fp_vers >> 4) & 0x0f, fp_vers & 0x0f);
5636919b5c909f Ralf Baechle 2009-02-28 66 seq_printf(m, "BogoMIPS\t\t: %u.%02u\n",
0ac354801a8791 Ralf Baechle 2005-02-21 67 cpu_data[n].udelay_val / (500000/HZ),
0ac354801a8791 Ralf Baechle 2005-02-21 68 (cpu_data[n].udelay_val / (5000/HZ)) % 100);
^1da177e4c3f41 Linus Torvalds 2005-04-16 69 seq_printf(m, "wait instruction\t: %s\n", cpu_wait ? "yes" : "no");
^1da177e4c3f41 Linus Torvalds 2005-04-16 70 seq_printf(m, "microsecond timers\t: %s\n",
^1da177e4c3f41 Linus Torvalds 2005-04-16 71 cpu_has_counter ? "yes" : "no");
31aa36658a1232 Karl-Johan Karlsson 2006-10-08 72 seq_printf(m, "tlb_entries\t\t: %d\n", cpu_data[n].tlbsize);
^1da177e4c3f41 Linus Torvalds 2005-04-16 73 seq_printf(m, "extra interrupt vector\t: %s\n",
^1da177e4c3f41 Linus Torvalds 2005-04-16 74 cpu_has_divec ? "yes" : "no");
654f57bfb46799 David Daney 2008-09-23 75 seq_printf(m, "hardware watchpoint\t: %s",
654f57bfb46799 David Daney 2008-09-23 76 cpu_has_watch ? "yes, " : "no\n");
654f57bfb46799 David Daney 2008-09-23 77 if (cpu_has_watch) {
654f57bfb46799 David Daney 2008-09-23 78 seq_printf(m, "count: %d, address/irw mask: [",
654f57bfb46799 David Daney 2008-09-23 79 cpu_data[n].watch_reg_count);
654f57bfb46799 David Daney 2008-09-23 80 for (i = 0; i < cpu_data[n].watch_reg_count; i++)
654f57bfb46799 David Daney 2008-09-23 81 seq_printf(m, "%s0x%04x", i ? ", " : "",
654f57bfb46799 David Daney 2008-09-23 82 cpu_data[n].watch_reg_masks[i]);
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 83 seq_puts(m, "]\n");
654f57bfb46799 David Daney 2008-09-23 84 }
41315b6ec108e9 Aaro Koskinen 2013-12-31 85
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 86 seq_puts(m, "isa\t\t\t:");
e5f5a5b06e51a3 Maciej W. Rozycki 2017-07-08 87 if (cpu_has_mips_1)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 88 seq_puts(m, " mips1");
a96102be700f87 Steven J. Hill 2012-12-07 89 if (cpu_has_mips_2)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 90 seq_puts(m, " mips2");
a96102be700f87 Steven J. Hill 2012-12-07 91 if (cpu_has_mips_3)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 92 seq_puts(m, " mips3");
a96102be700f87 Steven J. Hill 2012-12-07 93 if (cpu_has_mips_4)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 94 seq_puts(m, " mips4");
a96102be700f87 Steven J. Hill 2012-12-07 95 if (cpu_has_mips_5)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 96 seq_puts(m, " mips5");
a96102be700f87 Steven J. Hill 2012-12-07 97 if (cpu_has_mips32r1)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 98 seq_puts(m, " mips32r1");
a96102be700f87 Steven J. Hill 2012-12-07 99 if (cpu_has_mips32r2)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 100 seq_puts(m, " mips32r2");
ab7c01fdc3cfe0 Serge Semin 2020-05-21 101 if (cpu_has_mips32r5)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 102 seq_puts(m, " mips32r5");
515a6393dbac4f Markos Chandras 2014-11-14 103 if (cpu_has_mips32r6)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 104 seq_puts(m, " mips32r6");
a96102be700f87 Steven J. Hill 2012-12-07 105 if (cpu_has_mips64r1)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 106 seq_puts(m, " mips64r1");
a96102be700f87 Steven J. Hill 2012-12-07 107 if (cpu_has_mips64r2)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 108 seq_puts(m, " mips64r2");
ab7c01fdc3cfe0 Serge Semin 2020-05-21 109 if (cpu_has_mips64r5)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 110 seq_puts(m, " mips64r5");
515a6393dbac4f Markos Chandras 2014-11-14 111 if (cpu_has_mips64r6)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 112 seq_puts(m, " mips64r6");
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 113 seq_puts(m, "\n");
981ef0de49869c Ralf Baechle 2012-08-20 114
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 115 seq_puts(m, "ASEs implemented\t:");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 116 if (cpu_has_mips16)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 117 seq_puts(m, " mips16");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 118 if (cpu_has_mips16e2)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 119 seq_puts(m, " mips16e2");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 120 if (cpu_has_mdmx)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 121 seq_puts(m, " mdmx");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 122 if (cpu_has_mips3d)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 123 seq_puts(m, " mips3d");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 124 if (cpu_has_smartmips)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 125 seq_puts(m, " smartmips");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 126 if (cpu_has_dsp)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 127 seq_puts(m, " dsp");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 128 if (cpu_has_dsp2)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 129 seq_puts(m, " dsp2");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 130 if (cpu_has_dsp3)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 131 seq_puts(m, " dsp3");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 132 if (cpu_has_mipsmt)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 133 seq_puts(m, " mt");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 134 if (cpu_has_mmips)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 135 seq_puts(m, " micromips");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 136 if (cpu_has_vz)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 137 seq_puts(m, " vz");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 138 if (cpu_has_msa)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 139 seq_puts(m, " msa");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 140 if (cpu_has_eva)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 141 seq_puts(m, " eva");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 142 if (cpu_has_htw)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 143 seq_puts(m, " htw");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 144 if (cpu_has_xpa)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 145 seq_puts(m, " xpa");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 146 if (cpu_has_loongson_mmi)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 147 seq_puts(m, " loongson-mmi");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 148 if (cpu_has_loongson_cam)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 149 seq_puts(m, " loongson-cam");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 150 if (cpu_has_loongson_ext)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 151 seq_puts(m, " loongson-ext");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 152 if (cpu_has_loongson_ext2)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 153 seq_puts(m, " loongson-ext2");
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 154 seq_puts(m, "\n");
981ef0de49869c Ralf Baechle 2012-08-20 155
bce860833ab1e4 Steven J. Hill 2013-03-25 156 if (cpu_has_mmips) {
bce860833ab1e4 Steven J. Hill 2013-03-25 157 seq_printf(m, "micromips kernel\t: %s\n",
bce860833ab1e4 Steven J. Hill 2013-03-25 158 (read_c0_config3() & MIPS_CONF3_ISA_OE) ? "yes" : "no");
bce860833ab1e4 Steven J. Hill 2013-03-25 159 }
626bfa03729959 Hauke Mehrtens 2021-10-13 160
626bfa03729959 Hauke Mehrtens 2021-10-13 161 seq_puts(m, "Options implemented\t:");
626bfa03729959 Hauke Mehrtens 2021-10-13 162 if (cpu_has_tlb)
626bfa03729959 Hauke Mehrtens 2021-10-13 163 seq_puts(m, " tlb");
626bfa03729959 Hauke Mehrtens 2021-10-13 164 if (cpu_has_ftlb)
626bfa03729959 Hauke Mehrtens 2021-10-13 165 seq_puts(m, " ftlb");
626bfa03729959 Hauke Mehrtens 2021-10-13 166 if (cpu_has_tlbinv)
626bfa03729959 Hauke Mehrtens 2021-10-13 167 seq_puts(m, " tlbinv");
626bfa03729959 Hauke Mehrtens 2021-10-13 168 if (cpu_has_segments)
626bfa03729959 Hauke Mehrtens 2021-10-13 169 seq_puts(m, " segments");
626bfa03729959 Hauke Mehrtens 2021-10-13 170 if (cpu_has_rixiex)
626bfa03729959 Hauke Mehrtens 2021-10-13 171 seq_puts(m, " rixiex");
626bfa03729959 Hauke Mehrtens 2021-10-13 172 if (cpu_has_ldpte)
626bfa03729959 Hauke Mehrtens 2021-10-13 173 seq_puts(m, " ldpte");
626bfa03729959 Hauke Mehrtens 2021-10-13 174 if (cpu_has_maar)
626bfa03729959 Hauke Mehrtens 2021-10-13 175 seq_puts(m, " maar");
626bfa03729959 Hauke Mehrtens 2021-10-13 176 if (cpu_has_rw_llb)
626bfa03729959 Hauke Mehrtens 2021-10-13 177 seq_puts(m, " rw_llb");
626bfa03729959 Hauke Mehrtens 2021-10-13 178 if (cpu_has_4kex)
626bfa03729959 Hauke Mehrtens 2021-10-13 179 seq_puts(m, " 4kex");
626bfa03729959 Hauke Mehrtens 2021-10-13 180 if (cpu_has_3k_cache)
626bfa03729959 Hauke Mehrtens 2021-10-13 181 seq_puts(m, " 3k_cache");
626bfa03729959 Hauke Mehrtens 2021-10-13 182 if (cpu_has_4k_cache)
626bfa03729959 Hauke Mehrtens 2021-10-13 183 seq_puts(m, " 4k_cache");
626bfa03729959 Hauke Mehrtens 2021-10-13 184 if (cpu_has_tx39_cache)
626bfa03729959 Hauke Mehrtens 2021-10-13 185 seq_puts(m, " tx39_cache");
626bfa03729959 Hauke Mehrtens 2021-10-13 186 if (cpu_has_octeon_cache)
626bfa03729959 Hauke Mehrtens 2021-10-13 187 seq_puts(m, " octeon_cache");
1cab5bd69eb1f9 Tiezhu Yang 2021-11-25 188 if (raw_cpu_has_fpu)
626bfa03729959 Hauke Mehrtens 2021-10-13 189 seq_puts(m, " fpu");
626bfa03729959 Hauke Mehrtens 2021-10-13 190 if (cpu_has_32fpr)
626bfa03729959 Hauke Mehrtens 2021-10-13 191 seq_puts(m, " 32fpr");
626bfa03729959 Hauke Mehrtens 2021-10-13 192 if (cpu_has_cache_cdex_p)
626bfa03729959 Hauke Mehrtens 2021-10-13 193 seq_puts(m, " cache_cdex_p");
626bfa03729959 Hauke Mehrtens 2021-10-13 194 if (cpu_has_cache_cdex_s)
626bfa03729959 Hauke Mehrtens 2021-10-13 195 seq_puts(m, " cache_cdex_s");
626bfa03729959 Hauke Mehrtens 2021-10-13 196 if (cpu_has_prefetch)
626bfa03729959 Hauke Mehrtens 2021-10-13 197 seq_puts(m, " prefetch");
626bfa03729959 Hauke Mehrtens 2021-10-13 198 if (cpu_has_mcheck)
626bfa03729959 Hauke Mehrtens 2021-10-13 199 seq_puts(m, " mcheck");
626bfa03729959 Hauke Mehrtens 2021-10-13 200 if (cpu_has_ejtag)
626bfa03729959 Hauke Mehrtens 2021-10-13 201 seq_puts(m, " ejtag");
626bfa03729959 Hauke Mehrtens 2021-10-13 202 if (cpu_has_llsc)
626bfa03729959 Hauke Mehrtens 2021-10-13 203 seq_puts(m, " llsc");
626bfa03729959 Hauke Mehrtens 2021-10-13 204 if (cpu_has_guestctl0ext)
626bfa03729959 Hauke Mehrtens 2021-10-13 205 seq_puts(m, " guestctl0ext");
626bfa03729959 Hauke Mehrtens 2021-10-13 206 if (cpu_has_guestctl1)
626bfa03729959 Hauke Mehrtens 2021-10-13 207 seq_puts(m, " guestctl1");
626bfa03729959 Hauke Mehrtens 2021-10-13 208 if (cpu_has_guestctl2)
626bfa03729959 Hauke Mehrtens 2021-10-13 209 seq_puts(m, " guestctl2");
626bfa03729959 Hauke Mehrtens 2021-10-13 210 if (cpu_has_guestid)
626bfa03729959 Hauke Mehrtens 2021-10-13 211 seq_puts(m, " guestid");
626bfa03729959 Hauke Mehrtens 2021-10-13 212 if (cpu_has_drg)
626bfa03729959 Hauke Mehrtens 2021-10-13 213 seq_puts(m, " drg");
626bfa03729959 Hauke Mehrtens 2021-10-13 214 if (cpu_has_rixi)
626bfa03729959 Hauke Mehrtens 2021-10-13 215 seq_puts(m, " rixi");
626bfa03729959 Hauke Mehrtens 2021-10-13 216 if (cpu_has_lpa)
626bfa03729959 Hauke Mehrtens 2021-10-13 217 seq_puts(m, " lpa");
626bfa03729959 Hauke Mehrtens 2021-10-13 218 if (cpu_has_mvh)
626bfa03729959 Hauke Mehrtens 2021-10-13 219 seq_puts(m, " mvh");
626bfa03729959 Hauke Mehrtens 2021-10-13 220 if (cpu_has_vtag_icache)
626bfa03729959 Hauke Mehrtens 2021-10-13 221 seq_puts(m, " vtag_icache");
626bfa03729959 Hauke Mehrtens 2021-10-13 222 if (cpu_has_dc_aliases)
626bfa03729959 Hauke Mehrtens 2021-10-13 223 seq_puts(m, " dc_aliases");
626bfa03729959 Hauke Mehrtens 2021-10-13 224 if (cpu_has_ic_fills_f_dc)
626bfa03729959 Hauke Mehrtens 2021-10-13 225 seq_puts(m, " ic_fills_f_dc");
626bfa03729959 Hauke Mehrtens 2021-10-13 226 if (cpu_has_pindexed_dcache)
626bfa03729959 Hauke Mehrtens 2021-10-13 227 seq_puts(m, " pindexed_dcache");
626bfa03729959 Hauke Mehrtens 2021-10-13 228 if (cpu_has_userlocal)
626bfa03729959 Hauke Mehrtens 2021-10-13 229 seq_puts(m, " userlocal");
626bfa03729959 Hauke Mehrtens 2021-10-13 230 if (cpu_has_nofpuex)
626bfa03729959 Hauke Mehrtens 2021-10-13 231 seq_puts(m, " nofpuex");
626bfa03729959 Hauke Mehrtens 2021-10-13 232 if (cpu_has_vint)
626bfa03729959 Hauke Mehrtens 2021-10-13 233 seq_puts(m, " vint");
626bfa03729959 Hauke Mehrtens 2021-10-13 234 if (cpu_has_veic)
626bfa03729959 Hauke Mehrtens 2021-10-13 235 seq_puts(m, " veic");
626bfa03729959 Hauke Mehrtens 2021-10-13 236 if (cpu_has_inclusive_pcaches)
626bfa03729959 Hauke Mehrtens 2021-10-13 237 seq_puts(m, " inclusive_pcaches");
626bfa03729959 Hauke Mehrtens 2021-10-13 238 if (cpu_has_perf_cntr_intr_bit)
626bfa03729959 Hauke Mehrtens 2021-10-13 239 seq_puts(m, " perf_cntr_intr_bit");
626bfa03729959 Hauke Mehrtens 2021-10-13 240 if (cpu_has_ufr)
626bfa03729959 Hauke Mehrtens 2021-10-13 241 seq_puts(m, " ufr");
626bfa03729959 Hauke Mehrtens 2021-10-13 242 if (cpu_has_fre)
626bfa03729959 Hauke Mehrtens 2021-10-13 243 seq_puts(m, " fre");
626bfa03729959 Hauke Mehrtens 2021-10-13 244 if (cpu_has_cdmm)
626bfa03729959 Hauke Mehrtens 2021-10-13 245 seq_puts(m, " cdmm");
626bfa03729959 Hauke Mehrtens 2021-10-13 246 if (cpu_has_small_pages)
626bfa03729959 Hauke Mehrtens 2021-10-13 247 seq_puts(m, " small_pages");
626bfa03729959 Hauke Mehrtens 2021-10-13 248 if (cpu_has_nan_legacy)
626bfa03729959 Hauke Mehrtens 2021-10-13 249 seq_puts(m, " nan_legacy");
626bfa03729959 Hauke Mehrtens 2021-10-13 250 if (cpu_has_nan_2008)
626bfa03729959 Hauke Mehrtens 2021-10-13 251 seq_puts(m, " nan_2008");
626bfa03729959 Hauke Mehrtens 2021-10-13 252 if (cpu_has_ebase_wg)
626bfa03729959 Hauke Mehrtens 2021-10-13 253 seq_puts(m, " ebase_wg");
626bfa03729959 Hauke Mehrtens 2021-10-13 254 if (cpu_has_badinstr)
626bfa03729959 Hauke Mehrtens 2021-10-13 255 seq_puts(m, " badinstr");
626bfa03729959 Hauke Mehrtens 2021-10-13 256 if (cpu_has_badinstrp)
626bfa03729959 Hauke Mehrtens 2021-10-13 257 seq_puts(m, " badinstrp");
626bfa03729959 Hauke Mehrtens 2021-10-13 258 if (cpu_has_contextconfig)
626bfa03729959 Hauke Mehrtens 2021-10-13 259 seq_puts(m, " contextconfig");
626bfa03729959 Hauke Mehrtens 2021-10-13 260 if (cpu_has_perf)
626bfa03729959 Hauke Mehrtens 2021-10-13 261 seq_puts(m, " perf");
626bfa03729959 Hauke Mehrtens 2021-10-13 262 if (cpu_has_mac2008_only)
626bfa03729959 Hauke Mehrtens 2021-10-13 263 seq_puts(m, " mac2008_only");
626bfa03729959 Hauke Mehrtens 2021-10-13 264 if (cpu_has_ftlbparex)
626bfa03729959 Hauke Mehrtens 2021-10-13 265 seq_puts(m, " ftlbparex");
626bfa03729959 Hauke Mehrtens 2021-10-13 266 if (cpu_has_gsexcex)
626bfa03729959 Hauke Mehrtens 2021-10-13 267 seq_puts(m, " gsexcex");
626bfa03729959 Hauke Mehrtens 2021-10-13 268 if (cpu_has_shared_ftlb_ram)
626bfa03729959 Hauke Mehrtens 2021-10-13 269 seq_puts(m, " shared_ftlb_ram");
626bfa03729959 Hauke Mehrtens 2021-10-13 270 if (cpu_has_shared_ftlb_entries)
626bfa03729959 Hauke Mehrtens 2021-10-13 271 seq_puts(m, " shared_ftlb_entries");
626bfa03729959 Hauke Mehrtens 2021-10-13 272 if (cpu_has_mipsmt_pertccounters)
626bfa03729959 Hauke Mehrtens 2021-10-13 273 seq_puts(m, " mipsmt_pertccounters");
626bfa03729959 Hauke Mehrtens 2021-10-13 274 if (cpu_has_mmid)
626bfa03729959 Hauke Mehrtens 2021-10-13 275 seq_puts(m, " mmid");
626bfa03729959 Hauke Mehrtens 2021-10-13 276 if (cpu_has_mm_sysad)
626bfa03729959 Hauke Mehrtens 2021-10-13 277 seq_puts(m, " mm_sysad");
626bfa03729959 Hauke Mehrtens 2021-10-13 278 if (cpu_has_mm_full)
626bfa03729959 Hauke Mehrtens 2021-10-13 279 seq_puts(m, " mm_full");
626bfa03729959 Hauke Mehrtens 2021-10-13 280 seq_puts(m, "\n");
626bfa03729959 Hauke Mehrtens 2021-10-13 281
f6771dbb27c704 Ralf Baechle 2007-11-08 282 seq_printf(m, "shadow register sets\t: %d\n",
f6771dbb27c704 Ralf Baechle 2007-11-08 283 cpu_data[n].srsets);
e77c32fe284a4d David Daney 2010-12-21 284 seq_printf(m, "kscratch registers\t: %d\n",
e77c32fe284a4d David Daney 2010-12-21 285 hweight8(cpu_data[n].kscratch_mask));
bda4584cd943d7 Huacai Chen 2014-06-26 286 seq_printf(m, "package\t\t\t: %d\n", cpu_data[n].package);
f875a832d20285 Paul Burton 2017-08-12 287 seq_printf(m, "core\t\t\t: %d\n", cpu_core(&cpu_data[n]));
5508d456e9992b Ralf Baechle 2014-04-03 288
:::::: The code@line 61 was first introduced by commit
:::::: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 Linux-2.6.12-rc2
:::::: TO: Linus Torvalds <torvalds@ppc970.osdl.org>
:::::: CC: Linus Torvalds <torvalds@ppc970.osdl.org>
--
0-DAY CI Kernel Test Service
https://01.org/lkp
^ permalink raw reply [flat|nested] 6+ messages in thread
* arch/mips/kernel/proc.c:61:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provide...
@ 2022-04-23 19:23 kernel test robot
0 siblings, 0 replies; 6+ messages in thread
From: kernel test robot @ 2022-04-23 19:23 UTC (permalink / raw)
To: kbuild
[-- Attachment #1: Type: text/plain, Size: 55012 bytes --]
CC: llvm(a)lists.linux.dev
CC: kbuild-all(a)lists.01.org
BCC: lkp(a)intel.com
CC: linux-kernel(a)vger.kernel.org
TO: Arnd Bergmann <arnd@arndb.de>
CC: Masahiro Yamada <masahiroy@kernel.org>
CC: Alex Shi <alexs@kernel.org>
CC: Nick Desaulniers <ndesaulniers@google.com>
CC: Miguel Ojeda <ojeda@kernel.org>
CC: Nathan Chancellor <nathan@kernel.org>
tree: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git master
head: 45ab9400e73f34103e73c18a73280c9aa1650e98
commit: e8c07082a810fbb9db303a2b66b66b8d7e588b53 Kbuild: move to -std=gnu11
date: 6 weeks ago
:::::: branch date: 3 hours ago
:::::: commit date: 6 weeks ago
config: mips-randconfig-c004-20220421 (https://download.01.org/0day-ci/archive/20220424/202204240359.RIqrBXfp-lkp(a)intel.com/config)
compiler: clang version 15.0.0 (https://github.com/llvm/llvm-project 5bd87350a5ae429baf8f373cb226a57b62f87280)
reproduce (this is a W=1 build):
wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross
chmod +x ~/bin/make.cross
# install mips cross compiling tool for clang build
# apt-get install binutils-mips-linux-gnu
# https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e8c07082a810fbb9db303a2b66b66b8d7e588b53
git remote add linus https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
git fetch --no-tags linus master
git checkout e8c07082a810fbb9db303a2b66b66b8d7e588b53
# save the config file
COMPILER_INSTALL_PATH=$HOME/0day COMPILER=clang make.cross ARCH=mips clang-analyzer
If you fix the issue, kindly add following tag as appropriate
Reported-by: kernel test robot <lkp@intel.com>
clang-analyzer warnings: (new ones prefixed by >>)
set_softirq_pending(0);
^
include/linux/interrupt.h:545:33: note: expanded from macro 'set_softirq_pending'
#define set_softirq_pending(x) (__this_cpu_write(local_softirq_pending_ref, (x)))
^
include/linux/percpu-defs.h:452:2: note: expanded from macro '__this_cpu_write'
raw_cpu_write(pcp, val); \
^
include/linux/percpu-defs.h:421:34: note: expanded from macro 'raw_cpu_write'
#define raw_cpu_write(pcp, val) __pcpu_size_call(raw_cpu_write_, pcp, val)
^
note: (skipping 1 expansions in backtrace; use -fmacro-backtrace-limit=0 to see all)
note: expanded from here
include/asm-generic/percpu.h:214:35: note: expanded from macro 'raw_cpu_write_4'
#define raw_cpu_write_4(pcp, val) raw_cpu_generic_to_op(pcp, val, =)
^
include/asm-generic/percpu.h:70:48: note: expanded from macro 'raw_cpu_generic_to_op'
#define raw_cpu_generic_to_op(pcp, val, op) \
^
kernel/softirq.c:540:2: note: Execution continues on line 540
set_softirq_pending(0);
^
include/linux/interrupt.h:545:33: note: expanded from macro 'set_softirq_pending'
#define set_softirq_pending(x) (__this_cpu_write(local_softirq_pending_ref, (x)))
^
include/linux/percpu-defs.h:452:2: note: expanded from macro '__this_cpu_write'
raw_cpu_write(pcp, val); \
^
include/linux/percpu-defs.h:421:34: note: expanded from macro 'raw_cpu_write'
#define raw_cpu_write(pcp, val) __pcpu_size_call(raw_cpu_write_, pcp, val)
^
include/linux/percpu-defs.h:379:42: note: expanded from macro '__pcpu_size_call'
case 4: stem##4(variable, __VA_ARGS__);break; \
^
kernel/softirq.c:540:2: note: Loop condition is false. Exiting loop
set_softirq_pending(0);
^
include/linux/interrupt.h:545:33: note: expanded from macro 'set_softirq_pending'
#define set_softirq_pending(x) (__this_cpu_write(local_softirq_pending_ref, (x)))
^
include/linux/percpu-defs.h:452:2: note: expanded from macro '__this_cpu_write'
raw_cpu_write(pcp, val); \
^
include/linux/percpu-defs.h:421:34: note: expanded from macro 'raw_cpu_write'
#define raw_cpu_write(pcp, val) __pcpu_size_call(raw_cpu_write_, pcp, val)
^
include/linux/percpu-defs.h:373:50: note: expanded from macro '__pcpu_size_call'
#define __pcpu_size_call(stem, variable, ...) \
^
kernel/softirq.c:542:2: note: Loop condition is false. Exiting loop
local_irq_enable();
^
include/linux/irqflags.h:242:28: note: expanded from macro 'local_irq_enable'
#define local_irq_enable() do { raw_local_irq_enable(); } while (0)
^
kernel/softirq.c:546:2: note: Loop condition is true. Entering loop body
while ((softirq_bit = ffs(pending))) {
^
kernel/softirq.c:552:3: note: The value 23 is assigned to 'vec_nr'
vec_nr = h - softirq_vec;
^~~~~~~~~~~~~~~~~~~~~~~~
kernel/softirq.c:560:16: note: Assuming the condition is true
if (unlikely(prev_count != preempt_count())) {
^
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
kernel/softirq.c:560:3: note: Taking true branch
if (unlikely(prev_count != preempt_count())) {
^
kernel/softirq.c:561:4: note: Loop condition is false. Exiting loop
pr_err("huh, entered softirq %u %s %p with preempt_count %08x, exited with %08x?\n",
^
include/linux/printk.h:489:2: note: expanded from macro 'pr_err'
printk(KERN_ERR pr_fmt(fmt), ##__VA_ARGS__)
^
include/linux/printk.h:446:26: note: expanded from macro 'printk'
#define printk(fmt, ...) printk_index_wrap(_printk, fmt, ##__VA_ARGS__)
^
include/linux/printk.h:417:3: note: expanded from macro 'printk_index_wrap'
__printk_index_emit(_fmt, NULL, NULL); \
^
include/linux/printk.h:392:34: note: expanded from macro '__printk_index_emit'
#define __printk_index_emit(...) do {} while (0)
^
kernel/softirq.c:561:4: note: 3rd function call argument is an uninitialized value
pr_err("huh, entered softirq %u %s %p with preempt_count %08x, exited with %08x?\n",
^
include/linux/printk.h:489:2: note: expanded from macro 'pr_err'
printk(KERN_ERR pr_fmt(fmt), ##__VA_ARGS__)
^ ~~~~~~~~~~~
include/linux/printk.h:446:44: note: expanded from macro 'printk'
#define printk(fmt, ...) printk_index_wrap(_printk, fmt, ##__VA_ARGS__)
^ ~~~~~~~~~~~
include/linux/printk.h:418:3: note: expanded from macro 'printk_index_wrap'
_p_func(_fmt, ##__VA_ARGS__); \
^ ~~~~~~~~~~~
Suppressed 33 warnings (33 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
33 warnings generated.
