* [chrome-os:chromeos-5.10 25/29] block/genhd.c:2190:11: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides bound...
@ 2022-05-29 15:35 kernel test robot
0 siblings, 0 replies; 2+ messages in thread
From: kernel test robot @ 2022-05-29 15:35 UTC (permalink / raw)
To: kbuild
[-- Attachment #1: Type: text/plain, Size: 459230 bytes --]
CC: kbuild-all(a)lists.01.org
BCC: lkp(a)intel.com
TO: cros-kernel-buildreports(a)googlegroups.com
TO: Guenter Roeck <groeck@google.com>
tree: https://chromium.googlesource.com/chromiumos/third_party/kernel chromeos-5.10
head: 13491710253d86e7fa5deb854bd304b1dd06ab9e
commit: 56f22b8f6853d26be82709a978e89db6856af6b4 [25/29] BACKPORT: Kbuild: move to -std=gnu11
:::::: branch date: 2 days ago
:::::: commit date: 11 days ago
config: x86_64-randconfig-c007 (https://download.01.org/0day-ci/archive/20220529/202205292339.FqYKTHJZ-lkp(a)intel.com/config)
compiler: clang version 15.0.0 (https://github.com/llvm/llvm-project 0fbe3f3f486e01448121f7931a4ca29fac1504ab)
reproduce (this is a W=1 build):
wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross
chmod +x ~/bin/make.cross
git remote add chrome-os https://chromium.googlesource.com/chromiumos/third_party/kernel
git fetch --no-tags chrome-os chromeos-5.10
git checkout 56f22b8f6853d26be82709a978e89db6856af6b4
# save the config file
COMPILER_INSTALL_PATH=$HOME/0day COMPILER=clang make.cross ARCH=x86_64 clang-analyzer
If you fix the issue, kindly add following tag where applicable
Reported-by: kernel test robot <lkp@intel.com>
clang-analyzer warnings: (new ones prefixed by >>)
^~~~~~~~
block/genhd.c:84:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(buf, BDEVNAME_SIZE, "%s%d", hd->disk_name, partno);
^~~~~~~~
block/genhd.c:99:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(stat, 0, sizeof(struct disk_stats));
^~~~~~
block/genhd.c:99:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(stat, 0, sizeof(struct disk_stats));
^~~~~~
block/genhd.c:637:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(tbuf, BDEVT_SIZE, "%02x%02x", MAJOR(devt), MINOR(devt));
^~~~~~~~
block/genhd.c:637:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(tbuf, BDEVT_SIZE, "%02x%02x", MAJOR(devt), MINOR(devt));
^~~~~~~~
block/genhd.c:638:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(buf, BDEVT_SIZE, "%-9s", tbuf);
^~~~~~~~
block/genhd.c:638:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(buf, BDEVT_SIZE, "%-9s", tbuf);
^~~~~~~~
block/genhd.c:640:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(buf, BDEVT_SIZE, "%03x:%05x", MAJOR(devt), MINOR(devt));
^~~~~~~~
block/genhd.c:640:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(buf, BDEVT_SIZE, "%03x:%05x", MAJOR(devt), MINOR(devt));
^~~~~~~~
block/genhd.c:965:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(page, "\n");
^~~~~~~
block/genhd.c:965:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(page, "\n");
^~~~~~~
block/genhd.c:1242:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", disk->minors);
^~~~~~~
block/genhd.c:1242:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", disk->minors);
^~~~~~~
block/genhd.c:1250:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", disk_max_parts(disk));
^~~~~~~
block/genhd.c:1250:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", disk_max_parts(disk));
^~~~~~~
block/genhd.c:1258:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n",
^~~~~~~
block/genhd.c:1258:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n",
^~~~~~~
block/genhd.c:1267:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n",
^~~~~~~
block/genhd.c:1267:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n",
^~~~~~~
block/genhd.c:1276:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", get_disk_ro(disk) ? 1 : 0);
^~~~~~~
block/genhd.c:1276:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", get_disk_ro(disk) ? 1 : 0);
^~~~~~~
block/genhd.c:1284:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%llu\n",
^~~~~~~
block/genhd.c:1284:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%llu\n",
^~~~~~~
block/genhd.c:1302:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf,
^~~~~~~
block/genhd.c:1302:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf,
^~~~~~~
block/genhd.c:1344:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%8u %8u\n", inflight[0], inflight[1]);
^~~~~~~
block/genhd.c:1344:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%8u %8u\n", inflight[0], inflight[1]);
^~~~~~~
block/genhd.c:1352:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%x\n", disk->flags);
^~~~~~~
block/genhd.c:1352:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%x\n", disk->flags);
^~~~~~~
block/genhd.c:1361:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", queue_alignment_offset(disk->queue));
^~~~~~~
block/genhd.c:1361:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", queue_alignment_offset(disk->queue));
^~~~~~~
block/genhd.c:1370:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", queue_discard_alignment(disk->queue));
^~~~~~~
block/genhd.c:1370:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", queue_discard_alignment(disk->queue));
^~~~~~~
>> block/genhd.c:2190:11: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
pos += sprintf(buf + pos, "%s%s",
^~~~~~~
block/genhd.c:2190:11: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
pos += sprintf(buf + pos, "%s%s",
^~~~~~~
block/genhd.c:2195:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
pos += sprintf(buf + pos, "\n");
^~~~~~~
block/genhd.c:2195:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
pos += sprintf(buf + pos, "\n");
^~~~~~~
block/genhd.c:2223:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "-1\n");
^~~~~~~
block/genhd.c:2223:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "-1\n");
^~~~~~~
block/genhd.c:2225:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%ld\n", disk->ev->poll_msecs);
^~~~~~~
block/genhd.c:2225:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%ld\n", disk->ev->poll_msecs);
^~~~~~~
block/genhd.c:2235:17: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (!count || !sscanf(buf, "%ld", &intv))
^~~~~~
block/genhd.c:2235:17: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (!count || !sscanf(buf, "%ld", &intv))
^~~~~~
Suppressed 52 warnings (52 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
23 warnings generated.
Suppressed 23 warnings (23 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
23 warnings generated.
Suppressed 23 warnings (23 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
23 warnings generated.
Suppressed 23 warnings (23 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
23 warnings generated.
Suppressed 23 warnings (23 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
23 warnings generated.
Suppressed 23 warnings (23 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
23 warnings generated.
Suppressed 23 warnings (23 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
23 warnings generated.
Suppressed 23 warnings (23 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
42 warnings generated.
Suppressed 42 warnings (42 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
59 warnings generated.
drivers/gpio/gpiolib-cdev.c:213:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&ghd, 0, sizeof(ghd));
^~~~~~
drivers/gpio/gpiolib-cdev.c:213:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&ghd, 0, sizeof(ghd));
^~~~~~
drivers/gpio/gpiolib-cdev.c:539:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&le, 0, sizeof(le));
^~~~~~
drivers/gpio/gpiolib-cdev.c:539:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&le, 0, sizeof(le));
^~~~~~
drivers/gpio/gpiolib-cdev.c:663:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&le, 0, sizeof(le));
^~~~~~
drivers/gpio/gpiolib-cdev.c:663:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&le, 0, sizeof(le));
^~~~~~
drivers/gpio/gpiolib-cdev.c:1243:4: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret = -EIO;
^ ~~~~
drivers/gpio/gpiolib-cdev.c:1243:4: note: Value stored to 'ret' is never read
ret = -EIO;
^ ~~~~
drivers/gpio/gpiolib-cdev.c:1553:4: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret = -EIO;
^ ~~~~
drivers/gpio/gpiolib-cdev.c:1553:4: note: Value stored to 'ret' is never read
ret = -EIO;
^ ~~~~
drivers/gpio/gpiolib-cdev.c:1596:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&ghd, 0, sizeof(ghd));
^~~~~~
drivers/gpio/gpiolib-cdev.c:1596:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&ghd, 0, sizeof(ghd));
^~~~~~
drivers/gpio/gpiolib-cdev.c:1638:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&ge, 0, sizeof(ge));
^~~~~~
drivers/gpio/gpiolib-cdev.c:1638:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&ge, 0, sizeof(ge));
^~~~~~
drivers/gpio/gpiolib-cdev.c:1837:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(info_v1->name, info_v2->name, sizeof(info_v1->name));
--
^
fs/fscache/cookie.c:254:61: note: Assuming 'aux_data_len' is <= 255
if (!index_key || !index_key_len || index_key_len > 255 || aux_data_len > 255)
^~~~~~~~~~~~~~~~~~
fs/fscache/cookie.c:254:2: note: Taking false branch
if (!index_key || !index_key_len || index_key_len > 255 || aux_data_len > 255)
^
fs/fscache/cookie.c:256:6: note: Assuming 'aux_data' is null
if (!aux_data || !aux_data_len) {
^~~~~~~~~
fs/fscache/cookie.c:256:16: note: Left side of '||' is true
if (!aux_data || !aux_data_len) {
^
fs/fscache/cookie.c:257:3: note: Null pointer value stored to 'aux_data'
aux_data = NULL;
^~~~~~~~~~~~~~~
fs/fscache/cookie.c:261:2: note: Loop condition is false. Exiting loop
fscache_stat(&fscache_n_acquires);
^
fs/fscache/internal.h:299:28: note: expanded from macro 'fscache_stat'
#define fscache_stat(stat) do {} while (0)
^
fs/fscache/cookie.c:264:6: note: Assuming 'parent' is non-null
if (!parent) {
^~~~~~~
fs/fscache/cookie.c:264:2: note: Taking false branch
if (!parent) {
^
fs/fscache/cookie.c:271:9: note: Assuming the condition is false
BUG_ON(!def->name[0]);
^
include/asm-generic/bug.h:63:45: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^~~~~~~~~
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
fs/fscache/cookie.c:271:2: note: Taking false branch
BUG_ON(!def->name[0]);
^
include/asm-generic/bug.h:63:32: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^
fs/fscache/cookie.c:271:2: note: Loop condition is false. Exiting loop
BUG_ON(!def->name[0]);
^
include/asm-generic/bug.h:63:27: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^
fs/fscache/cookie.c:273:9: note: Assuming field 'type' is not equal to 0
BUG_ON(def->type == FSCACHE_COOKIE_TYPE_INDEX &&
^
include/asm-generic/bug.h:63:45: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
~~~~~~~~~^~~~~~~~~~
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
fs/fscache/cookie.c:273:48: note: Left side of '&&' is false
BUG_ON(def->type == FSCACHE_COOKIE_TYPE_INDEX &&
^
fs/fscache/cookie.c:273:2: note: Taking false branch
BUG_ON(def->type == FSCACHE_COOKIE_TYPE_INDEX &&
^
include/asm-generic/bug.h:63:32: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^
fs/fscache/cookie.c:273:2: note: Loop condition is false. Exiting loop
BUG_ON(def->type == FSCACHE_COOKIE_TYPE_INDEX &&
^
include/asm-generic/bug.h:63:27: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^
fs/fscache/cookie.c:278:7: note: Passing null pointer value via 5th parameter 'aux_data'
aux_data, aux_data_len,
^~~~~~~~
fs/fscache/cookie.c:276:14: note: Calling 'fscache_alloc_cookie'
candidate = fscache_alloc_cookie(parent, def,
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/fscache/cookie.c:135:6: note: Assuming 'cookie' is non-null
if (!cookie)
^~~~~~~
fs/fscache/cookie.c:135:2: note: Taking false branch
if (!cookie)
^
fs/fscache/cookie.c:141:2: note: Taking false branch
if (fscache_set_key(cookie, index_key, index_key_len) < 0)
^
fs/fscache/cookie.c:144:6: note: Assuming the condition is true
if (cookie->aux_len <= sizeof(cookie->inline_aux)) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/fscache/cookie.c:144:2: note: Taking true branch
if (cookie->aux_len <= sizeof(cookie->inline_aux)) {
^
fs/fscache/cookie.c:145:3: note: Null pointer passed as 2nd argument to memory copy function
memcpy(cookie->inline_aux, aux_data, cookie->aux_len);
^ ~~~~~~~~
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
>> drivers/gpio/gpiolib-sysfs.c:69:11: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
status = sprintf(buf, "%s\n",
^~~~~~~
drivers/gpio/gpiolib-sysfs.c:69:11: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
status = sprintf(buf, "%s\n",
^~~~~~~
drivers/gpio/gpiolib-sysfs.c:253:13: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
status = sprintf(buf, "%s\n", trigger_types[i].name);
^~~~~~~
drivers/gpio/gpiolib-sysfs.c:253:13: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
status = sprintf(buf, "%s\n", trigger_types[i].name);
^~~~~~~
drivers/gpio/gpiolib-sysfs.c:339:11: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
status = sprintf(buf, "%d\n",
^~~~~~~
drivers/gpio/gpiolib-sysfs.c:339:11: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
status = sprintf(buf, "%d\n",
^~~~~~~
drivers/gpio/gpiolib-sysfs.c:418:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", chip->base);
^~~~~~~
drivers/gpio/gpiolib-sysfs.c:418:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", chip->base);
^~~~~~~
drivers/gpio/gpiolib-sysfs.c:427:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", chip->label ? : "");
^~~~~~~
drivers/gpio/gpiolib-sysfs.c:427:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", chip->label ? : "");
^~~~~~~
drivers/gpio/gpiolib-sysfs.c:436:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", chip->ngpio);
^~~~~~~
drivers/gpio/gpiolib-sysfs.c:436:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", chip->ngpio);
^~~~~~~
Suppressed 42 warnings (42 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
51 warnings generated.
Suppressed 51 warnings (51 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
51 warnings generated.
Suppressed 51 warnings (51 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
51 warnings generated.
Suppressed 51 warnings (51 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
51 warnings generated.
Suppressed 51 warnings (51 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
51 warnings generated.
Suppressed 51 warnings (51 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
60 warnings generated.
drivers/regulator/virtual.c:111:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", data->min_uV);
^~~~~~~
drivers/regulator/virtual.c:111:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", data->min_uV);
^~~~~~~
drivers/regulator/virtual.c:137:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", data->max_uV);
^~~~~~~
drivers/regulator/virtual.c:137:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", data->max_uV);
^~~~~~~
drivers/regulator/virtual.c:163:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", data->min_uA);
^~~~~~~
drivers/regulator/virtual.c:163:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", data->min_uA);
^~~~~~~
drivers/regulator/virtual.c:189:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", data->max_uA);
^~~~~~~
drivers/regulator/virtual.c:189:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", data->max_uA);
^~~~~~~
drivers/regulator/virtual.c:218:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "fast\n");
^~~~~~~
drivers/regulator/virtual.c:218:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "fast\n");
^~~~~~~
drivers/regulator/virtual.c:220:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "normal\n");
^~~~~~~
drivers/regulator/virtual.c:220:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "normal\n");
^~~~~~~
drivers/regulator/virtual.c:222:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "idle\n");
^~~~~~~
drivers/regulator/virtual.c:222:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "idle\n");
^~~~~~~
drivers/regulator/virtual.c:224:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "standby\n");
^~~~~~~
drivers/regulator/virtual.c:224:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "standby\n");
--
23 warnings generated.
Suppressed 23 warnings (23 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
51 warnings generated.
fs/gfs2/main.c:45:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&ip->i_res, 0, sizeof(ip->i_res));
^~~~~~
fs/gfs2/main.c:45:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&ip->i_res, 0, sizeof(ip->i_res));
^~~~~~
Suppressed 50 warnings (50 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
56 warnings generated.
Suppressed 56 warnings (56 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
59 warnings generated.
fs/gfs2/aops.c:457:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(kaddr, dibh->b_data + sizeof(struct gfs2_dinode), dsize);
^~~~~~
fs/gfs2/aops.c:457:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(kaddr, dibh->b_data + sizeof(struct gfs2_dinode), dsize);
^~~~~~
fs/gfs2/aops.c:458:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(kaddr + dsize, 0, PAGE_SIZE - dsize);
^~~~~~
fs/gfs2/aops.c:458:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(kaddr + dsize, 0, PAGE_SIZE - dsize);
^~~~~~
fs/gfs2/aops.c:530:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf + copied, p + offset, amt);
^~~~~~
fs/gfs2/aops.c:530:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf + copied, p + offset, amt);
^~~~~~
Suppressed 56 warnings (56 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
49 warnings generated.
Suppressed 49 warnings (49 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
49 warnings generated.
fs/exfat/namei.c:537:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&info->crtime, 0, sizeof(info->crtime));
^~~~~~
fs/exfat/namei.c:537:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&info->crtime, 0, sizeof(info->crtime));
^~~~~~
fs/exfat/namei.c:538:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&info->mtime, 0, sizeof(info->mtime));
^~~~~~
fs/exfat/namei.c:538:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&info->mtime, 0, sizeof(info->mtime));
^~~~~~
fs/exfat/namei.c:539:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&info->atime, 0, sizeof(info->atime));
^~~~~~
fs/exfat/namei.c:539:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&info->atime, 0, sizeof(info->atime));
^~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
Suppressed 45 warnings (45 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
55 warnings generated.
drivers/pcmcia/socket_sysfs.c:41:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "32-bit\n");
^~~~~~~
drivers/pcmcia/socket_sysfs.c:41:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "32-bit\n");
^~~~~~~
drivers/pcmcia/socket_sysfs.c:42:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "16-bit\n");
^~~~~~~
drivers/pcmcia/socket_sysfs.c:42:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "16-bit\n");
^~~~~~~
drivers/pcmcia/socket_sysfs.c:54:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d.%dV\n", s->socket.Vcc / 10,
^~~~~~~
drivers/pcmcia/socket_sysfs.c:54:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d.%dV\n", s->socket.Vcc / 10,
^~~~~~~
drivers/pcmcia/socket_sysfs.c:56:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "X.XV\n");
^~~~~~~
drivers/pcmcia/socket_sysfs.c:56:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "X.XV\n");
^~~~~~~
drivers/pcmcia/socket_sysfs.c:66:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d.%dV\n", s->socket.Vpp / 10, s->socket.Vpp % 10);
^~~~~~~
drivers/pcmcia/socket_sysfs.c:66:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d.%dV\n", s->socket.Vpp / 10, s->socket.Vpp % 10);
^~~~~~~
drivers/pcmcia/socket_sysfs.c:76:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d.%dV\n", s->socket.Vcc / 10, s->socket.Vcc % 10);
^~~~~~~
drivers/pcmcia/socket_sysfs.c:76:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d.%dV\n", s->socket.Vcc / 10, s->socket.Vcc % 10);
^~~~~~~
>> drivers/pcmcia/socket_sysfs.c:101:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", s->state & SOCKET_SUSPEND ? "off" : "on");
^~~~~~~
drivers/pcmcia/socket_sysfs.c:101:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", s->state & SOCKET_SUSPEND ? "off" : "on");
^~~~~~~
drivers/pcmcia/socket_sysfs.c:148:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "0x%04x\n", s->irq_mask);
^~~~~~~
drivers/pcmcia/socket_sysfs.c:148:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "0x%04x\n", s->irq_mask);
^~~~~~~
drivers/pcmcia/socket_sysfs.c:162:8: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = sscanf(buf, "0x%x\n", &mask);
^~~~~~
drivers/pcmcia/socket_sysfs.c:162:8: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
ret = sscanf(buf, "0x%x\n", &mask);
^~~~~~
drivers/pcmcia/socket_sysfs.c:180:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", s->resource_setup_done ? "yes" : "no");
^~~~~~~
drivers/pcmcia/socket_sysfs.c:180:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", s->resource_setup_done ? "yes" : "no");
^~~~~~~
Suppressed 45 warnings (45 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
23 warnings generated.
Suppressed 23 warnings (23 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
23 warnings generated.
Suppressed 23 warnings (23 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
23 warnings generated.
Suppressed 23 warnings (23 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
23 warnings generated.
Suppressed 23 warnings (23 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
23 warnings generated.
Suppressed 23 warnings (23 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
23 warnings generated.
Suppressed 23 warnings (23 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
24 warnings generated.
Suppressed 24 warnings (24 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
26 warnings generated.
drivers/leds/trigger/ledtrig-heartbeat.c:99:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", heartbeat_data->invert);
^~~~~~~
drivers/leds/trigger/ledtrig-heartbeat.c:99:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", heartbeat_data->invert);
^~~~~~~
Suppressed 25 warnings (25 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
26 warnings generated.
drivers/leds/trigger/ledtrig-cpu.c:54:7: warning: Value stored to 'is_active' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
bool is_active = trig->is_active;
^~~~~~~~~ ~~~~~~~~~~~~~~~
drivers/leds/trigger/ledtrig-cpu.c:54:7: note: Value stored to 'is_active' during its initialization is never read
bool is_active = trig->is_active;
^~~~~~~~~ ~~~~~~~~~~~~~~~
drivers/leds/trigger/ledtrig-cpu.c:155:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(trig->name, MAX_NAME_LEN, "cpu%d", cpu);
^~~~~~~~
drivers/leds/trigger/ledtrig-cpu.c:155:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(trig->name, MAX_NAME_LEN, "cpu%d", cpu);
^~~~~~~~
Suppressed 24 warnings (24 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
23 warnings generated.
Suppressed 23 warnings (23 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
23 warnings generated.
Suppressed 23 warnings (23 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
23 warnings generated.
Suppressed 23 warnings (23 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
23 warnings generated.
Suppressed 23 warnings (23 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
23 warnings generated.
Suppressed 23 warnings (23 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
23 warnings generated.
Suppressed 23 warnings (23 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
23 warnings generated.
Suppressed 23 warnings (23 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
54 warnings generated.
drivers/video/fbdev/core/fbcvt.c:233:3: warning: Value stored to 'off' is never read [clang-analyzer-deadcode.DeadStores]
off += scnprintf(buf + off, size - off,
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/video/fbdev/core/fbcvt.c:233:3: note: Value stored to 'off' is never read
off += scnprintf(buf + off, size - off,
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/video/fbdev/core/fbcvt.c:252:4: warning: Value stored to 'off' is never read [clang-analyzer-deadcode.DeadStores]
off += scnprintf(buf + off, size - off, "-R");
--
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/cpufreq/cpufreq.c:190:9: note: '?' condition is true
return policy && cpumask_test_cpu(cpu, policy->cpus) ? policy : NULL;
^
drivers/cpufreq/cpufreq.c:190:2: note: Returning pointer, which participates in a condition later
return policy && cpumask_test_cpu(cpu, policy->cpus) ? policy : NULL;
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/cpufreq/cpufreq.c:1583:11: note: Returning from 'cpufreq_cpu_get_raw'
policy = cpufreq_cpu_get_raw(cpu);
^~~~~~~~~~~~~~~~~~~~~~~~
drivers/cpufreq/cpufreq.c:1584:7: note: 'policy' is non-null
if (!policy) {
^~~~~~
drivers/cpufreq/cpufreq.c:1584:2: note: Taking false branch
if (!policy) {
^
drivers/cpufreq/cpufreq.c:1590:2: note: Taking true branch
if (has_target())
^
drivers/cpufreq/cpufreq.c:1595:2: note: Taking true branch
if (policy_is_inactive(policy)) {
^
drivers/cpufreq/cpufreq.c:1596:3: note: Taking true branch
if (has_target())
^
drivers/cpufreq/cpufreq.c:1597:4: note: Null pointer passed as 2nd argument to string copy function
strncpy(policy->last_governor, policy->governor->name,
^ ~~~~~~~~~~~~~~~~~~~~~~
drivers/cpufreq/cpufreq.c:2447:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(policy, cpu_policy, sizeof(*policy));
^~~~~~
drivers/cpufreq/cpufreq.c:2447:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(policy, cpu_policy, sizeof(*policy));
^~~~~~
drivers/cpufreq/cpufreq.c:2477:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&new_data.cpuinfo, &policy->cpuinfo, sizeof(policy->cpuinfo));
^~~~~~
drivers/cpufreq/cpufreq.c:2477:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&new_data.cpuinfo, &policy->cpuinfo, sizeof(policy->cpuinfo));
^~~~~~
drivers/cpufreq/cpufreq.c:2874:3: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(default_governor, gov->name, CPUFREQ_NAME_LEN);
^~~~~~~
drivers/cpufreq/cpufreq.c:2874:3: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(default_governor, gov->name, CPUFREQ_NAME_LEN);
^~~~~~~
Suppressed 51 warnings (51 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
Suppressed 45 warnings (45 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
59 warnings generated.
drivers/pcmcia/ds.c:105:11: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
fields = sscanf(buf, "%hx %hx %hx %hhx %hhx %hhx %x %x %x %x",
^~~~~~
drivers/pcmcia/ds.c:105:11: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
fields = sscanf(buf, "%hx %hx %hx %hhx %hhx %hhx %x %x %x %x",
^~~~~~
drivers/pcmcia/ds.c:121:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dynid->id.prod_id_hash, prod_id_hash, sizeof(__u32) * 4);
^~~~~~
drivers/pcmcia/ds.c:121:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dynid->id.prod_id_hash, prod_id_hash, sizeof(__u32) * 4);
^~~~~~
drivers/pcmcia/ds.c:1018:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
pcmcia_device_attr(func_id, has_func_id, "0x%02x\n");
^
drivers/pcmcia/ds.c:1006:23: note: expanded from macro 'pcmcia_device_attr'
return p_dev->test ? sprintf(buf, format, p_dev->field) : -ENODEV; \
^~~~~~~
drivers/pcmcia/ds.c:1018:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
pcmcia_device_attr(func_id, has_func_id, "0x%02x\n");
^
drivers/pcmcia/ds.c:1006:23: note: expanded from macro 'pcmcia_device_attr'
return p_dev->test ? sprintf(buf, format, p_dev->field) : -ENODEV; \
^~~~~~~
drivers/pcmcia/ds.c:1019:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
pcmcia_device_attr(manf_id, has_manf_id, "0x%04x\n");
^
drivers/pcmcia/ds.c:1006:23: note: expanded from macro 'pcmcia_device_attr'
return p_dev->test ? sprintf(buf, format, p_dev->field) : -ENODEV; \
^~~~~~~
drivers/pcmcia/ds.c:1019:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
pcmcia_device_attr(manf_id, has_manf_id, "0x%04x\n");
^
drivers/pcmcia/ds.c:1006:23: note: expanded from macro 'pcmcia_device_attr'
return p_dev->test ? sprintf(buf, format, p_dev->field) : -ENODEV; \
^~~~~~~
drivers/pcmcia/ds.c:1020:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
pcmcia_device_attr(card_id, has_card_id, "0x%04x\n");
^
drivers/pcmcia/ds.c:1006:23: note: expanded from macro 'pcmcia_device_attr'
return p_dev->test ? sprintf(buf, format, p_dev->field) : -ENODEV; \
^~~~~~~
drivers/pcmcia/ds.c:1020:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
pcmcia_device_attr(card_id, has_card_id, "0x%04x\n");
^
drivers/pcmcia/ds.c:1006:23: note: expanded from macro 'pcmcia_device_attr'
return p_dev->test ? sprintf(buf, format, p_dev->field) : -ENODEV; \
^~~~~~~
>> drivers/pcmcia/ds.c:1021:1: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
pcmcia_device_stringattr(prod_id1, prod_id[0]);
^
drivers/pcmcia/ds.c:1014:24: note: expanded from macro 'pcmcia_device_stringattr'
return p_dev->field ? sprintf(buf, "%s\n", p_dev->field) : -ENODEV; \
^~~~~~~
drivers/pcmcia/ds.c:1021:1: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
pcmcia_device_stringattr(prod_id1, prod_id[0]);
^
drivers/pcmcia/ds.c:1014:24: note: expanded from macro 'pcmcia_device_stringattr'
return p_dev->field ? sprintf(buf, "%s\n", p_dev->field) : -ENODEV; \
^~~~~~~
drivers/pcmcia/ds.c:1022:1: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
pcmcia_device_stringattr(prod_id2, prod_id[1]);
^
drivers/pcmcia/ds.c:1014:24: note: expanded from macro 'pcmcia_device_stringattr'
return p_dev->field ? sprintf(buf, "%s\n", p_dev->field) : -ENODEV; \
^~~~~~~
drivers/pcmcia/ds.c:1022:1: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
pcmcia_device_stringattr(prod_id2, prod_id[1]);
^
drivers/pcmcia/ds.c:1014:24: note: expanded from macro 'pcmcia_device_stringattr'
return p_dev->field ? sprintf(buf, "%s\n", p_dev->field) : -ENODEV; \
^~~~~~~
drivers/pcmcia/ds.c:1023:1: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
pcmcia_device_stringattr(prod_id3, prod_id[2]);
^
drivers/pcmcia/ds.c:1014:24: note: expanded from macro 'pcmcia_device_stringattr'
return p_dev->field ? sprintf(buf, "%s\n", p_dev->field) : -ENODEV; \
^~~~~~~
drivers/pcmcia/ds.c:1023:1: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
pcmcia_device_stringattr(prod_id3, prod_id[2]);
^
drivers/pcmcia/ds.c:1014:24: note: expanded from macro 'pcmcia_device_stringattr'
return p_dev->field ? sprintf(buf, "%s\n", p_dev->field) : -ENODEV; \
^~~~~~~
drivers/pcmcia/ds.c:1024:1: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
pcmcia_device_stringattr(prod_id4, prod_id[3]);
^
drivers/pcmcia/ds.c:1014:24: note: expanded from macro 'pcmcia_device_stringattr'
return p_dev->field ? sprintf(buf, "%s\n", p_dev->field) : -ENODEV; \
^~~~~~~
drivers/pcmcia/ds.c:1024:1: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
pcmcia_device_stringattr(prod_id4, prod_id[3]);
^
drivers/pcmcia/ds.c:1014:24: note: expanded from macro 'pcmcia_device_stringattr'
return p_dev->field ? sprintf(buf, "%s\n", p_dev->field) : -ENODEV; \
^~~~~~~
drivers/pcmcia/ds.c:1030:25: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return p_dev->socket ? sprintf(buf, "0x%02x\n", p_dev->func) : -ENODEV;
^~~~~~~
drivers/pcmcia/ds.c:1030:25: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return p_dev->socket ? sprintf(buf, "0x%02x\n", p_dev->func) : -ENODEV;
^~~~~~~
drivers/pcmcia/ds.c:1042:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
str += sprintf(str, "%pr\n", p_dev->resource[i]);
^~~~~~~
drivers/pcmcia/ds.c:1042:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
str += sprintf(str, "%pr\n", p_dev->resource[i]);
^~~~~~~
drivers/pcmcia/ds.c:1053:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "off\n");
^~~~~~~
drivers/pcmcia/ds.c:1053:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "off\n");
^~~~~~~
drivers/pcmcia/ds.c:1055:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "on\n");
^~~~~~~
drivers/pcmcia/ds.c:1055:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "on\n");
^~~~~~~
drivers/pcmcia/ds.c:1089:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "pcmcia:m%04Xc%04Xf%02Xfn%02Xpfn%02X"
^~~~~~~
drivers/pcmcia/ds.c:1089:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "pcmcia:m%04Xc%04Xf%02Xfn%02Xpfn%02X"
^~~~~~~
Suppressed 45 warnings (45 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
52 warnings generated.