>> arch/mips/kernel/proc.c:61:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(fmt, "cpu model\t\t: %%s V%%d.%%d%s\n",
^~~~~~~
arch/mips/kernel/proc.c:61:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(fmt, "cpu model\t\t: %%s V%%d.%%d%s\n",
^~~~~~~
arch/mips/kernel/proc.c:296:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(fmt, "VCE%%c exceptions\t\t: %s\n",
^~~~~~~
arch/mips/kernel/proc.c:296:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(fmt, "VCE%%c exceptions\t\t: %s\n",
^~~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
12 warnings generated.
Suppressed 12 warnings (12 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
33 warnings generated.
Suppressed 33 warnings (33 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
40 warnings generated.
Suppressed 40 warnings (40 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
40 warnings generated.
Suppressed 40 warnings (40 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
drivers/regulator/helpers.c:150:6: warning: Assigned value is garbage or undefined [clang-analyzer-core.uninitialized.Assign]
val >>= ffs(rdev->desc->vsel_mask) - 1;
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/regulator/helpers.c:138:6: note: Assuming 'r' is non-null
if (!r)
^~
drivers/regulator/helpers.c:138:2: note: Taking false branch
if (!r)
^
drivers/regulator/helpers.c:142:6: note: Assuming 'ret' is equal to 0
if (ret != 0)
^~~~~~~~
drivers/regulator/helpers.c:142:2: note: Taking false branch
if (ret != 0)
^
drivers/regulator/helpers.c:146:6: note: Assuming 'ret' is equal to 0
if (ret != 0)
^~~~~~~~
drivers/regulator/helpers.c:146:2: note: Taking false branch
if (ret != 0)
^
drivers/regulator/helpers.c:150:6: note: Assigned value is garbage or undefined
val >>= ffs(rdev->desc->vsel_mask) - 1;
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/regulator/helpers.c:245:6: warning: Assigned value is garbage or undefined [clang-analyzer-core.uninitialized.Assign]
val >>= ffs(rdev->desc->vsel_mask) - 1;
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/regulator/helpers.c:241:6: note: Assuming 'ret' is equal to 0
if (ret != 0)
^~~~~~~~
drivers/regulator/helpers.c:241:2: note: Taking false branch
if (ret != 0)
^
drivers/regulator/helpers.c:245:6: note: Assigned value is garbage or undefined
val >>= ffs(rdev->desc->vsel_mask) - 1;
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/regulator/helpers.c:833:6: warning: Assigned value is garbage or undefined [clang-analyzer-core.uninitialized.Assign]
sel <<= ffs(rdev->desc->csel_mask) - 1;
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/regulator/helpers.c:803:6: note: Assuming 'n_currents' is not equal to 0
if (n_currents == 0)
^~~~~~~~~~~~~~~
drivers/regulator/helpers.c:803:2: note: Taking false branch
if (n_currents == 0)
^
drivers/regulator/helpers.c:806:6: note: Assuming field 'curr_table' is non-null
if (rdev->desc->curr_table) {
^~~~~~~~~~~~~~~~~~~~~~
drivers/regulator/helpers.c:806:2: note: Taking true branch
if (rdev->desc->curr_table) {
^
drivers/regulator/helpers.c:811:7: note: Assuming 'ascend' is false
if (ascend) {
^~~~~~
drivers/regulator/helpers.c:811:3: note: Taking false branch
if (ascend) {
^
drivers/regulator/helpers.c:820:16: note: 'i' is < 'n_currents'
for (i = 0; i < n_currents; i++) {
^
drivers/regulator/helpers.c:820:4: note: Loop condition is true. Entering loop body
for (i = 0; i < n_currents; i++) {
--
^~~~~~
drivers/leds/led-class-multicolor.c:79:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += sprintf(buf + len, "%d",
^~~~~~~
drivers/leds/led-class-multicolor.c:79:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
len += sprintf(buf + len, "%d",
^~~~~~~
drivers/leds/led-class-multicolor.c:82:11: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += sprintf(buf + len, " ");
^~~~~~~
drivers/leds/led-class-multicolor.c:82:11: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
len += sprintf(buf + len, " ");
^~~~~~~
drivers/leds/led-class-multicolor.c:102:10: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += sprintf(buf + len, "%s", led_colors[index]);
^~~~~~~
drivers/leds/led-class-multicolor.c:102:10: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
len += sprintf(buf + len, "%s", led_colors[index]);
^~~~~~~
drivers/leds/led-class-multicolor.c:104:11: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += sprintf(buf + len, " ");
^~~~~~~
drivers/leds/led-class-multicolor.c:104:11: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
len += sprintf(buf + len, " ");
^~~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
38 warnings generated.
drivers/usb/serial/quatech2.c:229:2: warning: Value stored to 'clear' is never read [clang-analyzer-deadcode.DeadStores]
clear &= ~set; /* 'set' takes precedence over 'clear' */
^ ~~~~
drivers/usb/serial/quatech2.c:229:2: note: Value stored to 'clear' is never read
clear &= ~set; /* 'set' takes precedence over 'clear' */
^ ~~~~
drivers/usb/serial/quatech2.c:482:2: warning: Value stored to 'ch' is never read [clang-analyzer-deadcode.DeadStores]
ch = urb->transfer_buffer;
^ ~~~~~~~~~~~~~~~~~~~~
drivers/usb/serial/quatech2.c:482:2: note: Value stored to 'ch' is never read
ch = urb->transfer_buffer;
^ ~~~~~~~~~~~~~~~~~~~~
drivers/usb/serial/quatech2.c:927:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data, buf, count);
^~~~~~
drivers/usb/serial/quatech2.c:927:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data, buf, count);
^~~~~~
Suppressed 35 warnings (34 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
drivers/usb/serial/sierra.c:468:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buffer, buf, writesize);
^~~~~~
drivers/usb/serial/sierra.c:468:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buffer, buf, writesize);
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
drivers/usb/serial/ssu100.c:144:2: warning: Value stored to 'clear' is never read [clang-analyzer-deadcode.DeadStores]
clear &= ~set; /* 'set' takes precedence over 'clear' */
^ ~~~~
drivers/usb/serial/ssu100.c:144:2: note: Value stored to 'clear' is never read
clear &= ~set; /* 'set' takes precedence over 'clear' */
^ ~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
65 warnings generated.
drivers/usb/gadget/function/f_ncm.c:733:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(req->buf, &ntb_parameters, value);
^~~~~~
drivers/usb/gadget/function/f_ncm.c:733:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(req->buf, &ntb_parameters, value);
^~~~~~
drivers/usb/gadget/function/f_ncm.c:1089:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ntb_ndp, 0, ncb_len);
^~~~~~
drivers/usb/gadget/function/f_ncm.c:1089:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(ntb_ndp, 0, ncb_len);
^~~~~~
drivers/usb/gadget/function/f_ncm.c:1586:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
USB_ETHERNET_CONFIGFS_ITEM_ATTR_QMULT(ncm);
^
drivers/usb/gadget/function/u_ether_configfs.h:108:10: note: expanded from macro 'USB_ETHERNET_CONFIGFS_ITEM_ATTR_QMULT'
return sprintf(page, "%d\n", qmult); \
^~~~~~~
drivers/usb/gadget/function/f_ncm.c:1586:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
USB_ETHERNET_CONFIGFS_ITEM_ATTR_QMULT(ncm);
^
drivers/usb/gadget/function/u_ether_configfs.h:108:10: note: expanded from macro 'USB_ETHERNET_CONFIGFS_ITEM_ATTR_QMULT'
return sprintf(page, "%d\n", qmult); \
^~~~~~~
Suppressed 62 warnings (62 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
38 warnings generated.
>> drivers/usb/usbip/vudc_dev.c:535:3: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(ep->name, "ep%d%s", num,
^~~~~~~
drivers/usb/usbip/vudc_dev.c:535:3: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(ep->name, "ep%d%s", num,
^~~~~~~
Suppressed 37 warnings (37 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
71 warnings generated.
drivers/usb/usbip/vudc_sysfs.c:55:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ddesc, usb_req->req.buf, sizeof(*ddesc));
^~~~~~
drivers/usb/usbip/vudc_sysfs.c:55:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ddesc, usb_req->req.buf, sizeof(*ddesc));
^~~~~~
drivers/usb/usbip/vudc_sysfs.c:85:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(out, desc_ptr + off, count);
^~~~~~
drivers/usb/usbip/vudc_sysfs.c:85:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(out, desc_ptr + off, count);
^~~~~~
drivers/usb/usbip/vudc_sysfs.c:245:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(out, PAGE_SIZE, "%d\n", status);
^~~~~~~~
drivers/usb/usbip/vudc_sysfs.c:245:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(out, PAGE_SIZE, "%d\n", status);
^~~~~~~~
Suppressed 68 warnings (68 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
75 warnings generated.
drivers/usb/usbip/vudc_tx.c:48:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&pdu_header, 0, sizeof(pdu_header));
^~~~~~
drivers/usb/usbip/vudc_tx.c:48:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&pdu_header, 0, sizeof(pdu_header));
^~~~~~
drivers/usb/usbip/vudc_tx.c:49:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&msg, 0, sizeof(msg));
^~~~~~
drivers/usb/usbip/vudc_tx.c:49:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&msg, 0, sizeof(msg));
^~~~~~
drivers/usb/usbip/vudc_tx.c:50:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&iov, 0, sizeof(iov));
^~~~~~
drivers/usb/usbip/vudc_tx.c:50:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&iov, 0, sizeof(iov));
^~~~~~
drivers/usb/usbip/vudc_tx.c:85:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&pdu_header, 0, sizeof(pdu_header));
^~~~~~
drivers/usb/usbip/vudc_tx.c:85:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&pdu_header, 0, sizeof(pdu_header));
^~~~~~
drivers/usb/usbip/vudc_tx.c:86:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&msg, 0, sizeof(msg));
^~~~~~
drivers/usb/usbip/vudc_tx.c:86:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&msg, 0, sizeof(msg));
^~~~~~
include/linux/list.h:137:13: warning: Use of memory after it is freed [clang-analyzer-unix.Malloc]
__list_del(entry->prev, entry->next);
^
drivers/usb/usbip/vudc_tx.c:227:9: note: Assuming the condition is true
while (!kthread_should_stop()) {
^~~~~~~~~~~~~~~~~~~~~~
drivers/usb/usbip/vudc_tx.c:227:2: note: Loop condition is true. Entering loop body
while (!kthread_should_stop()) {
^
drivers/usb/usbip/vudc_tx.c:228:7: note: Assuming the condition is false
if (usbip_event_happened(&udc->ud))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/usb/usbip/vudc_tx.c:228:3: note: Taking false branch
if (usbip_event_happened(&udc->ud))
^
drivers/usb/usbip/vudc_tx.c:230:9: note: Calling 'v_send_ret'
ret = v_send_ret(udc);
^~~~~~~~~~~~~~~
drivers/usb/usbip/vudc_tx.c:191:2: note: Loop condition is false. Exiting loop
spin_lock_irqsave(&udc->lock_tx, flags);
^
include/linux/spinlock.h:379:2: note: expanded from macro 'spin_lock_irqsave'
raw_spin_lock_irqsave(spinlock_check(lock), flags); \
^
include/linux/spinlock.h:264:3: note: expanded from macro 'raw_spin_lock_irqsave'
_raw_spin_lock_irqsave(lock, flags); \
^
include/linux/spinlock_api_up.h:69:45: note: expanded from macro '_raw_spin_lock_irqsave'
#define _raw_spin_lock_irqsave(lock, flags) __LOCK_IRQSAVE(lock, flags)
^
include/linux/spinlock_api_up.h:40:8: note: expanded from macro '__LOCK_IRQSAVE'
do { local_irq_save(flags); __LOCK(lock); } while (0)
^
include/linux/irqflags.h:244:36: note: expanded from macro 'local_irq_save'
#define local_irq_save(flags) do { raw_local_irq_save(flags); } while (0)
^
include/linux/irqflags.h:176:2: note: expanded from macro 'raw_local_irq_save'
do { \
^
drivers/usb/usbip/vudc_tx.c:191:2: note: Loop condition is false. Exiting loop
spin_lock_irqsave(&udc->lock_tx, flags);
vim +61 arch/mips/kernel/proc.c
^1da177e4c3f415 Linus Torvalds 2005-04-16 49
^1da177e4c3f415 Linus Torvalds 2005-04-16 50 /*
^1da177e4c3f415 Linus Torvalds 2005-04-16 51 * For the first processor also print the system type
^1da177e4c3f415 Linus Torvalds 2005-04-16 52 */
487d70d0b8bd1c7 Gabor Juhos 2010-11-23 53 if (n == 0) {
^1da177e4c3f415 Linus Torvalds 2005-04-16 54 seq_printf(m, "system type\t\t: %s\n", get_system_type());
487d70d0b8bd1c7 Gabor Juhos 2010-11-23 55 if (mips_get_machine_name())
487d70d0b8bd1c7 Gabor Juhos 2010-11-23 56 seq_printf(m, "machine\t\t\t: %s\n",
487d70d0b8bd1c7 Gabor Juhos 2010-11-23 57 mips_get_machine_name());
487d70d0b8bd1c7 Gabor Juhos 2010-11-23 58 }
^1da177e4c3f415 Linus Torvalds 2005-04-16 59
^1da177e4c3f415 Linus Torvalds 2005-04-16 60 seq_printf(m, "processor\t\t: %ld\n", n);
^1da177e4c3f415 Linus Torvalds 2005-04-16 @61 sprintf(fmt, "cpu model\t\t: %%s V%%d.%%d%s\n",
e04582b7bc70b40 Atsushi Nemoto 2006-10-09 62 cpu_data[n].options & MIPS_CPU_FPU ? " FPU V%d.%d" : "");
e47c659b55aff70 Johannes Dickgreber 2008-10-13 63 seq_printf(m, fmt, __cpu_name[n],
^1da177e4c3f415 Linus Torvalds 2005-04-16 64 (version >> 4) & 0x0f, version & 0x0f,
^1da177e4c3f415 Linus Torvalds 2005-04-16 65 (fp_vers >> 4) & 0x0f, fp_vers & 0x0f);
5636919b5c909fe Ralf Baechle 2009-02-28 66 seq_printf(m, "BogoMIPS\t\t: %u.%02u\n",
0ac354801a87918 Ralf Baechle 2005-02-21 67 cpu_data[n].udelay_val / (500000/HZ),
0ac354801a87918 Ralf Baechle 2005-02-21 68 (cpu_data[n].udelay_val / (5000/HZ)) % 100);
^1da177e4c3f415 Linus Torvalds 2005-04-16 69 seq_printf(m, "wait instruction\t: %s\n", cpu_wait ? "yes" : "no");
^1da177e4c3f415 Linus Torvalds 2005-04-16 70 seq_printf(m, "microsecond timers\t: %s\n",
^1da177e4c3f415 Linus Torvalds 2005-04-16 71 cpu_has_counter ? "yes" : "no");
31aa36658a12326 Karl-Johan Karlsson 2006-10-08 72 seq_printf(m, "tlb_entries\t\t: %d\n", cpu_data[n].tlbsize);
^1da177e4c3f415 Linus Torvalds 2005-04-16 73 seq_printf(m, "extra interrupt vector\t: %s\n",
^1da177e4c3f415 Linus Torvalds 2005-04-16 74 cpu_has_divec ? "yes" : "no");
654f57bfb467996 David Daney 2008-09-23 75 seq_printf(m, "hardware watchpoint\t: %s",
654f57bfb467996 David Daney 2008-09-23 76 cpu_has_watch ? "yes, " : "no\n");
654f57bfb467996 David Daney 2008-09-23 77 if (cpu_has_watch) {
654f57bfb467996 David Daney 2008-09-23 78 seq_printf(m, "count: %d, address/irw mask: [",
654f57bfb467996 David Daney 2008-09-23 79 cpu_data[n].watch_reg_count);
654f57bfb467996 David Daney 2008-09-23 80 for (i = 0; i < cpu_data[n].watch_reg_count; i++)
654f57bfb467996 David Daney 2008-09-23 81 seq_printf(m, "%s0x%04x", i ? ", " : "",
654f57bfb467996 David Daney 2008-09-23 82 cpu_data[n].watch_reg_masks[i]);
1ad964ae1a91501 Ilya Lipnitskiy 2021-10-13 83 seq_puts(m, "]\n");
654f57bfb467996 David Daney 2008-09-23 84 }
41315b6ec108e93 Aaro Koskinen 2013-12-31 85
1ad964ae1a91501 Ilya Lipnitskiy 2021-10-13 86 seq_puts(m, "isa\t\t\t:");
e5f5a5b06e51a36 Maciej W. Rozycki 2017-07-08 87 if (cpu_has_mips_1)
1ad964ae1a91501 Ilya Lipnitskiy 2021-10-13 88 seq_puts(m, " mips1");
a96102be700f872 Steven J. Hill 2012-12-07 89 if (cpu_has_mips_2)
1ad964ae1a91501 Ilya Lipnitskiy 2021-10-13 90 seq_puts(m, " mips2");
a96102be700f872 Steven J. Hill 2012-12-07 91 if (cpu_has_mips_3)
1ad964ae1a91501 Ilya Lipnitskiy 2021-10-13 92 seq_puts(m, " mips3");
a96102be700f872 Steven J. Hill 2012-12-07 93 if (cpu_has_mips_4)
1ad964ae1a91501 Ilya Lipnitskiy 2021-10-13 94 seq_puts(m, " mips4");
a96102be700f872 Steven J. Hill 2012-12-07 95 if (cpu_has_mips_5)
1ad964ae1a91501 Ilya Lipnitskiy 2021-10-13 96 seq_puts(m, " mips5");
a96102be700f872 Steven J. Hill 2012-12-07 97 if (cpu_has_mips32r1)
1ad964ae1a91501 Ilya Lipnitskiy 2021-10-13 98 seq_puts(m, " mips32r1");
a96102be700f872 Steven J. Hill 2012-12-07 99 if (cpu_has_mips32r2)
1ad964ae1a91501 Ilya Lipnitskiy 2021-10-13 100 seq_puts(m, " mips32r2");
ab7c01fdc3cfe02 Serge Semin 2020-05-21 101 if (cpu_has_mips32r5)
1ad964ae1a91501 Ilya Lipnitskiy 2021-10-13 102 seq_puts(m, " mips32r5");
515a6393dbac4f4 Markos Chandras 2014-11-14 103 if (cpu_has_mips32r6)
1ad964ae1a91501 Ilya Lipnitskiy 2021-10-13 104 seq_puts(m, " mips32r6");
a96102be700f872 Steven J. Hill 2012-12-07 105 if (cpu_has_mips64r1)
1ad964ae1a91501 Ilya Lipnitskiy 2021-10-13 106 seq_puts(m, " mips64r1");
a96102be700f872 Steven J. Hill 2012-12-07 107 if (cpu_has_mips64r2)
1ad964ae1a91501 Ilya Lipnitskiy 2021-10-13 108 seq_puts(m, " mips64r2");
ab7c01fdc3cfe02 Serge Semin 2020-05-21 109 if (cpu_has_mips64r5)
1ad964ae1a91501 Ilya Lipnitskiy 2021-10-13 110 seq_puts(m, " mips64r5");
515a6393dbac4f4 Markos Chandras 2014-11-14 111 if (cpu_has_mips64r6)
1ad964ae1a91501 Ilya Lipnitskiy 2021-10-13 112 seq_puts(m, " mips64r6");
1ad964ae1a91501 Ilya Lipnitskiy 2021-10-13 113 seq_puts(m, "\n");
981ef0de49869c9 Ralf Baechle 2012-08-20 114
1ad964ae1a91501 Ilya Lipnitskiy 2021-10-13 115 seq_puts(m, "ASEs implemented\t:");
01fde9a0e497c70 Ilya Lipnitskiy 2021-10-13 116 if (cpu_has_mips16)
1ad964ae1a91501 Ilya Lipnitskiy 2021-10-13 117 seq_puts(m, " mips16");
01fde9a0e497c70 Ilya Lipnitskiy 2021-10-13 118 if (cpu_has_mips16e2)
1ad964ae1a91501 Ilya Lipnitskiy 2021-10-13 119 seq_puts(m, " mips16e2");
01fde9a0e497c70 Ilya Lipnitskiy 2021-10-13 120 if (cpu_has_mdmx)
1ad964ae1a91501 Ilya Lipnitskiy 2021-10-13 121 seq_puts(m, " mdmx");
01fde9a0e497c70 Ilya Lipnitskiy 2021-10-13 122 if (cpu_has_mips3d)
1ad964ae1a91501 Ilya Lipnitskiy 2021-10-13 123 seq_puts(m, " mips3d");
01fde9a0e497c70 Ilya Lipnitskiy 2021-10-13 124 if (cpu_has_smartmips)
1ad964ae1a91501 Ilya Lipnitskiy 2021-10-13 125 seq_puts(m, " smartmips");
01fde9a0e497c70 Ilya Lipnitskiy 2021-10-13 126 if (cpu_has_dsp)
1ad964ae1a91501 Ilya Lipnitskiy 2021-10-13 127 seq_puts(m, " dsp");
01fde9a0e497c70 Ilya Lipnitskiy 2021-10-13 128 if (cpu_has_dsp2)
1ad964ae1a91501 Ilya Lipnitskiy 2021-10-13 129 seq_puts(m, " dsp2");
01fde9a0e497c70 Ilya Lipnitskiy 2021-10-13 130 if (cpu_has_dsp3)
1ad964ae1a91501 Ilya Lipnitskiy 2021-10-13 131 seq_puts(m, " dsp3");
01fde9a0e497c70 Ilya Lipnitskiy 2021-10-13 132 if (cpu_has_mipsmt)
1ad964ae1a91501 Ilya Lipnitskiy 2021-10-13 133 seq_puts(m, " mt");
01fde9a0e497c70 Ilya Lipnitskiy 2021-10-13 134 if (cpu_has_mmips)
1ad964ae1a91501 Ilya Lipnitskiy 2021-10-13 135 seq_puts(m, " micromips");
01fde9a0e497c70 Ilya Lipnitskiy 2021-10-13 136 if (cpu_has_vz)
1ad964ae1a91501 Ilya Lipnitskiy 2021-10-13 137 seq_puts(m, " vz");
01fde9a0e497c70 Ilya Lipnitskiy 2021-10-13 138 if (cpu_has_msa)
1ad964ae1a91501 Ilya Lipnitskiy 2021-10-13 139 seq_puts(m, " msa");
01fde9a0e497c70 Ilya Lipnitskiy 2021-10-13 140 if (cpu_has_eva)
1ad964ae1a91501 Ilya Lipnitskiy 2021-10-13 141 seq_puts(m, " eva");
01fde9a0e497c70 Ilya Lipnitskiy 2021-10-13 142 if (cpu_has_htw)
1ad964ae1a91501 Ilya Lipnitskiy 2021-10-13 143 seq_puts(m, " htw");
01fde9a0e497c70 Ilya Lipnitskiy 2021-10-13 144 if (cpu_has_xpa)
1ad964ae1a91501 Ilya Lipnitskiy 2021-10-13 145 seq_puts(m, " xpa");
01fde9a0e497c70 Ilya Lipnitskiy 2021-10-13 146 if (cpu_has_loongson_mmi)
1ad964ae1a91501 Ilya Lipnitskiy 2021-10-13 147 seq_puts(m, " loongson-mmi");
01fde9a0e497c70 Ilya Lipnitskiy 2021-10-13 148 if (cpu_has_loongson_cam)
1ad964ae1a91501 Ilya Lipnitskiy 2021-10-13 149 seq_puts(m, " loongson-cam");
01fde9a0e497c70 Ilya Lipnitskiy 2021-10-13 150 if (cpu_has_loongson_ext)
1ad964ae1a91501 Ilya Lipnitskiy 2021-10-13 151 seq_puts(m, " loongson-ext");
01fde9a0e497c70 Ilya Lipnitskiy 2021-10-13 152 if (cpu_has_loongson_ext2)
1ad964ae1a91501 Ilya Lipnitskiy 2021-10-13 153 seq_puts(m, " loongson-ext2");
1ad964ae1a91501 Ilya Lipnitskiy 2021-10-13 154 seq_puts(m, "\n");
981ef0de49869c9 Ralf Baechle 2012-08-20 155
bce860833ab1e40 Steven J. Hill 2013-03-25 156 if (cpu_has_mmips) {
bce860833ab1e40 Steven J. Hill 2013-03-25 157 seq_printf(m, "micromips kernel\t: %s\n",
bce860833ab1e40 Steven J. Hill 2013-03-25 158 (read_c0_config3() & MIPS_CONF3_ISA_OE) ? "yes" : "no");
bce860833ab1e40 Steven J. Hill 2013-03-25 159 }
626bfa03729959e Hauke Mehrtens 2021-10-13 160
626bfa03729959e Hauke Mehrtens 2021-10-13 161 seq_puts(m, "Options implemented\t:");
626bfa03729959e Hauke Mehrtens 2021-10-13 162 if (cpu_has_tlb)
626bfa03729959e Hauke Mehrtens 2021-10-13 163 seq_puts(m, " tlb");
626bfa03729959e Hauke Mehrtens 2021-10-13 164 if (cpu_has_ftlb)
626bfa03729959e Hauke Mehrtens 2021-10-13 165 seq_puts(m, " ftlb");
626bfa03729959e Hauke Mehrtens 2021-10-13 166 if (cpu_has_tlbinv)
626bfa03729959e Hauke Mehrtens 2021-10-13 167 seq_puts(m, " tlbinv");
626bfa03729959e Hauke Mehrtens 2021-10-13 168 if (cpu_has_segments)
626bfa03729959e Hauke Mehrtens 2021-10-13 169 seq_puts(m, " segments");
626bfa03729959e Hauke Mehrtens 2021-10-13 170 if (cpu_has_rixiex)
626bfa03729959e Hauke Mehrtens 2021-10-13 171 seq_puts(m, " rixiex");
626bfa03729959e Hauke Mehrtens 2021-10-13 172 if (cpu_has_ldpte)
626bfa03729959e Hauke Mehrtens 2021-10-13 173 seq_puts(m, " ldpte");
626bfa03729959e Hauke Mehrtens 2021-10-13 174 if (cpu_has_maar)
626bfa03729959e Hauke Mehrtens 2021-10-13 175 seq_puts(m, " maar");
626bfa03729959e Hauke Mehrtens 2021-10-13 176 if (cpu_has_rw_llb)
626bfa03729959e Hauke Mehrtens 2021-10-13 177 seq_puts(m, " rw_llb");
626bfa03729959e Hauke Mehrtens 2021-10-13 178 if (cpu_has_4kex)
626bfa03729959e Hauke Mehrtens 2021-10-13 179 seq_puts(m, " 4kex");
626bfa03729959e Hauke Mehrtens 2021-10-13 180 if (cpu_has_3k_cache)
626bfa03729959e Hauke Mehrtens 2021-10-13 181 seq_puts(m, " 3k_cache");
626bfa03729959e Hauke Mehrtens 2021-10-13 182 if (cpu_has_4k_cache)
626bfa03729959e Hauke Mehrtens 2021-10-13 183 seq_puts(m, " 4k_cache");
626bfa03729959e Hauke Mehrtens 2021-10-13 184 if (cpu_has_tx39_cache)
626bfa03729959e Hauke Mehrtens 2021-10-13 185 seq_puts(m, " tx39_cache");
626bfa03729959e Hauke Mehrtens 2021-10-13 186 if (cpu_has_octeon_cache)
626bfa03729959e Hauke Mehrtens 2021-10-13 187 seq_puts(m, " octeon_cache");
1cab5bd69eb1f99 Tiezhu Yang 2021-11-25 188 if (raw_cpu_has_fpu)
626bfa03729959e Hauke Mehrtens 2021-10-13 189 seq_puts(m, " fpu");
626bfa03729959e Hauke Mehrtens 2021-10-13 190 if (cpu_has_32fpr)
626bfa03729959e Hauke Mehrtens 2021-10-13 191 seq_puts(m, " 32fpr");
626bfa03729959e Hauke Mehrtens 2021-10-13 192 if (cpu_has_cache_cdex_p)
626bfa03729959e Hauke Mehrtens 2021-10-13 193 seq_puts(m, " cache_cdex_p");
626bfa03729959e Hauke Mehrtens 2021-10-13 194 if (cpu_has_cache_cdex_s)
626bfa03729959e Hauke Mehrtens 2021-10-13 195 seq_puts(m, " cache_cdex_s");
626bfa03729959e Hauke Mehrtens 2021-10-13 196 if (cpu_has_prefetch)
626bfa03729959e Hauke Mehrtens 2021-10-13 197 seq_puts(m, " prefetch");
626bfa03729959e Hauke Mehrtens 2021-10-13 198 if (cpu_has_mcheck)
626bfa03729959e Hauke Mehrtens 2021-10-13 199 seq_puts(m, " mcheck");
626bfa03729959e Hauke Mehrtens 2021-10-13 200 if (cpu_has_ejtag)
626bfa03729959e Hauke Mehrtens 2021-10-13 201 seq_puts(m, " ejtag");
626bfa03729959e Hauke Mehrtens 2021-10-13 202 if (cpu_has_llsc)
626bfa03729959e Hauke Mehrtens 2021-10-13 203 seq_puts(m, " llsc");
626bfa03729959e Hauke Mehrtens 2021-10-13 204 if (cpu_has_guestctl0ext)
626bfa03729959e Hauke Mehrtens 2021-10-13 205 seq_puts(m, " guestctl0ext");
626bfa03729959e Hauke Mehrtens 2021-10-13 206 if (cpu_has_guestctl1)
626bfa03729959e Hauke Mehrtens 2021-10-13 207 seq_puts(m, " guestctl1");
626bfa03729959e Hauke Mehrtens 2021-10-13 208 if (cpu_has_guestctl2)
626bfa03729959e Hauke Mehrtens 2021-10-13 209 seq_puts(m, " guestctl2");
626bfa03729959e Hauke Mehrtens 2021-10-13 210 if (cpu_has_guestid)
626bfa03729959e Hauke Mehrtens 2021-10-13 211 seq_puts(m, " guestid");
626bfa03729959e Hauke Mehrtens 2021-10-13 212 if (cpu_has_drg)
626bfa03729959e Hauke Mehrtens 2021-10-13 213 seq_puts(m, " drg");
626bfa03729959e Hauke Mehrtens 2021-10-13 214 if (cpu_has_rixi)
626bfa03729959e Hauke Mehrtens 2021-10-13 215 seq_puts(m, " rixi");
626bfa03729959e Hauke Mehrtens 2021-10-13 216 if (cpu_has_lpa)
626bfa03729959e Hauke Mehrtens 2021-10-13 217 seq_puts(m, " lpa");
626bfa03729959e Hauke Mehrtens 2021-10-13 218 if (cpu_has_mvh)
626bfa03729959e Hauke Mehrtens 2021-10-13 219 seq_puts(m, " mvh");
626bfa03729959e Hauke Mehrtens 2021-10-13 220 if (cpu_has_vtag_icache)
626bfa03729959e Hauke Mehrtens 2021-10-13 221 seq_puts(m, " vtag_icache");
626bfa03729959e Hauke Mehrtens 2021-10-13 222 if (cpu_has_dc_aliases)
626bfa03729959e Hauke Mehrtens 2021-10-13 223 seq_puts(m, " dc_aliases");
626bfa03729959e Hauke Mehrtens 2021-10-13 224 if (cpu_has_ic_fills_f_dc)
626bfa03729959e Hauke Mehrtens 2021-10-13 225 seq_puts(m, " ic_fills_f_dc");
626bfa03729959e Hauke Mehrtens 2021-10-13 226 if (cpu_has_pindexed_dcache)
626bfa03729959e Hauke Mehrtens 2021-10-13 227 seq_puts(m, " pindexed_dcache");
626bfa03729959e Hauke Mehrtens 2021-10-13 228 if (cpu_has_userlocal)
626bfa03729959e Hauke Mehrtens 2021-10-13 229 seq_puts(m, " userlocal");
626bfa03729959e Hauke Mehrtens 2021-10-13 230 if (cpu_has_nofpuex)
626bfa03729959e Hauke Mehrtens 2021-10-13 231 seq_puts(m, " nofpuex");
626bfa03729959e Hauke Mehrtens 2021-10-13 232 if (cpu_has_vint)
626bfa03729959e Hauke Mehrtens 2021-10-13 233 seq_puts(m, " vint");
626bfa03729959e Hauke Mehrtens 2021-10-13 234 if (cpu_has_veic)
626bfa03729959e Hauke Mehrtens 2021-10-13 235 seq_puts(m, " veic");
626bfa03729959e Hauke Mehrtens 2021-10-13 236 if (cpu_has_inclusive_pcaches)
626bfa03729959e Hauke Mehrtens 2021-10-13 237 seq_puts(m, " inclusive_pcaches");
626bfa03729959e Hauke Mehrtens 2021-10-13 238 if (cpu_has_perf_cntr_intr_bit)
626bfa03729959e Hauke Mehrtens 2021-10-13 239 seq_puts(m, " perf_cntr_intr_bit");
626bfa03729959e Hauke Mehrtens 2021-10-13 240 if (cpu_has_ufr)
626bfa03729959e Hauke Mehrtens 2021-10-13 241 seq_puts(m, " ufr");
626bfa03729959e Hauke Mehrtens 2021-10-13 242 if (cpu_has_fre)
626bfa03729959e Hauke Mehrtens 2021-10-13 243 seq_puts(m, " fre");
626bfa03729959e Hauke Mehrtens 2021-10-13 244 if (cpu_has_cdmm)
626bfa03729959e Hauke Mehrtens 2021-10-13 245 seq_puts(m, " cdmm");
626bfa03729959e Hauke Mehrtens 2021-10-13 246 if (cpu_has_small_pages)
626bfa03729959e Hauke Mehrtens 2021-10-13 247 seq_puts(m, " small_pages");
626bfa03729959e Hauke Mehrtens 2021-10-13 248 if (cpu_has_nan_legacy)
626bfa03729959e Hauke Mehrtens 2021-10-13 249 seq_puts(m, " nan_legacy");
626bfa03729959e Hauke Mehrtens 2021-10-13 250 if (cpu_has_nan_2008)
626bfa03729959e Hauke Mehrtens 2021-10-13 251 seq_puts(m, " nan_2008");
626bfa03729959e Hauke Mehrtens 2021-10-13 252 if (cpu_has_ebase_wg)
626bfa03729959e Hauke Mehrtens 2021-10-13 253 seq_puts(m, " ebase_wg");
626bfa03729959e Hauke Mehrtens 2021-10-13 254 if (cpu_has_badinstr)
626bfa03729959e Hauke Mehrtens 2021-10-13 255 seq_puts(m, " badinstr");
626bfa03729959e Hauke Mehrtens 2021-10-13 256 if (cpu_has_badinstrp)
626bfa03729959e Hauke Mehrtens 2021-10-13 257 seq_puts(m, " badinstrp");
626bfa03729959e Hauke Mehrtens 2021-10-13 258 if (cpu_has_contextconfig)
626bfa03729959e Hauke Mehrtens 2021-10-13 259 seq_puts(m, " contextconfig");
626bfa03729959e Hauke Mehrtens 2021-10-13 260 if (cpu_has_perf)
626bfa03729959e Hauke Mehrtens 2021-10-13 261 seq_puts(m, " perf");
626bfa03729959e Hauke Mehrtens 2021-10-13 262 if (cpu_has_mac2008_only)
626bfa03729959e Hauke Mehrtens 2021-10-13 263 seq_puts(m, " mac2008_only");
626bfa03729959e Hauke Mehrtens 2021-10-13 264 if (cpu_has_ftlbparex)
626bfa03729959e Hauke Mehrtens 2021-10-13 265 seq_puts(m, " ftlbparex");
626bfa03729959e Hauke Mehrtens 2021-10-13 266 if (cpu_has_gsexcex)
626bfa03729959e Hauke Mehrtens 2021-10-13 267 seq_puts(m, " gsexcex");
626bfa03729959e Hauke Mehrtens 2021-10-13 268 if (cpu_has_shared_ftlb_ram)
626bfa03729959e Hauke Mehrtens 2021-10-13 269 seq_puts(m, " shared_ftlb_ram");
626bfa03729959e Hauke Mehrtens 2021-10-13 270 if (cpu_has_shared_ftlb_entries)
626bfa03729959e Hauke Mehrtens 2021-10-13 271 seq_puts(m, " shared_ftlb_entries");
626bfa03729959e Hauke Mehrtens 2021-10-13 272 if (cpu_has_mipsmt_pertccounters)
626bfa03729959e Hauke Mehrtens 2021-10-13 273 seq_puts(m, " mipsmt_pertccounters");
626bfa03729959e Hauke Mehrtens 2021-10-13 274 if (cpu_has_mmid)
626bfa03729959e Hauke Mehrtens 2021-10-13 275 seq_puts(m, " mmid");
626bfa03729959e Hauke Mehrtens 2021-10-13 276 if (cpu_has_mm_sysad)
626bfa03729959e Hauke Mehrtens 2021-10-13 277 seq_puts(m, " mm_sysad");
626bfa03729959e Hauke Mehrtens 2021-10-13 278 if (cpu_has_mm_full)
626bfa03729959e Hauke Mehrtens 2021-10-13 279 seq_puts(m, " mm_full");
626bfa03729959e Hauke Mehrtens 2021-10-13 280 seq_puts(m, "\n");
626bfa03729959e Hauke Mehrtens 2021-10-13 281
f6771dbb27c704c Ralf Baechle 2007-11-08 282 seq_printf(m, "shadow register sets\t: %d\n",
f6771dbb27c704c Ralf Baechle 2007-11-08 283 cpu_data[n].srsets);
e77c32fe284a4da David Daney 2010-12-21 284 seq_printf(m, "kscratch registers\t: %d\n",
e77c32fe284a4da David Daney 2010-12-21 285 hweight8(cpu_data[n].kscratch_mask));
bda4584cd943d7b Huacai Chen 2014-06-26 286 seq_printf(m, "package\t\t\t: %d\n", cpu_data[n].package);
f875a832d202852 Paul Burton 2017-08-12 287 seq_printf(m, "core\t\t\t: %d\n", cpu_core(&cpu_data[n]));
5508d456e9992bb Ralf Baechle 2014-04-03 288
:::::: The code@line 61 was first introduced by commit
:::::: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 Linux-2.6.12-rc2
:::::: TO: Linus Torvalds <torvalds@ppc970.osdl.org>
:::::: CC: Linus Torvalds <torvalds@ppc970.osdl.org>
--
0-DAY CI Kernel Test Service
https://01.org/lkp
^ permalink raw reply [flat|nested] 6+ messages in thread
* arch/mips/kernel/proc.c:61:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provide...
@ 2022-03-29 16:56 kernel test robot
0 siblings, 0 replies; 6+ messages in thread
From: kernel test robot @ 2022-03-29 16:56 UTC (permalink / raw)
To: kbuild
[-- Attachment #1: Type: text/plain, Size: 61400 bytes --]
CC: llvm(a)lists.linux.dev
CC: kbuild-all(a)lists.01.org
BCC: lkp(a)intel.com
CC: linux-kernel(a)vger.kernel.org
TO: Arnd Bergmann <arnd@arndb.de>
CC: Masahiro Yamada <masahiroy@kernel.org>
CC: Alex Shi <alexs@kernel.org>
CC: Nick Desaulniers <ndesaulniers@google.com>
CC: Miguel Ojeda <ojeda@kernel.org>
CC: Nathan Chancellor <nathan@kernel.org>
tree: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git master
head: 1930a6e739c4b4a654a69164dbe39e554d228915
commit: e8c07082a810fbb9db303a2b66b66b8d7e588b53 Kbuild: move to -std=gnu11
date: 2 weeks ago
:::::: branch date: 16 hours ago
:::::: commit date: 2 weeks ago
config: mips-randconfig-c004-20220328 (https://download.01.org/0day-ci/archive/20220330/202203300031.dgoS813Z-lkp(a)intel.com/config)
compiler: clang version 15.0.0 (https://github.com/llvm/llvm-project 0f6d9501cf49ce02937099350d08f20c4af86f3d)
reproduce (this is a W=1 build):
wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross
chmod +x ~/bin/make.cross
# install mips cross compiling tool for clang build
# apt-get install binutils-mips-linux-gnu
# https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e8c07082a810fbb9db303a2b66b66b8d7e588b53
git remote add linus https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
git fetch --no-tags linus master
git checkout e8c07082a810fbb9db303a2b66b66b8d7e588b53
# save the config file to linux build tree
COMPILER_INSTALL_PATH=$HOME/0day COMPILER=clang make.cross ARCH=mips clang-analyzer
If you fix the issue, kindly add following tag as appropriate
Reported-by: kernel test robot <lkp@intel.com>
clang-analyzer warnings: (new ones prefixed by >>)
^~~~
security/integrity/ima/ima_api.c:45:2: note: Taking true branch
if (desc)
^
security/integrity/ima/ima_api.c:52:6: note: Assuming the condition is false
if (!*entry)
^~~~~~~
security/integrity/ima/ima_api.c:52:2: note: Taking false branch
if (!*entry)
^
security/integrity/ima/ima_api.c:55:29: note: Assuming 'ima_tpm_chip' is equal to null
digests = kcalloc(NR_BANKS(ima_tpm_chip) + ima_extra_slots,
^
security/integrity/ima/ima.h:44:26: note: expanded from macro 'NR_BANKS'
#define NR_BANKS(chip) ((chip != NULL) ? chip->nr_allocated_banks : 0)
^~~~~~~~~~~~
security/integrity/ima/ima_api.c:55:20: note: '?' condition is false
digests = kcalloc(NR_BANKS(ima_tpm_chip) + ima_extra_slots,
^
security/integrity/ima/ima.h:44:25: note: expanded from macro 'NR_BANKS'
#define NR_BANKS(chip) ((chip != NULL) ? chip->nr_allocated_banks : 0)
^
security/integrity/ima/ima_api.c:57:6: note: Assuming 'digests' is non-null
if (!digests) {
^~~~~~~~
security/integrity/ima/ima_api.c:57:2: note: Taking false branch
if (!digests) {
^
security/integrity/ima/ima_api.c:65:14: note: Assuming 'i' is < field 'num_fields'
for (i = 0; i < template_desc->num_fields; i++) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
security/integrity/ima/ima_api.c:65:2: note: Loop condition is true. Entering loop body
for (i = 0; i < template_desc->num_fields; i++) {
^
security/integrity/ima/ima_api.c:72:7: note: Assuming 'result' is not equal to 0
if (result != 0)
^~~~~~~~~~~
security/integrity/ima/ima_api.c:72:3: note: Taking true branch
if (result != 0)
^
security/integrity/ima/ima_api.c:73:4: note: Control jumps to line 81
goto out;
^
security/integrity/ima/ima_api.c:82:2: note: Null pointer value stored to 'entry'
*entry = NULL;
^~~~~~~~~~~~~
security/integrity/ima/ima_api.c:328:11: note: Returning from 'ima_alloc_init_template'
result = ima_alloc_init_template(&event_data, &entry, template_desc);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
security/integrity/ima/ima_api.c:329:6: note: Assuming 'result' is >= 0
if (result < 0) {
^~~~~~~~~~
security/integrity/ima/ima_api.c:329:2: note: Taking false branch
if (result < 0) {
^
security/integrity/ima/ima_api.c:335:30: note: Passing null pointer value via 1st parameter 'entry'
result = ima_store_template(entry, violation, inode, filename, pcr);
^~~~~
security/integrity/ima/ima_api.c:335:11: note: Calling 'ima_store_template'
result = ima_store_template(entry, violation, inode, filename, pcr);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
security/integrity/ima/ima_api.c:108:24: note: Access to field 'template_desc' results in a dereference of a null pointer (loaded from variable 'entry')
char *template_name = entry->template_desc->name;
^~~~~
security/integrity/ima/ima_api.c:249:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&hash.digest, 0, sizeof(hash.digest));
^~~~~~
security/integrity/ima/ima_api.c:249:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&hash.digest, 0, sizeof(hash.digest));
^~~~~~
security/integrity/ima/ima_api.c:267:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(iint->ima_hash, &hash, length);
^~~~~~
security/integrity/ima/ima_api.c:267:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(iint->ima_hash, &hash, length);
^~~~~~
Suppressed 40 warnings (40 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
kernel/debug/kdb/kdb_bp.c:583:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&kdb_breakpoints, '\0', sizeof(kdb_breakpoints));
^~~~~~
kernel/debug/kdb/kdb_bp.c:583:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&kdb_breakpoints, '\0', sizeof(kdb_breakpoints));
^~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (30 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
>> arch/mips/kernel/proc.c:61:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(fmt, "cpu model\t\t: %%s V%%d.%%d%s\n",
^~~~~~~
arch/mips/kernel/proc.c:61:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(fmt, "cpu model\t\t: %%s V%%d.%%d%s\n",
^~~~~~~
arch/mips/kernel/proc.c:296:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(fmt, "VCE%%c exceptions\t\t: %s\n",
^~~~~~~
arch/mips/kernel/proc.c:296:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(fmt, "VCE%%c exceptions\t\t: %s\n",
^~~~~~~
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
11 warnings generated.
Suppressed 11 warnings (11 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
40 warnings generated.
arch/mips/kernel/crash_dump.c:29:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, vaddr + offset, csize);
^~~~~~
arch/mips/kernel/crash_dump.c:29:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, vaddr + offset, csize);
^~~~~~
Suppressed 39 warnings (39 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
1 warning generated.