arch/x86/events/intel/uncore.c:102:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s", event->config);
^~~~~~~
arch/x86/events/intel/uncore.c:102:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s", event->config);
^~~~~~~
arch/x86/events/intel/uncore.c:861:4: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(pmu->name, "uncore_%s", pmu->type->name);
^~~~~~~
arch/x86/events/intel/uncore.c:861:4: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(pmu->name, "uncore_%s", pmu->type->name);
^~~~~~~
arch/x86/events/intel/uncore.c:863:4: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(pmu->name, "uncore");
^~~~~~~
arch/x86/events/intel/uncore.c:863:4: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(pmu->name, "uncore");
^~~~~~~
arch/x86/events/intel/uncore.c:865:3: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(pmu->name, "uncore_%s_%d", pmu->type->name,
--
^~~~~~
drivers/acpi/apei/erst.c:1046:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(rcd, 0, sizeof(*rcd));
^~~~~~
drivers/acpi/apei/erst.c:1047:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(rcd->hdr.signature, CPER_SIG_RECORD, CPER_SIG_SIZE);
^~~~~~
drivers/acpi/apei/erst.c:1047:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(rcd->hdr.signature, CPER_SIG_RECORD, CPER_SIG_SIZE);
^~~~~~
Suppressed 45 warnings (45 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
41 warnings generated.
drivers/input/serio/serio.c:347:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", serio->name);
^~~~~~~
drivers/input/serio/serio.c:347:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", serio->name);
^~~~~~~
drivers/input/serio/serio.c:354:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "serio:ty%02Xpr%02Xid%02Xex%02X\n",
^~~~~~~
drivers/input/serio/serio.c:354:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "serio:ty%02Xpr%02Xid%02Xex%02X\n",
^~~~~~~
drivers/input/serio/serio.c:361:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%02x\n", serio->id.type);
^~~~~~~
drivers/input/serio/serio.c:361:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%02x\n", serio->id.type);
^~~~~~~
drivers/input/serio/serio.c:367:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%02x\n", serio->id.proto);
^~~~~~~
drivers/input/serio/serio.c:367:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%02x\n", serio->id.proto);
^~~~~~~
drivers/input/serio/serio.c:373:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%02x\n", serio->id.id);
^~~~~~~
drivers/input/serio/serio.c:373:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%02x\n", serio->id.id);
^~~~~~~
drivers/input/serio/serio.c:379:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%02x\n", serio->id.extra);
^~~~~~~
drivers/input/serio/serio.c:379:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%02x\n", serio->id.extra);
^~~~~~~
drivers/input/serio/serio.c:416:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", serio->manual_bind ? "manual" : "auto");
^~~~~~~
drivers/input/serio/serio.c:416:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", serio->manual_bind ? "manual" : "auto");
^~~~~~~
drivers/input/serio/serio.c:440:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", serio->firmware_id);
^~~~~~~
drivers/input/serio/serio.c:440:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", serio->firmware_id);
^~~~~~~
drivers/input/serio/serio.c:738:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", driver->description ? driver->description : "(none)");
^~~~~~~
drivers/input/serio/serio.c:738:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", driver->description ? driver->description : "(none)");
^~~~~~~
drivers/input/serio/serio.c:745:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", serio_drv->manual_bind ? "manual" : "auto");
^~~~~~~
drivers/input/serio/serio.c:745:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", serio_drv->manual_bind ? "manual" : "auto");
^~~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
drivers/iio/industrialio-event.c:298:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", val);
^~~~~~~
drivers/iio/industrialio-event.c:298:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", val);
^~~~~~~
drivers/iio/industrialio-event.c:520:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ev_int->group.attrs,
^~~~~~
drivers/iio/industrialio-event.c:520:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ev_int->group.attrs,
^~~~~~
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
58 warnings generated.
drivers/iio/industrialio-buffer.c:229:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", to_iio_dev_attr(attr)->c->scan_index);
^~~~~~~
drivers/iio/industrialio-buffer.c:229:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", to_iio_dev_attr(attr)->c->scan_index);
^~~~~~~
>> drivers/iio/industrialio-buffer.c:247:10: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s:%c%d/%dX%d>>%u\n",
^~~~~~~
drivers/iio/industrialio-buffer.c:247:10: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s:%c%d/%dX%d>>%u\n",
^~~~~~~
drivers/iio/industrialio-buffer.c:255:11: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s:%c%d/%d>>%u\n",
^~~~~~~
drivers/iio/industrialio-buffer.c:255:11: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s:%c%d/%d>>%u\n",
^~~~~~~
drivers/iio/industrialio-buffer.c:275:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", ret);
^~~~~~~
drivers/iio/industrialio-buffer.c:275:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", ret);
^~~~~~~
drivers/iio/industrialio-buffer.c:420:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", buffer->scan_timestamp);
^~~~~~~
drivers/iio/industrialio-buffer.c:420:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", buffer->scan_timestamp);
^~~~~~~
drivers/iio/industrialio-buffer.c:509:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", buffer->length);
^~~~~~~
drivers/iio/industrialio-buffer.c:509:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", buffer->length);
^~~~~~~
drivers/iio/industrialio-buffer.c:552:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", iio_buffer_is_active(buffer));
^~~~~~~
drivers/iio/industrialio-buffer.c:552:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", iio_buffer_is_active(buffer));
^~~~~~~
drivers/iio/industrialio-buffer.c:710:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(config, 0, sizeof(*config));
^~~~~~
drivers/iio/industrialio-buffer.c:710:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(config, 0, sizeof(*config));
^~~~~~
drivers/iio/industrialio-buffer.c:723:2: warning: Dereference of null pointer [clang-analyzer-core.NullDereference]
list_for_each_entry(buffer, &iio_dev_opaque->buffer_list, buffer_list) {
^
include/linux/list.h:656:13: note: expanded from macro 'list_for_each_entry'
pos = list_next_entry(pos, member))
^
include/linux/list.h:555:2: note: expanded from macro 'list_next_entry'
list_entry((pos)->member.next, typeof(*(pos)), member)
^
include/linux/list.h:511:2: note: expanded from macro 'list_entry'
container_of(ptr, type, member)
^
include/linux/kernel.h:854:25: note: expanded from macro 'container_of'
void *__mptr = (void *)(ptr); \
^
drivers/iio/industrialio-buffer.c:1168:8: note: Calling 'strtobool'
ret = strtobool(buf, &requested_state);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/string.h:189:9: note: Value assigned to 'requested_state', which participates in a condition later
return kstrtobool(s, res);
^~~~~~~~~~~~~~~~~~
drivers/iio/industrialio-buffer.c:1168:8: note: Returning from 'strtobool'
ret = strtobool(buf, &requested_state);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/iio/industrialio-buffer.c:1169:6: note: Assuming 'ret' is >= 0
if (ret < 0)
^~~~~~~
drivers/iio/industrialio-buffer.c:1169:2: note: Taking false branch
if (ret < 0)
^
drivers/iio/industrialio-buffer.c:1177:6: note: Assuming 'inlist' is not equal to 'requested_state'
if (inlist == requested_state)
^~~~~~~~~~~~~~~~~~~~~~~~~
drivers/iio/industrialio-buffer.c:1177:2: note: Taking false branch
if (inlist == requested_state)
^
drivers/iio/industrialio-buffer.c:1180:6: note: Assuming 'requested_state' is true
if (requested_state)
^~~~~~~~~~~~~~~
drivers/iio/industrialio-buffer.c:1180:2: note: Taking true branch
if (requested_state)
^
drivers/iio/industrialio-buffer.c:1181:9: note: Calling '__iio_update_buffers'
ret = __iio_update_buffers(indio_dev, buffer, NULL);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/iio/industrialio-buffer.c:1063:42: note: Left side of '&&' is false
struct iio_dev_opaque *iio_dev_opaque = to_iio_dev_opaque(indio_dev);
^
include/linux/iio/iio-opaque.h:34:2: note: expanded from macro 'to_iio_dev_opaque'
container_of(indio_dev, struct iio_dev_opaque, indio_dev)
^
include/linux/kernel.h:855:61: note: expanded from macro 'container_of'
BUILD_BUG_ON_MSG(!__same_type(*(ptr), ((type *)0)->member) && \
^
drivers/iio/industrialio-buffer.c:1063:42: note: Taking false branch
struct iio_dev_opaque *iio_dev_opaque = to_iio_dev_opaque(indio_dev);
^
include/linux/iio/iio-opaque.h:34:2: note: expanded from macro 'to_iio_dev_opaque'
container_of(indio_dev, struct iio_dev_opaque, indio_dev)
--
^
net/sctp/sm_sideeffect.c:771:6: note: Assuming field 'dst' is null
if (t->dst)
^~~~~~
net/sctp/sm_sideeffect.c:771:2: note: Taking false branch
if (t->dst)
^
net/sctp/sm_sideeffect.c:781:6: note: Assuming field 'rto_pending' is not equal to 0
if (t->rto_pending == 0)
^~~~~~~~~~~~~~~~~~~
net/sctp/sm_sideeffect.c:781:2: note: Taking false branch
if (t->rto_pending == 0)
^
net/sctp/sm_sideeffect.c:784:41: note: Access to field 'skb' results in a dereference of a null pointer (loaded from variable 'chunk')
hbinfo = (struct sctp_sender_hb_info *)chunk->skb->data;
^~~~~
net/sctp/sm_sideeffect.c:962:9: warning: Access to field 'chunk_end' results in a dereference of a null pointer (loaded from variable 'chunk') [clang-analyzer-core.NullDereference]
while (chunk->chunk_end > chunk->skb->data) {
^
net/sctp/sm_sideeffect.c:1268:21: note: 'chunk' initialized to a null pointer value
struct sctp_chunk *chunk = NULL, *new_obj;
^~~~~
net/sctp/sm_sideeffect.c:1279:6: note: Assuming 'event_type' is equal to SCTP_EVENT_T_TIMEOUT
if (SCTP_EVENT_T_TIMEOUT != event_type)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
net/sctp/sm_sideeffect.c:1279:2: note: Taking false branch
if (SCTP_EVENT_T_TIMEOUT != event_type)
^
net/sctp/sm_sideeffect.c:1289:2: note: Loop condition is true. Entering loop body
while (NULL != (cmd = sctp_next_cmd(commands))) {
^
net/sctp/sm_sideeffect.c:1290:3: note: Control jumps to 'case SCTP_CMD_PROCESS_OPERR:' at line 1721
switch (cmd->verb) {
^
net/sctp/sm_sideeffect.c:1722:43: note: Passing null pointer value via 3rd parameter 'chunk'
sctp_cmd_process_operr(commands, asoc, chunk);
^~~~~
net/sctp/sm_sideeffect.c:1722:4: note: Calling 'sctp_cmd_process_operr'
sctp_cmd_process_operr(commands, asoc, chunk);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
net/sctp/sm_sideeffect.c:962:9: note: Access to field 'chunk_end' results in a dereference of a null pointer (loaded from variable 'chunk')
while (chunk->chunk_end > chunk->skb->data) {
^~~~~
net/sctp/sm_sideeffect.c:1685:25: warning: Dereference of null pointer [clang-analyzer-core.NullDereference]
chunk->subh.sack_hdr = &sackh;
~~~~~~~~~~~~~~~~~~~~~^~~~~~~~
net/sctp/sm_sideeffect.c:1268:21: note: 'chunk' initialized to a null pointer value
struct sctp_chunk *chunk = NULL, *new_obj;
^~~~~
net/sctp/sm_sideeffect.c:1279:6: note: Assuming 'event_type' is equal to SCTP_EVENT_T_TIMEOUT
if (SCTP_EVENT_T_TIMEOUT != event_type)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
net/sctp/sm_sideeffect.c:1279:2: note: Taking false branch
if (SCTP_EVENT_T_TIMEOUT != event_type)
^
net/sctp/sm_sideeffect.c:1289:2: note: Loop condition is true. Entering loop body
while (NULL != (cmd = sctp_next_cmd(commands))) {
^
net/sctp/sm_sideeffect.c:1290:3: note: Control jumps to 'case SCTP_CMD_PROCESS_CTSN:' at line 1678
switch (cmd->verb) {
^
net/sctp/sm_sideeffect.c:1685:25: note: Dereference of null pointer
chunk->subh.sack_hdr = &sackh;
~~~~~~~~~~~~~~~~~~~~~^~~~~~~~
net/sctp/sm_sideeffect.c:1695:20: warning: Access to field 'pdiscard' results in a dereference of a null pointer (loaded from variable 'chunk') [clang-analyzer-core.NullDereference]
chunk->pdiscard = 1;
~~~~~ ^
net/sctp/sm_sideeffect.c:1268:21: note: 'chunk' initialized to a null pointer value
struct sctp_chunk *chunk = NULL, *new_obj;
^~~~~
net/sctp/sm_sideeffect.c:1279:6: note: Assuming 'event_type' is equal to SCTP_EVENT_T_TIMEOUT
if (SCTP_EVENT_T_TIMEOUT != event_type)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
net/sctp/sm_sideeffect.c:1279:2: note: Taking false branch
if (SCTP_EVENT_T_TIMEOUT != event_type)
^
net/sctp/sm_sideeffect.c:1289:2: note: Loop condition is true. Entering loop body
while (NULL != (cmd = sctp_next_cmd(commands))) {
^
net/sctp/sm_sideeffect.c:1290:3: note: Control jumps to 'case SCTP_CMD_DISCARD_PACKET:' at line 1690
switch (cmd->verb) {
^
net/sctp/sm_sideeffect.c:1695:20: note: Access to field 'pdiscard' results in a dereference of a null pointer (loaded from variable 'chunk')
chunk->pdiscard = 1;
~~~~~ ^
Suppressed 110 warnings (110 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
51 warnings generated.
Suppressed 51 warnings (51 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
51 warnings generated.
Suppressed 51 warnings (51 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
53 warnings generated.
mm/swap_state.c:196:9: warning: Value stored to 'entry' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
void *entry = xas_store(&xas, shadow);
^~~~~ ~~~~~~~~~~~~~~~~~~~~~~~
mm/swap_state.c:196:9: note: Value stored to 'entry' during its initialization is never read
void *entry = xas_store(&xas, shadow);
^~~~~ ~~~~~~~~~~~~~~~~~~~~~~~
>> mm/swap_state.c:902:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", enable_vma_readahead ? "true" : "false");
^~~~~~~
mm/swap_state.c:902:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", enable_vma_readahead ? "true" : "false");
^~~~~~~
Suppressed 51 warnings (51 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
94 warnings generated.
net/sched/sch_choke.c:321:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(q->tab, 0, (q->tab_mask + 1) * sizeof(struct sk_buff *));
^~~~~~
net/sched/sch_choke.c:321:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(q->tab, 0, (q->tab_mask + 1) * sizeof(struct sk_buff *));
^~~~~~
Suppressed 93 warnings (93 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
90 warnings generated.
Suppressed 90 warnings (90 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
77 warnings generated.
Suppressed 77 warnings (77 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
117 warnings generated.
net/sched/cls_flow.c:89:2: warning: Undefined or garbage value returned to caller [clang-analyzer-core.uninitialized.UndefReturn]
return flow->basic.ip_proto;
^
net/sched/cls_flow.c:298:27: note: Left side of '||' is false
struct flow_head *head = rcu_dereference_bh(tp->root);
^
include/linux/rcupdate.h:574:31: note: expanded from macro 'rcu_dereference_bh'
#define rcu_dereference_bh(p) rcu_dereference_bh_check(p, 0)
^
include/linux/rcupdate.h:518:2: note: expanded from macro 'rcu_dereference_bh_check'
__rcu_dereference_check((p), (c) || rcu_read_lock_bh_held(), __rcu)
^
include/linux/rcupdate.h:369:48: note: expanded from macro '__rcu_dereference_check'
typeof(*p) *________p1 = (typeof(*p) *__force)READ_ONCE(p); \
^
include/asm-generic/rwonce.h:49:2: note: expanded from macro 'READ_ONCE'
compiletime_assert_rwonce_type(x); \
^
include/asm-generic/rwonce.h:36:21: note: expanded from macro 'compiletime_assert_rwonce_type'
compiletime_assert(__native_word(t) || sizeof(t) == sizeof(long long), \
^
include/linux/compiler_types.h:277:3: note: expanded from macro '__native_word'
(sizeof(t) == sizeof(char) || sizeof(t) == sizeof(short) || \
^
net/sched/cls_flow.c:298:27: note: Left side of '||' is false
struct flow_head *head = rcu_dereference_bh(tp->root);
^
include/linux/rcupdate.h:574:31: note: expanded from macro 'rcu_dereference_bh'
#define rcu_dereference_bh(p) rcu_dereference_bh_check(p, 0)
^
include/linux/rcupdate.h:518:2: note: expanded from macro 'rcu_dereference_bh_check'
__rcu_dereference_check((p), (c) || rcu_read_lock_bh_held(), __rcu)
^
include/linux/rcupdate.h:369:48: note: expanded from macro '__rcu_dereference_check'
typeof(*p) *________p1 = (typeof(*p) *__force)READ_ONCE(p); \
^
include/asm-generic/rwonce.h:49:2: note: expanded from macro 'READ_ONCE'
compiletime_assert_rwonce_type(x); \
^
include/asm-generic/rwonce.h:36:21: note: expanded from macro 'compiletime_assert_rwonce_type'
compiletime_assert(__native_word(t) || sizeof(t) == sizeof(long long), \
^
include/linux/compiler_types.h:277:3: note: expanded from macro '__native_word'
(sizeof(t) == sizeof(char) || sizeof(t) == sizeof(short) || \
^
net/sched/cls_flow.c:298:27: note: Left side of '||' is false
struct flow_head *head = rcu_dereference_bh(tp->root);
^
include/linux/rcupdate.h:574:31: note: expanded from macro 'rcu_dereference_bh'
#define rcu_dereference_bh(p) rcu_dereference_bh_check(p, 0)
^
include/linux/rcupdate.h:518:2: note: expanded from macro 'rcu_dereference_bh_check'
__rcu_dereference_check((p), (c) || rcu_read_lock_bh_held(), __rcu)
^
include/linux/rcupdate.h:369:48: note: expanded from macro '__rcu_dereference_check'
typeof(*p) *________p1 = (typeof(*p) *__force)READ_ONCE(p); \
^
include/asm-generic/rwonce.h:49:2: note: expanded from macro 'READ_ONCE'
compiletime_assert_rwonce_type(x); \
^
include/asm-generic/rwonce.h:36:21: note: expanded from macro 'compiletime_assert_rwonce_type'
compiletime_assert(__native_word(t) || sizeof(t) == sizeof(long long), \
^
include/linux/compiler_types.h:277:3: note: expanded from macro '__native_word'
(sizeof(t) == sizeof(char) || sizeof(t) == sizeof(short) || \
^
net/sched/cls_flow.c:298:27: note: Left side of '||' is true
struct flow_head *head = rcu_dereference_bh(tp->root);
^
include/linux/rcupdate.h:574:31: note: expanded from macro 'rcu_dereference_bh'
#define rcu_dereference_bh(p) rcu_dereference_bh_check(p, 0)
^
include/linux/rcupdate.h:518:2: note: expanded from macro 'rcu_dereference_bh_check'
__rcu_dereference_check((p), (c) || rcu_read_lock_bh_held(), __rcu)
^
include/linux/rcupdate.h:369:48: note: expanded from macro '__rcu_dereference_check'
typeof(*p) *________p1 = (typeof(*p) *__force)READ_ONCE(p); \
--
^~~~~~
fs/cifs/smb2transport.c:134:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(key, chan->signkey, SMB3_SIGN_KEY_SIZE);
^~~~~~
fs/cifs/smb2transport.c:134:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(key, chan->signkey, SMB3_SIGN_KEY_SIZE);
^~~~~~
fs/cifs/smb2transport.c:234:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(smb2_signature, 0x0, SMB2_HMACSHA256_SIZE);
^~~~~~
fs/cifs/smb2transport.c:234:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(smb2_signature, 0x0, SMB2_HMACSHA256_SIZE);
^~~~~~
fs/cifs/smb2transport.c:235:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(shdr->Signature, 0x0, SMB2_SIGNATURE_SIZE);
^~~~~~
fs/cifs/smb2transport.c:235:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(shdr->Signature, 0x0, SMB2_SIGNATURE_SIZE);
^~~~~~
fs/cifs/smb2transport.c:288:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(shdr->Signature, sigptr, SMB2_SIGNATURE_SIZE);
^~~~~~
fs/cifs/smb2transport.c:288:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(shdr->Signature, sigptr, SMB2_SIGNATURE_SIZE);
^~~~~~
fs/cifs/smb2transport.c:308:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(prfhash, 0x0, SMB2_HMACSHA256_SIZE);
^~~~~~
fs/cifs/smb2transport.c:308:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(prfhash, 0x0, SMB2_HMACSHA256_SIZE);
^~~~~~
fs/cifs/smb2transport.c:309:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(key, 0x0, key_size);
^~~~~~
fs/cifs/smb2transport.c:309:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(key, 0x0, key_size);
^~~~~~
fs/cifs/smb2transport.c:378:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(key, hashptr, key_size);
^~~~~~
fs/cifs/smb2transport.c:378:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(key, hashptr, key_size);
^~~~~~
fs/cifs/smb2transport.c:429:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ses->chans[0].signkey, ses->smb3signingkey,
^~~~~~
fs/cifs/smb2transport.c:429:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ses->chans[0].signkey, ses->smb3signingkey,
^~~~~~
fs/cifs/smb2transport.c:432:3: warning: Value stored to 'rc' is never read [clang-analyzer-deadcode.DeadStores]
rc = generate_key(ses, ptriplet->encryption.label,
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/cifs/smb2transport.c:432:3: note: Value stored to 'rc' is never read
rc = generate_key(ses, ptriplet->encryption.label,
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/cifs/smb2transport.c:562:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(smb3_signature, 0x0, SMB2_CMACAES_SIZE);
^~~~~~
fs/cifs/smb2transport.c:562:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(smb3_signature, 0x0, SMB2_CMACAES_SIZE);
^~~~~~
fs/cifs/smb2transport.c:563:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(shdr->Signature, 0x0, SMB2_SIGNATURE_SIZE);
^~~~~~
fs/cifs/smb2transport.c:563:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(shdr->Signature, 0x0, SMB2_SIGNATURE_SIZE);
^~~~~~
fs/cifs/smb2transport.c:604:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(shdr->Signature, sigptr, SMB2_SIGNATURE_SIZE);
^~~~~~
fs/cifs/smb2transport.c:604:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(shdr->Signature, sigptr, SMB2_SIGNATURE_SIZE);
^~~~~~
fs/cifs/smb2transport.c:634:3: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(shdr->Signature, "BSRSPYL", 8);
^~~~~~~
fs/cifs/smb2transport.c:634:3: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(shdr->Signature, "BSRSPYL", 8);
^~~~~~~
fs/cifs/smb2transport.c:672:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(server_response_sig, shdr->Signature, SMB2_SIGNATURE_SIZE);
^~~~~~
fs/cifs/smb2transport.c:672:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(server_response_sig, shdr->Signature, SMB2_SIGNATURE_SIZE);
^~~~~~
fs/cifs/smb2transport.c:674:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(shdr->Signature, 0, SMB2_SIGNATURE_SIZE);
^~~~~~
fs/cifs/smb2transport.c:674:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(shdr->Signature, 0, SMB2_SIGNATURE_SIZE);
^~~~~~
fs/cifs/smb2transport.c:718:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(temp, 0, sizeof(struct mid_q_entry));
^~~~~~
fs/cifs/smb2transport.c:718:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(temp, 0, sizeof(struct mid_q_entry));
^~~~~~
Suppressed 90 warnings (90 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
>> drivers/iio/industrialio-trigger.c:53:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", trig->name);
^~~~~~~
drivers/iio/industrialio-trigger.c:53:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", trig->name);
^~~~~~~
drivers/iio/industrialio-trigger.c:380:10: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", indio_dev->trig->name);
^~~~~~~
drivers/iio/industrialio-trigger.c:380:10: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", indio_dev->trig->name);
^~~~~~~
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
33 warnings generated.