Suppressed 1 warnings (1 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
40 warnings generated.
lib/crypto/blake2s-generic.c:56:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(m, block, BLAKE2S_BLOCK_SIZE);
^~~~~~
lib/crypto/blake2s-generic.c:56:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(m, block, BLAKE2S_BLOCK_SIZE);
^~~~~~
lib/crypto/blake2s-generic.c:58:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(v, state->h, 32);
^~~~~~
lib/crypto/blake2s-generic.c:58:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(v, state->h, 32);
^~~~~~
Suppressed 38 warnings (38 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
lib/crypto/sha256.c:136:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(sctx->buf + partial, data, done + 64);
^~~~~~
lib/crypto/sha256.c:136:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(sctx->buf + partial, data, done + 64);
^~~~~~
lib/crypto/sha256.c:150:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(sctx->buf + partial, src, len - done);
^~~~~~
lib/crypto/sha256.c:150:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(sctx->buf + partial, src, len - done);
^~~~~~
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
37 warnings generated.
kernel/seccomp.c:2242:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(names, 0, sizeof(names));
^~~~~~
kernel/seccomp.c:2242:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(names, 0, sizeof(names));
^~~~~~
kernel/seccomp.c:2264:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(names, 0, sizeof(names));
^~~~~~
kernel/seccomp.c:2264:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(names, 0, sizeof(names));
^~~~~~
kernel/seccomp.c:2288:14: warning: Value stored to 'new' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
const char *new = names;
^~~ ~~~~~
kernel/seccomp.c:2288:14: note: Value stored to 'new' during its initialization is never read
const char *new = names;
^~~ ~~~~~
kernel/seccomp.c:2289:14: warning: Value stored to 'old' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
const char *old = old_names;
^~~ ~~~~~~~~~
kernel/seccomp.c:2289:14: note: Value stored to 'old' during its initialization is never read
const char *old = old_names;
^~~ ~~~~~~~~~
kernel/seccomp.c:2294:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(names, 0, sizeof(names));
--
^
Suppressed 39 warnings (39 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
50 warnings generated.
Suppressed 50 warnings (50 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
56 warnings generated.
block/blk-sysfs.c:32:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(page, "%lu\n", var);
^~~~~~~
block/blk-sysfs.c:32:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(page, "%lu\n", var);
^~~~~~~
block/blk-sysfs.c:177:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(page, "%llu\n",
^~~~~~~
block/blk-sysfs.c:177:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(page, "%llu\n",
^~~~~~~
block/blk-sysfs.c:183:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(page, "%llu\n",
^~~~~~~
block/blk-sysfs.c:183:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(page, "%llu\n",
^~~~~~~
block/blk-sysfs.c:217:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(page, "%llu\n",
^~~~~~~
block/blk-sysfs.c:217:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(page, "%llu\n",
^~~~~~~
block/blk-sysfs.c:223:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(page, "%llu\n",
^~~~~~~
block/blk-sysfs.c:223:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(page, "%llu\n",
^~~~~~~
block/blk-sysfs.c:237:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(page, "%llu\n", max_sectors << SECTOR_SHIFT);
^~~~~~~
block/blk-sysfs.c:237:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(page, "%llu\n", max_sectors << SECTOR_SHIFT);
^~~~~~~
block/blk-sysfs.c:314:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(page, "host-aware\n");
^~~~~~~
block/blk-sysfs.c:314:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(page, "host-aware\n");
^~~~~~~
block/blk-sysfs.c:316:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(page, "host-managed\n");
^~~~~~~
block/blk-sysfs.c:316:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(page, "host-managed\n");
^~~~~~~
block/blk-sysfs.c:318:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(page, "none\n");
^~~~~~~
block/blk-sysfs.c:318:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(page, "none\n");
^~~~~~~
block/blk-sysfs.c:404:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(page, "%d\n", val);
^~~~~~~
block/blk-sysfs.c:404:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(page, "%d\n", val);
^~~~~~~
block/blk-sysfs.c:446:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(page, "%u\n", jiffies_to_msecs(q->rq_timeout));
^~~~~~~
block/blk-sysfs.c:446:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(page, "%u\n", jiffies_to_msecs(q->rq_timeout));
^~~~~~~
block/blk-sysfs.c:469:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(page, "%llu\n", div_u64(wbt_get_min_lat(q), 1000));
^~~~~~~
block/blk-sysfs.c:469:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(page, "%llu\n", div_u64(wbt_get_min_lat(q), 1000));
^~~~~~~
block/blk-sysfs.c:519:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(page, "write back\n");
^~~~~~~
block/blk-sysfs.c:519:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(page, "write back\n");
^~~~~~~
block/blk-sysfs.c:521:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(page, "write through\n");
^~~~~~~
block/blk-sysfs.c:521:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(page, "write through\n");
^~~~~~~
block/blk-sysfs.c:548:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(page, "%u\n", test_bit(QUEUE_FLAG_FUA, &q->queue_flags));
^~~~~~~
block/blk-sysfs.c:548:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(page, "%u\n", test_bit(QUEUE_FLAG_FUA, &q->queue_flags));
^~~~~~~
Suppressed 41 warnings (41 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
39 warnings generated.
>> drivers/misc/kgdbts.c:240:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(scratch_buf, "%s,%lx,%i", bp_type, addr,
^~~~~~~
drivers/misc/kgdbts.c:240:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(scratch_buf, "%s,%lx,%i", bp_type, addr,
^~~~~~~
drivers/misc/kgdbts.c:390:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(scratch_buf, 0, sizeof(scratch_buf));
^~~~~~
drivers/misc/kgdbts.c:390:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(scratch_buf, 0, sizeof(scratch_buf));
^~~~~~
drivers/misc/kgdbts.c:709:2: warning: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcat(get_buf, buf);
^~~~~~
drivers/misc/kgdbts.c:709:2: note: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119
strcat(get_buf, buf);
^~~~~~
drivers/misc/kgdbts.c:714:2: warning: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcat(get_buf, "#");
^~~~~~
drivers/misc/kgdbts.c:714:2: note: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119
strcat(get_buf, "#");
^~~~~~
drivers/misc/kgdbts.c:832:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&ts, 0, sizeof(ts));
^~~~~~
drivers/misc/kgdbts.c:832:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&ts, 0, sizeof(ts));
^~~~~~
drivers/misc/kgdbts.c:1075:2: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(config, opt);
^~~~~~
drivers/misc/kgdbts.c:1075:2: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(config, opt);
^~~~~~
drivers/misc/kgdbts.c:1146:3: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(config, kmessage);
^~~~~~
drivers/misc/kgdbts.c:1146:3: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(config, kmessage);
^~~~~~
drivers/misc/kgdbts.c:1155:2: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(config, kmessage);
^~~~~~
drivers/misc/kgdbts.c:1155:2: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(config, kmessage);
^~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
38 warnings generated.
drivers/tty/vt/consolemap.c:212:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(q, 0, MAX_GLYPH);
^~~~~~
drivers/tty/vt/consolemap.c:212:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(q, 0, MAX_GLYPH);
^~~~~~
drivers/tty/vt/consolemap.c:238:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(q, 0, MAX_GLYPH * sizeof(u16));
^~~~~~
drivers/tty/vt/consolemap.c:238:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(q, 0, MAX_GLYPH * sizeof(u16));
^~~~~~
drivers/tty/vt/consolemap.c:332:30: warning: The right operand of '|' is a garbage value [clang-analyzer-core.UndefinedBinaryOperatorResult]
inbuf[i] = UNI_DIRECT_BASE | ubuf[i];
^ ~~~~~~~
drivers/tty/vt/consolemap.c:328:6: note: Calling 'copy_from_user'
if (copy_from_user(ubuf, arg, E_TABSZ))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/uaccess.h:191:2: note: Taking true branch
if (likely(check_copy_size(to, n, false)))
^
include/linux/uaccess.h:192:7: note: Calling '_copy_from_user'
n = _copy_from_user(to, from, n);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/uaccess.h:157:6: note: Assuming the condition is true
if (!should_fail_usercopy() && likely(access_ok(from, n))) {
^~~~~~~~~~~~~~~~~~~~~~~
include/linux/uaccess.h:157:6: note: Left side of '&&' is true
include/linux/uaccess.h:157:2: note: Taking true branch
if (!should_fail_usercopy() && likely(access_ok(from, n))) {
^
include/linux/uaccess.h:159:9: note: Calling 'raw_copy_from_user'
res = raw_copy_from_user(to, from, n);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
arch/mips/include/asm/uaccess.h:455:2: note: Returning without writing to '*to'
return __cu_len_r;
^
include/linux/uaccess.h:159:9: note: Returning from 'raw_copy_from_user'
res = raw_copy_from_user(to, from, n);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/uaccess.h:161:6: note: Assuming 'res' is 0, which participates in a condition later
if (unlikely(res))
^
include/linux/compiler.h:78:40: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^~~~
include/linux/uaccess.h:161:2: note: Taking false branch
if (unlikely(res))
^
include/linux/uaccess.h:163:2: note: Returning without writing to '*to'
vim +61 arch/mips/kernel/proc.c
^1da177e4c3f41 Linus Torvalds 2005-04-16 49
^1da177e4c3f41 Linus Torvalds 2005-04-16 50 /*
^1da177e4c3f41 Linus Torvalds 2005-04-16 51 * For the first processor also print the system type
^1da177e4c3f41 Linus Torvalds 2005-04-16 52 */
487d70d0b8bd1c Gabor Juhos 2010-11-23 53 if (n == 0) {
^1da177e4c3f41 Linus Torvalds 2005-04-16 54 seq_printf(m, "system type\t\t: %s\n", get_system_type());
487d70d0b8bd1c Gabor Juhos 2010-11-23 55 if (mips_get_machine_name())
487d70d0b8bd1c Gabor Juhos 2010-11-23 56 seq_printf(m, "machine\t\t\t: %s\n",
487d70d0b8bd1c Gabor Juhos 2010-11-23 57 mips_get_machine_name());
487d70d0b8bd1c Gabor Juhos 2010-11-23 58 }
^1da177e4c3f41 Linus Torvalds 2005-04-16 59
^1da177e4c3f41 Linus Torvalds 2005-04-16 60 seq_printf(m, "processor\t\t: %ld\n", n);
^1da177e4c3f41 Linus Torvalds 2005-04-16 @61 sprintf(fmt, "cpu model\t\t: %%s V%%d.%%d%s\n",
e04582b7bc70b4 Atsushi Nemoto 2006-10-09 62 cpu_data[n].options & MIPS_CPU_FPU ? " FPU V%d.%d" : "");
e47c659b55aff7 Johannes Dickgreber 2008-10-13 63 seq_printf(m, fmt, __cpu_name[n],
^1da177e4c3f41 Linus Torvalds 2005-04-16 64 (version >> 4) & 0x0f, version & 0x0f,
^1da177e4c3f41 Linus Torvalds 2005-04-16 65 (fp_vers >> 4) & 0x0f, fp_vers & 0x0f);
5636919b5c909f Ralf Baechle 2009-02-28 66 seq_printf(m, "BogoMIPS\t\t: %u.%02u\n",
0ac354801a8791 Ralf Baechle 2005-02-21 67 cpu_data[n].udelay_val / (500000/HZ),
0ac354801a8791 Ralf Baechle 2005-02-21 68 (cpu_data[n].udelay_val / (5000/HZ)) % 100);
^1da177e4c3f41 Linus Torvalds 2005-04-16 69 seq_printf(m, "wait instruction\t: %s\n", cpu_wait ? "yes" : "no");
^1da177e4c3f41 Linus Torvalds 2005-04-16 70 seq_printf(m, "microsecond timers\t: %s\n",
^1da177e4c3f41 Linus Torvalds 2005-04-16 71 cpu_has_counter ? "yes" : "no");
31aa36658a1232 Karl-Johan Karlsson 2006-10-08 72 seq_printf(m, "tlb_entries\t\t: %d\n", cpu_data[n].tlbsize);
^1da177e4c3f41 Linus Torvalds 2005-04-16 73 seq_printf(m, "extra interrupt vector\t: %s\n",
^1da177e4c3f41 Linus Torvalds 2005-04-16 74 cpu_has_divec ? "yes" : "no");
654f57bfb46799 David Daney 2008-09-23 75 seq_printf(m, "hardware watchpoint\t: %s",
654f57bfb46799 David Daney 2008-09-23 76 cpu_has_watch ? "yes, " : "no\n");
654f57bfb46799 David Daney 2008-09-23 77 if (cpu_has_watch) {
654f57bfb46799 David Daney 2008-09-23 78 seq_printf(m, "count: %d, address/irw mask: [",
654f57bfb46799 David Daney 2008-09-23 79 cpu_data[n].watch_reg_count);
654f57bfb46799 David Daney 2008-09-23 80 for (i = 0; i < cpu_data[n].watch_reg_count; i++)
654f57bfb46799 David Daney 2008-09-23 81 seq_printf(m, "%s0x%04x", i ? ", " : "",
654f57bfb46799 David Daney 2008-09-23 82 cpu_data[n].watch_reg_masks[i]);
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 83 seq_puts(m, "]\n");
654f57bfb46799 David Daney 2008-09-23 84 }
41315b6ec108e9 Aaro Koskinen 2013-12-31 85
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 86 seq_puts(m, "isa\t\t\t:");
e5f5a5b06e51a3 Maciej W. Rozycki 2017-07-08 87 if (cpu_has_mips_1)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 88 seq_puts(m, " mips1");
a96102be700f87 Steven J. Hill 2012-12-07 89 if (cpu_has_mips_2)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 90 seq_puts(m, " mips2");
a96102be700f87 Steven J. Hill 2012-12-07 91 if (cpu_has_mips_3)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 92 seq_puts(m, " mips3");
a96102be700f87 Steven J. Hill 2012-12-07 93 if (cpu_has_mips_4)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 94 seq_puts(m, " mips4");
a96102be700f87 Steven J. Hill 2012-12-07 95 if (cpu_has_mips_5)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 96 seq_puts(m, " mips5");
a96102be700f87 Steven J. Hill 2012-12-07 97 if (cpu_has_mips32r1)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 98 seq_puts(m, " mips32r1");
a96102be700f87 Steven J. Hill 2012-12-07 99 if (cpu_has_mips32r2)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 100 seq_puts(m, " mips32r2");
ab7c01fdc3cfe0 Serge Semin 2020-05-21 101 if (cpu_has_mips32r5)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 102 seq_puts(m, " mips32r5");
515a6393dbac4f Markos Chandras 2014-11-14 103 if (cpu_has_mips32r6)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 104 seq_puts(m, " mips32r6");
a96102be700f87 Steven J. Hill 2012-12-07 105 if (cpu_has_mips64r1)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 106 seq_puts(m, " mips64r1");
a96102be700f87 Steven J. Hill 2012-12-07 107 if (cpu_has_mips64r2)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 108 seq_puts(m, " mips64r2");
ab7c01fdc3cfe0 Serge Semin 2020-05-21 109 if (cpu_has_mips64r5)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 110 seq_puts(m, " mips64r5");
515a6393dbac4f Markos Chandras 2014-11-14 111 if (cpu_has_mips64r6)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 112 seq_puts(m, " mips64r6");
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 113 seq_puts(m, "\n");
981ef0de49869c Ralf Baechle 2012-08-20 114
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 115 seq_puts(m, "ASEs implemented\t:");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 116 if (cpu_has_mips16)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 117 seq_puts(m, " mips16");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 118 if (cpu_has_mips16e2)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 119 seq_puts(m, " mips16e2");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 120 if (cpu_has_mdmx)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 121 seq_puts(m, " mdmx");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 122 if (cpu_has_mips3d)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 123 seq_puts(m, " mips3d");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 124 if (cpu_has_smartmips)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 125 seq_puts(m, " smartmips");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 126 if (cpu_has_dsp)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 127 seq_puts(m, " dsp");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 128 if (cpu_has_dsp2)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 129 seq_puts(m, " dsp2");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 130 if (cpu_has_dsp3)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 131 seq_puts(m, " dsp3");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 132 if (cpu_has_mipsmt)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 133 seq_puts(m, " mt");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 134 if (cpu_has_mmips)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 135 seq_puts(m, " micromips");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 136 if (cpu_has_vz)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 137 seq_puts(m, " vz");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 138 if (cpu_has_msa)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 139 seq_puts(m, " msa");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 140 if (cpu_has_eva)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 141 seq_puts(m, " eva");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 142 if (cpu_has_htw)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 143 seq_puts(m, " htw");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 144 if (cpu_has_xpa)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 145 seq_puts(m, " xpa");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 146 if (cpu_has_loongson_mmi)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 147 seq_puts(m, " loongson-mmi");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 148 if (cpu_has_loongson_cam)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 149 seq_puts(m, " loongson-cam");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 150 if (cpu_has_loongson_ext)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 151 seq_puts(m, " loongson-ext");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 152 if (cpu_has_loongson_ext2)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 153 seq_puts(m, " loongson-ext2");
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 154 seq_puts(m, "\n");
981ef0de49869c Ralf Baechle 2012-08-20 155
bce860833ab1e4 Steven J. Hill 2013-03-25 156 if (cpu_has_mmips) {
bce860833ab1e4 Steven J. Hill 2013-03-25 157 seq_printf(m, "micromips kernel\t: %s\n",
bce860833ab1e4 Steven J. Hill 2013-03-25 158 (read_c0_config3() & MIPS_CONF3_ISA_OE) ? "yes" : "no");
bce860833ab1e4 Steven J. Hill 2013-03-25 159 }
626bfa03729959 Hauke Mehrtens 2021-10-13 160
626bfa03729959 Hauke Mehrtens 2021-10-13 161 seq_puts(m, "Options implemented\t:");
626bfa03729959 Hauke Mehrtens 2021-10-13 162 if (cpu_has_tlb)
626bfa03729959 Hauke Mehrtens 2021-10-13 163 seq_puts(m, " tlb");
626bfa03729959 Hauke Mehrtens 2021-10-13 164 if (cpu_has_ftlb)
626bfa03729959 Hauke Mehrtens 2021-10-13 165 seq_puts(m, " ftlb");
626bfa03729959 Hauke Mehrtens 2021-10-13 166 if (cpu_has_tlbinv)
626bfa03729959 Hauke Mehrtens 2021-10-13 167 seq_puts(m, " tlbinv");
626bfa03729959 Hauke Mehrtens 2021-10-13 168 if (cpu_has_segments)
626bfa03729959 Hauke Mehrtens 2021-10-13 169 seq_puts(m, " segments");
626bfa03729959 Hauke Mehrtens 2021-10-13 170 if (cpu_has_rixiex)
626bfa03729959 Hauke Mehrtens 2021-10-13 171 seq_puts(m, " rixiex");
626bfa03729959 Hauke Mehrtens 2021-10-13 172 if (cpu_has_ldpte)
626bfa03729959 Hauke Mehrtens 2021-10-13 173 seq_puts(m, " ldpte");
626bfa03729959 Hauke Mehrtens 2021-10-13 174 if (cpu_has_maar)
626bfa03729959 Hauke Mehrtens 2021-10-13 175 seq_puts(m, " maar");
626bfa03729959 Hauke Mehrtens 2021-10-13 176 if (cpu_has_rw_llb)
626bfa03729959 Hauke Mehrtens 2021-10-13 177 seq_puts(m, " rw_llb");
626bfa03729959 Hauke Mehrtens 2021-10-13 178 if (cpu_has_4kex)
626bfa03729959 Hauke Mehrtens 2021-10-13 179 seq_puts(m, " 4kex");
626bfa03729959 Hauke Mehrtens 2021-10-13 180 if (cpu_has_3k_cache)
626bfa03729959 Hauke Mehrtens 2021-10-13 181 seq_puts(m, " 3k_cache");
626bfa03729959 Hauke Mehrtens 2021-10-13 182 if (cpu_has_4k_cache)
626bfa03729959 Hauke Mehrtens 2021-10-13 183 seq_puts(m, " 4k_cache");
626bfa03729959 Hauke Mehrtens 2021-10-13 184 if (cpu_has_tx39_cache)
626bfa03729959 Hauke Mehrtens 2021-10-13 185 seq_puts(m, " tx39_cache");
626bfa03729959 Hauke Mehrtens 2021-10-13 186 if (cpu_has_octeon_cache)
626bfa03729959 Hauke Mehrtens 2021-10-13 187 seq_puts(m, " octeon_cache");
1cab5bd69eb1f9 Tiezhu Yang 2021-11-25 188 if (raw_cpu_has_fpu)
626bfa03729959 Hauke Mehrtens 2021-10-13 189 seq_puts(m, " fpu");
626bfa03729959 Hauke Mehrtens 2021-10-13 190 if (cpu_has_32fpr)
626bfa03729959 Hauke Mehrtens 2021-10-13 191 seq_puts(m, " 32fpr");
626bfa03729959 Hauke Mehrtens 2021-10-13 192 if (cpu_has_cache_cdex_p)
626bfa03729959 Hauke Mehrtens 2021-10-13 193 seq_puts(m, " cache_cdex_p");
626bfa03729959 Hauke Mehrtens 2021-10-13 194 if (cpu_has_cache_cdex_s)
626bfa03729959 Hauke Mehrtens 2021-10-13 195 seq_puts(m, " cache_cdex_s");
626bfa03729959 Hauke Mehrtens 2021-10-13 196 if (cpu_has_prefetch)
626bfa03729959 Hauke Mehrtens 2021-10-13 197 seq_puts(m, " prefetch");
626bfa03729959 Hauke Mehrtens 2021-10-13 198 if (cpu_has_mcheck)
626bfa03729959 Hauke Mehrtens 2021-10-13 199 seq_puts(m, " mcheck");
626bfa03729959 Hauke Mehrtens 2021-10-13 200 if (cpu_has_ejtag)
626bfa03729959 Hauke Mehrtens 2021-10-13 201 seq_puts(m, " ejtag");
626bfa03729959 Hauke Mehrtens 2021-10-13 202 if (cpu_has_llsc)
626bfa03729959 Hauke Mehrtens 2021-10-13 203 seq_puts(m, " llsc");
626bfa03729959 Hauke Mehrtens 2021-10-13 204 if (cpu_has_guestctl0ext)
626bfa03729959 Hauke Mehrtens 2021-10-13 205 seq_puts(m, " guestctl0ext");
626bfa03729959 Hauke Mehrtens 2021-10-13 206 if (cpu_has_guestctl1)
626bfa03729959 Hauke Mehrtens 2021-10-13 207 seq_puts(m, " guestctl1");
626bfa03729959 Hauke Mehrtens 2021-10-13 208 if (cpu_has_guestctl2)
626bfa03729959 Hauke Mehrtens 2021-10-13 209 seq_puts(m, " guestctl2");
626bfa03729959 Hauke Mehrtens 2021-10-13 210 if (cpu_has_guestid)
626bfa03729959 Hauke Mehrtens 2021-10-13 211 seq_puts(m, " guestid");
626bfa03729959 Hauke Mehrtens 2021-10-13 212 if (cpu_has_drg)
626bfa03729959 Hauke Mehrtens 2021-10-13 213 seq_puts(m, " drg");
626bfa03729959 Hauke Mehrtens 2021-10-13 214 if (cpu_has_rixi)
626bfa03729959 Hauke Mehrtens 2021-10-13 215 seq_puts(m, " rixi");
626bfa03729959 Hauke Mehrtens 2021-10-13 216 if (cpu_has_lpa)
626bfa03729959 Hauke Mehrtens 2021-10-13 217 seq_puts(m, " lpa");
626bfa03729959 Hauke Mehrtens 2021-10-13 218 if (cpu_has_mvh)
626bfa03729959 Hauke Mehrtens 2021-10-13 219 seq_puts(m, " mvh");
626bfa03729959 Hauke Mehrtens 2021-10-13 220 if (cpu_has_vtag_icache)
626bfa03729959 Hauke Mehrtens 2021-10-13 221 seq_puts(m, " vtag_icache");
626bfa03729959 Hauke Mehrtens 2021-10-13 222 if (cpu_has_dc_aliases)
626bfa03729959 Hauke Mehrtens 2021-10-13 223 seq_puts(m, " dc_aliases");
626bfa03729959 Hauke Mehrtens 2021-10-13 224 if (cpu_has_ic_fills_f_dc)
626bfa03729959 Hauke Mehrtens 2021-10-13 225 seq_puts(m, " ic_fills_f_dc");
626bfa03729959 Hauke Mehrtens 2021-10-13 226 if (cpu_has_pindexed_dcache)
626bfa03729959 Hauke Mehrtens 2021-10-13 227 seq_puts(m, " pindexed_dcache");
626bfa03729959 Hauke Mehrtens 2021-10-13 228 if (cpu_has_userlocal)
626bfa03729959 Hauke Mehrtens 2021-10-13 229 seq_puts(m, " userlocal");
626bfa03729959 Hauke Mehrtens 2021-10-13 230 if (cpu_has_nofpuex)
626bfa03729959 Hauke Mehrtens 2021-10-13 231 seq_puts(m, " nofpuex");
626bfa03729959 Hauke Mehrtens 2021-10-13 232 if (cpu_has_vint)
626bfa03729959 Hauke Mehrtens 2021-10-13 233 seq_puts(m, " vint");
626bfa03729959 Hauke Mehrtens 2021-10-13 234 if (cpu_has_veic)
626bfa03729959 Hauke Mehrtens 2021-10-13 235 seq_puts(m, " veic");
626bfa03729959 Hauke Mehrtens 2021-10-13 236 if (cpu_has_inclusive_pcaches)
626bfa03729959 Hauke Mehrtens 2021-10-13 237 seq_puts(m, " inclusive_pcaches");
626bfa03729959 Hauke Mehrtens 2021-10-13 238 if (cpu_has_perf_cntr_intr_bit)
626bfa03729959 Hauke Mehrtens 2021-10-13 239 seq_puts(m, " perf_cntr_intr_bit");
626bfa03729959 Hauke Mehrtens 2021-10-13 240 if (cpu_has_ufr)
626bfa03729959 Hauke Mehrtens 2021-10-13 241 seq_puts(m, " ufr");
626bfa03729959 Hauke Mehrtens 2021-10-13 242 if (cpu_has_fre)
626bfa03729959 Hauke Mehrtens 2021-10-13 243 seq_puts(m, " fre");
626bfa03729959 Hauke Mehrtens 2021-10-13 244 if (cpu_has_cdmm)
626bfa03729959 Hauke Mehrtens 2021-10-13 245 seq_puts(m, " cdmm");
626bfa03729959 Hauke Mehrtens 2021-10-13 246 if (cpu_has_small_pages)
626bfa03729959 Hauke Mehrtens 2021-10-13 247 seq_puts(m, " small_pages");
626bfa03729959 Hauke Mehrtens 2021-10-13 248 if (cpu_has_nan_legacy)
626bfa03729959 Hauke Mehrtens 2021-10-13 249 seq_puts(m, " nan_legacy");
626bfa03729959 Hauke Mehrtens 2021-10-13 250 if (cpu_has_nan_2008)
626bfa03729959 Hauke Mehrtens 2021-10-13 251 seq_puts(m, " nan_2008");
626bfa03729959 Hauke Mehrtens 2021-10-13 252 if (cpu_has_ebase_wg)
626bfa03729959 Hauke Mehrtens 2021-10-13 253 seq_puts(m, " ebase_wg");
626bfa03729959 Hauke Mehrtens 2021-10-13 254 if (cpu_has_badinstr)
626bfa03729959 Hauke Mehrtens 2021-10-13 255 seq_puts(m, " badinstr");
626bfa03729959 Hauke Mehrtens 2021-10-13 256 if (cpu_has_badinstrp)
626bfa03729959 Hauke Mehrtens 2021-10-13 257 seq_puts(m, " badinstrp");
626bfa03729959 Hauke Mehrtens 2021-10-13 258 if (cpu_has_contextconfig)
626bfa03729959 Hauke Mehrtens 2021-10-13 259 seq_puts(m, " contextconfig");
626bfa03729959 Hauke Mehrtens 2021-10-13 260 if (cpu_has_perf)
626bfa03729959 Hauke Mehrtens 2021-10-13 261 seq_puts(m, " perf");
626bfa03729959 Hauke Mehrtens 2021-10-13 262 if (cpu_has_mac2008_only)
626bfa03729959 Hauke Mehrtens 2021-10-13 263 seq_puts(m, " mac2008_only");
626bfa03729959 Hauke Mehrtens 2021-10-13 264 if (cpu_has_ftlbparex)
626bfa03729959 Hauke Mehrtens 2021-10-13 265 seq_puts(m, " ftlbparex");
626bfa03729959 Hauke Mehrtens 2021-10-13 266 if (cpu_has_gsexcex)
626bfa03729959 Hauke Mehrtens 2021-10-13 267 seq_puts(m, " gsexcex");
626bfa03729959 Hauke Mehrtens 2021-10-13 268 if (cpu_has_shared_ftlb_ram)
626bfa03729959 Hauke Mehrtens 2021-10-13 269 seq_puts(m, " shared_ftlb_ram");
626bfa03729959 Hauke Mehrtens 2021-10-13 270 if (cpu_has_shared_ftlb_entries)
626bfa03729959 Hauke Mehrtens 2021-10-13 271 seq_puts(m, " shared_ftlb_entries");
626bfa03729959 Hauke Mehrtens 2021-10-13 272 if (cpu_has_mipsmt_pertccounters)
626bfa03729959 Hauke Mehrtens 2021-10-13 273 seq_puts(m, " mipsmt_pertccounters");
626bfa03729959 Hauke Mehrtens 2021-10-13 274 if (cpu_has_mmid)
626bfa03729959 Hauke Mehrtens 2021-10-13 275 seq_puts(m, " mmid");
626bfa03729959 Hauke Mehrtens 2021-10-13 276 if (cpu_has_mm_sysad)
626bfa03729959 Hauke Mehrtens 2021-10-13 277 seq_puts(m, " mm_sysad");
626bfa03729959 Hauke Mehrtens 2021-10-13 278 if (cpu_has_mm_full)
626bfa03729959 Hauke Mehrtens 2021-10-13 279 seq_puts(m, " mm_full");
626bfa03729959 Hauke Mehrtens 2021-10-13 280 seq_puts(m, "\n");
626bfa03729959 Hauke Mehrtens 2021-10-13 281
f6771dbb27c704 Ralf Baechle 2007-11-08 282 seq_printf(m, "shadow register sets\t: %d\n",
f6771dbb27c704 Ralf Baechle 2007-11-08 283 cpu_data[n].srsets);
e77c32fe284a4d David Daney 2010-12-21 284 seq_printf(m, "kscratch registers\t: %d\n",
e77c32fe284a4d David Daney 2010-12-21 285 hweight8(cpu_data[n].kscratch_mask));
bda4584cd943d7 Huacai Chen 2014-06-26 286 seq_printf(m, "package\t\t\t: %d\n", cpu_data[n].package);
f875a832d20285 Paul Burton 2017-08-12 287 seq_printf(m, "core\t\t\t: %d\n", cpu_core(&cpu_data[n]));
5508d456e9992b Ralf Baechle 2014-04-03 288
:::::: The code@line 61 was first introduced by commit
:::::: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 Linux-2.6.12-rc2
:::::: TO: Linus Torvalds <torvalds@ppc970.osdl.org>
:::::: CC: Linus Torvalds <torvalds@ppc970.osdl.org>
--
0-DAY CI Kernel Test Service
https://01.org/lkp
^ permalink raw reply [flat|nested] 6+ messages in thread
* arch/mips/kernel/proc.c:61:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provide...
@ 2022-03-28 17:00 kernel test robot
0 siblings, 0 replies; 6+ messages in thread
From: kernel test robot @ 2022-03-28 17:00 UTC (permalink / raw)
To: kbuild
[-- Attachment #1: Type: text/plain, Size: 171136 bytes --]
CC: llvm(a)lists.linux.dev
CC: kbuild-all(a)lists.01.org
BCC: lkp(a)intel.com
CC: linux-kernel(a)vger.kernel.org
TO: Arnd Bergmann <arnd@arndb.de>
CC: Masahiro Yamada <masahiroy@kernel.org>
CC: Alex Shi <alexs@kernel.org>
CC: Nick Desaulniers <ndesaulniers@google.com>
CC: Miguel Ojeda <ojeda@kernel.org>
CC: Nathan Chancellor <nathan@kernel.org>
tree: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git master
head: ae085d7f9365de7da27ab5c0d16b12d51ea7fca9
commit: e8c07082a810fbb9db303a2b66b66b8d7e588b53 Kbuild: move to -std=gnu11
date: 2 weeks ago
:::::: branch date: 15 hours ago
:::::: commit date: 2 weeks ago
config: mips-randconfig-c004-20220328 (https://download.01.org/0day-ci/archive/20220329/202203290056.sA6WFxfS-lkp(a)intel.com/config)
compiler: clang version 15.0.0 (https://github.com/llvm/llvm-project 0f6d9501cf49ce02937099350d08f20c4af86f3d)
reproduce (this is a W=1 build):
wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross
chmod +x ~/bin/make.cross
# install mips cross compiling tool for clang build
# apt-get install binutils-mips-linux-gnu
# https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e8c07082a810fbb9db303a2b66b66b8d7e588b53
git remote add linus https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
git fetch --no-tags linus master
git checkout e8c07082a810fbb9db303a2b66b66b8d7e588b53
# save the config file to linux build tree
COMPILER_INSTALL_PATH=$HOME/0day COMPILER=clang make.cross ARCH=mips clang-analyzer
If you fix the issue, kindly add following tag as appropriate
Reported-by: kernel test robot <lkp@intel.com>
clang-analyzer warnings: (new ones prefixed by >>)
39 warnings generated.
Suppressed 39 warnings (39 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
security/integrity/evm/evm_secfs.c:48:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(temp, "%d", (evm_initialized & ~EVM_SETUP_COMPLETE));
^~~~~~~
security/integrity/evm/evm_secfs.c:48:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(temp, "%d", (evm_initialized & ~EVM_SETUP_COMPLETE));
^~~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
security/keys/request_key_auth.c:100:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buffer, rka->callout_info, buflen);
^~~~~~
security/keys/request_key_auth.c:100:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buffer, rka->callout_info, buflen);
^~~~~~
security/keys/request_key_auth.c:214:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(desc, "%x", target->serial);
^~~~~~~
security/keys/request_key_auth.c:214:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(desc, "%x", target->serial);
^~~~~~~
security/keys/request_key_auth.c:262:27: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ctx.index_key.desc_len = sprintf(description, "%x", target_id);
^~~~~~~
security/keys/request_key_auth.c:262:27: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
ctx.index_key.desc_len = sprintf(description, "%x", target_id);
^~~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
40 warnings generated.
Suppressed 40 warnings (40 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
40 warnings generated.
Suppressed 40 warnings (40 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
40 warnings generated.
Suppressed 40 warnings (40 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
33 warnings generated.
security/integrity/evm/evm_main.c:360:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buffer + total_size, xattr->name, size);
^~~~~~
security/integrity/evm/evm_main.c:360:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buffer + total_size, xattr->name, size);
^~~~~~
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
40 warnings generated.
Suppressed 40 warnings (40 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
fs/reiserfs/xattr.c:156:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(namebuf, sizeof(namebuf), "%X.%X",
^~~~~~~~
fs/reiserfs/xattr.c:156:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(namebuf, sizeof(namebuf), "%X.%X",
^~~~~~~~
fs/reiserfs/xattr.c:581:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data + skip, buffer + buffer_pos, chunk);
^~~~~~
fs/reiserfs/xattr.c:581:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data + skip, buffer + buffer_pos, chunk);
^~~~~~
fs/reiserfs/xattr.c:591:3: warning: Value stored to 'skip' is never read [clang-analyzer-deadcode.DeadStores]
skip = 0;
^ ~
fs/reiserfs/xattr.c:591:3: note: Value stored to 'skip' is never read
skip = 0;
^ ~
fs/reiserfs/xattr.c:741:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buffer + buffer_pos, data + skip, chunk);
^~~~~~
fs/reiserfs/xattr.c:741:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buffer + buffer_pos, data + skip, chunk);
^~~~~~
fs/reiserfs/xattr.c:746:3: warning: Value stored to 'skip' is never read [clang-analyzer-deadcode.DeadStores]
skip = 0;
^ ~
fs/reiserfs/xattr.c:746:3: note: Value stored to 'skip' is never read
skip = 0;
^ ~
fs/reiserfs/xattr.c:830:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(b->buf + b->pos, name, namelen);
^~~~~~
fs/reiserfs/xattr.c:830:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(b->buf + b->pos, name, namelen);
^~~~~~
Suppressed 40 warnings (40 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
>> arch/mips/kernel/proc.c:61:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(fmt, "cpu model\t\t: %%s V%%d.%%d%s\n",
^~~~~~~
arch/mips/kernel/proc.c:61:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(fmt, "cpu model\t\t: %%s V%%d.%%d%s\n",
^~~~~~~
arch/mips/kernel/proc.c:296:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(fmt, "VCE%%c exceptions\t\t: %s\n",
^~~~~~~
arch/mips/kernel/proc.c:296:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(fmt, "VCE%%c exceptions\t\t: %s\n",
^~~~~~~
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
11 warnings generated.
Suppressed 11 warnings (11 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
40 warnings generated.
arch/mips/kernel/crash_dump.c:29:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, vaddr + offset, csize);
^~~~~~
arch/mips/kernel/crash_dump.c:29:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, vaddr + offset, csize);
^~~~~~
Suppressed 39 warnings (39 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
drivers/gpio/gpio-sim.c:515:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(devname, sizeof(devname), "gpio-sim.%u", simdev->id);
^~~~~~~~
drivers/gpio/gpio-sim.c:515:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(devname, sizeof(devname), "gpio-sim.%u", simdev->id);
^~~~~~~~
drivers/gpio/gpio-sim.c:648:2: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(dup, trimmed, strlen(trimmed) + 1);
^~~~~~~
drivers/gpio/gpio-sim.c:648:2: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(dup, trimmed, strlen(trimmed) + 1);
^~~~~~~
drivers/gpio/gpio-sim.c:663:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = sprintf(page, "%s\n", dev_name(&pdev->dev));
^~~~~~~
drivers/gpio/gpio-sim.c:663:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
ret = sprintf(page, "%s\n", dev_name(&pdev->dev));
^~~~~~~
drivers/gpio/gpio-sim.c:665:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = sprintf(page, "gpio-sim.%d\n", dev->id);
^~~~~~~
drivers/gpio/gpio-sim.c:665:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
ret = sprintf(page, "gpio-sim.%d\n", dev->id);
^~~~~~~
drivers/gpio/gpio-sim.c:683:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(page, "%c\n", live ? '1' : '0');
^~~~~~~
drivers/gpio/gpio-sim.c:683:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(page, "%c\n", live ? '1' : '0');
^~~~~~~
drivers/gpio/gpio-sim.c:826:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(properties, 0, sizeof(properties));
^~~~~~
drivers/gpio/gpio-sim.c:826:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(properties, 0, sizeof(properties));
^~~~~~
drivers/gpio/gpio-sim.c:894:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&pdevinfo, 0, sizeof(pdevinfo));
^~~~~~
drivers/gpio/gpio-sim.c:894:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&pdevinfo, 0, sizeof(pdevinfo));
^~~~~~
drivers/gpio/gpio-sim.c:1012:11: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(ctx->page, "%s\n", dev_name(dev));
^~~~~~~
drivers/gpio/gpio-sim.c:1012:11: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(ctx->page, "%s\n", dev_name(dev));
^~~~~~~
drivers/gpio/gpio-sim.c:1031:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = sprintf(page, "none\n");
^~~~~~~
drivers/gpio/gpio-sim.c:1031:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
ret = sprintf(page, "none\n");
^~~~~~~
drivers/gpio/gpio-sim.c:1047:8: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = sprintf(page, "%s\n", bank->label ?: "");
^~~~~~~
drivers/gpio/gpio-sim.c:1047:8: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
ret = sprintf(page, "%s\n", bank->label ?: "");
^~~~~~~
drivers/gpio/gpio-sim.c:1090:8: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = sprintf(page, "%u\n", bank->num_lines);
^~~~~~~
drivers/gpio/gpio-sim.c:1090:8: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
ret = sprintf(page, "%u\n", bank->num_lines);
^~~~~~~
drivers/gpio/gpio-sim.c:1142:8: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = sprintf(page, "%s\n", line->name ?: "");
^~~~~~~
drivers/gpio/gpio-sim.c:1142:8: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
ret = sprintf(page, "%s\n", line->name ?: "");
--
^~~~~~~~~~~~~~~~~~~~~~~~
drivers/base/regmap/regmap-irq.c:502:3: note: Loop condition is true. Entering loop body
for (i = 0; i < data->chip->num_regs; i++) {
^
drivers/base/regmap/regmap-irq.c:503:4: note: Control jumps to 'case 4:' at line 510
switch (map->format.val_bytes) {
^
drivers/base/regmap/regmap-irq.c:511:27: note: Array access (from variable 'buf32') results in a null pointer dereference
data->status_buf[i] = buf32[i];
^~~~~
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
14 warnings generated.
lib/xz/xz_dec_stream.c:162:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(s->temp.buf + s->temp.pos, b->in + b->in_pos, copy_size);
^~~~~~
lib/xz/xz_dec_stream.c:162:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(s->temp.buf + s->temp.pos, b->in + b->in_pos, copy_size);
^~~~~~
lib/xz/xz_dec_stream.c:822:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memzero(&s->block, sizeof(s->block));
^
lib/xz/xz_private.h:44:30: note: expanded from macro 'memzero'
# define memzero(buf, size) memset(buf, 0, size)
^~~~~~
lib/xz/xz_dec_stream.c:822:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memzero(&s->block, sizeof(s->block));
^
lib/xz/xz_private.h:44:30: note: expanded from macro 'memzero'
# define memzero(buf, size) memset(buf, 0, size)
^~~~~~
lib/xz/xz_dec_stream.c:823:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memzero(&s->index, sizeof(s->index));
^
lib/xz/xz_private.h:44:30: note: expanded from macro 'memzero'
# define memzero(buf, size) memset(buf, 0, size)
^~~~~~
lib/xz/xz_dec_stream.c:823:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memzero(&s->index, sizeof(s->index));
^
lib/xz/xz_private.h:44:30: note: expanded from macro 'memzero'
# define memzero(buf, size) memset(buf, 0, size)
^~~~~~
Suppressed 11 warnings (11 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
18 warnings generated.
lib/xz/xz_dec_lzma2.c:401:3: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(dict->buf + dict->pos, b->in + b->in_pos, copy_size);
^~~~~~~
lib/xz/xz_dec_lzma2.c:401:3: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(dict->buf + dict->pos, b->in + b->in_pos, copy_size);
^~~~~~~
lib/xz/xz_dec_lzma2.c:415:4: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(b->out + b->out_pos, b->in + b->in_pos,
^~~~~~~
lib/xz/xz_dec_lzma2.c:415:4: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(b->out + b->out_pos, b->in + b->in_pos,
^~~~~~~
lib/xz/xz_dec_lzma2.c:456:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(b->out + b->out_pos, dict->buf + dict->start,
^~~~~~
lib/xz/xz_dec_lzma2.c:456:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(b->out + b->out_pos, dict->buf + dict->start,
^~~~~~
lib/xz/xz_dec_lzma2.c:892:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(s->temp.buf + s->temp.size, b->in + b->in_pos, tmp);
^~~~~~
lib/xz/xz_dec_lzma2.c:892:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(s->temp.buf + s->temp.size, b->in + b->in_pos, tmp);
^~~~~~
lib/xz/xz_dec_lzma2.c:895:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memzero(s->temp.buf + s->temp.size + tmp,
^
lib/xz/xz_private.h:44:30: note: expanded from macro 'memzero'
# define memzero(buf, size) memset(buf, 0, size)
^~~~~~
lib/xz/xz_dec_lzma2.c:895:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memzero(s->temp.buf + s->temp.size + tmp,
^
lib/xz/xz_private.h:44:30: note: expanded from macro 'memzero'
# define memzero(buf, size) memset(buf, 0, size)
^~~~~~
lib/xz/xz_dec_lzma2.c:917:4: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(s->temp.buf, s->temp.buf + s->rc.in_pos,
^~~~~~~
lib/xz/xz_dec_lzma2.c:917:4: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(s->temp.buf, s->temp.buf + s->rc.in_pos,
^~~~~~~
lib/xz/xz_dec_lzma2.c:952:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(s->temp.buf, b->in + b->in_pos, in_avail);
^~~~~~
lib/xz/xz_dec_lzma2.c:952:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(s->temp.buf, b->in + b->in_pos, in_avail);
^~~~~~
Suppressed 11 warnings (11 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
39 warnings generated.