Suppressed 33 warnings (33 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
114 warnings generated.
kernel/sched/core.c:3461:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&p->se.statistics, 0, sizeof(p->se.statistics));
^~~~~~
kernel/sched/core.c:3461:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&p->se.statistics, 0, sizeof(p->se.statistics));
^~~~~~
kernel/sched/core.c:3656:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&p->sched_info, 0, sizeof(p->sched_info));
^~~~~~
kernel/sched/core.c:3656:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&p->sched_info, 0, sizeof(p->sched_info));
^~~~~~
kernel/sched/core.c:4658:16: warning: Value stored to 'preempt_disable_ip' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
unsigned long preempt_disable_ip = get_preempt_disable_ip(current);
^~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/sched/core.c:4658:16: note: Value stored to 'preempt_disable_ip' during its initialization is never read
unsigned long preempt_disable_ip = get_preempt_disable_ip(current);
^~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/sched/core.c:4926:35: warning: Access to field 'core_cookie' results in a dereference of a null pointer (loaded from variable 'max') [clang-analyzer-core.NullDereference]
cookie = rq->core->core_cookie = max->core_cookie;
^
kernel/sched/core.c:7146:2: note: Calling 'schedule'
schedule();
^~~~~~~~~~
kernel/sched/core.c:5472:3: note: Loop condition is false. Exiting loop
preempt_disable();
^
include/linux/preempt.h:169:27: note: expanded from macro 'preempt_disable'
#define preempt_disable() \
^
kernel/sched/core.c:5473:3: note: Calling '__schedule'
__schedule(false);
^~~~~~~~~~~~~~~~~
kernel/sched/core.c:5286:8: note: Loop condition is false. Exiting loop
cpu = smp_processor_id();
^
include/linux/smp.h:244:29: note: expanded from macro 'smp_processor_id'
# define smp_processor_id() __smp_processor_id()
^
arch/x86/include/asm/smp.h:159:30: note: expanded from macro '__smp_processor_id'
#define __smp_processor_id() __this_cpu_read(cpu_number)
^
include/linux/percpu-defs.h:446:2: note: expanded from macro '__this_cpu_read'
raw_cpu_read(pcp); \
^
include/linux/percpu-defs.h:420:28: note: expanded from macro 'raw_cpu_read'
#define raw_cpu_read(pcp) __pcpu_size_call_return(raw_cpu_read_, pcp)
^
include/linux/percpu-defs.h:319:2: note: expanded from macro '__pcpu_size_call_return'
__verify_pcpu_ptr(&(variable)); \
^
include/linux/percpu-defs.h:217:37: note: expanded from macro '__verify_pcpu_ptr'
#define __verify_pcpu_ptr(ptr) \
^
kernel/sched/core.c:5286:8: note: Control jumps to 'case 4:' at line 5286
cpu = smp_processor_id();
^
include/linux/smp.h:244:29: note: expanded from macro 'smp_processor_id'
# define smp_processor_id() __smp_processor_id()
^
arch/x86/include/asm/smp.h:159:30: note: expanded from macro '__smp_processor_id'
#define __smp_processor_id() __this_cpu_read(cpu_number)
^
include/linux/percpu-defs.h:446:2: note: expanded from macro '__this_cpu_read'
raw_cpu_read(pcp); \
^
include/linux/percpu-defs.h:420:28: note: expanded from macro 'raw_cpu_read'
#define raw_cpu_read(pcp) __pcpu_size_call_return(raw_cpu_read_, pcp)
^
include/linux/percpu-defs.h:320:2: note: expanded from macro '__pcpu_size_call_return'
switch(sizeof(variable)) { \
^
kernel/sched/core.c:5286:8: note: Execution continues on line 5286
cpu = smp_processor_id();
--
25 warnings generated.
crypto/michael_mic.c:68:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy((u8 *)&mctx->pending + mctx->pending_len, data, flen);
^~~~~~
crypto/michael_mic.c:68:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy((u8 *)&mctx->pending + mctx->pending_len, data, flen);
^~~~~~
crypto/michael_mic.c:90:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&mctx->pending, data, len);
^~~~~~
crypto/michael_mic.c:90:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&mctx->pending, data, len);
^~~~~~
Suppressed 23 warnings (23 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
crypto/ansi_cprng.c:105:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(tmp, ctx->DT, DEFAULT_BLK_SZ);
^~~~~~
crypto/ansi_cprng.c:105:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(tmp, ctx->DT, DEFAULT_BLK_SZ);
^~~~~~
crypto/ansi_cprng.c:139:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ctx->last_rand_data, ctx->rand_data,
^~~~~~
crypto/ansi_cprng.c:139:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ctx->last_rand_data, ctx->rand_data,
^~~~~~
crypto/ansi_cprng.c:218:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buf, 0, nbytes);
^~~~~~
crypto/ansi_cprng.c:218:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(buf, 0, nbytes);
^~~~~~
crypto/ansi_cprng.c:245:5: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buf, 0, nbytes);
^~~~~~
crypto/ansi_cprng.c:245:5: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(buf, 0, nbytes);
^~~~~~
crypto/ansi_cprng.c:252:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ptr, ctx->rand_data, DEFAULT_BLK_SZ);
^~~~~~
crypto/ansi_cprng.c:252:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ptr, ctx->rand_data, DEFAULT_BLK_SZ);
^~~~~~
crypto/ansi_cprng.c:291:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ctx->V, V, DEFAULT_BLK_SZ);
^~~~~~
crypto/ansi_cprng.c:291:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ctx->V, V, DEFAULT_BLK_SZ);
^~~~~~
crypto/ansi_cprng.c:293:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ctx->V, DEFAULT_V_SEED, DEFAULT_BLK_SZ);
^~~~~~
crypto/ansi_cprng.c:293:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ctx->V, DEFAULT_V_SEED, DEFAULT_BLK_SZ);
^~~~~~
crypto/ansi_cprng.c:296:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ctx->DT, DT, DEFAULT_BLK_SZ);
^~~~~~
crypto/ansi_cprng.c:296:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ctx->DT, DT, DEFAULT_BLK_SZ);
^~~~~~
crypto/ansi_cprng.c:298:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ctx->DT, 0, DEFAULT_BLK_SZ);
^~~~~~
crypto/ansi_cprng.c:298:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(ctx->DT, 0, DEFAULT_BLK_SZ);
^~~~~~
crypto/ansi_cprng.c:300:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ctx->rand_data, 0, DEFAULT_BLK_SZ);
^~~~~~
crypto/ansi_cprng.c:300:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(ctx->rand_data, 0, DEFAULT_BLK_SZ);
^~~~~~
crypto/ansi_cprng.c:301:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ctx->last_rand_data, 0, DEFAULT_BLK_SZ);
^~~~~~
crypto/ansi_cprng.c:301:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(ctx->last_rand_data, 0, DEFAULT_BLK_SZ);
^~~~~~
Suppressed 23 warnings (23 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
drivers/gnss/core.c:358:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", gnss_type_name(gdev));
^~~~~~~
drivers/gnss/core.c:358:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", gnss_type_name(gdev));
^~~~~~~
Suppressed 45 warnings (45 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
58 warnings generated.
Suppressed 58 warnings (58 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
24 warnings generated.
Suppressed 24 warnings (24 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
56 warnings generated.
>> drivers/counter/counter.c:55:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", e->items[index]);
^~~~~~~
drivers/counter/counter.c:55:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", e->items[index]);
^~~~~~~
drivers/counter/counter.c:94:10: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += sprintf(buf + len, "%s\n", e->items[i]);
^~~~~~~
drivers/counter/counter.c:94:10: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
len += sprintf(buf + len, "%s\n", e->items[i]);
^~~~~~~
drivers/counter/counter.c:118:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", e->items[index]);
^~~~~~~
drivers/counter/counter.c:118:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", e->items[index]);
^~~~~~~
drivers/counter/counter.c:157:10: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += sprintf(buf + len, "%s\n", e->items[i]);
^~~~~~~
drivers/counter/counter.c:157:10: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
len += sprintf(buf + len, "%s\n", e->items[i]);
^~~~~~~
drivers/counter/counter.c:180:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", e->items[index]);
^~~~~~~
drivers/counter/counter.c:180:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", e->items[index]);
^~~~~~~
drivers/counter/counter.c:217:10: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += sprintf(buf + len, "%s\n", e->items[i]);
^~~~~~~
drivers/counter/counter.c:217:10: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
len += sprintf(buf + len, "%s\n", e->items[i]);
^~~~~~~
drivers/counter/counter.c:311:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", counter_signal_value_str[val]);
^~~~~~~
drivers/counter/counter.c:311:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", counter_signal_value_str[val]);
^~~~~~~
drivers/counter/counter.c:324:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", comp->name);
^~~~~~~
drivers/counter/counter.c:324:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", comp->name);
^~~~~~~
drivers/counter/counter.c:563:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", counter_synapse_action_str[action]);
^~~~~~~
drivers/counter/counter.c:563:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", counter_synapse_action_str[action]);
^~~~~~~
drivers/counter/counter.c:615:10: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += sprintf(buf + len, "%s\n",
^~~~~~~
drivers/counter/counter.c:615:10: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
len += sprintf(buf + len, "%s\n",
^~~~~~~
drivers/counter/counter.c:722:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%lu\n", val);
^~~~~~~
drivers/counter/counter.c:722:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%lu\n", val);
^~~~~~~
drivers/counter/counter.c:776:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", counter_count_function_str[function]);
^~~~~~~
drivers/counter/counter.c:776:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", counter_count_function_str[function]);
^~~~~~~
drivers/counter/counter.c:900:10: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += sprintf(buf + len, "%s\n",
^~~~~~~
drivers/counter/counter.c:900:10: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
len += sprintf(buf + len, "%s\n",
^~~~~~~
drivers/counter/counter.c:1051:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%zu\n", comp->size);
^~~~~~~
drivers/counter/counter.c:1051:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%zu\n", comp->size);
^~~~~~~
Suppressed 42 warnings (42 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
95 warnings generated.
net/phonet/socket.c:207:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&sa, 0, sizeof(sa));
^~~~~~
net/phonet/socket.c:207:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&sa, 0, sizeof(sa));
^~~~~~
net/phonet/socket.c:321:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(addr, 0, sizeof(struct sockaddr_pn));
^~~~~~
net/phonet/socket.c:321:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(addr, 0, sizeof(struct sockaddr_pn));
^~~~~~
net/phonet/socket.c:479:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&try_sa, 0, sizeof(struct sockaddr_pn));
--
^
drivers/pci/pci-sysfs.c:42:9: note: expanded from macro 'pci_config_attr'
return sprintf(buf, format_string, pdev->field); \
^~~~~~~
drivers/pci/pci-sysfs.c:47:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
pci_config_attr(device, "0x%04x\n");
^
drivers/pci/pci-sysfs.c:42:9: note: expanded from macro 'pci_config_attr'
return sprintf(buf, format_string, pdev->field); \
^~~~~~~
drivers/pci/pci-sysfs.c:47:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
pci_config_attr(device, "0x%04x\n");
^
drivers/pci/pci-sysfs.c:42:9: note: expanded from macro 'pci_config_attr'
return sprintf(buf, format_string, pdev->field); \
^~~~~~~
drivers/pci/pci-sysfs.c:48:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
pci_config_attr(subsystem_vendor, "0x%04x\n");
^
drivers/pci/pci-sysfs.c:42:9: note: expanded from macro 'pci_config_attr'
return sprintf(buf, format_string, pdev->field); \
^~~~~~~
drivers/pci/pci-sysfs.c:48:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
pci_config_attr(subsystem_vendor, "0x%04x\n");
^
drivers/pci/pci-sysfs.c:42:9: note: expanded from macro 'pci_config_attr'
return sprintf(buf, format_string, pdev->field); \
^~~~~~~
drivers/pci/pci-sysfs.c:49:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
pci_config_attr(subsystem_device, "0x%04x\n");
^
drivers/pci/pci-sysfs.c:42:9: note: expanded from macro 'pci_config_attr'
return sprintf(buf, format_string, pdev->field); \
^~~~~~~
drivers/pci/pci-sysfs.c:49:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
pci_config_attr(subsystem_device, "0x%04x\n");
^
drivers/pci/pci-sysfs.c:42:9: note: expanded from macro 'pci_config_attr'
return sprintf(buf, format_string, pdev->field); \
^~~~~~~
drivers/pci/pci-sysfs.c:50:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
pci_config_attr(revision, "0x%02x\n");
^
drivers/pci/pci-sysfs.c:42:9: note: expanded from macro 'pci_config_attr'
return sprintf(buf, format_string, pdev->field); \
^~~~~~~
drivers/pci/pci-sysfs.c:50:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
pci_config_attr(revision, "0x%02x\n");
^
drivers/pci/pci-sysfs.c:42:9: note: expanded from macro 'pci_config_attr'
return sprintf(buf, format_string, pdev->field); \
^~~~~~~
drivers/pci/pci-sysfs.c:51:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
pci_config_attr(class, "0x%06x\n");
^
drivers/pci/pci-sysfs.c:42:9: note: expanded from macro 'pci_config_attr'
return sprintf(buf, format_string, pdev->field); \
^~~~~~~
drivers/pci/pci-sysfs.c:51:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
pci_config_attr(class, "0x%06x\n");
^
drivers/pci/pci-sysfs.c:42:9: note: expanded from macro 'pci_config_attr'
return sprintf(buf, format_string, pdev->field); \
^~~~~~~
drivers/pci/pci-sysfs.c:52:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
pci_config_attr(irq, "%u\n");
^
drivers/pci/pci-sysfs.c:42:9: note: expanded from macro 'pci_config_attr'
return sprintf(buf, format_string, pdev->field); \
^~~~~~~
drivers/pci/pci-sysfs.c:52:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
pci_config_attr(irq, "%u\n");
^
drivers/pci/pci-sysfs.c:42:9: note: expanded from macro 'pci_config_attr'
return sprintf(buf, format_string, pdev->field); \
^~~~~~~
drivers/pci/pci-sysfs.c:53:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
pci_config_attr(untrusted, "%u\n");
^
drivers/pci/pci-sysfs.c:42:9: note: expanded from macro 'pci_config_attr'
return sprintf(buf, format_string, pdev->field); \
^~~~~~~
drivers/pci/pci-sysfs.c:53:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
pci_config_attr(untrusted, "%u\n");
^
drivers/pci/pci-sysfs.c:42:9: note: expanded from macro 'pci_config_attr'
return sprintf(buf, format_string, pdev->field); \
^~~~~~~
drivers/pci/pci-sysfs.c:60:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", pdev->broken_parity_status);
^~~~~~~
drivers/pci/pci-sysfs.c:60:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", pdev->broken_parity_status);
^~~~~~~
drivers/pci/pci-sysfs.c:146:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
str += sprintf(str, "0x%016llx 0x%016llx 0x%016llx\n",
^~~~~~~
drivers/pci/pci-sysfs.c:146:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
str += sprintf(str, "0x%016llx 0x%016llx 0x%016llx\n",
^~~~~~~
>> drivers/pci/pci-sysfs.c:160:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n",
^~~~~~~
drivers/pci/pci-sysfs.c:160:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n",
^~~~~~~
drivers/pci/pci-sysfs.c:170:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", pcie_get_width_cap(pdev));
^~~~~~~
drivers/pci/pci-sysfs.c:170:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", pcie_get_width_cap(pdev));
^~~~~~~
drivers/pci/pci-sysfs.c:188:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", pci_speed_string(speed));
^~~~~~~
drivers/pci/pci-sysfs.c:188:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", pci_speed_string(speed));
^~~~~~~
drivers/pci/pci-sysfs.c:203:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n",
^~~~~~~
drivers/pci/pci-sysfs.c:203:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n",
^~~~~~~
drivers/pci/pci-sysfs.c:220:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", sec_bus);
^~~~~~~
drivers/pci/pci-sysfs.c:220:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", sec_bus);
^~~~~~~
drivers/pci/pci-sysfs.c:236:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", sub_bus);
^~~~~~~
drivers/pci/pci-sysfs.c:236:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", sub_bus);
^~~~~~~
drivers/pci/pci-sysfs.c:246:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", pci_ari_enabled(pci_dev->bus));
^~~~~~~
drivers/pci/pci-sysfs.c:246:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", pci_ari_enabled(pci_dev->bus));
^~~~~~~
drivers/pci/pci-sysfs.c:255:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "pci:v%08Xd%08Xsv%08Xsd%08Xbc%02Xsc%02Xi%02X\n",
^~~~~~~
drivers/pci/pci-sysfs.c:255:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "pci:v%08Xd%08Xsv%08Xsd%08Xbc%02Xsc%02Xi%02X\n",
^~~~~~~
drivers/pci/pci-sysfs.c:297:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", atomic_read(&pdev->enable_cnt));
^~~~~~~
drivers/pci/pci-sysfs.c:297:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", atomic_read(&pdev->enable_cnt));
^~~~~~~
drivers/pci/pci-sysfs.c:343:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", fls64(pdev->dma_mask));
^~~~~~~
drivers/pci/pci-sysfs.c:343:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", fls64(pdev->dma_mask));
^~~~~~~
drivers/pci/pci-sysfs.c:351:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", fls64(dev->coherent_dma_mask));
^~~~~~~
drivers/pci/pci-sysfs.c:351:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", fls64(dev->coherent_dma_mask));
^~~~~~~
drivers/pci/pci-sysfs.c:361:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", subordinate ?
^~~~~~~
drivers/pci/pci-sysfs.c:361:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", subordinate ?
^~~~~~~
drivers/pci/pci-sysfs.c:518:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", pdev->d3cold_allowed);
^~~~~~~
drivers/pci/pci-sysfs.c:518:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", pdev->d3cold_allowed);
^~~~~~~
drivers/pci/pci-sysfs.c:653:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", (pdev == vga_dev));
^~~~~~~
drivers/pci/pci-sysfs.c:653:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", (pdev == vga_dev));
^~~~~~~
drivers/pci/pci-sysfs.c:655:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n",
^~~~~~~
drivers/pci/pci-sysfs.c:655:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n",
^~~~~~~
drivers/pci/pci-sysfs.c:1147:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(res_attr_name, "resource%d_wc", num);
^~~~~~~
drivers/pci/pci-sysfs.c:1147:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(res_attr_name, "resource%d_wc", num);
^~~~~~~
drivers/pci/pci-sysfs.c:1151:3: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sprintf(res_attr_name, "resource%d", num);
^~~~~~~
drivers/pci/pci-sysfs.c:1151:3: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sprintf(res_attr_name, "resource%d", num);
--
^
fs/io_uring.c:3568:12: note: Calling 'iov_iter_count'
io_size = iov_iter_count(iter);
^~~~~~~~~~~~~~~~~~~~
include/linux/uio.h:234:2: note: Undefined or garbage value returned to caller
return i->count;
^ ~~~~~~~~
Suppressed 91 warnings (90 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
49 warnings generated.
crypto/seqiv.c:33:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(req->iv, subreq->iv, crypto_aead_ivsize(geniv));
^~~~~~
crypto/seqiv.c:33:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(req->iv, subreq->iv, crypto_aead_ivsize(geniv));
^~~~~~
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
65 warnings generated.
fs/ocfs2/aops.c:103:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(kaddr + (bh_result->b_size * iblock),
^~~~~~
fs/ocfs2/aops.c:103:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(kaddr + (bh_result->b_size * iblock),
^~~~~~
fs/ocfs2/aops.c:247:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(kaddr, di->id2.i_data.id_data, size);
^~~~~~
fs/ocfs2/aops.c:247:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(kaddr, di->id2.i_data.id_data, size);
^~~~~~
fs/ocfs2/aops.c:249:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(kaddr + size, 0, PAGE_SIZE - size);
^~~~~~
fs/ocfs2/aops.c:249:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(kaddr + size, 0, PAGE_SIZE - size);
^~~~~~
fs/ocfs2/aops.c:557:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(kaddr + cluster_start, 0, from - cluster_start);
^~~~~~
fs/ocfs2/aops.c:557:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(kaddr + cluster_start, 0, from - cluster_start);
^~~~~~
fs/ocfs2/aops.c:559:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(kaddr + to, 0, cluster_end - to);
^~~~~~
fs/ocfs2/aops.c:559:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(kaddr + to, 0, cluster_end - to);
^~~~~~
fs/ocfs2/aops.c:561:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(kaddr + cluster_start, 0, cluster_end - cluster_start);
^~~~~~
fs/ocfs2/aops.c:561:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(kaddr + cluster_start, 0, cluster_end - cluster_start);
^~~~~~
fs/ocfs2/aops.c:983:4: warning: Value stored to 'map_from' is never read [clang-analyzer-deadcode.DeadStores]
map_from = cluster_start;
^ ~~~~~~~~~~~~~
fs/ocfs2/aops.c:983:4: note: Value stored to 'map_from' is never read
map_from = cluster_start;
^ ~~~~~~~~~~~~~
fs/ocfs2/aops.c:984:4: warning: Value stored to 'map_to' is never read [clang-analyzer-deadcode.DeadStores]
map_to = cluster_end;
^ ~~~~~~~~~~~
fs/ocfs2/aops.c:984:4: note: Value stored to 'map_to' is never read
map_to = cluster_end;
^ ~~~~~~~~~~~
fs/ocfs2/aops.c:994:3: warning: Value stored to 'map_from' is never read [clang-analyzer-deadcode.DeadStores]
map_from = cluster_start;
^ ~~~~~~~~~~~~~
fs/ocfs2/aops.c:994:3: note: Value stored to 'map_from' is never read
map_from = cluster_start;
^ ~~~~~~~~~~~~~
fs/ocfs2/aops.c:995:3: warning: Value stored to 'map_to' is never read [clang-analyzer-deadcode.DeadStores]
map_to = cluster_end;
^ ~~~~~~~~~~~
fs/ocfs2/aops.c:995:3: note: Value stored to 'map_to' is never read
map_to = cluster_end;
^ ~~~~~~~~~~~
fs/ocfs2/aops.c:1678:4: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret = 0;
^ ~
fs/ocfs2/aops.c:1678:4: note: Value stored to 'ret' is never read
ret = 0;
^ ~
fs/ocfs2/aops.c:1944:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(di->id2.i_data.id_data + pos, kaddr + pos, *copied);
^~~~~~
fs/ocfs2/aops.c:1944:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(di->id2.i_data.id_data + pos, kaddr + pos, *copied);
^~~~~~
Suppressed 53 warnings (53 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
51 warnings generated.
>> drivers/misc/uacce/uacce.c:303:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", uacce->api_ver);
^~~~~~~
drivers/misc/uacce/uacce.c:303:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", uacce->api_ver);
^~~~~~~
drivers/misc/uacce/uacce.c:311:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", uacce->flags);
^~~~~~~
drivers/misc/uacce/uacce.c:311:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", uacce->flags);
^~~~~~~
drivers/misc/uacce/uacce.c:323:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n",
^~~~~~~
drivers/misc/uacce/uacce.c:323:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n",
^~~~~~~
drivers/misc/uacce/uacce.c:332:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", uacce->algs);
^~~~~~~
drivers/misc/uacce/uacce.c:332:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", uacce->algs);
^~~~~~~
drivers/misc/uacce/uacce.c:340:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%lu\n",
^~~~~~~
drivers/misc/uacce/uacce.c:340:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%lu\n",
^~~~~~~
drivers/misc/uacce/uacce.c:349:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%lu\n",
^~~~~~~
drivers/misc/uacce/uacce.c:349:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%lu\n",
^~~~~~~
Suppressed 45 warnings (45 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
61 warnings generated.
fs/reiserfs/inode.c:403:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(p, 0, inode->i_sb->s_blocksize);
^~~~~~
fs/reiserfs/inode.c:403:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(p, 0, inode->i_sb->s_blocksize);
^~~~~~
fs/reiserfs/inode.c:424:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(p, ih_item_body(bh, ih) + path.pos_in_item, chars);
^~~~~~
fs/reiserfs/inode.c:424:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(p, ih_item_body(bh, ih) + path.pos_in_item, chars);
^~~~~~
fs/reiserfs/inode.c:1140:3: warning: Value stored to 'bh' is never read [clang-analyzer-deadcode.DeadStores]
bh = get_last_bh(&path);
^
fs/reiserfs/inode.c:1140:3: note: Value stored to 'bh' is never read
fs/reiserfs/inode.c:1142:3: warning: Value stored to 'item' is never read [clang-analyzer-deadcode.DeadStores]
item = tp_item_body(&path);
^ ~~~~~~~~~~~~~~~~~~~
fs/reiserfs/inode.c:1142:3: note: Value stored to 'item' is never read
item = tp_item_body(&path);
^ ~~~~~~~~~~~~~~~~~~~
fs/reiserfs/inode.c:1520:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(INODE_PKEY(inode), 0, KEY_SIZE);
^~~~~~
fs/reiserfs/inode.c:1520:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(INODE_PKEY(inode), 0, KEY_SIZE);
^~~~~~
fs/reiserfs/inode.c:1964:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(INODE_PKEY(inode), &ih.ih_key, KEY_SIZE);
^~~~~~
fs/reiserfs/inode.c:1964:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(INODE_PKEY(inode), &ih.ih_key, KEY_SIZE);
^~~~~~
fs/reiserfs/inode.c:2456:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ih_item_body(bh, ih) + pos_in_item, p + bytes_copied,
^~~~~~
fs/reiserfs/inode.c:2456:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ih_item_body(bh, ih) + pos_in_item, p + bytes_copied,
^~~~~~
fs/reiserfs/inode.c:3199:3: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret = try_to_release_page(page, 0);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/reiserfs/inode.c:3199:3: note: Value stored to 'ret' is never read
ret = try_to_release_page(page, 0);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/reiserfs/reiserfs.h:1282:17: warning: The left operand of '&' is a garbage value [clang-analyzer-core.UndefinedBinaryOperatorResult]
v2->v = (v2->v & cpu_to_le64(15ULL << 60)) | cpu_to_le64(offset);
^
fs/reiserfs/inode.c:1938:9: note: Assuming field 't_trans_id' is not equal to 0
BUG_ON(!th->t_trans_id);
^
include/asm-generic/bug.h:63:45: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^~~~~~~~~
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
fs/reiserfs/inode.c:1938:2: note: Taking false branch
BUG_ON(!th->t_trans_id);
^
include/asm-generic/bug.h:63:32: note: expanded from macro 'BUG_ON'
--
^
drivers/net/can/softing/softing_main.c:702:9: note: expanded from macro 'DEV_ATTR_RO_STR'
return sprintf(buf, "%s\n", card->member); \
^~~~~~~
drivers/net/can/softing/softing_main.c:709:1: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
DEV_ATTR_RO_STR(hardware, pdat->name);
^
drivers/net/can/softing/softing_main.c:702:9: note: expanded from macro 'DEV_ATTR_RO_STR'
return sprintf(buf, "%s\n", card->member); \
^~~~~~~
drivers/net/can/softing/softing_main.c:710:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
DEV_ATTR_RO(hardware_version, id.hw_version);
^
drivers/net/can/softing/softing_main.c:693:9: note: expanded from macro 'DEV_ATTR_RO'
return sprintf(buf, "%u\n", card->member); \
^~~~~~~
drivers/net/can/softing/softing_main.c:710:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
DEV_ATTR_RO(hardware_version, id.hw_version);
^
drivers/net/can/softing/softing_main.c:693:9: note: expanded from macro 'DEV_ATTR_RO'
return sprintf(buf, "%u\n", card->member); \
^~~~~~~
drivers/net/can/softing/softing_main.c:711:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
DEV_ATTR_RO(license, id.license);
^
drivers/net/can/softing/softing_main.c:693:9: note: expanded from macro 'DEV_ATTR_RO'
return sprintf(buf, "%u\n", card->member); \
^~~~~~~
drivers/net/can/softing/softing_main.c:711:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
DEV_ATTR_RO(license, id.license);
^
drivers/net/can/softing/softing_main.c:693:9: note: expanded from macro 'DEV_ATTR_RO'
return sprintf(buf, "%u\n", card->member); \
^~~~~~~
Suppressed 90 warnings (90 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
61 warnings generated.
drivers/hwmon/adm1025.c:168:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", IN_FROM_REG(data->in[index],
^~~~~~~
drivers/hwmon/adm1025.c:168:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", IN_FROM_REG(data->in[index],
^~~~~~~
drivers/hwmon/adm1025.c:177:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", IN_FROM_REG(data->in_min[index],
^~~~~~~
drivers/hwmon/adm1025.c:177:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", IN_FROM_REG(data->in_min[index],
^~~~~~~
drivers/hwmon/adm1025.c:186:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", IN_FROM_REG(data->in_max[index],
^~~~~~~
drivers/hwmon/adm1025.c:186:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", IN_FROM_REG(data->in_max[index],
^~~~~~~
drivers/hwmon/adm1025.c:195:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", TEMP_FROM_REG(data->temp[index]));
^~~~~~~
drivers/hwmon/adm1025.c:195:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", TEMP_FROM_REG(data->temp[index]));
^~~~~~~
drivers/hwmon/adm1025.c:203:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", TEMP_FROM_REG(data->temp_min[index]));
^~~~~~~
drivers/hwmon/adm1025.c:203:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", TEMP_FROM_REG(data->temp_min[index]));
^~~~~~~
drivers/hwmon/adm1025.c:211:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", TEMP_FROM_REG(data->temp_max[index]));
^~~~~~~
drivers/hwmon/adm1025.c:211:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", TEMP_FROM_REG(data->temp_max[index]));
^~~~~~~
drivers/hwmon/adm1025.c:330:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", data->alarms);
^~~~~~~
drivers/hwmon/adm1025.c:330:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", data->alarms);
^~~~~~~
drivers/hwmon/adm1025.c:339:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", (data->alarms >> bitnr) & 1);
^~~~~~~
drivers/hwmon/adm1025.c:339:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", (data->alarms >> bitnr) & 1);
^~~~~~~
drivers/hwmon/adm1025.c:355:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", vid_from_reg(data->vid, data->vrm));
^~~~~~~
drivers/hwmon/adm1025.c:355:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", vid_from_reg(data->vid, data->vrm));
^~~~~~~
drivers/hwmon/adm1025.c:363:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", data->vrm);
^~~~~~~
drivers/hwmon/adm1025.c:363:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", data->vrm);
^~~~~~~
Suppressed 51 warnings (51 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
49 warnings generated.
>> fs/filesystems.c:220:10: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += sprintf(buf+len, "%s\t%s\n",
^~~~~~~
fs/filesystems.c:220:10: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
len += sprintf(buf+len, "%s\t%s\n",
^~~~~~~
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
52 warnings generated.
fs/namespace.c:2235:13: warning: Access to field 'd_inode' results in a dereference of a null pointer (loaded from variable 'dentry') [clang-analyzer-core.NullDereference]
inode_lock(dentry->d_inode);
^
fs/namespace.c:3715:1: note: Calling '__se_sys_pivot_root'
SYSCALL_DEFINE2(pivot_root, const char __user *, new_root,
^
include/linux/syscalls.h:214:36: note: expanded from macro 'SYSCALL_DEFINE2'
#define SYSCALL_DEFINE2(name, ...) SYSCALL_DEFINEx(2, _##name, __VA_ARGS__)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/syscalls.h:224:2: note: expanded from macro 'SYSCALL_DEFINEx'
__SYSCALL_DEFINEx(x, sname, __VA_ARGS__)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
arch/x86/include/asm/syscall_wrapper.h:230:2: note: expanded from macro '__SYSCALL_DEFINEx'
__X64_SYS_STUBx(x, name, __VA_ARGS__) \
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
arch/x86/include/asm/syscall_wrapper.h:96:2: note: expanded from macro '__X64_SYS_STUBx'
__SYS_STUBx(x64, sys##name, \
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
arch/x86/include/asm/syscall_wrapper.h:79:10: note: expanded from macro '__SYS_STUBx'
return __se_##name(__VA_ARGS__); \
^~~~~~~~~~~~~~~~~~~~~~~~
note: expanded from here
fs/namespace.c:3715:1: note: Calling '__do_sys_pivot_root'
SYSCALL_DEFINE2(pivot_root, const char __user *, new_root,
^
include/linux/syscalls.h:214:36: note: expanded from macro 'SYSCALL_DEFINE2'
#define SYSCALL_DEFINE2(name, ...) SYSCALL_DEFINEx(2, _##name, __VA_ARGS__)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/syscalls.h:224:2: note: expanded from macro 'SYSCALL_DEFINEx'
__SYSCALL_DEFINEx(x, sname, __VA_ARGS__)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
arch/x86/include/asm/syscall_wrapper.h:234:14: note: expanded from macro '__SYSCALL_DEFINEx'
long ret = __do_sys##name(__MAP(x,__SC_CAST,__VA_ARGS__));\
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
note: expanded from here
fs/namespace.c:3723:6: note: Assuming the condition is false
if (!may_mount())
^~~~~~~~~~~~
fs/namespace.c:3723:2: note: Taking false branch
if (!may_mount())
^
fs/namespace.c:3728:6: note: Assuming 'error' is 0
if (error)
^~~~~
fs/namespace.c:3728:2: note: Taking false branch
if (error)
^
fs/namespace.c:3733:6: note: Assuming 'error' is 0
if (error)
^~~~~
fs/namespace.c:3733:2: note: Taking false branch
if (error)
^
fs/namespace.c:3737:6: note: Assuming 'error' is 0
if (error)
^~~~~
fs/namespace.c:3737:2: note: Taking false branch
if (error)
^
fs/namespace.c:3741:11: note: Calling 'lock_mount'
old_mp = lock_mount(&old);
^~~~~~~~~~~~~~~~
fs/namespace.c:2236:6: note: Assuming the condition is true
if (unlikely(cant_mount(dentry))) {
^
include/linux/compiler.h:78:40: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^~~~
fs/namespace.c:2236:2: note: Taking false branch
if (unlikely(cant_mount(dentry))) {
^
fs/namespace.c:2242:14: note: 'mnt' is non-null
if (likely(!mnt)) {
^
include/linux/compiler.h:77:40: note: expanded from macro 'likely'
# define likely(x) __builtin_expect(!!(x), 1)
^
fs/namespace.c:2242:2: note: Taking false branch
if (likely(!mnt)) {
^
fs/namespace.c:2255:2: note: Null pointer value stored to 'dentry'
dentry = path->dentry = dget(mnt->mnt_root);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/namespace.c:2256:2: note: Control jumps to line 2235
goto retry;
^
fs/namespace.c:2235:13: note: Access to field 'd_inode' results in a dereference of a null pointer (loaded from variable 'dentry')
inode_lock(dentry->d_inode);
^~~~~~
Suppressed 51 warnings (51 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
69 warnings generated.
drivers/net/phy/micrel.c:459:28: warning: Value stored to 'of_node' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
const struct device_node *of_node = dev->of_node;
^~~~~~~ ~~~~~~~~~~~~
drivers/net/phy/micrel.c:459:28: note: Value stored to 'of_node' during its initialization is never read
const struct device_node *of_node = dev->of_node;
^~~~~~~ ~~~~~~~~~~~~
drivers/net/phy/micrel.c:682:28: warning: Value stored to 'of_node' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
const struct device_node *of_node = dev->of_node;
^~~~~~~ ~~~~~~~~~~~~
drivers/net/phy/micrel.c:682:28: note: Value stored to 'of_node' during its initialization is never read
const struct device_node *of_node = dev->of_node;
^~~~~~~ ~~~~~~~~~~~~
drivers/net/phy/micrel.c:878:22: warning: Value stored to 'of_node' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct device_node *of_node = dev->of_node;
^~~~~~~ ~~~~~~~~~~~~
drivers/net/phy/micrel.c:878:22: note: Value stored to 'of_node' during its initialization is never read
struct device_node *of_node = dev->of_node;
^~~~~~~ ~~~~~~~~~~~~
drivers/net/phy/micrel.c:942:2: warning: Value stored to 'regval' is never read [clang-analyzer-deadcode.DeadStores]
regval = phy_read(phydev, KSZ8873MLL_GLOBAL_CONTROL_4);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/phy/micrel.c:942:2: note: Value stored to 'regval' is never read
regval = phy_read(phydev, KSZ8873MLL_GLOBAL_CONTROL_4);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Suppressed 65 warnings (65 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
66 warnings generated.
drivers/net/phy/microchip.c:40:3: warning: Value stored to 'rc' is never read [clang-analyzer-deadcode.DeadStores]
rc = phy_write(phydev, LAN88XX_INT_MASK, 0x7FFF);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/phy/microchip.c:40:3: note: Value stored to 'rc' is never read
rc = phy_write(phydev, LAN88XX_INT_MASK, 0x7FFF);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/phy/microchip.c:41:3: warning: Value stored to 'rc' is never read [clang-analyzer-deadcode.DeadStores]
rc = phy_read(phydev, LAN88XX_INT_STS);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/phy/microchip.c:41:3: note: Value stored to 'rc' is never read
rc = phy_read(phydev, LAN88XX_INT_STS);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Suppressed 64 warnings (64 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
>> drivers/hwmon/dell-smm-hwmon.c:660:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", labels[type]);
^~~~~~~
drivers/hwmon/dell-smm-hwmon.c:660:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", labels[type]);
^~~~~~~
drivers/hwmon/dell-smm-hwmon.c:673:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", temp * 1000);
^~~~~~~
drivers/hwmon/dell-smm-hwmon.c:673:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", temp * 1000);
^~~~~~~
drivers/hwmon/dell-smm-hwmon.c:704:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s%s\n", (dock ? "Docking " : ""), labels[type]);
^~~~~~~
drivers/hwmon/dell-smm-hwmon.c:704:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s%s\n", (dock ? "Docking " : ""), labels[type]);
^~~~~~~
drivers/hwmon/dell-smm-hwmon.c:716:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", fan_speed);
^~~~~~~
drivers/hwmon/dell-smm-hwmon.c:716:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", fan_speed);
^~~~~~~
drivers/hwmon/dell-smm-hwmon.c:728:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", clamp_val(status * i8k_pwm_mult, 0, 255));
^~~~~~~
drivers/hwmon/dell-smm-hwmon.c:728:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", clamp_val(status * i8k_pwm_mult, 0, 255));
^~~~~~~
Suppressed 42 warnings (42 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
56 warnings generated.
fs/ext2/dir.c:449:2: warning: Value stored to 'err' is never read [clang-analyzer-deadcode.DeadStores]
err = ext2_commit_chunk(page, pos, len);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/ext2/dir.c:449:2: note: Value stored to 'err' is never read
err = ext2_commit_chunk(page, pos, len);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/ext2/dir.c:538:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(de->name, name, namelen);
^~~~~~
fs/ext2/dir.c:538:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(de->name, name, namelen);
^~~~~~
fs/ext2/dir.c:619:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(kaddr, 0, chunk_size);
^~~~~~
fs/ext2/dir.c:619:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(kaddr, 0, chunk_size);
^~~~~~
fs/ext2/dir.c:623:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy (de->name, ".\0\0", 4);
^~~~~~
fs/ext2/dir.c:623:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy (de->name, ".\0\0", 4);
^~~~~~
fs/ext2/dir.c:631:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy (de->name, "..\0", 4);
^~~~~~
fs/ext2/dir.c:631:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy (de->name, "..\0", 4);
^~~~~~
Suppressed 51 warnings (51 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
Suppressed 46 warnings (46 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
50 warnings generated.
fs/reiserfs/bitmap.c:1198:14: warning: Value stored to 'start' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
b_blocknr_t start = hint->search_start;
^~~~~ ~~~~~~~~~~~~~~~~~~
fs/reiserfs/bitmap.c:1198:14: note: Value stored to 'start' during its initialization is never read
b_blocknr_t start = hint->search_start;
^~~~~ ~~~~~~~~~~~~~~~~~~
fs/reiserfs/bitmap.c:1199:14: warning: Value stored to 'finish' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
b_blocknr_t finish = SB_BLOCK_COUNT(s) - 1;
^~~~~~
fs/reiserfs/bitmap.c:1199:14: note: Value stored to 'finish' during its initialization is never read
b_blocknr_t finish = SB_BLOCK_COUNT(s) - 1;
^~~~~~
fs/reiserfs/bitmap.c:1463:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(bitmap, 0xff, sizeof(*bitmap) * bmap_nr);
^~~~~~
fs/reiserfs/bitmap.c:1463:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(bitmap, 0xff, sizeof(*bitmap) * bmap_nr);
^~~~~~
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
55 warnings generated.
Suppressed 55 warnings (55 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
55 warnings generated.
Suppressed 55 warnings (55 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
70 warnings generated.
fs/orangefs/xattr.c:141:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buffer, cx->val, cx->length);
--
^
fs/ext4/namei.c:4029:6: note: Assuming field 'bh' is non-null
if (!new.bh || le32_to_cpu(new.de->inode) != new.inode->i_ino)
^~~~~~~
fs/ext4/namei.c:4029:6: note: Left side of '||' is false
fs/ext4/namei.c:4029:17: note: Access to field 'inode' results in a dereference of a null pointer (loaded from field 'de')
if (!new.bh || le32_to_cpu(new.de->inode) != new.inode->i_ino)
^
include/linux/byteorder/generic.h:89:21: note: expanded from macro 'le32_to_cpu'
#define le32_to_cpu __le32_to_cpu
^
include/uapi/linux/byteorder/little_endian.h:34:50: note: expanded from macro '__le32_to_cpu'
#define __le32_to_cpu(x) ((__force __u32)(__le32)(x))
^~
Suppressed 54 warnings (54 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
51 warnings generated.
Suppressed 51 warnings (51 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
58 warnings generated.
drivers/input/touchscreen/wdt87xx_i2c.c:270:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, &rx_buf[2], rx_len);
^~~~~~
drivers/input/touchscreen/wdt87xx_i2c.c:270:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, &rx_buf[2], rx_len);
^~~~~~
drivers/input/touchscreen/wdt87xx_i2c.c:310:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, &rx_buf[2], rx_len);
^~~~~~
drivers/input/touchscreen/wdt87xx_i2c.c:310:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, &rx_buf[2], rx_len);
^~~~~~
drivers/input/touchscreen/wdt87xx_i2c.c:343:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&tx_buf[tx_len], buf, buf_size);
^~~~~~
drivers/input/touchscreen/wdt87xx_i2c.c:343:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&tx_buf[tx_len], buf, buf_size);
^~~~~~
drivers/input/touchscreen/wdt87xx_i2c.c:586:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&pkt_buf[CMD_DATA_OFFSET], data, packet_size);
^~~~~~
drivers/input/touchscreen/wdt87xx_i2c.c:586:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&pkt_buf[CMD_DATA_OFFSET], data, packet_size);
^~~~~~
drivers/input/touchscreen/wdt87xx_i2c.c:665:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(cmd_buf, 0, sizeof(cmd_buf));
^~~~~~
drivers/input/touchscreen/wdt87xx_i2c.c:665:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(cmd_buf, 0, sizeof(cmd_buf));
^~~~~~
drivers/input/touchscreen/wdt87xx_i2c.c:674:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(pkt_buf, 0, sizeof(pkt_buf));
^~~~~~
drivers/input/touchscreen/wdt87xx_i2c.c:674:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(pkt_buf, 0, sizeof(pkt_buf));
^~~~~~
drivers/input/touchscreen/wdt87xx_i2c.c:1088:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(wdt->phys, sizeof(wdt->phys), "i2c-%u-%04x/input0",
^~~~~~~~
drivers/input/touchscreen/wdt87xx_i2c.c:1088:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(wdt->phys, sizeof(wdt->phys), "i2c-%u-%04x/input0",
^~~~~~~~
Suppressed 51 warnings (51 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
25 warnings generated.
Suppressed 25 warnings (25 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
42 warnings generated.
Suppressed 42 warnings (42 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
51 warnings generated.
Suppressed 51 warnings (51 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
51 warnings generated.
Suppressed 51 warnings (51 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
51 warnings generated.
Suppressed 51 warnings (51 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
51 warnings generated.
Suppressed 51 warnings (51 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
52 warnings generated.
drivers/regulator/bcm590xx-regulator.c:140:8: warning: Excessive padding in 'struct bcm590xx_info' (14 padding bytes, where 6 is optimal).
Optimal fields order:
name,
vin_name,
volt_table,
linear_ranges,
n_voltages,
n_linear_ranges,
consider reordering the fields or adding explicit padding members [clang-analyzer-optin.performance.Padding]
struct bcm590xx_info {
~~~~~~~^~~~~~~~~~~~~~~
drivers/regulator/bcm590xx-regulator.c:140:8: note: Excessive padding in 'struct bcm590xx_info' (14 padding bytes, where 6 is optimal). Optimal fields order: name, vin_name, volt_table, linear_ranges, n_voltages, n_linear_ranges, consider reordering the fields or adding explicit padding members
struct bcm590xx_info {
~~~~~~~^~~~~~~~~~~~~~~
Suppressed 51 warnings (51 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
52 warnings generated.
>> drivers/regulator/bd9571mwv-regulator.c:172:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", bdreg->bkup_mode_enabled ? "on" : "off");
^~~~~~~
drivers/regulator/bd9571mwv-regulator.c:172:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", bdreg->bkup_mode_enabled ? "on" : "off");
^~~~~~~
Suppressed 51 warnings (51 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
51 warnings generated.
Suppressed 51 warnings (51 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
75 warnings generated.
net/ethtool/common.c:296:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(link_ksettings, 0, sizeof(*link_ksettings));
^~~~~~
net/ethtool/common.c:296:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(link_ksettings, 0, sizeof(*link_ksettings));
^~~~~~
net/ethtool/common.c:389:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(info, 0, sizeof(*info));
^~~~~~
net/ethtool/common.c:389:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(info, 0, sizeof(*info));
^~~~~~
Suppressed 73 warnings (73 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
94 warnings generated.
net/ethtool/netlink.c:304:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(reply_data, 0, ops->reply_data_size);
^~~~~~
net/ethtool/netlink.c:304:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(reply_data, 0, ops->reply_data_size);
^~~~~~
net/ethtool/netlink.c:594:2: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret = -ENOMEM;
^ ~~~~~~~
net/ethtool/netlink.c:594:2: note: Value stored to 'ret' is never read
ret = -ENOMEM;
^ ~~~~~~~
Suppressed 92 warnings (92 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
95 warnings generated.
net/ethtool/bitset.c:17:17: warning: The result of the right shift is undefined due to shifting by '32', which is greater or equal to the width of type 'u32' [clang-analyzer-core.UndefinedBinaryOperatorResult]
return ~(u32)0 >> (32 - n % 32);
^
net/ethtool/bitset.c:829:9: note: Calling 'ethnl_update_bitset32'
return ethnl_update_bitset32((u32 *)bitmap, nbits, attr, names, extack,
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
net/ethtool/bitset.c:561:6: note: Assuming 'attr' is non-null
if (!attr)
^~~~~
net/ethtool/bitset.c:561:2: note: Taking false branch
if (!attr)
^
net/ethtool/bitset.c:565:6: note: Assuming 'ret' is >= 0
if (ret < 0)
^~~~~~~
net/ethtool/bitset.c:565:2: note: Taking false branch
if (ret < 0)
^
net/ethtool/bitset.c:568:6: note: Assuming the condition is false
if (tb[ETHTOOL_A_BITSET_BITS])
^~~~~~~~~~~~~~~~~~~~~~~~~
net/ethtool/bitset.c:568:2: note: Taking false branch
if (tb[ETHTOOL_A_BITSET_BITS])
^
net/ethtool/bitset.c:572:6: note: 'ret' is >= 0
if (ret < 0)
^~~
net/ethtool/bitset.c:572:2: note: Taking false branch
if (ret < 0)
^
net/ethtool/bitset.c:576:16: note: Assuming '__UNIQUE_ID___x846' is >= '__UNIQUE_ID___y847'
change_bits = min_t(unsigned int,
^
include/linux/minmax.h:104:27: note: expanded from macro 'min_t'
#define min_t(type, x, y) __careful_cmp((type)(x), (type)(y), <)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/minmax.h:38:3: note: expanded from macro '__careful_cmp'
__cmp_once(x, y, __UNIQUE_ID(__x), __UNIQUE_ID(__y), op))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/minmax.h:33:3: note: expanded from macro '__cmp_once'
__cmp(unique_x, unique_y, op); })
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/minmax.h:28:26: note: expanded from macro '__cmp'
#define __cmp(x, y, op) ((x) op (y) ? (x) : (y))
^~~~~~~~~~
net/ethtool/bitset.c:576:16: note: '?' condition is false
change_bits = min_t(unsigned int,
^
include/linux/minmax.h:104:27: note: expanded from macro 'min_t'
#define min_t(type, x, y) __careful_cmp((type)(x), (type)(y), <)
^
include/linux/minmax.h:38:3: note: expanded from macro '__careful_cmp'
__cmp_once(x, y, __UNIQUE_ID(__x), __UNIQUE_ID(__y), op))
^
include/linux/minmax.h:33:3: note: expanded from macro '__cmp_once'
__cmp(unique_x, unique_y, op); })
^
include/linux/minmax.h:28:26: note: expanded from macro '__cmp'
#define __cmp(x, y, op) ((x) op (y) ? (x) : (y))
--
51 warnings generated.
Suppressed 51 warnings (51 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
62 warnings generated.
drivers/misc/ics932s401.c:156:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "1\n");
^~~~~~~
drivers/misc/ics932s401.c:156:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "1\n");
^~~~~~~
drivers/misc/ics932s401.c:158:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "0\n");
^~~~~~~
drivers/misc/ics932s401.c:158:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "0\n");
^~~~~~~
drivers/misc/ics932s401.c:202:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", calculate_cpu_freq(data));
^~~~~~~
drivers/misc/ics932s401.c:202:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", calculate_cpu_freq(data));
^~~~~~~
drivers/misc/ics932s401.c:231:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", freq);
^~~~~~~
drivers/misc/ics932s401.c:231:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", freq);
^~~~~~~
drivers/misc/ics932s401.c:259:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", calculate_src_freq(data));
^~~~~~~
drivers/misc/ics932s401.c:259:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", calculate_src_freq(data));
^~~~~~~
drivers/misc/ics932s401.c:279:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", freq);
^~~~~~~
drivers/misc/ics932s401.c:279:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", freq);
^~~~~~~
drivers/misc/ics932s401.c:307:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", calculate_pci_freq(data));
^~~~~~~
drivers/misc/ics932s401.c:307:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", calculate_pci_freq(data));
^~~~~~~
drivers/misc/ics932s401.c:322:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", freq);
^~~~~~~
drivers/misc/ics932s401.c:322:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", freq);
^~~~~~~
drivers/misc/ics932s401.c:373:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", x);
^~~~~~~
drivers/misc/ics932s401.c:373:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", x);
^~~~~~~
drivers/misc/ics932s401.c:385:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "0%%\n");
^~~~~~~
drivers/misc/ics932s401.c:385:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "0%%\n");
^~~~~~~
drivers/misc/ics932s401.c:399:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "-0.%lu%%\n", val);
^~~~~~~
drivers/misc/ics932s401.c:399:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "-0.%lu%%\n", val);
^~~~~~~
Suppressed 51 warnings (51 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
31 warnings generated.
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
56 warnings generated.
drivers/watchdog/ziirave_wdt.c:248:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(packet + 3, data, len);
^~~~~~
drivers/watchdog/ziirave_wdt.c:248:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(packet + 3, data, len);
^~~~~~
drivers/watchdog/ziirave_wdt.c:249:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(packet + 3 + len, 0, ZIIRAVE_FIRM_PKT_DATA_SIZE - len);
^~~~~~
drivers/watchdog/ziirave_wdt.c:249:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(packet + 3 + len, 0, ZIIRAVE_FIRM_PKT_DATA_SIZE - len);
^~~~~~
drivers/watchdog/ziirave_wdt.c:449:8: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = sprintf(buf, ZIIRAVE_FW_VERSION_FMT, w_priv->firmware_rev.major,
^~~~~~~
drivers/watchdog/ziirave_wdt.c:449:8: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
ret = sprintf(buf, ZIIRAVE_FW_VERSION_FMT, w_priv->firmware_rev.major,
^~~~~~~
drivers/watchdog/ziirave_wdt.c:472:8: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = sprintf(buf, ZIIRAVE_BL_VERSION_FMT, w_priv->bootloader_rev.major,
^~~~~~~
drivers/watchdog/ziirave_wdt.c:472:8: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
ret = sprintf(buf, ZIIRAVE_BL_VERSION_FMT, w_priv->bootloader_rev.major,
^~~~~~~
>> drivers/watchdog/ziirave_wdt.c:495:8: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = sprintf(buf, "%s", ziirave_reasons[w_priv->reset_reason]);
^~~~~~~
drivers/watchdog/ziirave_wdt.c:495:8: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
ret = sprintf(buf, "%s", ziirave_reasons[w_priv->reset_reason]);
^~~~~~~
Suppressed 51 warnings (51 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
55 warnings generated.
drivers/hwmon/menf21bmc_hwmon.c:104:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", input_names[attr->index]);
^~~~~~~
drivers/hwmon/menf21bmc_hwmon.c:104:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", input_names[attr->index]);
^~~~~~~
drivers/hwmon/menf21bmc_hwmon.c:116:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", drv_data->in_val[attr->index]);
^~~~~~~
drivers/hwmon/menf21bmc_hwmon.c:116:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", drv_data->in_val[attr->index]);
^~~~~~~
drivers/hwmon/menf21bmc_hwmon.c:125:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", drv_data->in_min[attr->index]);
^~~~~~~
drivers/hwmon/menf21bmc_hwmon.c:125:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", drv_data->in_min[attr->index]);
^~~~~~~
drivers/hwmon/menf21bmc_hwmon.c:134:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", drv_data->in_max[attr->index]);
^~~~~~~
drivers/hwmon/menf21bmc_hwmon.c:134:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", drv_data->in_max[attr->index]);
^~~~~~~
Suppressed 51 warnings (51 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
64 warnings generated.
drivers/hwmon/nct7802.c:77:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", (mode >> (2 * sattr->index) & 3) + 2);
^~~~~~~
drivers/hwmon/nct7802.c:77:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", (mode >> (2 * sattr->index) & 3) + 2);
^~~~~~~
drivers/hwmon/nct7802.c:110:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "1\n");
^~~~~~~
drivers/hwmon/nct7802.c:110:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "1\n");
^~~~~~~
drivers/hwmon/nct7802.c:116:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", !(regval & (1 << sattr->index)));
^~~~~~~
drivers/hwmon/nct7802.c:116:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", !(regval & (1 << sattr->index)));
^~~~~~~
drivers/hwmon/nct7802.c:128:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "255\n");
^~~~~~~
drivers/hwmon/nct7802.c:128:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "255\n");
^~~~~~~
drivers/hwmon/nct7802.c:134:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", val);
^~~~~~~
drivers/hwmon/nct7802.c:134:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", val);
^~~~~~~
drivers/hwmon/nct7802.c:165:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", enabled + 1);
^~~~~~~
drivers/hwmon/nct7802.c:165:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", enabled + 1);
^~~~~~~
drivers/hwmon/nct7802.c:352:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", voltage);
^~~~~~~
drivers/hwmon/nct7802.c:352:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", voltage);
^~~~~~~
drivers/hwmon/nct7802.c:427:8: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = sprintf(buf, "%u\n", !!(data->in_status & (1 << sattr->index)));
^~~~~~~
drivers/hwmon/nct7802.c:427:8: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
ret = sprintf(buf, "%u\n", !!(data->in_status & (1 << sattr->index)));
^~~~~~~
drivers/hwmon/nct7802.c:444:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", temp);
^~~~~~~
drivers/hwmon/nct7802.c:444:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", temp);
^~~~~~~
drivers/hwmon/nct7802.c:477:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", speed);
^~~~~~~
drivers/hwmon/nct7802.c:477:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", speed);
^~~~~~~
drivers/hwmon/nct7802.c:491:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", speed);
^~~~~~~
drivers/hwmon/nct7802.c:491:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", speed);
--
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/wireless/ath/ath10k/sdio.c:1054:3: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret = ath10k_sdio_mbox_proc_counter_intr(ar);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/wireless/ath/ath10k/sdio.c:1054:3: note: Value stored to 'ret' is never read
ret = ath10k_sdio_mbox_proc_counter_intr(ar);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/wireless/ath/ath10k/sdio.c:1208:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ar_sdio->bmi_buf, req, req_len);
^~~~~~
drivers/net/wireless/ath/ath10k/sdio.c:1208:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ar_sdio->bmi_buf, req, req_len);
^~~~~~
drivers/net/wireless/ath/ath10k/sdio.c:1281:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(resp, ar_sdio->bmi_buf, *resp_len);
^~~~~~
drivers/net/wireless/ath/ath10k/sdio.c:1281:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(resp, ar_sdio->bmi_buf, *resp_len);
^~~~~~
drivers/net/wireless/ath/ath10k/sdio.c:1315:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(bus_req, 0, sizeof(*bus_req));
^~~~~~
drivers/net/wireless/ath/ath10k/sdio.c:1315:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(bus_req, 0, sizeof(*bus_req));
^~~~~~
drivers/net/wireless/ath/ath10k/sdio.c:1559:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(regs, 0, sizeof(*regs));
^~~~~~
drivers/net/wireless/ath/ath10k/sdio.c:1559:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(regs, 0, sizeof(*regs));
^~~~~~
drivers/net/wireless/ath/ath10k/sdio.c:1753:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, mem, buf_len);
^~~~~~
drivers/net/wireless/ath/ath10k/sdio.c:1753:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, mem, buf_len);
^~~~~~
drivers/net/wireless/ath/ath10k/sdio.c:1930:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(regs, 0, sizeof(*regs)); /* disable all interrupts */
^~~~~~
drivers/net/wireless/ath/ath10k/sdio.c:1930:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(regs, 0, sizeof(*regs)); /* disable all interrupts */
^~~~~~
drivers/net/wireless/ath/ath10k/sdio.c:1931:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(skb->data, regs, sizeof(*regs));
^~~~~~
drivers/net/wireless/ath/ath10k/sdio.c:1931:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(skb->data, regs, sizeof(*regs));
^~~~~~
drivers/net/wireless/ath/ath10k/sdio.c:2228:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf + i, &val, 4);
^~~~~~
drivers/net/wireless/ath/ath10k/sdio.c:2228:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf + i, &val, 4);
^~~~~~
drivers/net/wireless/ath/ath10k/sdio.c:2445:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buf, 0, buf_len);
^~~~~~
drivers/net/wireless/ath/ath10k/sdio.c:2445:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(buf, 0, buf_len);
^~~~~~
Suppressed 83 warnings (83 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
52 warnings generated.
drivers/mmc/core/regulator.c:181:17: warning: Value stored to 'dev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct device *dev = mmc_dev(mmc);
^~~
drivers/mmc/core/regulator.c:181:17: note: Value stored to 'dev' during its initialization is never read
struct device *dev = mmc_dev(mmc);
^~~
Suppressed 51 warnings (51 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
41 warnings generated.
Suppressed 41 warnings (41 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
drivers/leds/trigger/ledtrig-timer.c:23:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%lu\n", led_cdev->blink_delay_on);
^~~~~~~
drivers/leds/trigger/ledtrig-timer.c:23:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%lu\n", led_cdev->blink_delay_on);
^~~~~~~
drivers/leds/trigger/ledtrig-timer.c:48:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%lu\n", led_cdev->blink_delay_off);
^~~~~~~
drivers/leds/trigger/ledtrig-timer.c:48:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%lu\n", led_cdev->blink_delay_off);
^~~~~~~
Suppressed 25 warnings (25 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
52 warnings generated.
drivers/i2c/i2c-smbus.c:392:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&info, 0, sizeof(struct i2c_board_info));
^~~~~~
drivers/i2c/i2c-smbus.c:392:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&info, 0, sizeof(struct i2c_board_info));
^~~~~~
Suppressed 51 warnings (51 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
53 warnings generated.
>> drivers/i2c/i2c-dev.c:104:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", i2c_dev->adap->name);
^~~~~~~
drivers/i2c/i2c-dev.c:104:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", i2c_dev->adap->name);
^~~~~~~
drivers/i2c/i2c-dev.c:608:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(client->name, I2C_NAME_SIZE, "i2c-dev %d", adap->nr);
^~~~~~~~
drivers/i2c/i2c-dev.c:608:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(client->name, I2C_NAME_SIZE, "i2c-dev %d", adap->nr);
^~~~~~~~
Suppressed 51 warnings (51 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
drivers/char/ipmi/ipmi_si_platform.c:160:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&io, 0, sizeof(io));
^~~~~~
drivers/char/ipmi/ipmi_si_platform.c:160:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&io, 0, sizeof(io));
^~~~~~
drivers/char/ipmi/ipmi_si_platform.c:334:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&io, 0, sizeof(io));
^~~~~~
drivers/char/ipmi/ipmi_si_platform.c:334:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&io, 0, sizeof(io));
^~~~~~
Suppressed 42 warnings (42 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
42 warnings generated.