>> drivers/misc/kgdbts.c:240:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(scratch_buf, "%s,%lx,%i", bp_type, addr,
^~~~~~~
drivers/misc/kgdbts.c:240:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(scratch_buf, "%s,%lx,%i", bp_type, addr,
^~~~~~~
drivers/misc/kgdbts.c:390:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(scratch_buf, 0, sizeof(scratch_buf));
^~~~~~
drivers/misc/kgdbts.c:390:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(scratch_buf, 0, sizeof(scratch_buf));
^~~~~~
drivers/misc/kgdbts.c:709:2: warning: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcat(get_buf, buf);
^~~~~~
drivers/misc/kgdbts.c:709:2: note: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119
strcat(get_buf, buf);
^~~~~~
drivers/misc/kgdbts.c:714:2: warning: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcat(get_buf, "#");
^~~~~~
drivers/misc/kgdbts.c:714:2: note: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119
strcat(get_buf, "#");
^~~~~~
drivers/misc/kgdbts.c:832:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&ts, 0, sizeof(ts));
^~~~~~
drivers/misc/kgdbts.c:832:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&ts, 0, sizeof(ts));
^~~~~~
drivers/misc/kgdbts.c:1075:2: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(config, opt);
^~~~~~
drivers/misc/kgdbts.c:1075:2: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(config, opt);
^~~~~~
drivers/misc/kgdbts.c:1146:3: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(config, kmessage);
^~~~~~
drivers/misc/kgdbts.c:1146:3: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(config, kmessage);
^~~~~~
drivers/misc/kgdbts.c:1155:2: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(config, kmessage);
^~~~~~
drivers/misc/kgdbts.c:1155:2: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(config, kmessage);
^~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
drivers/gpu/drm/bridge/cadence/cdns-mhdp8546-core.c:151:9: warning: 2nd function call argument is an uninitialized value [clang-analyzer-core.CallAndMessage]
ret = cdns_mhdp_mailbox_write(mhdp, header[i]);
^
drivers/gpu/drm/bridge/cadence/cdns-mhdp8546-core.c:2413:8: note: Calling 'cdns_mhdp_update_link_status'
ret = cdns_mhdp_update_link_status(mhdp);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/gpu/drm/bridge/cadence/cdns-mhdp8546-core.c:2258:18: note: Calling 'cdns_mhdp_detect_hpd'
mhdp->plugged = cdns_mhdp_detect_hpd(mhdp, &hpd_pulse);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/gpu/drm/bridge/cadence/cdns-mhdp8546-core.c:2224:14: note: Calling 'cdns_mhdp_read_hpd_event'
hpd_event = cdns_mhdp_read_hpd_event(mhdp);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/gpu/drm/bridge/cadence/cdns-mhdp8546-core.c:447:8: note: Calling 'cdns_mhdp_mailbox_send'
ret = cdns_mhdp_mailbox_send(mhdp, MB_MODULE_ID_DP_TX,
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/gpu/drm/bridge/cadence/cdns-mhdp8546-core.c:150:2: note: Loop condition is true. Entering loop body
for (i = 0; i < sizeof(header); i++) {
^
drivers/gpu/drm/bridge/cadence/cdns-mhdp8546-core.c:152:7: note: Assuming 'ret' is 0
if (ret)
^~~
drivers/gpu/drm/bridge/cadence/cdns-mhdp8546-core.c:152:3: note: Taking false branch
if (ret)
^
drivers/gpu/drm/bridge/cadence/cdns-mhdp8546-core.c:150:2: note: Loop condition is true. Entering loop body
for (i = 0; i < sizeof(header); i++) {
^
drivers/gpu/drm/bridge/cadence/cdns-mhdp8546-core.c:152:7: note: Assuming 'ret' is 0
if (ret)
^~~
drivers/gpu/drm/bridge/cadence/cdns-mhdp8546-core.c:152:3: note: Taking false branch
if (ret)
^
drivers/gpu/drm/bridge/cadence/cdns-mhdp8546-core.c:150:2: note: Loop condition is true. Entering loop body
for (i = 0; i < sizeof(header); i++) {
^
drivers/gpu/drm/bridge/cadence/cdns-mhdp8546-core.c:152:7: note: Assuming 'ret' is 0
if (ret)
^~~
drivers/gpu/drm/bridge/cadence/cdns-mhdp8546-core.c:152:3: note: Taking false branch
if (ret)
^
drivers/gpu/drm/bridge/cadence/cdns-mhdp8546-core.c:150:34: note: The value 3 is assigned to 'i'
for (i = 0; i < sizeof(header); i++) {
--
include/linux/spinlock.h:377:43: note: expanded from macro 'spin_lock_irqsave'
#define spin_lock_irqsave(lock, flags) \
^
drivers/crypto/s5p-sss.c:1381:6: note: 'req' is non-null
if (req)
^~~
drivers/crypto/s5p-sss.c:1381:2: note: Taking true branch
if (req)
^
drivers/crypto/s5p-sss.c:1384:6: note: Assuming the condition is false
if (test_bit(HASH_FLAGS_BUSY, &dd->hash_flags)) {
^
include/asm-generic/bitops/non-atomic.h:120:18: note: expanded from macro 'test_bit'
#define test_bit arch_test_bit
^
drivers/crypto/s5p-sss.c:1384:2: note: Taking false branch
if (test_bit(HASH_FLAGS_BUSY, &dd->hash_flags)) {
^
drivers/crypto/s5p-sss.c:1391:6: note: Assuming 'async_req' is non-null
if (async_req)
^~~~~~~~~
drivers/crypto/s5p-sss.c:1391:2: note: Taking true branch
if (async_req)
^
drivers/crypto/s5p-sss.c:1396:7: note: 'async_req' is non-null
if (!async_req)
^~~~~~~~~
drivers/crypto/s5p-sss.c:1396:2: note: Taking false branch
if (!async_req)
^
drivers/crypto/s5p-sss.c:1399:6: note: Assuming 'backlog' is null
if (backlog)
^~~~~~~
drivers/crypto/s5p-sss.c:1399:2: note: Taking false branch
if (backlog)
^
drivers/crypto/s5p-sss.c:1407:6: note: 'err' is 0
if (err || !ctx->total)
^~~
drivers/crypto/s5p-sss.c:1407:6: note: Left side of '||' is false
drivers/crypto/s5p-sss.c:1407:13: note: Assuming field 'total' is 0
if (err || !ctx->total)
^~~~~~~~~~~
drivers/crypto/s5p-sss.c:1407:2: note: Taking true branch
if (err || !ctx->total)
^
drivers/crypto/s5p-sss.c:1408:3: note: Control jumps to line 1426
goto out;
^
drivers/crypto/s5p-sss.c:1426:2: note: Taking true branch
if (err != -EINPROGRESS) {
^
drivers/crypto/s5p-sss.c:1428:3: note: Calling 's5p_hash_finish_req'
s5p_hash_finish_req(req, err);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/crypto/s5p-sss.c:1332:6: note: Assuming the condition is false
if (test_bit(HASH_FLAGS_SGS_COPIED, &dd->hash_flags))
^
include/asm-generic/bitops/non-atomic.h:120:18: note: expanded from macro 'test_bit'
#define test_bit arch_test_bit
^
drivers/crypto/s5p-sss.c:1332:2: note: Taking false branch
if (test_bit(HASH_FLAGS_SGS_COPIED, &dd->hash_flags))
^
drivers/crypto/s5p-sss.c:1336:6: note: Assuming the condition is true
if (test_bit(HASH_FLAGS_SGS_ALLOCED, &dd->hash_flags))
^
include/asm-generic/bitops/non-atomic.h:120:18: note: expanded from macro 'test_bit'
#define test_bit arch_test_bit
^
drivers/crypto/s5p-sss.c:1336:2: note: Taking true branch
if (test_bit(HASH_FLAGS_SGS_ALLOCED, &dd->hash_flags))
^
drivers/crypto/s5p-sss.c:1337:3: note: Memory is released
kfree(ctx->sg);
^~~~~~~~~~~~~~
drivers/crypto/s5p-sss.c:1339:10: note: Use of memory after it is freed
ctx->sg = NULL;
~~~~~~~ ^
drivers/crypto/s5p-sss.c:1701:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(out, ctx, sizeof(*ctx) + ctx->bufcnt);
^~~~~~
drivers/crypto/s5p-sss.c:1701:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(out, ctx, sizeof(*ctx) + ctx->bufcnt);
^~~~~~
drivers/crypto/s5p-sss.c:1718:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ctx, in, sizeof(*ctx) + BUFLEN);
^~~~~~
drivers/crypto/s5p-sss.c:1718:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ctx, in, sizeof(*ctx) + BUFLEN);
^~~~~~
drivers/crypto/s5p-sss.c:2056:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ctx->aes_key, key, keylen);
^~~~~~
drivers/crypto/s5p-sss.c:2056:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ctx->aes_key, key, keylen);
^~~~~~
Suppressed 40 warnings (40 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
>> kernel/debug/kdb/kdb_main.c:314:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(ep, "%s=%s", var, val);
^~~~~~~
kernel/debug/kdb/kdb_main.c:314:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(ep, "%s=%s", var, val);
^~~~~~~
kernel/debug/kdb/kdb_main.c:563:3: warning: Value stored to 'found' is never read [clang-analyzer-deadcode.DeadStores]
found = kdbnearsym(addr, &symtab);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/debug/kdb/kdb_main.c:563:3: note: Value stored to 'found' is never read
found = kdbnearsym(addr, &symtab);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/debug/kdb/kdb_main.c:750:3: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(mp->usage, argv[2]+1);
^~~~~~
kernel/debug/kdb/kdb_main.c:750:3: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(mp->usage, argv[2]+1);
^~~~~~
kernel/debug/kdb/kdb_main.c:754:3: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(mp->help, argv[3]+1);
^~~~~~
kernel/debug/kdb/kdb_main.c:754:3: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(mp->help, argv[3]+1);
^~~~~~
kernel/debug/kdb/kdb_main.c:882:2: warning: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
strcpy(kdb_grep_string, cp);
^~~~~~
kernel/debug/kdb/kdb_main.c:882:2: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(kdb_grep_string, cp);
^~~~~~
kernel/debug/kdb/kdb_main.c:1295:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(kdb_prompt_str, CMD_BUFLEN, kdbgetenv("PROMPT"),
^~~~~~~~
kernel/debug/kdb/kdb_main.c:1295:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(kdb_prompt_str, CMD_BUFLEN, kdbgetenv("PROMPT"),
^~~~~~~~
kernel/debug/kdb/kdb_main.c:1298:4: warning: Call to function 'strncat' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncat_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncat(kdb_prompt_str, "[defcmd]", CMD_BUFLEN);
^~~~~~~
kernel/debug/kdb/kdb_main.c:1298:4: note: Call to function 'strncat' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncat_s' in case of C11
strncat(kdb_prompt_str, "[defcmd]", CMD_BUFLEN);
^~~~~~~
kernel/debug/kdb/kdb_main.c:1488:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(cbuf, '\0', sizeof(cbuf));
^~~~~~
kernel/debug/kdb/kdb_main.c:1488:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(cbuf, '\0', sizeof(cbuf));
^~~~~~
kernel/debug/kdb/kdb_main.c:1504:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&symtab, 0, sizeof(symtab));
^~~~~~
kernel/debug/kdb/kdb_main.c:1504:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&symtab, 0, sizeof(symtab));
^~~~~~
kernel/debug/kdb/kdb_main.c:1667:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(fmtstr, "%%16.16l%c ", fmtchar);
^~~~~~~
kernel/debug/kdb/kdb_main.c:1667:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(fmtstr, "%%16.16l%c ", fmtchar);
^~~~~~~
kernel/debug/kdb/kdb_main.c:1670:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(fmtstr, "%%8.8l%c ", fmtchar);
^~~~~~~
kernel/debug/kdb/kdb_main.c:1670:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(fmtstr, "%%8.8l%c ", fmtchar);
^~~~~~~
kernel/debug/kdb/kdb_main.c:1673:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(fmtstr, "%%4.4l%c ", fmtchar);
^~~~~~~
kernel/debug/kdb/kdb_main.c:1673:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(fmtstr, "%%4.4l%c ", fmtchar);
^~~~~~~
kernel/debug/kdb/kdb_main.c:1676:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(fmtstr, "%%2.2l%c ", fmtchar);
^~~~~~~
kernel/debug/kdb/kdb_main.c:1676:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(fmtstr, "%%2.2l%c ", fmtchar);
^~~~~~~
kernel/debug/kdb/kdb_main.c:2480:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(val, 0, sizeof(*val));
^~~~~~
kernel/debug/kdb/kdb_main.c:2480:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(val, 0, sizeof(*val));
^~~~~~
kernel/debug/kdb/kdb_main.c:2558:2: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(fmtstr, "%%0%dlx ", (int)(2*bytesperword));
^~~~~~~
kernel/debug/kdb/kdb_main.c:2558:2: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(fmtstr, "%%0%dlx ", (int)(2*bytesperword));
^~~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
drivers/mtd/nand/raw/nand_jedec.c:103:6: warning: The result of the left shift is undefined because the right operand is negative [clang-analyzer-core.UndefinedBinaryOperatorResult]
1 << (fls(le32_to_cpu(p->pages_per_block)) - 1);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/mtd/nand/raw/nand_jedec.c:27:25: note: Calling 'nand_to_mtd'
struct mtd_info *mtd = nand_to_mtd(chip);
^~~~~~~~~~~~~~~~~
include/linux/mtd/rawnand.h:1315:2: note: Returning without writing to 'chip->parameters.model', which participates in a condition later
return &chip->base.mtd;
--
^
mm/vmalloc.c:2211:6: note: Assuming the condition is true
if (vmap_pages_range(addr, addr + size, PAGE_KERNEL,
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
mm/vmalloc.c:2211:2: note: Taking true branch
if (vmap_pages_range(addr, addr + size, PAGE_KERNEL,
^
mm/vmalloc.c:2213:3: note: Calling 'vm_unmap_ram'
vm_unmap_ram(mem, count);
^~~~~~~~~~~~~~~~~~~~~~~~
mm/vmalloc.c:2151:2: note: Loop condition is false. Exiting loop
might_sleep();
^
include/linux/kernel.h:180:29: note: expanded from macro 'might_sleep'
# define might_sleep() do { might_resched(); } while (0)
^
include/linux/kernel.h:115:26: note: expanded from macro 'might_resched'
# define might_resched() do { } while (0)
^
mm/vmalloc.c:2151:2: note: Loop condition is false. Exiting loop
might_sleep();
^
include/linux/kernel.h:180:24: note: expanded from macro 'might_sleep'
# define might_sleep() do { might_resched(); } while (0)
^
mm/vmalloc.c:2152:9: note: Assuming 'addr' is 0
BUG_ON(!addr);
^
arch/mips/include/asm/bug.h:34:44: note: expanded from macro 'BUG_ON'
#define BUG_ON(C) __BUG_ON((unsigned long)(C))
^
mm/vmalloc.c:2159:13: note: 'count' is > 32
if (likely(count <= VMAP_MAX_ALLOC)) {
^
include/linux/compiler.h:77:40: note: expanded from macro 'likely'
# define likely(x) __builtin_expect(!!(x), 1)
^
mm/vmalloc.c:2159:2: note: Taking false branch
if (likely(count <= VMAP_MAX_ALLOC)) {
^
mm/vmalloc.c:2165:7: note: Calling 'find_vmap_area'
va = find_vmap_area(addr);
^~~~~~~~~~~~~~~~~~~~
mm/vmalloc.c:1792:2: note: Value assigned to 'va'
va = __find_vmap_area(addr);
^~~~~~~~~~~~~~~~~~~~~~~~~~~
mm/vmalloc.c:1795:2: note: Returning pointer (loaded from 'va')
return va;
^~~~~~~~~
mm/vmalloc.c:2165:7: note: Returning from 'find_vmap_area'
va = find_vmap_area(addr);
^~~~~~~~~~~~~~~~~~~~
mm/vmalloc.c:2165:2: note: Value assigned to 'va'
va = find_vmap_area(addr);
^~~~~~~~~~~~~~~~~~~~~~~~~
mm/vmalloc.c:2166:9: note: Assuming 'va' is null
BUG_ON(!va);
^
arch/mips/include/asm/bug.h:34:44: note: expanded from macro 'BUG_ON'
#define BUG_ON(C) __BUG_ON((unsigned long)(C))
^
mm/vmalloc.c:2167:37: note: Access to field 'va_start' results in a dereference of a null pointer (loaded from variable 'va')
debug_check_no_locks_freed((void *)va->va_start,
^~
mm/vmalloc.c:3362:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, map + offset, length);
^~~~~~
mm/vmalloc.c:3362:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, map + offset, length);
^~~~~~
mm/vmalloc.c:3365:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buf, 0, length);
^~~~~~
mm/vmalloc.c:3365:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(buf, 0, length);
^~~~~~
mm/vmalloc.c:3445:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buf, 0, n);
^~~~~~
mm/vmalloc.c:3445:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(buf, 0, n);
^~~~~~
mm/vmalloc.c:3457:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buf, 0, buflen - (buf - buf_start));
^~~~~~
mm/vmalloc.c:3457:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(buf, 0, buflen - (buf - buf_start));
^~~~~~
mm/vmalloc.c:3954:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(counters, 0, nr_node_ids * sizeof(unsigned int));
^~~~~~
mm/vmalloc.c:3954:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(counters, 0, nr_node_ids * sizeof(unsigned int));
^~~~~~
Suppressed 40 warnings (39 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
39 warnings generated.
Suppressed 39 warnings (39 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
40 warnings generated.
>> drivers/mmc/host/omap_hsmmc.c:747:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", mmc_pdata(host)->name);
^~~~~~~
drivers/mmc/host/omap_hsmmc.c:747:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", mmc_pdata(host)->name);
^~~~~~~
Suppressed 39 warnings (39 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
42 warnings generated.
drivers/mmc/host/davinci_mmc.c:631:37: warning: The result of the '/' expression is undefined [clang-analyzer-core.UndefinedBinaryOperatorResult]
host->ns_in_one_cycle = (1000000) / (((mmc_pclk
^
drivers/mmc/host/davinci_mmc.c:646:6: note: Assuming field 'bus_mode' is not equal to MMC_BUSMODE_OPENDRAIN
if (ios->bus_mode == MMC_BUSMODE_OPENDRAIN) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/mmc/host/davinci_mmc.c:646:2: note: Taking false branch
if (ios->bus_mode == MMC_BUSMODE_OPENDRAIN) {
^
drivers/mmc/host/davinci_mmc.c:666:24: note: Calling 'calculate_freq_for_card'
mmc_push_pull_freq = calculate_freq_for_card(host, ios->clock);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/mmc/host/davinci_mmc.c:618:6: note: Assuming 'mmc_req_freq' is 0
if (mmc_req_freq && mmc_pclk > (2 * mmc_req_freq))
^~~~~~~~~~~~
drivers/mmc/host/davinci_mmc.c:618:19: note: Left side of '&&' is false
if (mmc_req_freq && mmc_pclk > (2 * mmc_req_freq))
^
drivers/mmc/host/davinci_mmc.c:627:6: note: Assuming 'mmc_freq' is <= 'mmc_req_freq'
if (mmc_freq > mmc_req_freq)
^~~~~~~~~~~~~~~~~~~~~~~
drivers/mmc/host/davinci_mmc.c:627:2: note: Taking false branch
if (mmc_freq > mmc_req_freq)
^
drivers/mmc/host/davinci_mmc.c:630:6: note: 'mmc_req_freq' is <= 400000
if (mmc_req_freq <= 400000)
^~~~~~~~~~~~
drivers/mmc/host/davinci_mmc.c:630:2: note: Taking true branch
if (mmc_req_freq <= 400000)
^
drivers/mmc/host/davinci_mmc.c:631:37: note: The result of the '/' expression is undefined
host->ns_in_one_cycle = (1000000) / (((mmc_pclk
~~~~~~~~~~^~~~~~~~~~~~~
drivers/mmc/host/davinci_mmc.c:939:15: warning: Access to field 'error' results in a dereference of a null pointer (loaded from variable 'data') [clang-analyzer-core.NullDereference]
data->error = -ETIMEDOUT;
~~~~ ^
drivers/mmc/host/davinci_mmc.c:870:2: note: 'data' initialized here
struct mmc_data *data = host->data;
^~~~~~~~~~~~~~~~~~~~~
drivers/mmc/host/davinci_mmc.c:872:6: note: Assuming field 'cmd' is not equal to NULL
if (host->cmd == NULL && host->data == NULL) {
^~~~~~~~~~~~~~~~~
drivers/mmc/host/davinci_mmc.c:872:24: note: Left side of '&&' is false
if (host->cmd == NULL && host->data == NULL) {
^
drivers/mmc/host/davinci_mmc.c:891:6: note: Assuming field 'bytes_left' is 0
if (host->bytes_left && (status & (MMCST0_DXRDY | MMCST0_DRRDY))) {
^~~~~~~~~~~~~~~~
drivers/mmc/host/davinci_mmc.c:891:23: note: Left side of '&&' is false
if (host->bytes_left && (status & (MMCST0_DXRDY | MMCST0_DRRDY))) {
^
drivers/mmc/host/davinci_mmc.c:920:6: note: Assuming the condition is true
if (qstatus & MMCST0_DATDNE) {
^~~~~~~~~~~~~~~~~~~~~~~
drivers/mmc/host/davinci_mmc.c:920:2: note: Taking true branch
if (qstatus & MMCST0_DATDNE) {
^
drivers/mmc/host/davinci_mmc.c:922:7: note: Assuming 'data' is equal to NULL
if (data != NULL) {
^~~~~~~~~~~~
drivers/mmc/host/davinci_mmc.c:922:3: note: Taking false branch
if (data != NULL) {
^
drivers/mmc/host/davinci_mmc.c:932:4: note: Left side of '&&' is true
dev_err(mmc_dev(host->mmc),
^
include/linux/dev_printk.h:144:2: note: expanded from macro 'dev_err'
dev_printk_index_wrap(_dev_err, KERN_ERR, dev, dev_fmt(fmt), ##__VA_ARGS__)
^
include/linux/dev_printk.h:109:3: note: expanded from macro 'dev_printk_index_wrap'
dev_printk_index_emit(level, fmt); \
^
include/linux/dev_printk.h:105:2: note: expanded from macro 'dev_printk_index_emit'
printk_index_subsys_emit("%s %s: ", level, fmt)
^
include/linux/printk.h:413:2: note: expanded from macro 'printk_index_subsys_emit'
__printk_index_emit(fmt, level, subsys_fmt_prefix)
^
include/linux/printk.h:370:7: note: expanded from macro '__printk_index_emit'
if (__builtin_constant_p(_fmt) && __builtin_constant_p(_level)) { \
^
drivers/mmc/host/davinci_mmc.c:932:4: note: Taking true branch
dev_err(mmc_dev(host->mmc),
^
include/linux/dev_printk.h:144:2: note: expanded from macro 'dev_err'
dev_printk_index_wrap(_dev_err, KERN_ERR, dev, dev_fmt(fmt), ##__VA_ARGS__)
^
include/linux/dev_printk.h:109:3: note: expanded from macro 'dev_printk_index_wrap'
dev_printk_index_emit(level, fmt); \
^
include/linux/dev_printk.h:105:2: note: expanded from macro 'dev_printk_index_emit'
printk_index_subsys_emit("%s %s: ", level, fmt)
--
~~~~~~~~~^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
include/linux/err.h:36:2: note: Returning zero, which participates in a condition later
return IS_ERR_VALUE((unsigned long)ptr);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/bus/brcmstb_gisb.c:422:6: note: Returning from 'IS_ERR'
if (IS_ERR(gdev->base))
^~~~~~~~~~~~~~~~~~
drivers/bus/brcmstb_gisb.c:422:2: note: Taking false branch
if (IS_ERR(gdev->base))
^
drivers/bus/brcmstb_gisb.c:426:6: note: Assuming 'of_id' is non-null
if (!of_id) {
^~~~~~
drivers/bus/brcmstb_gisb.c:426:2: note: Taking false branch
if (!of_id) {
^
drivers/bus/brcmstb_gisb.c:436:6: note: Assuming 'err' is >= 0
if (err < 0)
^~~~~~~
drivers/bus/brcmstb_gisb.c:436:2: note: Taking false branch
if (err < 0)
^
drivers/bus/brcmstb_gisb.c:442:6: note: Assuming 'err' is >= 0
if (err < 0)
^~~~~~~
drivers/bus/brcmstb_gisb.c:442:2: note: Taking false branch
if (err < 0)
^
drivers/bus/brcmstb_gisb.c:446:6: note: Assuming 'bp_irq' is <= 0
if (bp_irq > 0) {
^~~~~~~~~~
drivers/bus/brcmstb_gisb.c:446:2: note: Taking false branch
if (bp_irq > 0) {
^
drivers/bus/brcmstb_gisb.c:455:2: note: Taking false branch
if (of_property_read_u32(dn, "brcm,gisb-arb-master-mask",
^
drivers/bus/brcmstb_gisb.c:464:6: note: Assuming the condition is true
if (hweight_long(gdev->valid_mask) == num_masters) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/bus/brcmstb_gisb.c:464:2: note: Taking true branch
if (hweight_long(gdev->valid_mask) == num_masters) {
^
drivers/bus/brcmstb_gisb.c:468:19: note: Assuming 'i' is < 'last'
for (i = first; i < last; i++) {
^~~~~~~~
drivers/bus/brcmstb_gisb.c:468:3: note: Loop condition is true. Entering loop body
for (i = first; i < last; i++) {
^
drivers/bus/brcmstb_gisb.c:469:8: note: Assuming the condition is true
if (!(gdev->valid_mask & BIT(i)))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/bus/brcmstb_gisb.c:469:4: note: Taking true branch
if (!(gdev->valid_mask & BIT(i)))
^
drivers/bus/brcmstb_gisb.c:470:5: note: Execution continues on line 468
continue;
^
drivers/bus/brcmstb_gisb.c:468:29: note: The value 32 is assigned to 'i'
for (i = first; i < last; i++) {
^~~
drivers/bus/brcmstb_gisb.c:468:19: note: Assuming 'i' is < 'last'
for (i = first; i < last; i++) {
^~~~~~~~
drivers/bus/brcmstb_gisb.c:468:3: note: Loop condition is true. Entering loop body
for (i = first; i < last; i++) {
^
drivers/bus/brcmstb_gisb.c:469:29: note: The result of the left shift is undefined due to shifting by '32', which is greater or equal to the width of type 'unsigned long'
if (!(gdev->valid_mask & BIT(i)))
^
include/vdso/bits.h:7:26: note: expanded from macro 'BIT'
#define BIT(nr) (UL(1) << (nr))
^ ~~~~
Suppressed 31 warnings (30 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
41 warnings generated.
drivers/mmc/core/mmc_ops.c:270:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(cxd, cmd.resp, sizeof(u32) * 4);
^~~~~~
drivers/mmc/core/mmc_ops.c:270:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(cxd, cmd.resp, sizeof(u32) * 4);
^~~~~~
drivers/mmc/core/mmc_ops.c:789:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data_buf, test_buf, len);
^~~~~~
drivers/mmc/core/mmc_ops.c:789:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data_buf, test_buf, len);
^~~~~~
Suppressed 39 warnings (39 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
41 warnings generated.
drivers/i2c/busses/i2c-jz4780.c:573:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buf, 0, len);
^~~~~~
drivers/i2c/busses/i2c-jz4780.c:573:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(buf, 0, len);
^~~~~~
>> drivers/i2c/busses/i2c-jz4780.c:784:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(i2c->adap.name, "%s", pdev->name);
^~~~~~~
drivers/i2c/busses/i2c-jz4780.c:784:2: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(i2c->adap.name, "%s", pdev->name);
^~~~~~~
Suppressed 39 warnings (39 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
39 warnings generated.
Suppressed 39 warnings (39 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
39 warnings generated.
Suppressed 39 warnings (39 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
40 warnings generated.
drivers/gpu/ipu-v3/ipu-csi.c:351:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(csicfg, 0, sizeof(*csicfg));
^~~~~~
drivers/gpu/ipu-v3/ipu-csi.c:351:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(csicfg, 0, sizeof(*csicfg));
^~~~~~
Suppressed 39 warnings (39 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
39 warnings generated.
Suppressed 39 warnings (39 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
39 warnings generated.
Suppressed 39 warnings (39 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
39 warnings generated.
Suppressed 39 warnings (39 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
42 warnings generated.
Suppressed 42 warnings (41 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
41 warnings generated.
drivers/media/i2c/saa6588.c:157:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, &s->buffer[s->rd_index], 3);
^~~~~~
drivers/media/i2c/saa6588.c:157:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, &s->buffer[s->rd_index], 3);
^~~~~~
Suppressed 40 warnings (40 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
40 warnings generated.
Suppressed 40 warnings (40 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
drivers/media/dvb-frontends/s5h1420.c:186:29: warning: The result of the left shift is undefined because the left operand is negative [clang-analyzer-core.UndefinedBinaryOperatorResult]
((cmd->msg_len-1) << 4) | 0x08);
~~~~~~~~~~~~~~~~ ^
drivers/media/dvb-frontends/s5h1420.c:170:2: note: Assuming 'debug' is 0
dprintk("enter %s\n", __func__);
^
drivers/media/dvb-frontends/s5h1420.c:61:6: note: expanded from macro 'dprintk'
if (debug) \
^~~~~
drivers/media/dvb-frontends/s5h1420.c:170:2: note: Taking false branch
dprintk("enter %s\n", __func__);
^
drivers/media/dvb-frontends/s5h1420.c:61:2: note: expanded from macro 'dprintk'
if (debug) \
^
drivers/media/dvb-frontends/s5h1420.c:170:2: note: Loop condition is false. Exiting loop
dprintk("enter %s\n", __func__);
^
drivers/media/dvb-frontends/s5h1420.c:60:23: note: expanded from macro 'dprintk'
#define dprintk(x...) do { \
^
drivers/media/dvb-frontends/s5h1420.c:171:6: note: Assuming the condition is false
if (cmd->msg_len > sizeof(cmd->msg))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/s5h1420.c:171:2: note: Taking false branch
if (cmd->msg_len > sizeof(cmd->msg))
^
drivers/media/dvb-frontends/s5h1420.c:180:11: note: Assuming 'i' is >= field 'msg_len'
for(i=0; i< cmd->msg_len; i++) {
^~~~~~~~~~~~~~~
drivers/media/dvb-frontends/s5h1420.c:180:2: note: Loop condition is false. Execution continues on line 185
for(i=0; i< cmd->msg_len; i++) {
^
drivers/media/dvb-frontends/s5h1420.c:186:29: note: The result of the left shift is undefined because the left operand is negative
((cmd->msg_len-1) << 4) | 0x08);
~~~~~~~~~~~~~~~~ ^
drivers/media/dvb-frontends/s5h1420.c:846:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(m, 0, sizeof(struct i2c_msg) * (1 + num));
^~~~~~
drivers/media/dvb-frontends/s5h1420.c:846:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(m, 0, sizeof(struct i2c_msg) * (1 + num));
^~~~~~
drivers/media/dvb-frontends/s5h1420.c:852:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&m[1], msg, sizeof(struct i2c_msg) * num);
^~~~~~
drivers/media/dvb-frontends/s5h1420.c:852:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&m[1], msg, sizeof(struct i2c_msg) * num);
^~~~~~
drivers/media/dvb-frontends/s5h1420.c:895:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(state->shadow, 0xff, sizeof(state->shadow));
^~~~~~
drivers/media/dvb-frontends/s5h1420.c:895:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(state->shadow, 0xff, sizeof(state->shadow));
--
^
include/linux/printk.h:413:2: note: expanded from macro 'printk_index_subsys_emit'
__printk_index_emit(fmt, level, subsys_fmt_prefix)
^
include/linux/printk.h:379:12: note: expanded from macro '__printk_index_emit'
.fmt = __builtin_constant_p(_fmt) ? (_fmt) : NULL, \
^
drivers/thermal/rcar_gen3_thermal.c:502:3: note: '?' condition is true
dev_info(dev, "No calibration values fused, fallback to driver values\n");
^
include/linux/dev_printk.h:150:2: note: expanded from macro 'dev_info'
dev_printk_index_wrap(_dev_info, KERN_INFO, dev, dev_fmt(fmt), ##__VA_ARGS__)
^
include/linux/dev_printk.h:109:3: note: expanded from macro 'dev_printk_index_wrap'
dev_printk_index_emit(level, fmt); \
^
include/linux/dev_printk.h:105:2: note: expanded from macro 'dev_printk_index_emit'
printk_index_subsys_emit("%s %s: ", level, fmt)
^
include/linux/printk.h:413:2: note: expanded from macro 'printk_index_subsys_emit'
__printk_index_emit(fmt, level, subsys_fmt_prefix)
^
include/linux/printk.h:383:14: note: expanded from macro '__printk_index_emit'
.level = __builtin_constant_p(_level) ? (_level) : NULL, \
^
drivers/thermal/rcar_gen3_thermal.c:502:3: note: Loop condition is false. Exiting loop
dev_info(dev, "No calibration values fused, fallback to driver values\n");
^
include/linux/dev_printk.h:150:2: note: expanded from macro 'dev_info'
dev_printk_index_wrap(_dev_info, KERN_INFO, dev, dev_fmt(fmt), ##__VA_ARGS__)
^
include/linux/dev_printk.h:109:3: note: expanded from macro 'dev_printk_index_wrap'
dev_printk_index_emit(level, fmt); \
^
include/linux/dev_printk.h:105:2: note: expanded from macro 'dev_printk_index_emit'
printk_index_subsys_emit("%s %s: ", level, fmt)
^
include/linux/printk.h:413:2: note: expanded from macro 'printk_index_subsys_emit'
__printk_index_emit(fmt, level, subsys_fmt_prefix)
^
include/linux/printk.h:369:2: note: expanded from macro '__printk_index_emit'
do { \
^
drivers/thermal/rcar_gen3_thermal.c:504:2: note: Loop condition is true. Entering loop body
for (i = 0; i < priv->num_tscs; i++) {
^
drivers/thermal/rcar_gen3_thermal.c:509:3: note: Taking false branch
if (IS_ERR(zone)) {
^
drivers/thermal/rcar_gen3_thermal.c:517:3: note: Calling 'rcar_gen3_thermal_calc_coefs'
rcar_gen3_thermal_calc_coefs(priv, tsc, *ths_tj_1);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/thermal/rcar_gen3_thermal.c:146:45: note: The result of the left shift is undefined because the left operand is negative
/ (priv->ptat[0] - priv->ptat[2])) + FIXPT_INT(TJ_3);
^
drivers/thermal/rcar_gen3_thermal.c:125:29: note: expanded from macro 'FIXPT_INT'
#define FIXPT_INT(_x) ((_x) << FIXPT_SHIFT)
~~~~ ^
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
drivers/greybus/interface.c:472:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", measurement);
^~~~~~~
drivers/greybus/interface.c:472:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", measurement);
^~~~~~~
drivers/greybus/interface.c:491:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", measurement);
^~~~~~~
drivers/greybus/interface.c:491:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", measurement);
^~~~~~~
drivers/greybus/interface.c:510:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", measurement);
^~~~~~~
drivers/greybus/interface.c:510:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", measurement);
^~~~~~~
drivers/greybus/interface.c:589:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", gb_interface_type_string(intf));
^~~~~~~
drivers/greybus/interface.c:589:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", gb_interface_type_string(intf));
^~~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
drivers/w1/slaves/w1_ds28e04.c:137:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, &data->memory[off], count);
^~~~~~
drivers/w1/slaves/w1_ds28e04.c:137:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, &data->memory[off], count);
^~~~~~
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
40 warnings generated.
>> drivers/power/supply/wm8350_power.c:179:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", charge);
^~~~~~~
drivers/power/supply/wm8350_power.c:179:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", charge);
^~~~~~~
Suppressed 39 warnings (39 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
41 warnings generated.
drivers/media/dvb-frontends/stv0910.c:683:4: warning: Value stored to 'status' is never read [clang-analyzer-deadcode.DeadStores]
status = write_reg(state, RSTV0910_P2_ERRCTRL1 +
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/stv0910.c:683:4: note: Value stored to 'status' is never read
status = write_reg(state, RSTV0910_P2_ERRCTRL1 +
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/stv0910.c:689:4: warning: Value stored to 'status' is never read [clang-analyzer-deadcode.DeadStores]
status = write_reg(state, RSTV0910_P2_ERRCTRL1 +
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/stv0910.c:689:4: note: Value stored to 'status' is never read
status = write_reg(state, RSTV0910_P2_ERRCTRL1 +
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Suppressed 39 warnings (39 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
49 warnings generated.
drivers/media/dvb-frontends/mxl5xx.c:230:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&buf[6], reg_data_ptr, size);
^~~~~~
drivers/media/dvb-frontends/mxl5xx.c:230:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&buf[6], reg_data_ptr, size);
^~~~~~
drivers/media/dvb-frontends/mxl5xx.c:412:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
BUILD_HYDRA_CMD(MXL_HYDRA_ABORT_TUNE_CMD, MXL_CMD_WRITE,
^
drivers/media/dvb-frontends/mxl5xx_defs.h:196:3: note: expanded from macro 'BUILD_HYDRA_CMD'
memcpy((void *)&cmd_buff[6], data_ptr, size); \
^~~~~~
drivers/media/dvb-frontends/mxl5xx.c:412:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
BUILD_HYDRA_CMD(MXL_HYDRA_ABORT_TUNE_CMD, MXL_CMD_WRITE,
^
drivers/media/dvb-frontends/mxl5xx_defs.h:196:3: note: expanded from macro 'BUILD_HYDRA_CMD'
memcpy((void *)&cmd_buff[6], data_ptr, size); \
^~~~~~
drivers/media/dvb-frontends/mxl5xx.c:482:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
BUILD_HYDRA_CMD(MXL_HYDRA_DEMOD_SET_PARAM_CMD, MXL_CMD_WRITE,
^
drivers/media/dvb-frontends/mxl5xx_defs.h:196:3: note: expanded from macro 'BUILD_HYDRA_CMD'
memcpy((void *)&cmd_buff[6], data_ptr, size); \
^~~~~~
drivers/media/dvb-frontends/mxl5xx.c:482:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
BUILD_HYDRA_CMD(MXL_HYDRA_DEMOD_SET_PARAM_CMD, MXL_CMD_WRITE,
^
drivers/media/dvb-frontends/mxl5xx_defs.h:196:3: note: expanded from macro 'BUILD_HYDRA_CMD'
memcpy((void *)&cmd_buff[6], data_ptr, size); \
^~~~~~
drivers/media/dvb-frontends/mxl5xx.c:552:35: warning: Assigned value is garbage or undefined [clang-analyzer-core.uninitialized.Assign]
p->pre_bit_error.stat[0].uvalue = reg[2];
^
drivers/media/dvb-frontends/mxl5xx.c:656:6: note: Assuming 're_tune' is false
if (re_tune) {
^~~~~~~
drivers/media/dvb-frontends/mxl5xx.c:656:2: note: Taking false branch
if (re_tune) {
^
drivers/media/dvb-frontends/mxl5xx.c:663:9: note: Calling 'read_status'
return read_status(fe, status);
^~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/mxl5xx.c:624:13: note: Assuming 'reg_data' is equal to 1
*status = (reg_data == 1) ? 0x1f : 0;
^~~~~~~~~~~~~
drivers/media/dvb-frontends/mxl5xx.c:624:12: note: '?' condition is true
*status = (reg_data == 1) ? 0x1f : 0;
^
drivers/media/dvb-frontends/mxl5xx.c:629:2: note: Calling 'read_signal_strength'
read_signal_strength(fe);
^~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/mxl5xx.c:607:2: note: Returning without writing to 'fe->dtv_property_cache.delivery_system', which participates in a condition later
return stat;
^
drivers/media/dvb-frontends/mxl5xx.c:629:2: note: Returning from 'read_signal_strength'
read_signal_strength(fe);
^~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/mxl5xx.c:631:2: note: Taking true branch
if (*status & FE_HAS_CARRIER)
^
drivers/media/dvb-frontends/mxl5xx.c:632:3: note: Calling 'read_snr'
read_snr(fe);
^~~~~~~~~~~~
drivers/media/dvb-frontends/mxl5xx.c:530:2: note: Returning without writing to 'fe->dtv_property_cache.delivery_system', which participates in a condition later
return stat;
^
drivers/media/dvb-frontends/mxl5xx.c:632:3: note: Returning from 'read_snr'
read_snr(fe);
^~~~~~~~~~~~
drivers/media/dvb-frontends/mxl5xx.c:636:2: note: Taking true branch
if (*status & FE_HAS_SYNC)
^
drivers/media/dvb-frontends/mxl5xx.c:637:3: note: Calling 'read_ber'
read_ber(fe);
--
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/gpu/drm/etnaviv/etnaviv_gpu.c:1373:7: note: 'gpu_fence' is non-null
if (!gpu_fence) {
^~~~~~~~~
drivers/gpu/drm/etnaviv/etnaviv_gpu.c:1373:2: note: Taking false branch
if (!gpu_fence) {
^
drivers/gpu/drm/etnaviv/etnaviv_gpu.c:1380:6: note: Assuming field 'fe_running' is true
if (!gpu->fe_running)
^~~~~~~~~~~~~~~~
drivers/gpu/drm/etnaviv/etnaviv_gpu.c:1380:2: note: Taking false branch
if (!gpu->fe_running)
^
drivers/gpu/drm/etnaviv/etnaviv_gpu.c:1383:6: note: Assuming field 'prev_mmu_context' is null
if (submit->prev_mmu_context)
^~~~~~~~~~~~~~~~~~~~~~~~
drivers/gpu/drm/etnaviv/etnaviv_gpu.c:1383:2: note: Taking false branch
if (submit->prev_mmu_context)
^
drivers/gpu/drm/etnaviv/etnaviv_gpu.c:1387:14: note: Field 'nr_pmrs' is 0
if (submit->nr_pmrs) {
^
drivers/gpu/drm/etnaviv/etnaviv_gpu.c:1387:2: note: Taking false branch
if (submit->nr_pmrs) {
^
drivers/gpu/drm/etnaviv/etnaviv_gpu.c:1399:6: note: Assuming field 'nr_pmrs' is not equal to 0
if (submit->nr_pmrs) {
^~~~~~~~~~~~~~~
drivers/gpu/drm/etnaviv/etnaviv_gpu.c:1399:2: note: Taking true branch
if (submit->nr_pmrs) {
^
drivers/gpu/drm/etnaviv/etnaviv_gpu.c:1400:3: note: Array subscript is undefined
gpu->event[event[2]].sync_point = &sync_point_perfmon_sample_post;
^ ~~~~~~~~
Suppressed 41 warnings (41 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
50 warnings generated.
drivers/power/supply/twl4030_charger.c:364:2: warning: Value stored to 'cur_reg' is never read [clang-analyzer-deadcode.DeadStores]
cur_reg |= oldreg << 8;
^ ~~~~~~~~~~~
drivers/power/supply/twl4030_charger.c:364:2: note: Value stored to 'cur_reg' is never read
cur_reg |= oldreg << 8;
^ ~~~~~~~~~~~
drivers/power/supply/twl4030_charger.c:383:3: warning: Value stored to 'status' is never read [clang-analyzer-deadcode.DeadStores]
status = twl_i2c_write_u8(TWL_MODULE_MAIN_CHARGE,
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/power/supply/twl4030_charger.c:383:3: note: Value stored to 'status' is never read
status = twl_i2c_write_u8(TWL_MODULE_MAIN_CHARGE,
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/power/supply/twl4030_charger.c:467:4: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret = twl4030_clear_set_boot_bci(0, TWL4030_BCIAUTOUSB);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/power/supply/twl4030_charger.c:467:4: note: Value stored to 'ret' is never read
ret = twl4030_clear_set_boot_bci(0, TWL4030_BCIAUTOUSB);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/power/supply/twl4030_charger.c:487:4: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret = twl_i2c_write_u8(TWL_MODULE_MAIN_CHARGE, 0x33,
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/power/supply/twl4030_charger.c:487:4: note: Value stored to 'ret' is never read
ret = twl_i2c_write_u8(TWL_MODULE_MAIN_CHARGE, 0x33,
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/power/supply/twl4030_charger.c:490:4: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret = twl_i2c_write_u8(TWL_MODULE_MAIN_CHARGE, 0x2a,
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/power/supply/twl4030_charger.c:490:4: note: Value stored to 'ret' is never read
ret = twl_i2c_write_u8(TWL_MODULE_MAIN_CHARGE, 0x2a,
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/power/supply/twl4030_charger.c:493:4: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret = twl_i2c_write_u8(TWL_MODULE_MAIN_CHARGE, 0x26,
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/power/supply/twl4030_charger.c:493:4: note: Value stored to 'ret' is never read
ret = twl_i2c_write_u8(TWL_MODULE_MAIN_CHARGE, 0x26,
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/power/supply/twl4030_charger.c:496:4: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret = twl_i2c_write_u8(TWL_MODULE_MAIN_CHARGE, 0xf3,
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/power/supply/twl4030_charger.c:496:4: note: Value stored to 'ret' is never read
ret = twl_i2c_write_u8(TWL_MODULE_MAIN_CHARGE, 0xf3,
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/power/supply/twl4030_charger.c:499:4: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret = twl_i2c_write_u8(TWL_MODULE_MAIN_CHARGE, 0x9c,
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/power/supply/twl4030_charger.c:499:4: note: Value stored to 'ret' is never read
ret = twl_i2c_write_u8(TWL_MODULE_MAIN_CHARGE, 0x9c,
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Suppressed 42 warnings (41 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
>> drivers/leds/trigger/ledtrig-tty.c:33:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len = sprintf(buf, "%s\n", trigger_data->ttyname);
^~~~~~~
drivers/leds/trigger/ledtrig-tty.c:33:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
len = sprintf(buf, "%s\n", trigger_data->ttyname);
^~~~~~~
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
37 warnings generated.
drivers/leds/led-class-flash.c:75:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", fled_cdev->brightness.val);
^~~~~~~
drivers/leds/led-class-flash.c:75:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", fled_cdev->brightness.val);
^~~~~~~
drivers/leds/led-class-flash.c:85:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", fled_cdev->brightness.max);
^~~~~~~
drivers/leds/led-class-flash.c:85:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", fled_cdev->brightness.max);
^~~~~~~
drivers/leds/led-class-flash.c:133:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", state);
^~~~~~~
drivers/leds/led-class-flash.c:133:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", state);
^~~~~~~
drivers/leds/led-class-flash.c:172:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", fled_cdev->timeout.val);
^~~~~~~
drivers/leds/led-class-flash.c:172:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", fled_cdev->timeout.val);
^~~~~~~
drivers/leds/led-class-flash.c:182:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", fled_cdev->timeout.max);
^~~~~~~
drivers/leds/led-class-flash.c:182:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", fled_cdev->timeout.max);
^~~~~~~
drivers/leds/led-class-flash.c:203:14: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
buf_len = sprintf(pbuf, "%s ",
^~~~~~~
drivers/leds/led-class-flash.c:203:14: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
buf_len = sprintf(pbuf, "%s ",
^~~~~~~
drivers/leds/led-class-flash.c:210:16: warning: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119 [clang-analyzer-security.insecureAPI.strcpy]
return strlen(strcat(buf, "\n"));
^~~~~~
drivers/leds/led-class-flash.c:210:16: note: Call to function 'strcat' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcat'. CWE-119
return strlen(strcat(buf, "\n"));
^~~~~~
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
drivers/media/v4l2-core/v4l2-device.c:37:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(v4l2_dev->name, sizeof(v4l2_dev->name), "%s %s",
^~~~~~~~
drivers/media/v4l2-core/v4l2-device.c:37:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(v4l2_dev->name, sizeof(v4l2_dev->name), "%s %s",
^~~~~~~~
drivers/media/v4l2-core/v4l2-device.c:67:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(v4l2_dev->name, sizeof(v4l2_dev->name),
^~~~~~~~
drivers/media/v4l2-core/v4l2-device.c:67:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(v4l2_dev->name, sizeof(v4l2_dev->name),
^~~~~~~~
drivers/media/v4l2-core/v4l2-device.c:70:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(v4l2_dev->name, sizeof(v4l2_dev->name),
^~~~~~~~
drivers/media/v4l2-core/v4l2-device.c:70:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(v4l2_dev->name, sizeof(v4l2_dev->name),
^~~~~~~~
Suppressed 40 warnings (40 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
39 warnings generated.
Suppressed 39 warnings (39 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
41 warnings generated.
Suppressed 41 warnings (41 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
39 warnings generated.
Suppressed 39 warnings (39 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
36 warnings generated.
drivers/power/supply/max1721x_battery.c:259:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(str, 13, "%04X%04X%04X", val[0], val[1], val[2]);
^~~~~~~~
drivers/power/supply/max1721x_battery.c:259:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(str, 13, "%04X%04X%04X", val[0], val[1], val[2]);
^~~~~~~~
drivers/power/supply/max1721x_battery.c:341:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(info->name, sizeof(info->name),
^~~~~~~~
drivers/power/supply/max1721x_battery.c:341:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(info->name, sizeof(info->name),
--
33 warnings generated.
drivers/gpu/drm/scheduler/sched_main.c:627:10: warning: Access to field 'rq' results in a dereference of a null pointer (loaded from variable 'entity') [clang-analyzer-core.NullDereference]
sched = entity->rq->sched;
^~~~~~
drivers/gpu/drm/scheduler/sched_main.c:623:2: note: 'entity' initialized here
struct drm_sched_entity *entity = job->entity;
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/gpu/drm/scheduler/sched_main.c:625:9: note: Assuming 'entity' is null
BUG_ON(!entity);
^
arch/mips/include/asm/bug.h:34:44: note: expanded from macro 'BUG_ON'
#define BUG_ON(C) __BUG_ON((unsigned long)(C))
^
drivers/gpu/drm/scheduler/sched_main.c:627:10: note: Access to field 'rq' results in a dereference of a null pointer (loaded from variable 'entity')
sched = entity->rq->sched;
^~~~~~
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
drivers/gpu/drm/scheduler/sched_entity.c:68:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(entity, 0, sizeof(struct drm_sched_entity));
^~~~~~
drivers/gpu/drm/scheduler/sched_entity.c:68:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(entity, 0, sizeof(struct drm_sched_entity));
^~~~~~
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
41 warnings generated.
Suppressed 41 warnings (41 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
40 warnings generated.
fs/iomap/direct-io.c:405:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(iomap_inline_data(iomap, size), 0, pos - size);
^~~~~~
fs/iomap/direct-io.c:405:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(iomap_inline_data(iomap, size), 0, pos - size);
^~~~~~
Suppressed 39 warnings (39 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
39 warnings generated.
Suppressed 39 warnings (39 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
39 warnings generated.
Suppressed 39 warnings (39 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
39 warnings generated.
Suppressed 39 warnings (39 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
39 warnings generated.
Suppressed 39 warnings (39 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
40 warnings generated.
drivers/phy/marvell/phy-mmp3-usb.c:143:16: warning: Value stored to 'base' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
void __iomem *base = mmp3_usb_phy->base;
^~~~ ~~~~~~~~~~~~~~~~~~
drivers/phy/marvell/phy-mmp3-usb.c:143:16: note: Value stored to 'base' during its initialization is never read
void __iomem *base = mmp3_usb_phy->base;
^~~~ ~~~~~~~~~~~~~~~~~~
Suppressed 39 warnings (39 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
39 warnings generated.
Suppressed 39 warnings (39 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
39 warnings generated.
Suppressed 39 warnings (39 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
39 warnings generated.
drivers/mtd/nand/raw/brcmnand/brcmnand.c:1996:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(desc, 0, sizeof(*desc));
^~~~~~
drivers/mtd/nand/raw/brcmnand/brcmnand.c:1996:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(desc, 0, sizeof(*desc));
^~~~~~
drivers/mtd/nand/raw/brcmnand/brcmnand.c:2212:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(oob, 0x99, mtd->oobsize);
^~~~~~
drivers/mtd/nand/raw/brcmnand/brcmnand.c:2212:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(oob, 0x99, mtd->oobsize);
^~~~~~
drivers/mtd/nand/raw/brcmnand/brcmnand.c:2259:4: warning: Value stored to 'err' is never read [clang-analyzer-deadcode.DeadStores]
err = brcmnand_read_by_pio(mtd, chip, addr, trans, buf,
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/mtd/nand/raw/brcmnand/brcmnand.c:2259:4: note: Value stored to 'err' is never read
err = brcmnand_read_by_pio(mtd, chip, addr, trans, buf,
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
>> drivers/mtd/nand/raw/brcmnand/brcmnand.c:2551:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
buf += sprintf(buf,
^~~~~~~
drivers/mtd/nand/raw/brcmnand/brcmnand.c:2551:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
buf += sprintf(buf,
^~~~~~~
drivers/mtd/nand/raw/brcmnand/brcmnand.c:2561:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(buf, ", Hamming ECC");
^~~~~~~
drivers/mtd/nand/raw/brcmnand/brcmnand.c:2561:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(buf, ", Hamming ECC");
^~~~~~~
drivers/mtd/nand/raw/brcmnand/brcmnand.c:2563:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(buf, ", BCH-%u (1KiB sector)", cfg->ecc_level << 1);
^~~~~~~
drivers/mtd/nand/raw/brcmnand/brcmnand.c:2563:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(buf, ", BCH-%u (1KiB sector)", cfg->ecc_level << 1);
^~~~~~~
drivers/mtd/nand/raw/brcmnand/brcmnand.c:2565:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(buf, ", BCH-%u", cfg->ecc_level);
^~~~~~~
drivers/mtd/nand/raw/brcmnand/brcmnand.c:2565:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(buf, ", BCH-%u", cfg->ecc_level);
^~~~~~~
drivers/mtd/nand/raw/brcmnand/brcmnand.c:2592:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(cfg, 0, sizeof(*cfg));
^~~~~~
drivers/mtd/nand/raw/brcmnand/brcmnand.c:2592:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(cfg, 0, sizeof(*cfg));
^~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
42 warnings generated.
drivers/iio/adc/mcp3422.c:277:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "240 60 15\n");
^~~~~~~
drivers/iio/adc/mcp3422.c:277:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "240 60 15\n");
^~~~~~~
drivers/iio/adc/mcp3422.c:279:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "240 60 15 3\n");
^~~~~~~
drivers/iio/adc/mcp3422.c:279:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "240 60 15 3\n");
^~~~~~~
drivers/iio/adc/mcp3422.c:288:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "0.%09u 0.%09u 0.%09u 0.%09u\n",
^~~~~~~
drivers/iio/adc/mcp3422.c:288:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "0.%09u 0.%09u 0.%09u 0.%09u\n",
^~~~~~~
Suppressed 39 warnings (39 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
39 warnings generated.