Suppressed 42 warnings (42 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
42 warnings generated.
Suppressed 42 warnings (42 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
drivers/char/ipmi/ipmi_si_pci.c:78:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&io, 0, sizeof(io));
^~~~~~
drivers/char/ipmi/ipmi_si_pci.c:78:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&io, 0, sizeof(io));
^~~~~~
Suppressed 45 warnings (45 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
54 warnings generated.
drivers/hwmon/lm90.c:995:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", !!(client->flags & I2C_CLIENT_PEC));
^~~~~~~
drivers/hwmon/lm90.c:995:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", !!(client->flags & I2C_CLIENT_PEC));
^~~~~~~
drivers/hwmon/lm90.c:1071:41: warning: The result of the left shift is undefined because the left operand is negative [clang-analyzer-core.UndefinedBinaryOperatorResult]
data->temp11[index] = temp_to_s8(val) << 8;
^
drivers/hwmon/lm90.c:1432:2: note: Control jumps to 'case hwmon_temp:' at line 1435
switch (type) {
^
drivers/hwmon/lm90.c:1436:10: note: Calling 'lm90_temp_write'
return lm90_temp_write(dev, attr, channel, val);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/hwmon/lm90.c:1280:6: note: 'err' is 0
if (err)
^~~
drivers/hwmon/lm90.c:1280:2: note: Taking false branch
if (err)
^
drivers/hwmon/lm90.c:1283:2: note: Control jumps to 'case hwmon_temp_offset:' @line 1313
switch (attr) {
^
drivers/hwmon/lm90.c:1314:9: note: Calling 'lm90_set_temp11'
err = lm90_set_temp11(data, REMOTE_OFFSET, val);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/hwmon/lm90.c:1061:6: note: Assuming field 'kind' is not equal to lm99
if (data->kind == lm99 && index <= 2)
^~~~~~~~~~~~~~~~~~
drivers/hwmon/lm90.c:1061:25: note: Left side of '&&' is false
if (data->kind == lm99 && index <= 2)
^
drivers/hwmon/lm90.c:1064:6: note: Assuming the condition is false
if (data->flags & LM90_HAVE_EXTENDED_TEMP)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/hwmon/lm90.c:1064:2: note: Taking false branch
if (data->flags & LM90_HAVE_EXTENDED_TEMP)
^
drivers/hwmon/lm90.c:1066:11: note: Assuming field 'kind' is not equal to max6646
else if (data->kind == max6646)
^~~~~~~~~~~~~~~~~~~~~
drivers/hwmon/lm90.c:1066:7: note: Taking false branch
else if (data->kind == max6646)
^
drivers/hwmon/lm90.c:1068:11: note: Assuming the condition is false
else if (data->flags & LM90_HAVE_REM_LIMIT_EXT)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/hwmon/lm90.c:1068:7: note: Taking false branch
else if (data->flags & LM90_HAVE_REM_LIMIT_EXT)
^
drivers/hwmon/lm90.c:1071:25: note: Calling 'temp_to_s8'
data->temp11[index] = temp_to_s8(val) << 8;
^~~~~~~~~~~~~~~
drivers/hwmon/lm90.c:897:6: note: Assuming the condition is true
if (val <= -128000)
--
^~~~~~
net/netfilter/nf_conntrack_core.c:2147:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dst_tuple, src_tuple, sizeof(*dst_tuple));
^~~~~~
net/netfilter/nf_conntrack_core.c:2147:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dst_tuple, src_tuple, sizeof(*dst_tuple));
^~~~~~
net/netfilter/nf_conntrack_core.c:2164:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dst_tuple, src_tuple, sizeof(*dst_tuple));
^~~~~~
net/netfilter/nf_conntrack_core.c:2164:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dst_tuple, src_tuple, sizeof(*dst_tuple));
^~~~~~
net/netfilter/nf_conntrack_core.c:2495:2: warning: Value stored to 'old_size' is never read [clang-analyzer-deadcode.DeadStores]
old_size = nf_conntrack_htable_size;
^ ~~~~~~~~~~~~~~~~~~~~~~~~
net/netfilter/nf_conntrack_core.c:2495:2: note: Value stored to 'old_size' is never read
old_size = nf_conntrack_htable_size;
^ ~~~~~~~~~~~~~~~~~~~~~~~~
Suppressed 113 warnings (113 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
57 warnings generated.
drivers/hwmon/pmbus/inspur-ipsps.c:73:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(buf, PAGE_SIZE, "%s\n", data);
^~~~~~~~
drivers/hwmon/pmbus/inspur-ipsps.c:73:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(buf, PAGE_SIZE, "%s\n", data);
^~~~~~~~
drivers/hwmon/pmbus/inspur-ipsps.c:94:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(buf, PAGE_SIZE, "%u.%02u%u-%u.%02u\n",
^~~~~~~~
drivers/hwmon/pmbus/inspur-ipsps.c:94:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(buf, PAGE_SIZE, "%u.%02u%u-%u.%02u\n",
^~~~~~~~
drivers/hwmon/pmbus/inspur-ipsps.c:114:10: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(buf, PAGE_SIZE, "[%s] %s %s\n",
^~~~~~~~
drivers/hwmon/pmbus/inspur-ipsps.c:114:10: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(buf, PAGE_SIZE, "[%s] %s %s\n",
^~~~~~~~
drivers/hwmon/pmbus/inspur-ipsps.c:118:10: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(buf, PAGE_SIZE, "%s [%s] %s\n",
^~~~~~~~
drivers/hwmon/pmbus/inspur-ipsps.c:118:10: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(buf, PAGE_SIZE, "%s [%s] %s\n",
^~~~~~~~
drivers/hwmon/pmbus/inspur-ipsps.c:122:10: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(buf, PAGE_SIZE, "%s %s [%s]\n",
^~~~~~~~
drivers/hwmon/pmbus/inspur-ipsps.c:122:10: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(buf, PAGE_SIZE, "%s %s [%s]\n",
^~~~~~~~
drivers/hwmon/pmbus/inspur-ipsps.c:126:10: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(buf, PAGE_SIZE, "unspecified\n");
^~~~~~~~
drivers/hwmon/pmbus/inspur-ipsps.c:126:10: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(buf, PAGE_SIZE, "unspecified\n");
^~~~~~~~
Suppressed 51 warnings (51 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
94 warnings generated.
drivers/net/can/dev/dev.c:987:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&bt, nla_data(data[IFLA_CAN_BITTIMING]), sizeof(bt));
^~~~~~
drivers/net/can/dev/dev.c:987:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&bt, nla_data(data[IFLA_CAN_BITTIMING]), sizeof(bt));
^~~~~~
drivers/net/can/dev/dev.c:1001:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&priv->bittiming, &bt, sizeof(bt));
^~~~~~
drivers/net/can/dev/dev.c:1001:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&priv->bittiming, &bt, sizeof(bt));
^~~~~~
drivers/net/can/dev/dev.c:1077:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&dbt, nla_data(data[IFLA_CAN_DATA_BITTIMING]),
^~~~~~
drivers/net/can/dev/dev.c:1077:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&dbt, nla_data(data[IFLA_CAN_DATA_BITTIMING]),
^~~~~~
drivers/net/can/dev/dev.c:1092:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&priv->data_bittiming, &dbt, sizeof(dbt));
^~~~~~
drivers/net/can/dev/dev.c:1092:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&priv->data_bittiming, &dbt, sizeof(dbt));
^~~~~~
Suppressed 90 warnings (90 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
54 warnings generated.
drivers/hwmon/powr1220.c:181:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", adc_val);
^~~~~~~
drivers/hwmon/powr1220.c:181:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", adc_val);
^~~~~~~
drivers/hwmon/powr1220.c:191:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", data->adc_maxes[attr->index]);
^~~~~~~
drivers/hwmon/powr1220.c:191:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", data->adc_maxes[attr->index]);
^~~~~~~
>> drivers/hwmon/powr1220.c:201:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", input_names[attr->index]);
^~~~~~~
drivers/hwmon/powr1220.c:201:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", input_names[attr->index]);
^~~~~~~
Suppressed 51 warnings (51 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
52 warnings generated.
Suppressed 52 warnings (52 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
52 warnings generated.
fs/xfs/xfs_trans_buf.c:575:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(bip->bli_formats[i].blf_data_map, 0,
^~~~~~
fs/xfs/xfs_trans_buf.c:575:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(bip->bli_formats[i].blf_data_map, 0,
^~~~~~
Suppressed 51 warnings (51 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
53 warnings generated.
fs/xfs/xfs_dquot.c:220:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(d, 0, BBTOB(q->qi_dqchunklen));
^~~~~~
fs/xfs/xfs_dquot.c:220:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(d, 0, BBTOB(q->qi_dqchunklen));
^~~~~~
Suppressed 52 warnings (52 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
52 warnings generated.
Suppressed 52 warnings (52 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
51 warnings generated.
Suppressed 51 warnings (51 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
54 warnings generated.
drivers/mfd/retu-mfd.c:214:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(®, data, sizeof(reg));
^~~~~~
drivers/mfd/retu-mfd.c:214:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(®, data, sizeof(reg));
^~~~~~
drivers/mfd/retu-mfd.c:215:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&val, data + sizeof(reg), sizeof(val));
^~~~~~
drivers/mfd/retu-mfd.c:215:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&val, data + sizeof(reg), sizeof(val));
^~~~~~
Suppressed 52 warnings (52 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
52 warnings generated.
Suppressed 52 warnings (52 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
53 warnings generated.
drivers/mfd/sky81452.c:47:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(cells, 0, sizeof(cells));
^~~~~~
drivers/mfd/sky81452.c:47:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(cells, 0, sizeof(cells));
^~~~~~
Suppressed 52 warnings (52 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
51 warnings generated.
Suppressed 51 warnings (51 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
59 warnings generated.
drivers/nvdimm/btt.c:226:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(dirname, 32, "arena%d", idx);
^~~~~~~~
drivers/nvdimm/btt.c:226:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(dirname, 32, "arena%d", idx);
^~~~~~~~
drivers/nvdimm/btt.c:351:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ent, &log.ent[arena->log_index[ret_ent]], LOG_ENT_SIZE);
^~~~~~
drivers/nvdimm/btt.c:351:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ent, &log.ent[arena->log_index[ret_ent]], LOG_ENT_SIZE);
^~~~~~
drivers/nvdimm/btt.c:497:2: warning: Undefined or garbage value returned to caller [clang-analyzer-core.uninitialized.UndefReturn]
return ret;
^
drivers/nvdimm/btt.c:1676:6: note: Assuming field 'uuid' is non-null
if (!nd_btt->uuid || !nd_btt->ndns || !nd_btt->lbasize) {
^~~~~~~~~~~~~
drivers/nvdimm/btt.c:1676:6: note: Left side of '||' is false
drivers/nvdimm/btt.c:1676:23: note: Assuming field 'ndns' is non-null
if (!nd_btt->uuid || !nd_btt->ndns || !nd_btt->lbasize) {
^~~~~~~~~~~~~
drivers/nvdimm/btt.c:1676:6: note: Left side of '||' is false
if (!nd_btt->uuid || !nd_btt->ndns || !nd_btt->lbasize) {
^
drivers/nvdimm/btt.c:1676:40: note: Assuming field 'lbasize' is not equal to 0
if (!nd_btt->uuid || !nd_btt->ndns || !nd_btt->lbasize) {
^~~~~~~~~~~~~~~~
drivers/nvdimm/btt.c:1676:2: note: Taking false branch
if (!nd_btt->uuid || !nd_btt->ndns || !nd_btt->lbasize) {
^
drivers/nvdimm/btt.c:1682:6: note: Assuming 'btt_sb' is non-null
if (!btt_sb)
^~~~~~~
drivers/nvdimm/btt.c:1682:2: note: Taking false branch
--
^
drivers/net/wireless/rsi/rsi_91x_hal.c:504:2: note: Value assigned to field 'blcmd_timer_expired', which participates in a condition later
add_timer(&adapter->bl_cmd_timer);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/wireless/rsi/rsi_91x_hal.c:847:2: note: Returning from 'bl_start_cmd_timer'
bl_start_cmd_timer(adapter, BL_CMD_TIMEOUT);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/wireless/rsi/rsi_91x_hal.c:849:9: note: Assuming field 'blcmd_timer_expired' is false
while (!adapter->blcmd_timer_expired) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/wireless/rsi/rsi_91x_hal.c:849:2: note: Loop condition is true. Entering loop body
while (!adapter->blcmd_timer_expired) {
^
drivers/net/wireless/rsi/rsi_91x_hal.c:853:7: note: Assuming 'status' is >= 0
if (status < 0) {
^~~~~~~~~~
drivers/net/wireless/rsi/rsi_91x_hal.c:853:3: note: Taking false branch
if (status < 0) {
^
drivers/net/wireless/rsi/rsi_91x_hal.c:859:3: note: Left side of '&&' is true
mdelay(1);
^
include/linux/delay.h:44:3: note: expanded from macro 'mdelay'
(__builtin_constant_p(n) && (n)<=MAX_UDELAY_MS) ? udelay((n)*1000) : \
^
drivers/net/wireless/rsi/rsi_91x_hal.c:859:3: note: 1 is <= 5
mdelay(1);
^
include/linux/delay.h:44:30: note: expanded from macro 'mdelay'
(__builtin_constant_p(n) && (n)<=MAX_UDELAY_MS) ? udelay((n)*1000) : \
^~~
drivers/net/wireless/rsi/rsi_91x_hal.c:859:3: note: '?' condition is true
mdelay(1);
^
include/linux/delay.h:44:2: note: expanded from macro 'mdelay'
(__builtin_constant_p(n) && (n)<=MAX_UDELAY_MS) ? udelay((n)*1000) : \
^
drivers/net/wireless/rsi/rsi_91x_hal.c:859:3: note: Taking true branch
mdelay(1);
^
include/linux/delay.h:44:52: note: expanded from macro 'mdelay'
(__builtin_constant_p(n) && (n)<=MAX_UDELAY_MS) ? udelay((n)*1000) : \
^
include/asm-generic/delay.h:22:3: note: expanded from macro 'udelay'
if (__builtin_constant_p(n)) { \
^
drivers/net/wireless/rsi/rsi_91x_hal.c:859:3: note: Taking false branch
mdelay(1);
^
include/linux/delay.h:44:52: note: expanded from macro 'mdelay'
(__builtin_constant_p(n) && (n)<=MAX_UDELAY_MS) ? udelay((n)*1000) : \
^
include/asm-generic/delay.h:23:4: note: expanded from macro 'udelay'
if ((n) / 20000 >= 1) \
^
drivers/net/wireless/rsi/rsi_91x_hal.c:860:7: note: Assuming the condition is true
if ((regout_val >> 8) == REGOUT_VALID)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/wireless/rsi/rsi_91x_hal.c:860:3: note: Taking true branch
if ((regout_val >> 8) == REGOUT_VALID)
^
drivers/net/wireless/rsi/rsi_91x_hal.c:861:4: note: Execution continues on line 863
break;
^
drivers/net/wireless/rsi/rsi_91x_hal.c:863:6: note: Assuming field 'blcmd_timer_expired' is false
if (adapter->blcmd_timer_expired) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/net/wireless/rsi/rsi_91x_hal.c:863:2: note: Taking false branch
if (adapter->blcmd_timer_expired) {
^
drivers/net/wireless/rsi/rsi_91x_hal.c:876:25: note: The result of the left shift is undefined because the left operand is negative
REGOUT_INVALID << 8),
^
drivers/net/wireless/rsi/rsi_91x_hal.c:1064:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&bootload_ds, fw_p, sizeof(struct bootload_ds));
^~~~~~
drivers/net/wireless/rsi/rsi_91x_hal.c:1064:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&bootload_ds, fw_p, sizeof(struct bootload_ds));
^~~~~~
Suppressed 96 warnings (96 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
29 warnings generated.
drivers/hwmon/adt7x10.c:235:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", ADT7X10_REG_TO_TEMP(data,
^~~~~~~
drivers/hwmon/adt7x10.c:235:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", ADT7X10_REG_TO_TEMP(data,
^~~~~~~
drivers/hwmon/adt7x10.c:278:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n",
^~~~~~~
drivers/hwmon/adt7x10.c:278:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n",
^~~~~~~
drivers/hwmon/adt7x10.c:315:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", !!(ret & attr->index));
^~~~~~~
drivers/hwmon/adt7x10.c:315:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", !!(ret & attr->index));
^~~~~~~
>> drivers/hwmon/adt7x10.c:323:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", data->name);
^~~~~~~
drivers/hwmon/adt7x10.c:323:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", data->name);
^~~~~~~
Suppressed 25 warnings (25 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
51 warnings generated.
Suppressed 51 warnings (51 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
54 warnings generated.
Suppressed 54 warnings (54 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
53 warnings generated.
drivers/hwmon/it87.c:863:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", in_from_reg(data, nr, data->in[nr][index]));
^~~~~~~
drivers/hwmon/it87.c:863:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", in_from_reg(data, nr, data->in[nr][index]));
^~~~~~~
drivers/hwmon/it87.c:951:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", TEMP_FROM_REG(data->temp[nr][index]));
^~~~~~~
drivers/hwmon/it87.c:951:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", TEMP_FROM_REG(data->temp[nr][index]));
^~~~~~~
drivers/hwmon/it87.c:1030:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "6\n"); /* Intel PECI */
^~~~~~~
drivers/hwmon/it87.c:1030:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "6\n"); /* Intel PECI */
^~~~~~~
drivers/hwmon/it87.c:1032:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "3\n"); /* thermal diode */
^~~~~~~
drivers/hwmon/it87.c:1032:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "3\n"); /* thermal diode */
^~~~~~~
drivers/hwmon/it87.c:1034:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "4\n"); /* thermistor */
^~~~~~~
drivers/hwmon/it87.c:1034:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "4\n"); /* thermistor */
^~~~~~~
drivers/hwmon/it87.c:1035:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "0\n"); /* disabled */
^~~~~~~
drivers/hwmon/it87.c:1035:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "0\n"); /* disabled */
^~~~~~~
drivers/hwmon/it87.c:1122:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", speed);
^~~~~~~
drivers/hwmon/it87.c:1122:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", speed);
^~~~~~~
drivers/hwmon/it87.c:1132:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%lu\n", DIV_FROM_REG(data->fan_div[nr]));
^~~~~~~
drivers/hwmon/it87.c:1132:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%lu\n", DIV_FROM_REG(data->fan_div[nr]));
^~~~~~~
drivers/hwmon/it87.c:1142:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", pwm_mode(data, nr));
^~~~~~~
drivers/hwmon/it87.c:1142:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", pwm_mode(data, nr));
^~~~~~~
drivers/hwmon/it87.c:1152:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n",
^~~~~~~
drivers/hwmon/it87.c:1152:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n",
^~~~~~~
drivers/hwmon/it87.c:1172:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", freq);
^~~~~~~
drivers/hwmon/it87.c:1172:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", freq);
^~~~~~~
drivers/hwmon/it87.c:1458:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", (int)BIT(map));
^~~~~~~
drivers/hwmon/it87.c:1458:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", (int)BIT(map));
^~~~~~~
drivers/hwmon/it87.c:1516:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n",
^~~~~~~
drivers/hwmon/it87.c:1516:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n",
^~~~~~~
drivers/hwmon/it87.c:1552:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", data->auto_pwm[nr][1] & 0x7f);
^~~~~~~
drivers/hwmon/it87.c:1552:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", data->auto_pwm[nr][1] & 0x7f);
^~~~~~~
drivers/hwmon/it87.c:1590:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", TEMP_FROM_REG(reg));
--
^~~~~~~
drivers/hwmon/it87.c:1870:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", (data->beeps >> bitnr) & 1);
^~~~~~~
drivers/hwmon/it87.c:1870:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", (data->beeps >> bitnr) & 1);
^~~~~~~
drivers/hwmon/it87.c:1920:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", data->vrm);
^~~~~~~
drivers/hwmon/it87.c:1920:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", data->vrm);
^~~~~~~
drivers/hwmon/it87.c:1943:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%ld\n", (long)vid_from_reg(data->vid, data->vrm));
^~~~~~~
drivers/hwmon/it87.c:1943:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%ld\n", (long)vid_from_reg(data->vid, data->vrm));
^~~~~~~
drivers/hwmon/it87.c:1973:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", label);
^~~~~~~
drivers/hwmon/it87.c:1973:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", label);
^~~~~~~
drivers/hwmon/it87.c:3311:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&sio_data, 0, sizeof(struct it87_sio_data));
^~~~~~
drivers/hwmon/it87.c:3311:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&sio_data, 0, sizeof(struct it87_sio_data));
^~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
51 warnings generated.
Suppressed 51 warnings (51 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
51 warnings generated.
Suppressed 51 warnings (51 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
39 warnings generated.
drivers/mmc/core/sdio.c:30:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
MMC_DEV_ATTR(vendor, "0x%04x\n", card->cis.vendor);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sdio.c:30:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
MMC_DEV_ATTR(vendor, "0x%04x\n", card->cis.vendor);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sdio.c:31:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
MMC_DEV_ATTR(device, "0x%04x\n", card->cis.device);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sdio.c:31:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
MMC_DEV_ATTR(device, "0x%04x\n", card->cis.device);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sdio.c:32:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
MMC_DEV_ATTR(revision, "%u.%u\n", card->major_rev, card->minor_rev);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sdio.c:32:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
MMC_DEV_ATTR(revision, "%u.%u\n", card->major_rev, card->minor_rev);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sdio.c:33:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
MMC_DEV_ATTR(ocr, "0x%08x\n", card->ocr);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sdio.c:33:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
MMC_DEV_ATTR(ocr, "0x%08x\n", card->ocr);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sdio.c:34:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
MMC_DEV_ATTR(rca, "0x%04x\n", card->rca);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sdio.c:34:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
MMC_DEV_ATTR(rca, "0x%04x\n", card->rca);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
>> drivers/mmc/core/sdio.c:49:1: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sdio_info_attr(1);
^
drivers/mmc/core/sdio.c:45:9: note: expanded from macro 'sdio_info_attr'
return sprintf(buf, "%s\n", card->info[num-1]); \
^~~~~~~
drivers/mmc/core/sdio.c:49:1: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sdio_info_attr(1);
^
drivers/mmc/core/sdio.c:45:9: note: expanded from macro 'sdio_info_attr'
return sprintf(buf, "%s\n", card->info[num-1]); \
^~~~~~~
drivers/mmc/core/sdio.c:50:1: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sdio_info_attr(2);
^
drivers/mmc/core/sdio.c:45:9: note: expanded from macro 'sdio_info_attr'
return sprintf(buf, "%s\n", card->info[num-1]); \
^~~~~~~
drivers/mmc/core/sdio.c:50:1: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sdio_info_attr(2);
^
drivers/mmc/core/sdio.c:45:9: note: expanded from macro 'sdio_info_attr'
return sprintf(buf, "%s\n", card->info[num-1]); \
^~~~~~~
drivers/mmc/core/sdio.c:51:1: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sdio_info_attr(3);
^
drivers/mmc/core/sdio.c:45:9: note: expanded from macro 'sdio_info_attr'
return sprintf(buf, "%s\n", card->info[num-1]); \
^~~~~~~
drivers/mmc/core/sdio.c:51:1: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sdio_info_attr(3);
^
drivers/mmc/core/sdio.c:45:9: note: expanded from macro 'sdio_info_attr'
return sprintf(buf, "%s\n", card->info[num-1]); \
^~~~~~~
drivers/mmc/core/sdio.c:52:1: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sdio_info_attr(4);
^
drivers/mmc/core/sdio.c:45:9: note: expanded from macro 'sdio_info_attr'
return sprintf(buf, "%s\n", card->info[num-1]); \
^~~~~~~
drivers/mmc/core/sdio.c:52:1: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sdio_info_attr(4);
^
drivers/mmc/core/sdio.c:45:9: note: expanded from macro 'sdio_info_attr'
return sprintf(buf, "%s\n", card->info[num-1]); \
^~~~~~~
Suppressed 30 warnings (30 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
68 warnings generated.
drivers/bus/mhi/core/main.c:203:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, buf_info->v_addr, buf_info->len);
^~~~~~
drivers/bus/mhi/core/main.c:203:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, buf_info->v_addr, buf_info->len);
^~~~~~
drivers/bus/mhi/core/main.c:221:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf_info->v_addr, buf_info->bb_addr, buf_info->len);
^~~~~~
drivers/bus/mhi/core/main.c:221:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf_info->v_addr, buf_info->bb_addr, buf_info->len);
^~~~~~
drivers/bus/mhi/core/main.c:284:2: warning: Value stored to 'mhi_cntrl' is never read [clang-analyzer-deadcode.DeadStores]
mhi_cntrl = mhi_dev->mhi_cntrl;
^ ~~~~~~~~~~~~~~~~~~
drivers/bus/mhi/core/main.c:284:2: note: Value stored to 'mhi_cntrl' is never read
mhi_cntrl = mhi_dev->mhi_cntrl;
^ ~~~~~~~~~~~~~~~~~~
drivers/bus/mhi/core/main.c:467:17: warning: Value stored to 'dev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct device *dev = &mhi_cntrl->mhi_dev->dev;
^~~ ~~~~~~~~~~~~~~~~~~~~~~~~
drivers/bus/mhi/core/main.c:467:17: note: Value stored to 'dev' during its initialization is never read
struct device *dev = &mhi_cntrl->mhi_dev->dev;
^~~ ~~~~~~~~~~~~~~~~~~~~~~~~
drivers/bus/mhi/core/main.c:1047:17: warning: Value stored to 'dev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct device *dev = &mhi_cntrl->mhi_dev->dev;
^~~ ~~~~~~~~~~~~~~~~~~~~~~~~
drivers/bus/mhi/core/main.c:1047:17: note: Value stored to 'dev' during its initialization is never read
struct device *dev = &mhi_cntrl->mhi_dev->dev;
^~~ ~~~~~~~~~~~~~~~~~~~~~~~~
drivers/bus/mhi/core/main.c:1521:17: warning: Value stored to 'dev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct device *dev = &mhi_cntrl->mhi_dev->dev;
^~~ ~~~~~~~~~~~~~~~~~~~~~~~~
drivers/bus/mhi/core/main.c:1521:17: note: Value stored to 'dev' during its initialization is never read
struct device *dev = &mhi_cntrl->mhi_dev->dev;
^~~ ~~~~~~~~~~~~~~~~~~~~~~~~
Suppressed 62 warnings (61 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
67 warnings generated.
drivers/hwmon/applesmc.c:390:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(cache->key, key, 4);
^~~~~~
drivers/hwmon/applesmc.c:390:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(cache->key, key, 4);
^~~~~~
drivers/hwmon/applesmc.c:392:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(cache->type, &info[1], 4);
^~~~~~
drivers/hwmon/applesmc.c:392:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(cache->type, &info[1], 4);
--
sound/core/seq/seq_memory.c:328:29: note: Field 'ptr' is equal to NULL
if (cell->event.data.ext.ptr == NULL)
^
sound/core/seq/seq_memory.c:328:4: note: Taking true branch
if (cell->event.data.ext.ptr == NULL)
^
sound/core/seq/seq_memory.c:330:8: note: 'tail' is null
if (tail)
^~~~
sound/core/seq/seq_memory.c:330:4: note: Taking false branch
if (tail)
^
sound/core/seq/seq_memory.c:334:8: note: Assuming 'is_chained' is not equal to 0
if (is_chained && src) {
^~~~~~~~~~
sound/core/seq/seq_memory.c:334:8: note: Left side of '&&' is true
sound/core/seq/seq_memory.c:334:22: note: Assuming 'src' is null
if (is_chained && src) {
^~~
sound/core/seq/seq_memory.c:334:8: note: Assuming pointer value is null
if (is_chained && src) {
^~~~~~~~~~~~~~~~~
sound/core/seq/seq_memory.c:334:4: note: Taking false branch
if (is_chained && src) {
^
sound/core/seq/seq_memory.c:337:15: note: Assuming 'is_usrptr' is 0
} else if (is_usrptr) {
^~~~~~~~~
sound/core/seq/seq_memory.c:337:11: note: Taking false branch
} else if (is_usrptr) {
^
sound/core/seq/seq_memory.c:343:5: note: Null pointer passed as 2nd argument to memory copy function
memcpy(&tmp->event, buf, size);
^ ~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
40 warnings generated.
drivers/mmc/core/sdio_bus.c:42:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sdio_config_attr(class, "0x%02x\n", func->class);
^
drivers/mmc/core/sdio_bus.c:38:9: note: expanded from macro 'sdio_config_attr'
return sprintf(buf, format_string, args); \
^~~~~~~
drivers/mmc/core/sdio_bus.c:42:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sdio_config_attr(class, "0x%02x\n", func->class);
^
drivers/mmc/core/sdio_bus.c:38:9: note: expanded from macro 'sdio_config_attr'
return sprintf(buf, format_string, args); \
^~~~~~~
drivers/mmc/core/sdio_bus.c:43:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sdio_config_attr(vendor, "0x%04x\n", func->vendor);
^
drivers/mmc/core/sdio_bus.c:38:9: note: expanded from macro 'sdio_config_attr'
return sprintf(buf, format_string, args); \
^~~~~~~
drivers/mmc/core/sdio_bus.c:43:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sdio_config_attr(vendor, "0x%04x\n", func->vendor);
^
drivers/mmc/core/sdio_bus.c:38:9: note: expanded from macro 'sdio_config_attr'
return sprintf(buf, format_string, args); \
^~~~~~~
drivers/mmc/core/sdio_bus.c:44:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sdio_config_attr(device, "0x%04x\n", func->device);
^
drivers/mmc/core/sdio_bus.c:38:9: note: expanded from macro 'sdio_config_attr'
return sprintf(buf, format_string, args); \
^~~~~~~
drivers/mmc/core/sdio_bus.c:44:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sdio_config_attr(device, "0x%04x\n", func->device);
^
drivers/mmc/core/sdio_bus.c:38:9: note: expanded from macro 'sdio_config_attr'
return sprintf(buf, format_string, args); \
^~~~~~~
drivers/mmc/core/sdio_bus.c:45:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sdio_config_attr(revision, "%u.%u\n", func->major_rev, func->minor_rev);
^
drivers/mmc/core/sdio_bus.c:38:9: note: expanded from macro 'sdio_config_attr'
return sprintf(buf, format_string, args); \
^~~~~~~
drivers/mmc/core/sdio_bus.c:45:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sdio_config_attr(revision, "%u.%u\n", func->major_rev, func->minor_rev);
^
drivers/mmc/core/sdio_bus.c:38:9: note: expanded from macro 'sdio_config_attr'
return sprintf(buf, format_string, args); \
^~~~~~~
drivers/mmc/core/sdio_bus.c:46:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sdio_config_attr(modalias, "sdio:c%02Xv%04Xd%04X\n", func->class, func->vendor, func->device);
^
drivers/mmc/core/sdio_bus.c:38:9: note: expanded from macro 'sdio_config_attr'
return sprintf(buf, format_string, args); \
^~~~~~~
drivers/mmc/core/sdio_bus.c:46:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sdio_config_attr(modalias, "sdio:c%02Xv%04Xd%04X\n", func->class, func->vendor, func->device);
^
drivers/mmc/core/sdio_bus.c:38:9: note: expanded from macro 'sdio_config_attr'
return sprintf(buf, format_string, args); \
^~~~~~~
>> drivers/mmc/core/sdio_bus.c:61:1: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sdio_info_attr(1);
^
drivers/mmc/core/sdio_bus.c:57:9: note: expanded from macro 'sdio_info_attr'
return sprintf(buf, "%s\n", func->info[num-1]); \
^~~~~~~
drivers/mmc/core/sdio_bus.c:61:1: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sdio_info_attr(1);
^
drivers/mmc/core/sdio_bus.c:57:9: note: expanded from macro 'sdio_info_attr'
return sprintf(buf, "%s\n", func->info[num-1]); \
^~~~~~~
drivers/mmc/core/sdio_bus.c:62:1: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sdio_info_attr(2);
^
drivers/mmc/core/sdio_bus.c:57:9: note: expanded from macro 'sdio_info_attr'
return sprintf(buf, "%s\n", func->info[num-1]); \
^~~~~~~
drivers/mmc/core/sdio_bus.c:62:1: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sdio_info_attr(2);
^
drivers/mmc/core/sdio_bus.c:57:9: note: expanded from macro 'sdio_info_attr'
return sprintf(buf, "%s\n", func->info[num-1]); \
^~~~~~~
drivers/mmc/core/sdio_bus.c:63:1: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sdio_info_attr(3);
^
drivers/mmc/core/sdio_bus.c:57:9: note: expanded from macro 'sdio_info_attr'
return sprintf(buf, "%s\n", func->info[num-1]); \
^~~~~~~
drivers/mmc/core/sdio_bus.c:63:1: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sdio_info_attr(3);
^
drivers/mmc/core/sdio_bus.c:57:9: note: expanded from macro 'sdio_info_attr'
return sprintf(buf, "%s\n", func->info[num-1]); \
^~~~~~~
drivers/mmc/core/sdio_bus.c:64:1: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sdio_info_attr(4);
^
drivers/mmc/core/sdio_bus.c:57:9: note: expanded from macro 'sdio_info_attr'
return sprintf(buf, "%s\n", func->info[num-1]); \
^~~~~~~
drivers/mmc/core/sdio_bus.c:64:1: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sdio_info_attr(4);
^
drivers/mmc/core/sdio_bus.c:57:9: note: expanded from macro 'sdio_info_attr'
return sprintf(buf, "%s\n", func->info[num-1]); \
^~~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
57 warnings generated.
sound/soc/codecs/nau8824.c:845:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(prefixed_pin, sizeof(prefixed_pin), "%s %s",
^~~~~~~~
sound/soc/codecs/nau8824.c:845:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(prefixed_pin, sizeof(prefixed_pin), "%s %s",
^~~~~~~~
sound/soc/codecs/nau8824.c:860:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(prefixed_pin, sizeof(prefixed_pin), "%s %s",
^~~~~~~~
sound/soc/codecs/nau8824.c:860:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(prefixed_pin, sizeof(prefixed_pin), "%s %s",
^~~~~~~~
sound/soc/codecs/nau8824.c:1808:17: warning: Value stored to 'dev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct device *dev = nau8824->dev;
^~~ ~~~~~~~~~~~~
sound/soc/codecs/nau8824.c:1808:17: note: Value stored to 'dev' during its initialization is never read
struct device *dev = nau8824->dev;
^~~ ~~~~~~~~~~~~
Suppressed 54 warnings (54 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
51 warnings generated.
Suppressed 51 warnings (51 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
Suppressed 47 warnings (47 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
51 warnings generated.
Suppressed 51 warnings (51 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
55 warnings generated.
sound/soc/codecs/pcm186x.c:268:19: warning: Value stored to 'format' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
snd_pcm_format_t format = params_format(params);
^~~~~~ ~~~~~~~~~~~~~~~~~~~~~
sound/soc/codecs/pcm186x.c:268:19: note: Value stored to 'format' during its initialization is never read
snd_pcm_format_t format = params_format(params);
^~~~~~ ~~~~~~~~~~~~~~~~~~~~~
Suppressed 54 warnings (54 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
51 warnings generated.
fs/ext4/dir.c:289:3: warning: Value stored to 'offset' is never read [clang-analyzer-deadcode.DeadStores]
offset = 0;
^ ~
fs/ext4/dir.c:289:3: note: Value stored to 'offset' is never read
offset = 0;
^ ~
fs/ext4/dir.c:466:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(new_fn->name, ent_name->name, ent_name->len);
--
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sd.c:678:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
MMC_DEV_ATTR(scr, "%08x%08x\n", card->raw_scr[0], card->raw_scr[1]);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sd.c:678:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
MMC_DEV_ATTR(scr, "%08x%08x\n", card->raw_scr[0], card->raw_scr[1]);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sd.c:679:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
MMC_DEV_ATTR(ssr,
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sd.c:679:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
MMC_DEV_ATTR(ssr,
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sd.c:687:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
MMC_DEV_ATTR(date, "%02d/%04d\n", card->cid.month, card->cid.year);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sd.c:687:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
MMC_DEV_ATTR(date, "%02d/%04d\n", card->cid.month, card->cid.year);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sd.c:688:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
MMC_DEV_ATTR(erase_size, "%u\n", card->erase_size << 9);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sd.c:688:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
MMC_DEV_ATTR(erase_size, "%u\n", card->erase_size << 9);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sd.c:689:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
MMC_DEV_ATTR(preferred_erase_size, "%u\n", card->pref_erase << 9);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sd.c:689:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
MMC_DEV_ATTR(preferred_erase_size, "%u\n", card->pref_erase << 9);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sd.c:690:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
MMC_DEV_ATTR(fwrev, "0x%x\n", card->cid.fwrev);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sd.c:690:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
MMC_DEV_ATTR(fwrev, "0x%x\n", card->cid.fwrev);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sd.c:691:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
MMC_DEV_ATTR(hwrev, "0x%x\n", card->cid.hwrev);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sd.c:691:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
MMC_DEV_ATTR(hwrev, "0x%x\n", card->cid.hwrev);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sd.c:692:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
MMC_DEV_ATTR(manfid, "0x%06x\n", card->cid.manfid);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sd.c:692:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
MMC_DEV_ATTR(manfid, "0x%06x\n", card->cid.manfid);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
>> drivers/mmc/core/sd.c:693:1: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
MMC_DEV_ATTR(name, "%s\n", card->cid.prod_name);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sd.c:693:1: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
MMC_DEV_ATTR(name, "%s\n", card->cid.prod_name);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sd.c:694:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
MMC_DEV_ATTR(oemid, "0x%04x\n", card->cid.oemid);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sd.c:694:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
MMC_DEV_ATTR(oemid, "0x%04x\n", card->cid.oemid);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sd.c:695:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
MMC_DEV_ATTR(serial, "0x%08x\n", card->cid.serial);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sd.c:695:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
MMC_DEV_ATTR(serial, "0x%08x\n", card->cid.serial);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sd.c:696:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
MMC_DEV_ATTR(ocr, "0x%08x\n", card->ocr);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sd.c:696:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
MMC_DEV_ATTR(ocr, "0x%08x\n", card->ocr);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sd.c:697:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
MMC_DEV_ATTR(rca, "0x%04x\n", card->rca);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sd.c:697:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
MMC_DEV_ATTR(rca, "0x%04x\n", card->rca);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sd.c:708:23: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "0x%x\n", host->dsr);
^~~~~~~
drivers/mmc/core/sd.c:708:23: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "0x%x\n", host->dsr);
^~~~~~~
drivers/mmc/core/sd.c:711:23: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "0x%x\n", 0x404);
^~~~~~~
drivers/mmc/core/sd.c:711:23: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "0x%x\n", 0x404);
^~~~~~~
drivers/mmc/core/sd.c:716:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
MMC_DEV_ATTR(vendor, "0x%04x\n", card->cis.vendor);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sd.c:716:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
MMC_DEV_ATTR(vendor, "0x%04x\n", card->cis.vendor);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sd.c:717:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
MMC_DEV_ATTR(device, "0x%04x\n", card->cis.device);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sd.c:717:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
MMC_DEV_ATTR(device, "0x%04x\n", card->cis.device);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sd.c:718:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
MMC_DEV_ATTR(revision, "%u.%u\n", card->major_rev, card->minor_rev);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
--
^~~~~~~
drivers/nvme/host/core.c:3442:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%8ph\n", dev_to_ns_head(dev)->ids.eui64);
^~~~~~~
drivers/nvme/host/core.c:3449:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", dev_to_ns_head(dev)->ns_id);
^~~~~~~
drivers/nvme/host/core.c:3449:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", dev_to_ns_head(dev)->ns_id);
^~~~~~~
drivers/nvme/host/core.c:3519:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
nvme_show_str_function(model);
^
drivers/nvme/host/core.c:3514:16: note: expanded from macro 'nvme_show_str_function'
return sprintf(buf, "%.*s\n", \
^~~~~~~
drivers/nvme/host/core.c:3519:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
nvme_show_str_function(model);
^
drivers/nvme/host/core.c:3514:16: note: expanded from macro 'nvme_show_str_function'
return sprintf(buf, "%.*s\n", \
^~~~~~~
drivers/nvme/host/core.c:3520:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
nvme_show_str_function(serial);
^
drivers/nvme/host/core.c:3514:16: note: expanded from macro 'nvme_show_str_function'
return sprintf(buf, "%.*s\n", \
^~~~~~~
drivers/nvme/host/core.c:3520:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
nvme_show_str_function(serial);
^
drivers/nvme/host/core.c:3514:16: note: expanded from macro 'nvme_show_str_function'
return sprintf(buf, "%.*s\n", \
^~~~~~~
drivers/nvme/host/core.c:3521:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
nvme_show_str_function(firmware_rev);
^
drivers/nvme/host/core.c:3514:16: note: expanded from macro 'nvme_show_str_function'
return sprintf(buf, "%.*s\n", \
^~~~~~~
drivers/nvme/host/core.c:3521:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
nvme_show_str_function(firmware_rev);
^
drivers/nvme/host/core.c:3514:16: note: expanded from macro 'nvme_show_str_function'
return sprintf(buf, "%.*s\n", \
^~~~~~~
drivers/nvme/host/core.c:3532:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
nvme_show_int_function(cntlid);
^
drivers/nvme/host/core.c:3528:16: note: expanded from macro 'nvme_show_int_function'
return sprintf(buf, "%d\n", ctrl->field); \
^~~~~~~
drivers/nvme/host/core.c:3532:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
nvme_show_int_function(cntlid);
^
drivers/nvme/host/core.c:3528:16: note: expanded from macro 'nvme_show_int_function'
return sprintf(buf, "%d\n", ctrl->field); \
^~~~~~~
drivers/nvme/host/core.c:3533:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
nvme_show_int_function(numa_node);
^
drivers/nvme/host/core.c:3528:16: note: expanded from macro 'nvme_show_int_function'
return sprintf(buf, "%d\n", ctrl->field); \
^~~~~~~
drivers/nvme/host/core.c:3533:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
nvme_show_int_function(numa_node);
^
drivers/nvme/host/core.c:3528:16: note: expanded from macro 'nvme_show_int_function'
return sprintf(buf, "%d\n", ctrl->field); \
^~~~~~~
drivers/nvme/host/core.c:3534:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
nvme_show_int_function(queue_count);
^
drivers/nvme/host/core.c:3528:16: note: expanded from macro 'nvme_show_int_function'
return sprintf(buf, "%d\n", ctrl->field); \
^~~~~~~
drivers/nvme/host/core.c:3534:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
nvme_show_int_function(queue_count);
^
drivers/nvme/host/core.c:3528:16: note: expanded from macro 'nvme_show_int_function'
return sprintf(buf, "%d\n", ctrl->field); \
^~~~~~~
drivers/nvme/host/core.c:3535:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
nvme_show_int_function(sqsize);
^
drivers/nvme/host/core.c:3528:16: note: expanded from macro 'nvme_show_int_function'
return sprintf(buf, "%d\n", ctrl->field); \
^~~~~~~
drivers/nvme/host/core.c:3535:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
nvme_show_int_function(sqsize);
^
drivers/nvme/host/core.c:3528:16: note: expanded from macro 'nvme_show_int_function'
return sprintf(buf, "%d\n", ctrl->field); \
^~~~~~~
drivers/nvme/host/core.c:3555:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(buf, PAGE_SIZE, "%s\n", ctrl->ops->name);
^~~~~~~~
drivers/nvme/host/core.c:3555:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(buf, PAGE_SIZE, "%s\n", ctrl->ops->name);
^~~~~~~~
>> drivers/nvme/host/core.c:3576:10: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", state_name[ctrl->state]);
^~~~~~~
drivers/nvme/host/core.c:3576:10: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", state_name[ctrl->state]);
^~~~~~~
drivers/nvme/host/core.c:3578:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "unknown state\n");
^~~~~~~
drivers/nvme/host/core.c:3578:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "unknown state\n");
^~~~~~~
drivers/nvme/host/core.c:3589:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(buf, PAGE_SIZE, "%s\n", ctrl->subsys->subnqn);
^~~~~~~~
drivers/nvme/host/core.c:3589:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(buf, PAGE_SIZE, "%s\n", ctrl->subsys->subnqn);
^~~~~~~~
drivers/nvme/host/core.c:3599:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(buf, PAGE_SIZE, "%s\n", ctrl->opts->host->nqn);
^~~~~~~~
drivers/nvme/host/core.c:3599:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(buf, PAGE_SIZE, "%s\n", ctrl->opts->host->nqn);
^~~~~~~~
drivers/nvme/host/core.c:3609:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(buf, PAGE_SIZE, "%pU\n", &ctrl->opts->host->id);
^~~~~~~~
drivers/nvme/host/core.c:3609:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(buf, PAGE_SIZE, "%pU\n", &ctrl->opts->host->id);
^~~~~~~~
drivers/nvme/host/core.c:3630:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "off\n");
^~~~~~~
drivers/nvme/host/core.c:3630:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "off\n");
^~~~~~~
drivers/nvme/host/core.c:3631:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n",
^~~~~~~
drivers/nvme/host/core.c:3631:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n",
^~~~~~~
drivers/nvme/host/core.c:3662:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "off\n");
^~~~~~~
drivers/nvme/host/core.c:3662:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "off\n");
^~~~~~~
drivers/nvme/host/core.c:3663:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", ctrl->opts->reconnect_delay);
^~~~~~~
drivers/nvme/host/core.c:3663:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", ctrl->opts->reconnect_delay);
^~~~~~~
drivers/nvme/host/core.c:3952:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(disk->disk_name, disk_name, DISK_NAME_LEN);
^~~~~~
drivers/nvme/host/core.c:3952:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(disk->disk_name, disk_name, DISK_NAME_LEN);
^~~~~~
drivers/nvme/host/core.c:4558:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&ctrl->ka_cmd, 0, sizeof(ctrl->ka_cmd));
^~~~~~
drivers/nvme/host/core.c:4558:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&ctrl->ka_cmd, 0, sizeof(ctrl->ka_cmd));
^~~~~~
Suppressed 76 warnings (76 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
99 warnings generated.
net/can/isotp.c:214:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ncf->data, so->opt.txpad_content, CAN_MAX_DLEN);
^~~~~~
net/can/isotp.c:214:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(ncf->data, so->opt.txpad_content, CAN_MAX_DLEN);
^~~~~~
net/can/isotp.c:253:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(addr, 0, sizeof(*addr));
^~~~~~
net/can/isotp.c:253:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(addr, 0, sizeof(*addr));
^~~~~~
net/can/isotp.c:434:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(skb_put(nskb, len), &cf->data[pcilen], len);
^~~~~~
net/can/isotp.c:434:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(skb_put(nskb, len), &cf->data[pcilen], len);
^~~~~~
net/can/isotp.c:573:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(skb_put(nskb, so->rx.len), so->rx.buf,
^~~~~~
net/can/isotp.c:573:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(skb_put(nskb, so->rx.len), so->rx.buf,
^~~~~~
net/can/isotp.c:700:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(cf->data, so->opt.txpad_content, cf->len);
^~~~~~
net/can/isotp.c:700:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(cf->data, so->opt.txpad_content, cf->len);
^~~~~~
net/can/isotp.c:704:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(cf->data, CAN_ISOTP_DEFAULT_PAD_CONTENT,
--
__compiletime_assert(condition, msg, prefix, suffix)
^
include/linux/compiler_types.h:293:2: note: expanded from macro '__compiletime_assert'
do { \
^
net/sched/cls_fw.c:293:32: note: Assuming the condition is false
RCU_INIT_POINTER(fnew->next, rtnl_dereference(pfp->next));
^
include/linux/rtnetlink.h:81:2: note: expanded from macro 'rtnl_dereference'
rcu_dereference_protected(p, lockdep_rtnl_is_held())
^
include/linux/rcupdate.h:557:2: note: expanded from macro 'rcu_dereference_protected'
__rcu_dereference_protected((p), (c), __rcu)
^
include/linux/rcupdate.h:376:19: note: expanded from macro '__rcu_dereference_protected'
RCU_LOCKDEP_WARN(!(c), "suspicious rcu_dereference_protected() usage"); \
^
note: (skipping 2 expansions in backtrace; use -fmacro-backtrace-limit=0 to see all)
include/linux/rcupdate.h:391:59: note: expanded from macro 'RCU_INITIALIZER'
#define RCU_INITIALIZER(v) (typeof(*(v)) __force __rcu *)(v)
^
include/asm-generic/rwonce.h:61:18: note: expanded from macro 'WRITE_ONCE'
__WRITE_ONCE(x, val); \
~~~~~~~~~~~~~~~~^~~~
include/asm-generic/rwonce.h:55:33: note: expanded from macro '__WRITE_ONCE'
*(volatile typeof(x) *)&(x) = (val); \
^~~
net/sched/cls_fw.c:293:32: note: Left side of '&&' is false
RCU_INIT_POINTER(fnew->next, rtnl_dereference(pfp->next));
^
include/linux/rtnetlink.h:81:2: note: expanded from macro 'rtnl_dereference'
rcu_dereference_protected(p, lockdep_rtnl_is_held())
^
include/linux/rcupdate.h:557:2: note: expanded from macro 'rcu_dereference_protected'
__rcu_dereference_protected((p), (c), __rcu)
^
include/linux/rcupdate.h:376:2: note: expanded from macro '__rcu_dereference_protected'
RCU_LOCKDEP_WARN(!(c), "suspicious rcu_dereference_protected() usage"); \
^
include/linux/rcupdate.h:313:11: note: expanded from macro 'RCU_LOCKDEP_WARN'
if ((c) && debug_lockdep_rcu_enabled() && !__warned) { \
^
net/sched/cls_fw.c:293:32: note: Loop condition is false. Exiting loop
RCU_INIT_POINTER(fnew->next, rtnl_dereference(pfp->next));
^
include/linux/rtnetlink.h:81:2: note: expanded from macro 'rtnl_dereference'
rcu_dereference_protected(p, lockdep_rtnl_is_held())
^
include/linux/rcupdate.h:557:2: note: expanded from macro 'rcu_dereference_protected'
__rcu_dereference_protected((p), (c), __rcu)
^
include/linux/rcupdate.h:376:2: note: expanded from macro '__rcu_dereference_protected'
RCU_LOCKDEP_WARN(!(c), "suspicious rcu_dereference_protected() usage"); \
^
include/linux/rcupdate.h:311:2: note: expanded from macro 'RCU_LOCKDEP_WARN'
do { \
^
net/sched/cls_fw.c:293:32: note: Access to field 'next' results in a dereference of a null pointer (loaded from variable 'pfp')
RCU_INIT_POINTER(fnew->next, rtnl_dereference(pfp->next));
^
include/linux/rtnetlink.h:81:2: note: expanded from macro 'rtnl_dereference'
rcu_dereference_protected(p, lockdep_rtnl_is_held())
^ ~
include/linux/rcupdate.h:557:2: note: expanded from macro 'rcu_dereference_protected'
__rcu_dereference_protected((p), (c), __rcu)
^ ~
include/linux/rcupdate.h:378:34: note: expanded from macro '__rcu_dereference_protected'
((typeof(*p) __force __kernel *)(p)); \
^~
note: (skipping 1 expansions in backtrace; use -fmacro-backtrace-limit=0 to see all)
include/linux/rcupdate.h:391:59: note: expanded from macro 'RCU_INITIALIZER'
#define RCU_INITIALIZER(v) (typeof(*(v)) __force __rcu *)(v)
^
include/asm-generic/rwonce.h:61:18: note: expanded from macro 'WRITE_ONCE'
__WRITE_ONCE(x, val); \
^~~
include/asm-generic/rwonce.h:55:33: note: expanded from macro '__WRITE_ONCE'
*(volatile typeof(x) *)&(x) = (val); \
^~~
Suppressed 77 warnings (77 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
98 warnings generated.
net/mac80211/rc80211_minstrel_debugfs.c:71:7: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
p += sprintf(p, "\n");
^~~~~~~
net/mac80211/rc80211_minstrel_debugfs.c:71:7: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
p += sprintf(p, "\n");
^~~~~~~
net/mac80211/rc80211_minstrel_debugfs.c:72:7: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
p += sprintf(p,
^~~~~~~
net/mac80211/rc80211_minstrel_debugfs.c:72:7: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
p += sprintf(p,
^~~~~~~
net/mac80211/rc80211_minstrel_debugfs.c:74:7: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
p += sprintf(p,
^~~~~~~
net/mac80211/rc80211_minstrel_debugfs.c:74:7: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
p += sprintf(p,
^~~~~~~
>> net/mac80211/rc80211_minstrel_debugfs.c:87:8: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
p += sprintf(p, " %3u%s ", mr->bitrate / 2,
^~~~~~~
net/mac80211/rc80211_minstrel_debugfs.c:87:8: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
p += sprintf(p, " %3u%s ", mr->bitrate / 2,
^~~~~~~
net/mac80211/rc80211_minstrel_debugfs.c:89:8: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
p += sprintf(p, "%3u ", i);
^~~~~~~
net/mac80211/rc80211_minstrel_debugfs.c:89:8: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
p += sprintf(p, "%3u ", i);
^~~~~~~
net/mac80211/rc80211_minstrel_debugfs.c:90:8: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
p += sprintf(p, "%6u ", mr->perfect_tx_time);
^~~~~~~
net/mac80211/rc80211_minstrel_debugfs.c:90:8: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
p += sprintf(p, "%6u ", mr->perfect_tx_time);
^~~~~~~
net/mac80211/rc80211_minstrel_debugfs.c:96:8: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
p += sprintf(p, "%4u.%1u %4u.%1u %3u.%1u"
^~~~~~~
net/mac80211/rc80211_minstrel_debugfs.c:96:8: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
p += sprintf(p, "%4u.%1u %4u.%1u %3u.%1u"
^~~~~~~
net/mac80211/rc80211_minstrel_debugfs.c:108:7: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
p += sprintf(p, "\nTotal packet count:: ideal %d "
^~~~~~~
net/mac80211/rc80211_minstrel_debugfs.c:108:7: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
p += sprintf(p, "\nTotal packet count:: ideal %d "
^~~~~~~
net/mac80211/rc80211_minstrel_debugfs.c:138:8: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
p += sprintf(p, "%s" ,((i == mi->max_tp_rate[0]) ? "A" : ""));
^~~~~~~
net/mac80211/rc80211_minstrel_debugfs.c:138:8: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
p += sprintf(p, "%s" ,((i == mi->max_tp_rate[0]) ? "A" : ""));
^~~~~~~
net/mac80211/rc80211_minstrel_debugfs.c:139:8: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
p += sprintf(p, "%s" ,((i == mi->max_tp_rate[1]) ? "B" : ""));
^~~~~~~
net/mac80211/rc80211_minstrel_debugfs.c:139:8: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
p += sprintf(p, "%s" ,((i == mi->max_tp_rate[1]) ? "B" : ""));
^~~~~~~
net/mac80211/rc80211_minstrel_debugfs.c:140:8: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
p += sprintf(p, "%s" ,((i == mi->max_tp_rate[2]) ? "C" : ""));
^~~~~~~
net/mac80211/rc80211_minstrel_debugfs.c:140:8: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
p += sprintf(p, "%s" ,((i == mi->max_tp_rate[2]) ? "C" : ""));
^~~~~~~
net/mac80211/rc80211_minstrel_debugfs.c:141:8: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
p += sprintf(p, "%s" ,((i == mi->max_tp_rate[3]) ? "D" : ""));
^~~~~~~
net/mac80211/rc80211_minstrel_debugfs.c:141:8: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
p += sprintf(p, "%s" ,((i == mi->max_tp_rate[3]) ? "D" : ""));
^~~~~~~
net/mac80211/rc80211_minstrel_debugfs.c:142:8: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
p += sprintf(p, "%s" ,((i == mi->max_prob_rate) ? "P" : ""));
^~~~~~~
net/mac80211/rc80211_minstrel_debugfs.c:142:8: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
p += sprintf(p, "%s" ,((i == mi->max_prob_rate) ? "P" : ""));
^~~~~~~
net/mac80211/rc80211_minstrel_debugfs.c:144:8: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
p += sprintf(p, ",%u%s", mr->bitrate / 2,
^~~~~~~
net/mac80211/rc80211_minstrel_debugfs.c:144:8: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
p += sprintf(p, ",%u%s", mr->bitrate / 2,
^~~~~~~
net/mac80211/rc80211_minstrel_debugfs.c:146:8: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
p += sprintf(p, "%u,", i);
^~~~~~~
net/mac80211/rc80211_minstrel_debugfs.c:146:8: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
p += sprintf(p, "%u,", i);
^~~~~~~
net/mac80211/rc80211_minstrel_debugfs.c:147:8: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
p += sprintf(p, "%u,",mr->perfect_tx_time);
^~~~~~~
net/mac80211/rc80211_minstrel_debugfs.c:147:8: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
p += sprintf(p, "%u,",mr->perfect_tx_time);
^~~~~~~
net/mac80211/rc80211_minstrel_debugfs.c:153:8: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
p += sprintf(p, "%u.%u,%u.%u,%u.%u,%u,%u,%u,"
^~~~~~~
net/mac80211/rc80211_minstrel_debugfs.c:153:8: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
p += sprintf(p, "%u.%u,%u.%u,%u.%u,%u,%u,%u,"
^~~~~~~
Suppressed 81 warnings (81 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
112 warnings generated.
drivers/net/wireless/ath/ath11k/mac.c:569:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&arvif_iter, 0, sizeof(struct ath11k_vif_iter));
^~~~~~
drivers/net/wireless/ath/ath11k/mac.c:569:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&arvif_iter, 0, sizeof(struct ath11k_vif_iter));
^~~~~~
drivers/net/wireless/ath/ath11k/mac.c:1935:27: warning: Although the value stored to 'vht_mcs' is used in the enclosing expression, the value is never actually read from 'vht_mcs' [clang-analyzer-deadcode.DeadStores]
for (i = 0, max_nss = 0, vht_mcs = 0; i < NL80211_VHT_NSS_MAX; i++) {
^ ~
drivers/net/wireless/ath/ath11k/mac.c:1935:27: note: Although the value stored to 'vht_mcs' is used in the enclosing expression, the value is never actually read from 'vht_mcs'
for (i = 0, max_nss = 0, vht_mcs = 0; i < NL80211_VHT_NSS_MAX; i++) {
^ ~
drivers/net/wireless/ath/ath11k/mac.c:2256:27: warning: Although the value stored to 'he_mcs' is used in the enclosing expression, the value is never actually read from 'he_mcs' [clang-analyzer-deadcode.DeadStores]
for (i = 0, max_nss = 0, he_mcs = 0; i < NL80211_HE_NSS_MAX; i++) {
vim +2190 block/genhd.c
77ea887e433ad8 Tejun Heo 2010-12-08 2172
77ea887e433ad8 Tejun Heo 2010-12-08 2173 /*
77ea887e433ad8 Tejun Heo 2010-12-08 2174 * A disk events enabled device has the following sysfs nodes under
77ea887e433ad8 Tejun Heo 2010-12-08 2175 * its /sys/block/X/ directory.