Suppressed 39 warnings (39 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
40 warnings generated.
drivers/i2c/busses/i2c-stm32f7.c:2194:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(adap->name, sizeof(adap->name), "STM32F7 I2C(%pa)",
^~~~~~~~
drivers/i2c/busses/i2c-stm32f7.c:2194:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(adap->name, sizeof(adap->name), "STM32F7 I2C(%pa)",
^~~~~~~~
Suppressed 39 warnings (39 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
33 warnings generated.
drivers/i2c/busses/i2c-stm32.c:35:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&dma_sconfig, 0, sizeof(dma_sconfig));
^~~~~~
drivers/i2c/busses/i2c-stm32.c:35:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&dma_sconfig, 0, sizeof(dma_sconfig));
^~~~~~
drivers/i2c/busses/i2c-stm32.c:57:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&dma_sconfig, 0, sizeof(dma_sconfig));
^~~~~~
drivers/i2c/busses/i2c-stm32.c:57:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&dma_sconfig, 0, sizeof(dma_sconfig));
^~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
39 warnings generated.
Suppressed 39 warnings (39 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
30 warnings generated.
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
41 warnings generated.
drivers/media/dvb-frontends/m88ds3103.c:1687:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&board_info, 0, sizeof(board_info));
^~~~~~
drivers/media/dvb-frontends/m88ds3103.c:1687:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&board_info, 0, sizeof(board_info));
^~~~~~
drivers/media/dvb-frontends/m88ds3103.c:1874:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&dev->fe.ops, &m88ds3103_ops, sizeof(struct dvb_frontend_ops));
^~~~~~
drivers/media/dvb-frontends/m88ds3103.c:1874:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&dev->fe.ops, &m88ds3103_ops, sizeof(struct dvb_frontend_ops));
vim +61 arch/mips/kernel/proc.c
^1da177e4c3f41 Linus Torvalds 2005-04-16 49
^1da177e4c3f41 Linus Torvalds 2005-04-16 50 /*
^1da177e4c3f41 Linus Torvalds 2005-04-16 51 * For the first processor also print the system type
^1da177e4c3f41 Linus Torvalds 2005-04-16 52 */
487d70d0b8bd1c Gabor Juhos 2010-11-23 53 if (n == 0) {
^1da177e4c3f41 Linus Torvalds 2005-04-16 54 seq_printf(m, "system type\t\t: %s\n", get_system_type());
487d70d0b8bd1c Gabor Juhos 2010-11-23 55 if (mips_get_machine_name())
487d70d0b8bd1c Gabor Juhos 2010-11-23 56 seq_printf(m, "machine\t\t\t: %s\n",
487d70d0b8bd1c Gabor Juhos 2010-11-23 57 mips_get_machine_name());
487d70d0b8bd1c Gabor Juhos 2010-11-23 58 }
^1da177e4c3f41 Linus Torvalds 2005-04-16 59
^1da177e4c3f41 Linus Torvalds 2005-04-16 60 seq_printf(m, "processor\t\t: %ld\n", n);
^1da177e4c3f41 Linus Torvalds 2005-04-16 @61 sprintf(fmt, "cpu model\t\t: %%s V%%d.%%d%s\n",
e04582b7bc70b4 Atsushi Nemoto 2006-10-09 62 cpu_data[n].options & MIPS_CPU_FPU ? " FPU V%d.%d" : "");
e47c659b55aff7 Johannes Dickgreber 2008-10-13 63 seq_printf(m, fmt, __cpu_name[n],
^1da177e4c3f41 Linus Torvalds 2005-04-16 64 (version >> 4) & 0x0f, version & 0x0f,
^1da177e4c3f41 Linus Torvalds 2005-04-16 65 (fp_vers >> 4) & 0x0f, fp_vers & 0x0f);
5636919b5c909f Ralf Baechle 2009-02-28 66 seq_printf(m, "BogoMIPS\t\t: %u.%02u\n",
0ac354801a8791 Ralf Baechle 2005-02-21 67 cpu_data[n].udelay_val / (500000/HZ),
0ac354801a8791 Ralf Baechle 2005-02-21 68 (cpu_data[n].udelay_val / (5000/HZ)) % 100);
^1da177e4c3f41 Linus Torvalds 2005-04-16 69 seq_printf(m, "wait instruction\t: %s\n", cpu_wait ? "yes" : "no");
^1da177e4c3f41 Linus Torvalds 2005-04-16 70 seq_printf(m, "microsecond timers\t: %s\n",
^1da177e4c3f41 Linus Torvalds 2005-04-16 71 cpu_has_counter ? "yes" : "no");
31aa36658a1232 Karl-Johan Karlsson 2006-10-08 72 seq_printf(m, "tlb_entries\t\t: %d\n", cpu_data[n].tlbsize);
^1da177e4c3f41 Linus Torvalds 2005-04-16 73 seq_printf(m, "extra interrupt vector\t: %s\n",
^1da177e4c3f41 Linus Torvalds 2005-04-16 74 cpu_has_divec ? "yes" : "no");
654f57bfb46799 David Daney 2008-09-23 75 seq_printf(m, "hardware watchpoint\t: %s",
654f57bfb46799 David Daney 2008-09-23 76 cpu_has_watch ? "yes, " : "no\n");
654f57bfb46799 David Daney 2008-09-23 77 if (cpu_has_watch) {
654f57bfb46799 David Daney 2008-09-23 78 seq_printf(m, "count: %d, address/irw mask: [",
654f57bfb46799 David Daney 2008-09-23 79 cpu_data[n].watch_reg_count);
654f57bfb46799 David Daney 2008-09-23 80 for (i = 0; i < cpu_data[n].watch_reg_count; i++)
654f57bfb46799 David Daney 2008-09-23 81 seq_printf(m, "%s0x%04x", i ? ", " : "",
654f57bfb46799 David Daney 2008-09-23 82 cpu_data[n].watch_reg_masks[i]);
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 83 seq_puts(m, "]\n");
654f57bfb46799 David Daney 2008-09-23 84 }
41315b6ec108e9 Aaro Koskinen 2013-12-31 85
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 86 seq_puts(m, "isa\t\t\t:");
e5f5a5b06e51a3 Maciej W. Rozycki 2017-07-08 87 if (cpu_has_mips_1)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 88 seq_puts(m, " mips1");
a96102be700f87 Steven J. Hill 2012-12-07 89 if (cpu_has_mips_2)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 90 seq_puts(m, " mips2");
a96102be700f87 Steven J. Hill 2012-12-07 91 if (cpu_has_mips_3)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 92 seq_puts(m, " mips3");
a96102be700f87 Steven J. Hill 2012-12-07 93 if (cpu_has_mips_4)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 94 seq_puts(m, " mips4");
a96102be700f87 Steven J. Hill 2012-12-07 95 if (cpu_has_mips_5)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 96 seq_puts(m, " mips5");
a96102be700f87 Steven J. Hill 2012-12-07 97 if (cpu_has_mips32r1)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 98 seq_puts(m, " mips32r1");
a96102be700f87 Steven J. Hill 2012-12-07 99 if (cpu_has_mips32r2)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 100 seq_puts(m, " mips32r2");
ab7c01fdc3cfe0 Serge Semin 2020-05-21 101 if (cpu_has_mips32r5)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 102 seq_puts(m, " mips32r5");
515a6393dbac4f Markos Chandras 2014-11-14 103 if (cpu_has_mips32r6)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 104 seq_puts(m, " mips32r6");
a96102be700f87 Steven J. Hill 2012-12-07 105 if (cpu_has_mips64r1)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 106 seq_puts(m, " mips64r1");
a96102be700f87 Steven J. Hill 2012-12-07 107 if (cpu_has_mips64r2)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 108 seq_puts(m, " mips64r2");
ab7c01fdc3cfe0 Serge Semin 2020-05-21 109 if (cpu_has_mips64r5)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 110 seq_puts(m, " mips64r5");
515a6393dbac4f Markos Chandras 2014-11-14 111 if (cpu_has_mips64r6)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 112 seq_puts(m, " mips64r6");
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 113 seq_puts(m, "\n");
981ef0de49869c Ralf Baechle 2012-08-20 114
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 115 seq_puts(m, "ASEs implemented\t:");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 116 if (cpu_has_mips16)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 117 seq_puts(m, " mips16");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 118 if (cpu_has_mips16e2)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 119 seq_puts(m, " mips16e2");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 120 if (cpu_has_mdmx)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 121 seq_puts(m, " mdmx");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 122 if (cpu_has_mips3d)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 123 seq_puts(m, " mips3d");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 124 if (cpu_has_smartmips)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 125 seq_puts(m, " smartmips");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 126 if (cpu_has_dsp)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 127 seq_puts(m, " dsp");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 128 if (cpu_has_dsp2)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 129 seq_puts(m, " dsp2");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 130 if (cpu_has_dsp3)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 131 seq_puts(m, " dsp3");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 132 if (cpu_has_mipsmt)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 133 seq_puts(m, " mt");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 134 if (cpu_has_mmips)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 135 seq_puts(m, " micromips");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 136 if (cpu_has_vz)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 137 seq_puts(m, " vz");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 138 if (cpu_has_msa)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 139 seq_puts(m, " msa");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 140 if (cpu_has_eva)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 141 seq_puts(m, " eva");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 142 if (cpu_has_htw)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 143 seq_puts(m, " htw");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 144 if (cpu_has_xpa)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 145 seq_puts(m, " xpa");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 146 if (cpu_has_loongson_mmi)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 147 seq_puts(m, " loongson-mmi");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 148 if (cpu_has_loongson_cam)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 149 seq_puts(m, " loongson-cam");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 150 if (cpu_has_loongson_ext)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 151 seq_puts(m, " loongson-ext");
01fde9a0e497c7 Ilya Lipnitskiy 2021-10-13 152 if (cpu_has_loongson_ext2)
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 153 seq_puts(m, " loongson-ext2");
1ad964ae1a9150 Ilya Lipnitskiy 2021-10-13 154 seq_puts(m, "\n");
981ef0de49869c Ralf Baechle 2012-08-20 155
bce860833ab1e4 Steven J. Hill 2013-03-25 156 if (cpu_has_mmips) {
bce860833ab1e4 Steven J. Hill 2013-03-25 157 seq_printf(m, "micromips kernel\t: %s\n",
bce860833ab1e4 Steven J. Hill 2013-03-25 158 (read_c0_config3() & MIPS_CONF3_ISA_OE) ? "yes" : "no");
bce860833ab1e4 Steven J. Hill 2013-03-25 159 }
626bfa03729959 Hauke Mehrtens 2021-10-13 160
626bfa03729959 Hauke Mehrtens 2021-10-13 161 seq_puts(m, "Options implemented\t:");
626bfa03729959 Hauke Mehrtens 2021-10-13 162 if (cpu_has_tlb)
626bfa03729959 Hauke Mehrtens 2021-10-13 163 seq_puts(m, " tlb");
626bfa03729959 Hauke Mehrtens 2021-10-13 164 if (cpu_has_ftlb)
626bfa03729959 Hauke Mehrtens 2021-10-13 165 seq_puts(m, " ftlb");
626bfa03729959 Hauke Mehrtens 2021-10-13 166 if (cpu_has_tlbinv)
626bfa03729959 Hauke Mehrtens 2021-10-13 167 seq_puts(m, " tlbinv");
626bfa03729959 Hauke Mehrtens 2021-10-13 168 if (cpu_has_segments)
626bfa03729959 Hauke Mehrtens 2021-10-13 169 seq_puts(m, " segments");
626bfa03729959 Hauke Mehrtens 2021-10-13 170 if (cpu_has_rixiex)
626bfa03729959 Hauke Mehrtens 2021-10-13 171 seq_puts(m, " rixiex");
626bfa03729959 Hauke Mehrtens 2021-10-13 172 if (cpu_has_ldpte)
626bfa03729959 Hauke Mehrtens 2021-10-13 173 seq_puts(m, " ldpte");
626bfa03729959 Hauke Mehrtens 2021-10-13 174 if (cpu_has_maar)
626bfa03729959 Hauke Mehrtens 2021-10-13 175 seq_puts(m, " maar");
626bfa03729959 Hauke Mehrtens 2021-10-13 176 if (cpu_has_rw_llb)
626bfa03729959 Hauke Mehrtens 2021-10-13 177 seq_puts(m, " rw_llb");
626bfa03729959 Hauke Mehrtens 2021-10-13 178 if (cpu_has_4kex)
626bfa03729959 Hauke Mehrtens 2021-10-13 179 seq_puts(m, " 4kex");
626bfa03729959 Hauke Mehrtens 2021-10-13 180 if (cpu_has_3k_cache)
626bfa03729959 Hauke Mehrtens 2021-10-13 181 seq_puts(m, " 3k_cache");
626bfa03729959 Hauke Mehrtens 2021-10-13 182 if (cpu_has_4k_cache)
626bfa03729959 Hauke Mehrtens 2021-10-13 183 seq_puts(m, " 4k_cache");
626bfa03729959 Hauke Mehrtens 2021-10-13 184 if (cpu_has_tx39_cache)
626bfa03729959 Hauke Mehrtens 2021-10-13 185 seq_puts(m, " tx39_cache");
626bfa03729959 Hauke Mehrtens 2021-10-13 186 if (cpu_has_octeon_cache)
626bfa03729959 Hauke Mehrtens 2021-10-13 187 seq_puts(m, " octeon_cache");
1cab5bd69eb1f9 Tiezhu Yang 2021-11-25 188 if (raw_cpu_has_fpu)
626bfa03729959 Hauke Mehrtens 2021-10-13 189 seq_puts(m, " fpu");
626bfa03729959 Hauke Mehrtens 2021-10-13 190 if (cpu_has_32fpr)
626bfa03729959 Hauke Mehrtens 2021-10-13 191 seq_puts(m, " 32fpr");
626bfa03729959 Hauke Mehrtens 2021-10-13 192 if (cpu_has_cache_cdex_p)
626bfa03729959 Hauke Mehrtens 2021-10-13 193 seq_puts(m, " cache_cdex_p");
626bfa03729959 Hauke Mehrtens 2021-10-13 194 if (cpu_has_cache_cdex_s)
626bfa03729959 Hauke Mehrtens 2021-10-13 195 seq_puts(m, " cache_cdex_s");
626bfa03729959 Hauke Mehrtens 2021-10-13 196 if (cpu_has_prefetch)
626bfa03729959 Hauke Mehrtens 2021-10-13 197 seq_puts(m, " prefetch");
626bfa03729959 Hauke Mehrtens 2021-10-13 198 if (cpu_has_mcheck)
626bfa03729959 Hauke Mehrtens 2021-10-13 199 seq_puts(m, " mcheck");
626bfa03729959 Hauke Mehrtens 2021-10-13 200 if (cpu_has_ejtag)
626bfa03729959 Hauke Mehrtens 2021-10-13 201 seq_puts(m, " ejtag");
626bfa03729959 Hauke Mehrtens 2021-10-13 202 if (cpu_has_llsc)
626bfa03729959 Hauke Mehrtens 2021-10-13 203 seq_puts(m, " llsc");
626bfa03729959 Hauke Mehrtens 2021-10-13 204 if (cpu_has_guestctl0ext)
626bfa03729959 Hauke Mehrtens 2021-10-13 205 seq_puts(m, " guestctl0ext");
626bfa03729959 Hauke Mehrtens 2021-10-13 206 if (cpu_has_guestctl1)
626bfa03729959 Hauke Mehrtens 2021-10-13 207 seq_puts(m, " guestctl1");
626bfa03729959 Hauke Mehrtens 2021-10-13 208 if (cpu_has_guestctl2)
626bfa03729959 Hauke Mehrtens 2021-10-13 209 seq_puts(m, " guestctl2");
626bfa03729959 Hauke Mehrtens 2021-10-13 210 if (cpu_has_guestid)
626bfa03729959 Hauke Mehrtens 2021-10-13 211 seq_puts(m, " guestid");
626bfa03729959 Hauke Mehrtens 2021-10-13 212 if (cpu_has_drg)
626bfa03729959 Hauke Mehrtens 2021-10-13 213 seq_puts(m, " drg");
626bfa03729959 Hauke Mehrtens 2021-10-13 214 if (cpu_has_rixi)
626bfa03729959 Hauke Mehrtens 2021-10-13 215 seq_puts(m, " rixi");
626bfa03729959 Hauke Mehrtens 2021-10-13 216 if (cpu_has_lpa)
626bfa03729959 Hauke Mehrtens 2021-10-13 217 seq_puts(m, " lpa");
626bfa03729959 Hauke Mehrtens 2021-10-13 218 if (cpu_has_mvh)
626bfa03729959 Hauke Mehrtens 2021-10-13 219 seq_puts(m, " mvh");
626bfa03729959 Hauke Mehrtens 2021-10-13 220 if (cpu_has_vtag_icache)
626bfa03729959 Hauke Mehrtens 2021-10-13 221 seq_puts(m, " vtag_icache");
626bfa03729959 Hauke Mehrtens 2021-10-13 222 if (cpu_has_dc_aliases)
626bfa03729959 Hauke Mehrtens 2021-10-13 223 seq_puts(m, " dc_aliases");
626bfa03729959 Hauke Mehrtens 2021-10-13 224 if (cpu_has_ic_fills_f_dc)
626bfa03729959 Hauke Mehrtens 2021-10-13 225 seq_puts(m, " ic_fills_f_dc");
626bfa03729959 Hauke Mehrtens 2021-10-13 226 if (cpu_has_pindexed_dcache)
626bfa03729959 Hauke Mehrtens 2021-10-13 227 seq_puts(m, " pindexed_dcache");
626bfa03729959 Hauke Mehrtens 2021-10-13 228 if (cpu_has_userlocal)
626bfa03729959 Hauke Mehrtens 2021-10-13 229 seq_puts(m, " userlocal");
626bfa03729959 Hauke Mehrtens 2021-10-13 230 if (cpu_has_nofpuex)
626bfa03729959 Hauke Mehrtens 2021-10-13 231 seq_puts(m, " nofpuex");
626bfa03729959 Hauke Mehrtens 2021-10-13 232 if (cpu_has_vint)
626bfa03729959 Hauke Mehrtens 2021-10-13 233 seq_puts(m, " vint");
626bfa03729959 Hauke Mehrtens 2021-10-13 234 if (cpu_has_veic)
626bfa03729959 Hauke Mehrtens 2021-10-13 235 seq_puts(m, " veic");
626bfa03729959 Hauke Mehrtens 2021-10-13 236 if (cpu_has_inclusive_pcaches)
626bfa03729959 Hauke Mehrtens 2021-10-13 237 seq_puts(m, " inclusive_pcaches");
626bfa03729959 Hauke Mehrtens 2021-10-13 238 if (cpu_has_perf_cntr_intr_bit)
626bfa03729959 Hauke Mehrtens 2021-10-13 239 seq_puts(m, " perf_cntr_intr_bit");
626bfa03729959 Hauke Mehrtens 2021-10-13 240 if (cpu_has_ufr)
626bfa03729959 Hauke Mehrtens 2021-10-13 241 seq_puts(m, " ufr");
626bfa03729959 Hauke Mehrtens 2021-10-13 242 if (cpu_has_fre)
626bfa03729959 Hauke Mehrtens 2021-10-13 243 seq_puts(m, " fre");
626bfa03729959 Hauke Mehrtens 2021-10-13 244 if (cpu_has_cdmm)
626bfa03729959 Hauke Mehrtens 2021-10-13 245 seq_puts(m, " cdmm");
626bfa03729959 Hauke Mehrtens 2021-10-13 246 if (cpu_has_small_pages)
626bfa03729959 Hauke Mehrtens 2021-10-13 247 seq_puts(m, " small_pages");
626bfa03729959 Hauke Mehrtens 2021-10-13 248 if (cpu_has_nan_legacy)
626bfa03729959 Hauke Mehrtens 2021-10-13 249 seq_puts(m, " nan_legacy");
626bfa03729959 Hauke Mehrtens 2021-10-13 250 if (cpu_has_nan_2008)
626bfa03729959 Hauke Mehrtens 2021-10-13 251 seq_puts(m, " nan_2008");
626bfa03729959 Hauke Mehrtens 2021-10-13 252 if (cpu_has_ebase_wg)
626bfa03729959 Hauke Mehrtens 2021-10-13 253 seq_puts(m, " ebase_wg");
626bfa03729959 Hauke Mehrtens 2021-10-13 254 if (cpu_has_badinstr)
626bfa03729959 Hauke Mehrtens 2021-10-13 255 seq_puts(m, " badinstr");
626bfa03729959 Hauke Mehrtens 2021-10-13 256 if (cpu_has_badinstrp)
626bfa03729959 Hauke Mehrtens 2021-10-13 257 seq_puts(m, " badinstrp");
626bfa03729959 Hauke Mehrtens 2021-10-13 258 if (cpu_has_contextconfig)
626bfa03729959 Hauke Mehrtens 2021-10-13 259 seq_puts(m, " contextconfig");
626bfa03729959 Hauke Mehrtens 2021-10-13 260 if (cpu_has_perf)
626bfa03729959 Hauke Mehrtens 2021-10-13 261 seq_puts(m, " perf");
626bfa03729959 Hauke Mehrtens 2021-10-13 262 if (cpu_has_mac2008_only)
626bfa03729959 Hauke Mehrtens 2021-10-13 263 seq_puts(m, " mac2008_only");
626bfa03729959 Hauke Mehrtens 2021-10-13 264 if (cpu_has_ftlbparex)
626bfa03729959 Hauke Mehrtens 2021-10-13 265 seq_puts(m, " ftlbparex");
626bfa03729959 Hauke Mehrtens 2021-10-13 266 if (cpu_has_gsexcex)
626bfa03729959 Hauke Mehrtens 2021-10-13 267 seq_puts(m, " gsexcex");
626bfa03729959 Hauke Mehrtens 2021-10-13 268 if (cpu_has_shared_ftlb_ram)
626bfa03729959 Hauke Mehrtens 2021-10-13 269 seq_puts(m, " shared_ftlb_ram");
626bfa03729959 Hauke Mehrtens 2021-10-13 270 if (cpu_has_shared_ftlb_entries)
626bfa03729959 Hauke Mehrtens 2021-10-13 271 seq_puts(m, " shared_ftlb_entries");
626bfa03729959 Hauke Mehrtens 2021-10-13 272 if (cpu_has_mipsmt_pertccounters)
626bfa03729959 Hauke Mehrtens 2021-10-13 273 seq_puts(m, " mipsmt_pertccounters");
626bfa03729959 Hauke Mehrtens 2021-10-13 274 if (cpu_has_mmid)
626bfa03729959 Hauke Mehrtens 2021-10-13 275 seq_puts(m, " mmid");
626bfa03729959 Hauke Mehrtens 2021-10-13 276 if (cpu_has_mm_sysad)
626bfa03729959 Hauke Mehrtens 2021-10-13 277 seq_puts(m, " mm_sysad");
626bfa03729959 Hauke Mehrtens 2021-10-13 278 if (cpu_has_mm_full)
626bfa03729959 Hauke Mehrtens 2021-10-13 279 seq_puts(m, " mm_full");
626bfa03729959 Hauke Mehrtens 2021-10-13 280 seq_puts(m, "\n");
626bfa03729959 Hauke Mehrtens 2021-10-13 281
f6771dbb27c704 Ralf Baechle 2007-11-08 282 seq_printf(m, "shadow register sets\t: %d\n",
f6771dbb27c704 Ralf Baechle 2007-11-08 283 cpu_data[n].srsets);
e77c32fe284a4d David Daney 2010-12-21 284 seq_printf(m, "kscratch registers\t: %d\n",
e77c32fe284a4d David Daney 2010-12-21 285 hweight8(cpu_data[n].kscratch_mask));
bda4584cd943d7 Huacai Chen 2014-06-26 286 seq_printf(m, "package\t\t\t: %d\n", cpu_data[n].package);
f875a832d20285 Paul Burton 2017-08-12 287 seq_printf(m, "core\t\t\t: %d\n", cpu_core(&cpu_data[n]));
5508d456e9992b Ralf Baechle 2014-04-03 288
:::::: The code@line 61 was first introduced by commit
:::::: 1da177e4c3f41524e886b7f1b8a0c1fc7321cac2 Linux-2.6.12-rc2
:::::: TO: Linus Torvalds <torvalds@ppc970.osdl.org>
:::::: CC: Linus Torvalds <torvalds@ppc970.osdl.org>
--
0-DAY CI Kernel Test Service
https://01.org/lkp
^ permalink raw reply [flat|nested] 6+ messages in thread
end of thread, other threads:[~2022-05-31 22:52 UTC | newest]
Thread overview: 6+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2022-05-08 15:55 arch/mips/kernel/proc.c:61:2: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provide kernel test robot
-- strict thread matches above, loose matches on Subject: below --
2022-05-31 22:52 kernel test robot
2022-05-11 5:02 kernel test robot
2022-04-23 19:23 kernel test robot
2022-03-29 16:56 kernel test robot
2022-03-28 17:00 kernel test robot
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.