77ea887e433ad8 Tejun Heo 2010-12-08 2176 *
77ea887e433ad8 Tejun Heo 2010-12-08 2177 * events : list of all supported events
77ea887e433ad8 Tejun Heo 2010-12-08 2178 * events_async : list of events which can be detected w/o polling
673387a930059f Martin Wilck 2019-03-27 2179 * (always empty, only for backwards compatibility)
77ea887e433ad8 Tejun Heo 2010-12-08 2180 * events_poll_msecs : polling interval, 0: disable, -1: system default
77ea887e433ad8 Tejun Heo 2010-12-08 2181 */
77ea887e433ad8 Tejun Heo 2010-12-08 2182 static ssize_t __disk_events_show(unsigned int events, char *buf)
77ea887e433ad8 Tejun Heo 2010-12-08 2183 {
77ea887e433ad8 Tejun Heo 2010-12-08 2184 const char *delim = "";
77ea887e433ad8 Tejun Heo 2010-12-08 2185 ssize_t pos = 0;
77ea887e433ad8 Tejun Heo 2010-12-08 2186 int i;
77ea887e433ad8 Tejun Heo 2010-12-08 2187
77ea887e433ad8 Tejun Heo 2010-12-08 2188 for (i = 0; i < ARRAY_SIZE(disk_events_strs); i++)
77ea887e433ad8 Tejun Heo 2010-12-08 2189 if (events & (1 << i)) {
77ea887e433ad8 Tejun Heo 2010-12-08 @2190 pos += sprintf(buf + pos, "%s%s",
77ea887e433ad8 Tejun Heo 2010-12-08 2191 delim, disk_events_strs[i]);
77ea887e433ad8 Tejun Heo 2010-12-08 2192 delim = " ";
77ea887e433ad8 Tejun Heo 2010-12-08 2193 }
77ea887e433ad8 Tejun Heo 2010-12-08 2194 if (pos)
77ea887e433ad8 Tejun Heo 2010-12-08 2195 pos += sprintf(buf + pos, "\n");
77ea887e433ad8 Tejun Heo 2010-12-08 2196 return pos;
77ea887e433ad8 Tejun Heo 2010-12-08 2197 }
77ea887e433ad8 Tejun Heo 2010-12-08 2198
:::::: The code@line 2190 was first introduced by commit
:::::: 77ea887e433ad8389d416826936c110fa7910f80 implement in-kernel gendisk events handling
:::::: TO: Tejun Heo <tj@kernel.org>
:::::: CC: Jens Axboe <jaxboe@fusionio.com>
--
0-DAY CI Kernel Test Service
https://01.org/lkp
^ permalink raw reply [flat|nested] 2+ messages in thread
* [chrome-os:chromeos-5.10 25/29] block/genhd.c:2190:11: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides bound...
@ 2022-05-27 3:30 kernel test robot
0 siblings, 0 replies; 2+ messages in thread
From: kernel test robot @ 2022-05-27 3:30 UTC (permalink / raw)
To: kbuild
[-- Attachment #1: Type: text/plain, Size: 322965 bytes --]
CC: kbuild-all(a)lists.01.org
BCC: lkp(a)intel.com
TO: cros-kernel-buildreports(a)googlegroups.com
TO: Guenter Roeck <groeck@google.com>
tree: https://chromium.googlesource.com/chromiumos/third_party/kernel chromeos-5.10
head: 880450147e4114ab7c1fc98df8a5a6a77c9261f0
commit: 56f22b8f6853d26be82709a978e89db6856af6b4 [25/29] BACKPORT: Kbuild: move to -std=gnu11
:::::: branch date: 3 hours ago
:::::: commit date: 9 days ago
config: arm-randconfig-c002-20220524 (https://download.01.org/0day-ci/archive/20220527/202205271128.jSOqZpkl-lkp(a)intel.com/config)
compiler: clang version 15.0.0 (https://github.com/llvm/llvm-project 6f4644d194da594562027a5d458d9fb7a20ebc39)
reproduce (this is a W=1 build):
wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross
chmod +x ~/bin/make.cross
# install arm cross compiling tool for clang build
# apt-get install binutils-arm-linux-gnueabi
git remote add chrome-os https://chromium.googlesource.com/chromiumos/third_party/kernel
git fetch --no-tags chrome-os chromeos-5.10
git checkout 56f22b8f6853d26be82709a978e89db6856af6b4
# save the config file
COMPILER_INSTALL_PATH=$HOME/0day COMPILER=clang make.cross ARCH=arm clang-analyzer
If you fix the issue, kindly add following tag where applicable
Reported-by: kernel test robot <lkp@intel.com>
clang-analyzer warnings: (new ones prefixed by >>)
^~~~~~~~
block/genhd.c:84:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(buf, BDEVNAME_SIZE, "%s%d", hd->disk_name, partno);
^~~~~~~~
block/genhd.c:99:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(stat, 0, sizeof(struct disk_stats));
^~~~~~
block/genhd.c:99:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(stat, 0, sizeof(struct disk_stats));
^~~~~~
block/genhd.c:637:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(tbuf, BDEVT_SIZE, "%02x%02x", MAJOR(devt), MINOR(devt));
^~~~~~~~
block/genhd.c:637:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(tbuf, BDEVT_SIZE, "%02x%02x", MAJOR(devt), MINOR(devt));
^~~~~~~~
block/genhd.c:638:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(buf, BDEVT_SIZE, "%-9s", tbuf);
^~~~~~~~
block/genhd.c:638:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(buf, BDEVT_SIZE, "%-9s", tbuf);
^~~~~~~~
block/genhd.c:640:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(buf, BDEVT_SIZE, "%03x:%05x", MAJOR(devt), MINOR(devt));
^~~~~~~~
block/genhd.c:640:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(buf, BDEVT_SIZE, "%03x:%05x", MAJOR(devt), MINOR(devt));
^~~~~~~~
block/genhd.c:965:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(page, "\n");
^~~~~~~
block/genhd.c:965:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(page, "\n");
^~~~~~~
block/genhd.c:1242:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", disk->minors);
^~~~~~~
block/genhd.c:1242:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", disk->minors);
^~~~~~~
block/genhd.c:1250:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", disk_max_parts(disk));
^~~~~~~
block/genhd.c:1250:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", disk_max_parts(disk));
^~~~~~~
block/genhd.c:1258:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n",
^~~~~~~
block/genhd.c:1258:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n",
^~~~~~~
block/genhd.c:1267:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n",
^~~~~~~
block/genhd.c:1267:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n",
^~~~~~~
block/genhd.c:1276:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", get_disk_ro(disk) ? 1 : 0);
^~~~~~~
block/genhd.c:1276:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", get_disk_ro(disk) ? 1 : 0);
^~~~~~~
block/genhd.c:1284:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%llu\n",
^~~~~~~
block/genhd.c:1284:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%llu\n",
^~~~~~~
block/genhd.c:1302:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf,
^~~~~~~
block/genhd.c:1302:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf,
^~~~~~~
block/genhd.c:1344:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%8u %8u\n", inflight[0], inflight[1]);
^~~~~~~
block/genhd.c:1344:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%8u %8u\n", inflight[0], inflight[1]);
^~~~~~~
block/genhd.c:1352:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%x\n", disk->flags);
^~~~~~~
block/genhd.c:1352:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%x\n", disk->flags);
^~~~~~~
block/genhd.c:1361:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", queue_alignment_offset(disk->queue));
^~~~~~~
block/genhd.c:1361:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", queue_alignment_offset(disk->queue));
^~~~~~~
block/genhd.c:1370:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", queue_discard_alignment(disk->queue));
^~~~~~~
block/genhd.c:1370:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", queue_discard_alignment(disk->queue));
^~~~~~~
>> block/genhd.c:2190:11: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
pos += sprintf(buf + pos, "%s%s",
^~~~~~~
block/genhd.c:2190:11: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
pos += sprintf(buf + pos, "%s%s",
^~~~~~~
block/genhd.c:2195:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
pos += sprintf(buf + pos, "\n");
^~~~~~~
block/genhd.c:2195:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
pos += sprintf(buf + pos, "\n");
^~~~~~~
block/genhd.c:2223:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "-1\n");
^~~~~~~
block/genhd.c:2223:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "-1\n");
^~~~~~~
block/genhd.c:2225:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%ld\n", disk->ev->poll_msecs);
^~~~~~~
block/genhd.c:2225:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%ld\n", disk->ev->poll_msecs);
^~~~~~~
block/genhd.c:2235:17: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (!count || !sscanf(buf, "%ld", &intv))
^~~~~~
block/genhd.c:2235:17: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (!count || !sscanf(buf, "%ld", &intv))
^~~~~~
Suppressed 45 warnings (45 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
33 warnings generated.
Suppressed 33 warnings (33 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
fs/statfs.c:62:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buf, 0, sizeof(*buf));
^~~~~~
fs/statfs.c:62:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(buf, 0, sizeof(*buf));
^~~~~~
fs/statfs.c:131:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&buf, st, sizeof(*st));
^~~~~~
fs/statfs.c:131:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&buf, st, sizeof(*st));
^~~~~~
fs/statfs.c:161:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buf.f_spare, 0, sizeof(buf.f_spare));
^~~~~~
fs/statfs.c:161:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(buf.f_spare, 0, sizeof(buf.f_spare));
^~~~~~
fs/statfs.c:172:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&buf, st, sizeof(*st));
^~~~~~
fs/statfs.c:172:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&buf, st, sizeof(*st));
^~~~~~
fs/statfs.c:185:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buf.f_spare, 0, sizeof(buf.f_spare));
^~~~~~
fs/statfs.c:185:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(buf.f_spare, 0, sizeof(buf.f_spare));
^~~~~~
fs/statfs.c:256:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&tmp,0,sizeof(struct ustat));
^~~~~~
fs/statfs.c:256:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&tmp,0,sizeof(struct ustat));
^~~~~~
Suppressed 37 warnings (37 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
fs/xfs/libxfs/xfs_defer.c:410:40: warning: Array subscript is undefined [clang-analyzer-core.uninitialized.ArraySubscript]
const struct xfs_defer_op_type *ops = defer_op_types[dfp->dfp_type];
^
fs/xfs/libxfs/xfs_defer.c:521:10: note: Calling 'xfs_defer_finish_noroll'
error = xfs_defer_finish_noroll(tp);
^~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/xfs/libxfs/xfs_defer.c:465:2: note: Assuming the condition is false
ASSERT((*tp)->t_flags & XFS_TRANS_PERM_LOG_RES);
^
fs/xfs/xfs_linux.h:213:3: note: expanded from macro 'ASSERT'
(likely(expr) ? (void)0 : asswarn(NULL, #expr, __FILE__, __LINE__))
^~~~~~~~~~~~
include/linux/compiler.h:77:38: note: expanded from macro 'likely'
# define likely(x) __builtin_expect(!!(x), 1)
^~~~
fs/xfs/libxfs/xfs_defer.c:465:2: note: '?' condition is true
ASSERT((*tp)->t_flags & XFS_TRANS_PERM_LOG_RES);
^
fs/xfs/xfs_linux.h:213:3: note: expanded from macro 'ASSERT'
(likely(expr) ? (void)0 : asswarn(NULL, #expr, __FILE__, __LINE__))
^
include/linux/compiler.h:77:20: note: expanded from macro 'likely'
# define likely(x) __builtin_expect(!!(x), 1)
^
fs/xfs/libxfs/xfs_defer.c:470:9: note: Left side of '||' is false
while (!list_empty(&dop_pending) || !list_empty(&(*tp)->t_dfops)) {
--
drivers/nvme/target/configfs.c:1091:8: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
ret = snprintf(page, PAGE_SIZE, "%s\n", model);
^~~~~~~~
drivers/nvme/target/configfs.c:1129:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(new_model->number, new_model_number, len);
^~~~~~
drivers/nvme/target/configfs.c:1129:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(new_model->number, new_model_number, len);
^~~~~~
drivers/nvme/target/configfs.c:1243:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(page, PAGE_SIZE, "%d\n", to_nvmet_port(item)->enabled);
^~~~~~~~
drivers/nvme/target/configfs.c:1243:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(page, PAGE_SIZE, "%d\n", to_nvmet_port(item)->enabled);
^~~~~~~~
drivers/nvme/target/configfs.c:1351:11: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(page, "%s\n", nvmet_ana_state[i].name);
^~~~~~~
drivers/nvme/target/configfs.c:1351:11: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(page, "%s\n", nvmet_ana_state[i].name);
^~~~~~~
drivers/nvme/target/configfs.c:1354:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(page, "\n");
^~~~~~~
drivers/nvme/target/configfs.c:1354:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(page, "\n");
^~~~~~~
Suppressed 41 warnings (41 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
arch/arm/kernel/module-plts.c:48:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(plt->lit, fixed_plts, sizeof(fixed_plts));
^~~~~~
arch/arm/kernel/module-plts.c:48:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(plt->lit, fixed_plts, sizeof(fixed_plts));
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
Suppressed 35 warnings (34 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
14 warnings generated.
Suppressed 14 warnings (11 in non-user code, 3 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
arch/arm/kernel/devtree.c:250:6: warning: Access to field 'dt_fixup' results in a dereference of a null pointer (loaded from variable 'mdesc') [clang-analyzer-core.NullDereference]
if (mdesc->dt_fixup)
^~~~~
arch/arm/kernel/devtree.c:224:6: note: Assuming 'dt_virt' is non-null
if (!dt_virt || !early_init_dt_verify(dt_virt))
^~~~~~~~
arch/arm/kernel/devtree.c:224:6: note: Left side of '||' is false
arch/arm/kernel/devtree.c:224:18: note: Assuming the condition is false
if (!dt_virt || !early_init_dt_verify(dt_virt))
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
arch/arm/kernel/devtree.c:224:2: note: Taking false branch
if (!dt_virt || !early_init_dt_verify(dt_virt))
^
arch/arm/kernel/devtree.c:227:2: note: Value assigned to 'mdesc'
mdesc = of_flat_dt_match_machine(mdesc_best, arch_get_next_mach);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
arch/arm/kernel/devtree.c:229:6: note: Assuming 'mdesc' is null
if (!mdesc) {
^~~~~~
arch/arm/kernel/devtree.c:229:2: note: Taking true branch
if (!mdesc) {
^
arch/arm/kernel/devtree.c:239:10: note: Assuming 'size' is <= 0
while (size > 0) {
^~~~~~~~
arch/arm/kernel/devtree.c:239:3: note: Loop condition is false. Execution continues on line 244
while (size > 0) {
^
arch/arm/kernel/devtree.c:250:6: note: Access to field 'dt_fixup' results in a dereference of a null pointer (loaded from variable 'mdesc')
if (mdesc->dt_fixup)
^~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
18 warnings generated.
Suppressed 18 warnings (18 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
16 warnings generated.
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
10 warnings generated.
Suppressed 10 warnings (10 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
18 warnings generated.
Suppressed 18 warnings (18 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
16 warnings generated.
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
16 warnings generated.
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
16 warnings generated.
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
40 warnings generated.
>> drivers/misc/uacce/uacce.c:303:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", uacce->api_ver);
^~~~~~~
drivers/misc/uacce/uacce.c:303:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", uacce->api_ver);
^~~~~~~
drivers/misc/uacce/uacce.c:311:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", uacce->flags);
^~~~~~~
drivers/misc/uacce/uacce.c:311:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", uacce->flags);
^~~~~~~
drivers/misc/uacce/uacce.c:323:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n",
^~~~~~~
drivers/misc/uacce/uacce.c:323:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n",
^~~~~~~
drivers/misc/uacce/uacce.c:332:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", uacce->algs);
^~~~~~~
drivers/misc/uacce/uacce.c:332:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", uacce->algs);
^~~~~~~
drivers/misc/uacce/uacce.c:340:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%lu\n",
^~~~~~~
drivers/misc/uacce/uacce.c:340:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%lu\n",
^~~~~~~
drivers/misc/uacce/uacce.c:349:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%lu\n",
^~~~~~~
drivers/misc/uacce/uacce.c:349:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%lu\n",
^~~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
37 warnings generated.
fs/pstore/ram_core.c:104:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(prz->ecc_info.par, 0,
^~~~~~
fs/pstore/ram_core.c:104:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(prz->ecc_info.par, 0,
^~~~~~
fs/pstore/ram_core.c:265:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = snprintf(str, len, ""
^~~~~~~~
fs/pstore/ram_core.c:265:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
ret = snprintf(str, len, ""
^~~~~~~~
fs/pstore/ram_core.c:269:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = snprintf(str, len, "\nNo errors detected\n");
^~~~~~~~
fs/pstore/ram_core.c:269:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
ret = snprintf(str, len, "\nNo errors detected\n");
^~~~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
fs/zonefs/super.c:742:16: warning: Assigned value is garbage or undefined [clang-analyzer-core.uninitialized.Assign]
iocb->ki_pos += size;
^
fs/zonefs/super.c:932:6: note: Assuming the condition is true
if (unlikely(IS_IMMUTABLE(inode)))
^
include/linux/compiler.h:78:40: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^~~~
fs/zonefs/super.c:932:2: note: Taking false branch
if (unlikely(IS_IMMUTABLE(inode)))
^
fs/zonefs/super.c:935:6: note: Assuming the condition is false
if (sb_rdonly(inode->i_sb))
^~~~~~~~~~~~~~~~~~~~~~
fs/zonefs/super.c:935:2: note: Taking false branch
if (sb_rdonly(inode->i_sb))
^
fs/zonefs/super.c:939:6: note: Assuming field 'ki_pos' is < field 'i_max_size'
if (iocb->ki_pos >= ZONEFS_I(inode)->i_max_size)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/zonefs/super.c:939:2: note: Taking false branch
if (iocb->ki_pos >= ZONEFS_I(inode)->i_max_size)
^
fs/zonefs/super.c:942:6: note: Assuming the condition is true
if (iocb->ki_flags & IOCB_DIRECT) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/zonefs/super.c:942:2: note: Taking true branch
if (iocb->ki_flags & IOCB_DIRECT) {
^
fs/zonefs/super.c:943:17: note: Calling 'zonefs_file_dio_write'
ssize_t ret = zonefs_file_dio_write(iocb, from);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/zonefs/super.c:835:6: note: Assuming field 'i_ztype' is not equal to ZONEFS_ZTYPE_SEQ
if (zi->i_ztype == ZONEFS_ZTYPE_SEQ && !sync &&
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/zonefs/super.c:835:38: note: Left side of '&&' is false
if (zi->i_ztype == ZONEFS_ZTYPE_SEQ && !sync &&
^
fs/zonefs/super.c:839:6: note: Assuming the condition is true
if (iocb->ki_flags & IOCB_NOWAIT) {
--
^~~~~~~
drivers/nvme/target/discovery.c:140:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(traddr, port->disc_addr.traddr, NVMF_TRADDR_SIZE);
^~~~~~
drivers/nvme/target/discovery.c:140:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(traddr, port->disc_addr.traddr, NVMF_TRADDR_SIZE);
^~~~~~
drivers/nvme/target/discovery.c:264:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(id->sn, ' ', sizeof(id->sn));
^~~~~~
drivers/nvme/target/discovery.c:264:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(id->sn, ' ', sizeof(id->sn));
^~~~~~
drivers/nvme/target/discovery.c:267:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(id->fr, ' ', sizeof(id->fr));
^~~~~~
drivers/nvme/target/discovery.c:267:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(id->fr, ' ', sizeof(id->fr));
^~~~~~
Suppressed 40 warnings (40 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
drivers/mfd/abx500-core.c:45:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&dev_entry->ops, ops, sizeof(*ops));
^~~~~~
drivers/mfd/abx500-core.c:45:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&dev_entry->ops, ops, sizeof(*ops));
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
19 warnings generated.
Suppressed 19 warnings (19 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
18 warnings generated.
Suppressed 18 warnings (18 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
18 warnings generated.
Suppressed 18 warnings (18 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
drivers/mmc/core/sdio_bus.c:42:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sdio_config_attr(class, "0x%02x\n", func->class);
^
drivers/mmc/core/sdio_bus.c:38:9: note: expanded from macro 'sdio_config_attr'
return sprintf(buf, format_string, args); \
^~~~~~~
drivers/mmc/core/sdio_bus.c:42:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sdio_config_attr(class, "0x%02x\n", func->class);
^
drivers/mmc/core/sdio_bus.c:38:9: note: expanded from macro 'sdio_config_attr'
return sprintf(buf, format_string, args); \
^~~~~~~
drivers/mmc/core/sdio_bus.c:43:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sdio_config_attr(vendor, "0x%04x\n", func->vendor);
^
drivers/mmc/core/sdio_bus.c:38:9: note: expanded from macro 'sdio_config_attr'
return sprintf(buf, format_string, args); \
^~~~~~~
drivers/mmc/core/sdio_bus.c:43:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sdio_config_attr(vendor, "0x%04x\n", func->vendor);
^
drivers/mmc/core/sdio_bus.c:38:9: note: expanded from macro 'sdio_config_attr'
return sprintf(buf, format_string, args); \
^~~~~~~
drivers/mmc/core/sdio_bus.c:44:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sdio_config_attr(device, "0x%04x\n", func->device);
^
drivers/mmc/core/sdio_bus.c:38:9: note: expanded from macro 'sdio_config_attr'
return sprintf(buf, format_string, args); \
^~~~~~~
drivers/mmc/core/sdio_bus.c:44:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sdio_config_attr(device, "0x%04x\n", func->device);
^
drivers/mmc/core/sdio_bus.c:38:9: note: expanded from macro 'sdio_config_attr'
return sprintf(buf, format_string, args); \
^~~~~~~
drivers/mmc/core/sdio_bus.c:45:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sdio_config_attr(revision, "%u.%u\n", func->major_rev, func->minor_rev);
^
drivers/mmc/core/sdio_bus.c:38:9: note: expanded from macro 'sdio_config_attr'
return sprintf(buf, format_string, args); \
^~~~~~~
drivers/mmc/core/sdio_bus.c:45:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sdio_config_attr(revision, "%u.%u\n", func->major_rev, func->minor_rev);
^
drivers/mmc/core/sdio_bus.c:38:9: note: expanded from macro 'sdio_config_attr'
return sprintf(buf, format_string, args); \
^~~~~~~
drivers/mmc/core/sdio_bus.c:46:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sdio_config_attr(modalias, "sdio:c%02Xv%04Xd%04X\n", func->class, func->vendor, func->device);
^
drivers/mmc/core/sdio_bus.c:38:9: note: expanded from macro 'sdio_config_attr'
return sprintf(buf, format_string, args); \
^~~~~~~
drivers/mmc/core/sdio_bus.c:46:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sdio_config_attr(modalias, "sdio:c%02Xv%04Xd%04X\n", func->class, func->vendor, func->device);
^
drivers/mmc/core/sdio_bus.c:38:9: note: expanded from macro 'sdio_config_attr'
return sprintf(buf, format_string, args); \
^~~~~~~
>> drivers/mmc/core/sdio_bus.c:61:1: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sdio_info_attr(1);
^
drivers/mmc/core/sdio_bus.c:57:9: note: expanded from macro 'sdio_info_attr'
return sprintf(buf, "%s\n", func->info[num-1]); \
^~~~~~~
drivers/mmc/core/sdio_bus.c:61:1: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sdio_info_attr(1);
^
drivers/mmc/core/sdio_bus.c:57:9: note: expanded from macro 'sdio_info_attr'
return sprintf(buf, "%s\n", func->info[num-1]); \
^~~~~~~
drivers/mmc/core/sdio_bus.c:62:1: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sdio_info_attr(2);
^
drivers/mmc/core/sdio_bus.c:57:9: note: expanded from macro 'sdio_info_attr'
return sprintf(buf, "%s\n", func->info[num-1]); \
^~~~~~~
drivers/mmc/core/sdio_bus.c:62:1: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sdio_info_attr(2);
^
drivers/mmc/core/sdio_bus.c:57:9: note: expanded from macro 'sdio_info_attr'
return sprintf(buf, "%s\n", func->info[num-1]); \
^~~~~~~
drivers/mmc/core/sdio_bus.c:63:1: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sdio_info_attr(3);
^
drivers/mmc/core/sdio_bus.c:57:9: note: expanded from macro 'sdio_info_attr'
return sprintf(buf, "%s\n", func->info[num-1]); \
^~~~~~~
drivers/mmc/core/sdio_bus.c:63:1: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sdio_info_attr(3);
^
drivers/mmc/core/sdio_bus.c:57:9: note: expanded from macro 'sdio_info_attr'
return sprintf(buf, "%s\n", func->info[num-1]); \
^~~~~~~
drivers/mmc/core/sdio_bus.c:64:1: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sdio_info_attr(4);
^
drivers/mmc/core/sdio_bus.c:57:9: note: expanded from macro 'sdio_info_attr'
return sprintf(buf, "%s\n", func->info[num-1]); \
^~~~~~~
drivers/mmc/core/sdio_bus.c:64:1: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sdio_info_attr(4);
^
drivers/mmc/core/sdio_bus.c:57:9: note: expanded from macro 'sdio_info_attr'
return sprintf(buf, "%s\n", func->info[num-1]); \
^~~~~~~
Suppressed 18 warnings (18 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
41 warnings generated.
lib/irq_poll.c:181:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(iop, 0, sizeof(*iop));
^~~~~~
lib/irq_poll.c:181:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(iop, 0, sizeof(*iop));
^~~~~~
Suppressed 40 warnings (40 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
Suppressed 45 warnings (43 in non-user code, 2 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
Suppressed 45 warnings (43 in non-user code, 2 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
security/keys/gc.c:366:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&key->payload, KEY_DESTROY, sizeof(key->payload));
^~~~~~
security/keys/gc.c:366:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&key->payload, KEY_DESTROY, sizeof(key->payload));
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
36 warnings generated.
kernel/resource.c:80:2: warning: The expression is an uninitialized value. The computed value will also be garbage [clang-analyzer-core.uninitialized.Assign]
(*pos)++;
^
kernel/resource.c:1610:2: note: 'l' declared without an initial value
loff_t l;
^~~~~~~~
kernel/resource.c:1612:2: note: Loop condition is false. Exiting loop
read_lock(&resource_lock);
^
include/linux/rwlock.h:71:26: note: expanded from macro 'read_lock'
#define read_lock(lock) _raw_read_lock(lock)
^
include/linux/spinlock_api_up.h:60:32: note: expanded from macro '_raw_read_lock'
#define _raw_read_lock(lock) __LOCK(lock)
--
kernel/sysctl.c:1496:4: note: Taking false branch
if ((left <= 1) && skipped) {
^
kernel/sysctl.c:1501:8: note: 'err' is 0
if (err)
^~~
kernel/sysctl.c:1501:4: note: Taking false branch
if (err)
^
kernel/sysctl.c:1503:8: note: Assuming 'val_a' is < 'bitmap_len'
if (val_a >= bitmap_len || neg) {
^~~~~~~~~~~~~~~~~~~
kernel/sysctl.c:1503:8: note: Left side of '||' is false
kernel/sysctl.c:1503:31: note: 'neg' is false
if (val_a >= bitmap_len || neg) {
^~~
kernel/sysctl.c:1503:4: note: Taking false branch
if (val_a >= bitmap_len || neg) {
^
kernel/sysctl.c:1509:8: note: Assuming 'left' is 0
if (left) {
^~~~
kernel/sysctl.c:1509:4: note: Taking false branch
if (left) {
^
kernel/sysctl.c:1514:10: note: The left operand of '==' is a garbage value
if (c == '-') {
~ ^
kernel/sysctl.c:1541:4: warning: Value stored to 'first' is never read [clang-analyzer-deadcode.DeadStores]
first = 0;
^ ~
kernel/sysctl.c:1541:4: note: Value stored to 'first' is never read
first = 0;
^ ~
Suppressed 92 warnings (90 in non-user code, 2 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
39 warnings generated.
drivers/staging/fieldbus/dev_core.c:31:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", !!fb->online);
^~~~~~~
drivers/staging/fieldbus/dev_core.c:31:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", !!fb->online);
^~~~~~~
drivers/staging/fieldbus/dev_core.c:42:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", !!fb->enable_get(fb));
^~~~~~~
drivers/staging/fieldbus/dev_core.c:42:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", !!fb->enable_get(fb));
^~~~~~~
drivers/staging/fieldbus/dev_core.c:73:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(buf, PAGE_SIZE, "%s\n", fb->card_name);
^~~~~~~~
drivers/staging/fieldbus/dev_core.c:73:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(buf, PAGE_SIZE, "%s\n", fb->card_name);
^~~~~~~~
drivers/staging/fieldbus/dev_core.c:82:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%zu\n", fb->read_area_sz);
^~~~~~~
drivers/staging/fieldbus/dev_core.c:82:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%zu\n", fb->read_area_sz);
^~~~~~~
drivers/staging/fieldbus/dev_core.c:91:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%zu\n", fb->write_area_sz);
^~~~~~~
drivers/staging/fieldbus/dev_core.c:91:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%zu\n", fb->write_area_sz);
^~~~~~~
drivers/staging/fieldbus/dev_core.c:119:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", t);
^~~~~~~
drivers/staging/fieldbus/dev_core.c:119:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", t);
^~~~~~~
Suppressed 33 warnings (33 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
19 warnings generated.
lib/genalloc.c:445:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(vaddr, 0, size);
^~~~~~
lib/genalloc.c:445:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(vaddr, 0, size);
^~~~~~
Suppressed 18 warnings (18 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
36 warnings generated.
lib/842/842_compress.c:534:4: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret = add_repeat_template(p, repeat_count);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
lib/842/842_compress.c:534:4: note: Value stored to 'ret' is never read
ret = add_repeat_template(p, repeat_count);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
lib/842/842_compress.c:598:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(p->out, 0, pad);
^~~~~~
lib/842/842_compress.c:598:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(p->out, 0, pad);
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
38 warnings generated.
>> fs/filesystems.c:220:10: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += sprintf(buf+len, "%s\t%s\n",
^~~~~~~
fs/filesystems.c:220:10: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
len += sprintf(buf+len, "%s\t%s\n",
^~~~~~~
Suppressed 37 warnings (37 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
fs/affs/namei.c:22:34: warning: Although the value stored to 'ch' is used in the enclosing expression, the value is never actually read from 'ch' [clang-analyzer-deadcode.DeadStores]
return ch >= 'a' && ch <= 'z' ? ch -= ('a' - 'A') : ch;
^ ~~~~~~~~~~~
fs/affs/namei.c:22:34: note: Although the value stored to 'ch' is used in the enclosing expression, the value is never actually read from 'ch'
return ch >= 'a' && ch <= 'z' ? ch -= ('a' - 'A') : ch;
^ ~~~~~~~~~~~
fs/affs/namei.c:486:2: warning: Value stored to 'retval' is never read [clang-analyzer-deadcode.DeadStores]
retval = affs_insert_hash(new_dir, bh_old);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/affs/namei.c:486:2: note: Value stored to 'retval' is never read
retval = affs_insert_hash(new_dir, bh_old);
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
Suppressed 41 warnings (41 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
41 warnings generated.
Suppressed 41 warnings (41 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
drivers/hid/hid-cmedia.c:86:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(cm->switch_map, jack_switch_types, sizeof(cm->switch_map));
^~~~~~
drivers/hid/hid-cmedia.c:86:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(cm->switch_map, jack_switch_types, sizeof(cm->switch_map));
^~~~~~
Suppressed 33 warnings (33 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
33 warnings generated.
Suppressed 33 warnings (33 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
include/linux/hid.h:1047:9: warning: Access to field 'name' results in a dereference of a null pointer (loaded from variable 'input') [clang-analyzer-core.NullDereference]
input->name, c, type);
^
drivers/hid/hid-ite.c:38:7: note: Assuming the condition is true
if ((quirks & QUIRK_TOUCHPAD_ON_OFF_REPORT) &&
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/hid/hid-ite.c:38:6: note: Left side of '&&' is true
if ((quirks & QUIRK_TOUCHPAD_ON_OFF_REPORT) &&
^
drivers/hid/hid-ite.c:39:6: note: Assuming the condition is true
(usage->hid & HID_USAGE_PAGE) == 0x00880000) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/hid/hid-ite.c:38:2: note: Taking true branch
if ((quirks & QUIRK_TOUCHPAD_ON_OFF_REPORT) &&
^
drivers/hid/hid-ite.c:40:7: note: Assuming field 'hid' is equal to 8913016
if (usage->hid == 0x00880078) {
^~~~~~~~~~~~~~~~~~~~~~~~
drivers/hid/hid-ite.c:40:3: note: Taking true branch
if (usage->hid == 0x00880078) {
^
drivers/hid/hid-ite.c:42:4: note: Calling 'hid_map_usage_clear'
hid_map_usage_clear(hi, usage, bit, max, EV_KEY, KEY_F22);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/hid.h:1068:2: note: Calling 'hid_map_usage'
hid_map_usage(hidinput, usage, bit, max, type, c);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/hid.h:1022:2: note: 'input' initialized here
struct input_dev *input = hidinput->input;
^~~~~~~~~~~~~~~~~~~~~~~
include/linux/hid.h:1026:2: note: Control jumps to 'case 1:' at line 1035
switch (type) {
^
include/linux/hid.h:1038:3: note: Execution continues on line 1045
break;
^
include/linux/hid.h:1045:15: note: 'c' is <= 'limit'
if (unlikely(c > limit || !bmap)) {
^
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
include/linux/hid.h:1045:15: note: Left side of '||' is false
if (unlikely(c > limit || !bmap)) {
^
include/linux/hid.h:1045:28: note: Assuming 'bmap' is null
if (unlikely(c > limit || !bmap)) {
^
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
include/linux/hid.h:1045:28: note: Assuming pointer value is null
if (unlikely(c > limit || !bmap)) {
^
include/linux/compiler.h:78:42: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^
include/linux/hid.h:1045:2: note: Taking true branch
if (unlikely(c > limit || !bmap)) {
^
include/linux/hid.h:1046:3: note: Assuming the condition is true
pr_warn_ratelimited("%s: Invalid code %d type %d\n",
--
if (page_block) {
^
fs/mpage.c:572:8: note: Assuming 'boundary' is 0
if (boundary) {
^~~~~~~~
fs/mpage.c:572:4: note: Taking false branch
if (boundary) {
^
fs/mpage.c:577:12: note: Assuming the condition is false
} while ((bh = bh->b_this_page) != head);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/mpage.c:547:3: note: Loop condition is false. Exiting loop
do {
^
fs/mpage.c:579:7: note: Assuming 'first_unmapped' is not equal to 0
if (first_unmapped)
^~~~~~~~~~~~~~
fs/mpage.c:579:3: note: Taking true branch
if (first_unmapped)
^
fs/mpage.c:580:4: note: Control jumps to line 626
goto page_is_mapped;
^
fs/mpage.c:627:6: note: Assuming 'end_index' is > field 'index'
if (page->index >= end_index) {
^~~~~~~~~~~~~~~~~~~~~~~~
fs/mpage.c:627:2: note: Taking false branch
if (page->index >= end_index) {
^
fs/mpage.c:646:6: note: Assuming 'bio' is non-null
if (bio && mpd->last_block_in_bio != blocks[0] - 1)
^~~
fs/mpage.c:646:6: note: Left side of '&&' is true
fs/mpage.c:646:13: note: Assuming the condition is false
if (bio && mpd->last_block_in_bio != blocks[0] - 1)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/mpage.c:646:2: note: Taking false branch
if (bio && mpd->last_block_in_bio != blocks[0] - 1)
^
fs/mpage.c:650:6: note: 'bio' is not equal to NULL
if (bio == NULL) {
^~~
fs/mpage.c:650:2: note: Taking false branch
if (bio == NULL) {
^
fs/mpage.c:672:6: note: Assuming the condition is false
if (bio_add_page(bio, page, length, 0) < length) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/mpage.c:672:2: note: Taking false branch
if (bio_add_page(bio, page, length, 0) < length) {
^
fs/mpage.c:679:2: note: Assuming the condition is true
BUG_ON(PageWriteback(page));
^
include/asm-generic/bug.h:63:36: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^~~~~~~~~~~~~~~~~~~
include/linux/compiler.h:78:40: note: expanded from macro 'unlikely'
# define unlikely(x) __builtin_expect(!!(x), 0)
^~~~
fs/mpage.c:679:2: note: Taking false branch
BUG_ON(PageWriteback(page));
^
include/asm-generic/bug.h:63:32: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^
fs/mpage.c:679:2: note: Loop condition is false. Exiting loop
BUG_ON(PageWriteback(page));
^
include/asm-generic/bug.h:63:27: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^
fs/mpage.c:682:6: note: 'boundary' is 0
if (boundary || (first_unmapped != blocks_per_page)) {
^~~~~~~~
fs/mpage.c:682:6: note: Left side of '||' is false
fs/mpage.c:682:19: note: 'first_unmapped' is equal to 'blocks_per_page'
if (boundary || (first_unmapped != blocks_per_page)) {
^~~~~~~~~~~~~~
fs/mpage.c:682:2: note: Taking false branch
if (boundary || (first_unmapped != blocks_per_page)) {
^
fs/mpage.c:689:26: note: Assigned value is garbage or undefined
mpd->last_block_in_bio = blocks[blocks_per_page - 1];
^ ~~~~~~~~~~~~~~~~~~~~~~~~~~~
Suppressed 45 warnings (45 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
21 warnings generated.
drivers/auxdisplay/img-ascii-lcd.c:288:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ctx->curr, ' ', ctx->cfg->num_chars);
^~~~~~
drivers/auxdisplay/img-ascii-lcd.c:288:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(ctx->curr, ' ', ctx->cfg->num_chars);
^~~~~~
drivers/auxdisplay/img-ascii-lcd.c:297:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(new_msg, msg, count);
^~~~~~
drivers/auxdisplay/img-ascii-lcd.c:297:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(new_msg, msg, count);
^~~~~~
>> drivers/auxdisplay/img-ascii-lcd.c:329:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", ctx->message);
^~~~~~~
drivers/auxdisplay/img-ascii-lcd.c:329:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", ctx->message);
^~~~~~~
Suppressed 18 warnings (18 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
18 warnings generated.
Suppressed 18 warnings (18 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
28 warnings generated.
drivers/input/serio/serio.c:347:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", serio->name);
^~~~~~~
drivers/input/serio/serio.c:347:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", serio->name);
^~~~~~~
drivers/input/serio/serio.c:354:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "serio:ty%02Xpr%02Xid%02Xex%02X\n",
^~~~~~~
drivers/input/serio/serio.c:354:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "serio:ty%02Xpr%02Xid%02Xex%02X\n",
^~~~~~~
drivers/input/serio/serio.c:361:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%02x\n", serio->id.type);
^~~~~~~
drivers/input/serio/serio.c:361:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%02x\n", serio->id.type);
^~~~~~~
drivers/input/serio/serio.c:367:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%02x\n", serio->id.proto);
^~~~~~~
drivers/input/serio/serio.c:367:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%02x\n", serio->id.proto);
^~~~~~~
drivers/input/serio/serio.c:373:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%02x\n", serio->id.id);
^~~~~~~
drivers/input/serio/serio.c:373:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%02x\n", serio->id.id);
^~~~~~~
drivers/input/serio/serio.c:379:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%02x\n", serio->id.extra);
^~~~~~~
drivers/input/serio/serio.c:379:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%02x\n", serio->id.extra);
^~~~~~~
drivers/input/serio/serio.c:416:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", serio->manual_bind ? "manual" : "auto");
^~~~~~~
drivers/input/serio/serio.c:416:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", serio->manual_bind ? "manual" : "auto");
^~~~~~~
drivers/input/serio/serio.c:440:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", serio->firmware_id);
^~~~~~~
drivers/input/serio/serio.c:440:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", serio->firmware_id);
^~~~~~~
drivers/input/serio/serio.c:738:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", driver->description ? driver->description : "(none)");
^~~~~~~
drivers/input/serio/serio.c:738:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", driver->description ? driver->description : "(none)");
^~~~~~~
drivers/input/serio/serio.c:745:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", serio_drv->manual_bind ? "manual" : "auto");
^~~~~~~
drivers/input/serio/serio.c:745:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", serio_drv->manual_bind ? "manual" : "auto");
^~~~~~~
Suppressed 18 warnings (18 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
81 warnings generated.
fs/nilfs2/sysfs.c:111:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(buf, PAGE_SIZE, "%llu\n",
^~~~~~~~
fs/nilfs2/sysfs.c:111:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(buf, PAGE_SIZE, "%llu\n",
^~~~~~~~
fs/nilfs2/sysfs.c:119:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(buf, PAGE_SIZE, "%llu\n",
^~~~~~~~
fs/nilfs2/sysfs.c:119:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(buf, PAGE_SIZE, "%llu\n",
^~~~~~~~
fs/nilfs2/sysfs.c:132:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(buf, PAGE_SIZE, snapshot_readme_str);
^~~~~~~~
fs/nilfs2/sysfs.c:132:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(buf, PAGE_SIZE, snapshot_readme_str);
--
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sd.c:678:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
MMC_DEV_ATTR(scr, "%08x%08x\n", card->raw_scr[0], card->raw_scr[1]);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sd.c:678:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
MMC_DEV_ATTR(scr, "%08x%08x\n", card->raw_scr[0], card->raw_scr[1]);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sd.c:679:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
MMC_DEV_ATTR(ssr,
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sd.c:679:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
MMC_DEV_ATTR(ssr,
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sd.c:687:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
MMC_DEV_ATTR(date, "%02d/%04d\n", card->cid.month, card->cid.year);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sd.c:687:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
MMC_DEV_ATTR(date, "%02d/%04d\n", card->cid.month, card->cid.year);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sd.c:688:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
MMC_DEV_ATTR(erase_size, "%u\n", card->erase_size << 9);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sd.c:688:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
MMC_DEV_ATTR(erase_size, "%u\n", card->erase_size << 9);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sd.c:689:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
MMC_DEV_ATTR(preferred_erase_size, "%u\n", card->pref_erase << 9);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sd.c:689:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
MMC_DEV_ATTR(preferred_erase_size, "%u\n", card->pref_erase << 9);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sd.c:690:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
MMC_DEV_ATTR(fwrev, "0x%x\n", card->cid.fwrev);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sd.c:690:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
MMC_DEV_ATTR(fwrev, "0x%x\n", card->cid.fwrev);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sd.c:691:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
MMC_DEV_ATTR(hwrev, "0x%x\n", card->cid.hwrev);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sd.c:691:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
MMC_DEV_ATTR(hwrev, "0x%x\n", card->cid.hwrev);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sd.c:692:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
MMC_DEV_ATTR(manfid, "0x%06x\n", card->cid.manfid);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sd.c:692:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
MMC_DEV_ATTR(manfid, "0x%06x\n", card->cid.manfid);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
>> drivers/mmc/core/sd.c:693:1: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
MMC_DEV_ATTR(name, "%s\n", card->cid.prod_name);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sd.c:693:1: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
MMC_DEV_ATTR(name, "%s\n", card->cid.prod_name);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sd.c:694:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
MMC_DEV_ATTR(oemid, "0x%04x\n", card->cid.oemid);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sd.c:694:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
MMC_DEV_ATTR(oemid, "0x%04x\n", card->cid.oemid);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sd.c:695:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
MMC_DEV_ATTR(serial, "0x%08x\n", card->cid.serial);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sd.c:695:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
MMC_DEV_ATTR(serial, "0x%08x\n", card->cid.serial);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sd.c:696:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
MMC_DEV_ATTR(ocr, "0x%08x\n", card->ocr);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sd.c:696:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
MMC_DEV_ATTR(ocr, "0x%08x\n", card->ocr);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sd.c:697:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
MMC_DEV_ATTR(rca, "0x%04x\n", card->rca);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sd.c:697:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
MMC_DEV_ATTR(rca, "0x%04x\n", card->rca);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sd.c:708:23: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "0x%x\n", host->dsr);
^~~~~~~
drivers/mmc/core/sd.c:708:23: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "0x%x\n", host->dsr);
^~~~~~~
drivers/mmc/core/sd.c:711:23: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "0x%x\n", 0x404);
^~~~~~~
drivers/mmc/core/sd.c:711:23: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "0x%x\n", 0x404);
^~~~~~~
drivers/mmc/core/sd.c:716:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
MMC_DEV_ATTR(vendor, "0x%04x\n", card->cis.vendor);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sd.c:716:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
MMC_DEV_ATTR(vendor, "0x%04x\n", card->cis.vendor);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sd.c:717:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
MMC_DEV_ATTR(device, "0x%04x\n", card->cis.device);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sd.c:717:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
MMC_DEV_ATTR(device, "0x%04x\n", card->cis.device);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sd.c:718:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
MMC_DEV_ATTR(revision, "%u.%u\n", card->major_rev, card->minor_rev);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
--
^~~~~~
drivers/edac/edac_mc.c:1119:4: note: Call to function 'strcpy' is insecure as it does not provide bounding of the memory buffer. Replace unbounded copy functions with analogous functions that support length arguments such as 'strlcpy'. CWE-119
strcpy(p, dimm->label);
^~~~~~
drivers/edac/edac_mc.c:1152:14: warning: The left operand of '<' is a garbage value due to array index out of bounds [clang-analyzer-core.UndefinedBinaryOperatorResult]
if (pos[i] < 0)
~~~~~~ ^
drivers/edac/edac_mc.c:1035:2: note: Taking false branch
edac_dbg(3, "MC%d\n", mci->mc_idx);
^
drivers/edac/edac_mc.h:84:2: note: expanded from macro 'edac_dbg'
if (0) \
^
drivers/edac/edac_mc.c:1035:2: note: Loop condition is false. Exiting loop
edac_dbg(3, "MC%d\n", mci->mc_idx);
^
drivers/edac/edac_mc.h:82:39: note: expanded from macro 'edac_dbg'
#define edac_dbg(level, fmt, ...) \
^
drivers/edac/edac_mc.c:1048:11: note: '?' condition is true
e->msg = msg ?: "";
^
drivers/edac/edac_mc.c:1049:20: note: '?' condition is true
e->other_detail = other_detail ?: "";
^
drivers/edac/edac_mc.c:1056:14: note: Assuming 'i' is >= field 'n_layers'
for (i = 0; i < mci->n_layers; i++) {
^~~~~~~~~~~~~~~~~
drivers/edac/edac_mc.c:1056:2: note: Loop condition is false. Execution continues on line 1086
for (i = 0; i < mci->n_layers; i++) {
^
drivers/edac/edac_mc.c:1089:2: note: Loop condition is false. Execution continues on line 1141
mci_for_each_dimm(mci, dimm) {
^
include/linux/edac.h:600:2: note: expanded from macro 'mci_for_each_dimm'
for ((dimm) = (mci)->dimms[0]; \
^
drivers/edac/edac_mc.c:1141:6: note: 'any_memory' is true
if (any_memory)
^~~~~~~~~~
drivers/edac/edac_mc.c:1141:2: note: Taking true branch
if (any_memory)
^
drivers/edac/edac_mc.c:1151:14: note: Assuming 'i' is < field 'n_layers'
for (i = 0; i < mci->n_layers; i++) {
^~~~~~~~~~~~~~~~~
drivers/edac/edac_mc.c:1151:2: note: Loop condition is true. Entering loop body
for (i = 0; i < mci->n_layers; i++) {
^
drivers/edac/edac_mc.c:1152:7: note: Assuming the condition is true
if (pos[i] < 0)
^~~~~~~~~~
drivers/edac/edac_mc.c:1152:3: note: Taking true branch
if (pos[i] < 0)
^
drivers/edac/edac_mc.c:1153:4: note: Execution continues on line 1151
continue;
^
drivers/edac/edac_mc.c:1151:14: note: Assuming 'i' is < field 'n_layers'
for (i = 0; i < mci->n_layers; i++) {
^~~~~~~~~~~~~~~~~
drivers/edac/edac_mc.c:1151:2: note: Loop condition is true. Entering loop body
for (i = 0; i < mci->n_layers; i++) {
^
drivers/edac/edac_mc.c:1152:7: note: Assuming the condition is true
if (pos[i] < 0)
^~~~~~~~~~
drivers/edac/edac_mc.c:1152:3: note: Taking true branch
if (pos[i] < 0)
^
drivers/edac/edac_mc.c:1153:4: note: Execution continues on line 1151
continue;
^
drivers/edac/edac_mc.c:1151:14: note: Assuming 'i' is < field 'n_layers'
for (i = 0; i < mci->n_layers; i++) {
^~~~~~~~~~~~~~~~~
drivers/edac/edac_mc.c:1151:2: note: Loop condition is true. Entering loop body
for (i = 0; i < mci->n_layers; i++) {
^
drivers/edac/edac_mc.c:1152:7: note: Assuming the condition is true
if (pos[i] < 0)
^~~~~~~~~~
drivers/edac/edac_mc.c:1152:3: note: Taking true branch
if (pos[i] < 0)
^
drivers/edac/edac_mc.c:1153:4: note: Execution continues on line 1151
continue;
^
drivers/edac/edac_mc.c:1151:33: note: The value 3 is assigned to 'i'
for (i = 0; i < mci->n_layers; i++) {
^~~
drivers/edac/edac_mc.c:1151:14: note: Assuming 'i' is < field 'n_layers'
for (i = 0; i < mci->n_layers; i++) {
^~~~~~~~~~~~~~~~~
drivers/edac/edac_mc.c:1151:2: note: Loop condition is true. Entering loop body
for (i = 0; i < mci->n_layers; i++) {
^
drivers/edac/edac_mc.c:1152:14: note: The left operand of '<' is a garbage value due to array index out of bounds
if (pos[i] < 0)
~~~~~~ ^
>> drivers/edac/edac_mc.c:1155:8: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
p += sprintf(p, "%s:%d ",
^~~~~~~
drivers/edac/edac_mc.c:1155:8: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
p += sprintf(p, "%s:%d ",
^~~~~~~
Suppressed 40 warnings (40 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
41 warnings generated.
crypto/seqiv.c:33:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(req->iv, subreq->iv, crypto_aead_ivsize(geniv));
^~~~~~
crypto/seqiv.c:33:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(req->iv, subreq->iv, crypto_aead_ivsize(geniv));
^~~~~~
Suppressed 40 warnings (40 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
drivers/char/virtio_console.c:681:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy((__force char *)out_buf, buf->buf + buf->offset,
^~~~~~
drivers/char/virtio_console.c:681:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy((__force char *)out_buf, buf->buf + buf->offset,
^~~~~~
drivers/char/virtio_console.c:896:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(page_address(page) + offset, src + buf->offset, len);
^~~~~~
drivers/char/virtio_console.c:896:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(page_address(page) + offset, src + buf->offset, len);
^~~~~~
drivers/char/virtio_console.c:1282:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buffer, "%s\n", port->name);
^~~~~~~
drivers/char/virtio_console.c:1282:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buffer, "%s\n", port->name);
^~~~~~~
drivers/char/virtio_console.c:1464:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(debugfs_name, sizeof(debugfs_name), "vport%up%u",
^~~~~~~~
drivers/char/virtio_console.c:1464:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(debugfs_name, sizeof(debugfs_name), "vport%up%u",
^~~~~~~~
drivers/char/virtio_console.c:1627:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&size, buf->buf + buf->offset + sizeof(*cpkt),
^~~~~~
drivers/char/virtio_console.c:1627:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&size, buf->buf + buf->offset + sizeof(*cpkt),
^~~~~~
drivers/char/virtio_console.c:1675:3: warning: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
strncpy(port->name, buf->buf + buf->offset + sizeof(*cpkt),
^~~~~~~
drivers/char/virtio_console.c:1675:3: note: Call to function 'strncpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'strncpy_s' in case of C11
strncpy(port->name, buf->buf + buf->offset + sizeof(*cpkt),
^~~~~~~
drivers/char/virtio_console.c:2046:6: warning: Called function pointer is null (null dereference) [clang-analyzer-core.CallAndMessage]
virtio_cread_feature(vdev, VIRTIO_CONSOLE_F_MULTIPORT,
^
include/linux/virtio_config.h:547:17: note: expanded from macro 'virtio_cread_feature'
virtio_cread((vdev), structname, member, ptr); \
~~~~~~~~~~~~~^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/virtio_config.h:341:4: note: expanded from macro 'virtio_cread'
vdev->config->get((vdev), \
^~~~~~~~~~~~~~~~~
drivers/char/virtio_console.c:2007:15: note: Assuming 'early_put_chars' is equal to NULL
bool early = early_put_chars != NULL;
^~~~~~~~~~~~~~~~~~~~~~~
drivers/char/virtio_console.c:2010:6: note: Assuming field 'get' is null
if (!vdev->config->get &&
^~~~~~~~~~~~~~~~~~
drivers/char/virtio_console.c:2010:6: note: Left side of '&&' is true
drivers/char/virtio_console.c:2011:7: note: Assuming the condition is false
(virtio_has_feature(vdev, VIRTIO_CONSOLE_F_SIZE)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/char/virtio_console.c:2011:7: note: Left side of '||' is false
drivers/char/virtio_console.c:2012:10: note: Assuming the condition is false
|| virtio_has_feature(vdev, VIRTIO_CONSOLE_F_MULTIPORT))) {
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/char/virtio_console.c:2010:2: note: Taking false branch
if (!vdev->config->get &&
^
drivers/char/virtio_console.c:2021:12: note: Calling 'kmalloc'
portdev = kmalloc(sizeof(*portdev), GFP_KERNEL);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/slab.h:540:2: note: Taking false branch
if (__builtin_constant_p(size)) {
^
include/linux/slab.h:557:2: note: Returning pointer, which participates in a condition later
return __kmalloc(size, flags);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/char/virtio_console.c:2021:12: note: Returning from 'kmalloc'
portdev = kmalloc(sizeof(*portdev), GFP_KERNEL);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/char/virtio_console.c:2022:6: note: Assuming 'portdev' is non-null
if (!portdev) {
^~~~~~~~
drivers/char/virtio_console.c:2022:2: note: Taking false branch
if (!portdev) {
^
drivers/char/virtio_console.c:2033:6: note: Assuming field 'chr_major' is >= 0
if (portdev->chr_major < 0) {
^~~~~~~~~~~~~~~~~~~~~~
--
^~~~~~~
drivers/staging/iio/resolver/ad2s1210.c:205:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", st->fclkin);
^~~~~~~
drivers/staging/iio/resolver/ad2s1210.c:244:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", st->fexcit);
^~~~~~~
drivers/staging/iio/resolver/ad2s1210.c:244:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", st->fexcit);
^~~~~~~
drivers/staging/iio/resolver/ad2s1210.c:285:25: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return ret < 0 ? ret : sprintf(buf, "0x%x\n", ret);
^~~~~~~
drivers/staging/iio/resolver/ad2s1210.c:285:25: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return ret < 0 ? ret : sprintf(buf, "0x%x\n", ret);
^~~~~~~
drivers/staging/iio/resolver/ad2s1210.c:336:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", st->resolution);
^~~~~~~
drivers/staging/iio/resolver/ad2s1210.c:336:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", st->resolution);
^~~~~~~
drivers/staging/iio/resolver/ad2s1210.c:395:21: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return ret ? ret : sprintf(buf, "0x%x\n", ret);
^~~~~~~
drivers/staging/iio/resolver/ad2s1210.c:395:21: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return ret ? ret : sprintf(buf, "0x%x\n", ret);
^~~~~~~
drivers/staging/iio/resolver/ad2s1210.c:434:25: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return ret < 0 ? ret : sprintf(buf, "%d\n", ret);
^~~~~~~
drivers/staging/iio/resolver/ad2s1210.c:434:25: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return ret < 0 ? ret : sprintf(buf, "%d\n", ret);
^~~~~~~
drivers/staging/iio/resolver/ad2s1210.c:502:3: warning: Value stored to 'negative' is never read [clang-analyzer-deadcode.DeadStores]
negative = st->rx[0] & 0x80;
^ ~~~~~~~~~~~~~~~~
drivers/staging/iio/resolver/ad2s1210.c:502:3: note: Value stored to 'negative' is never read
negative = st->rx[0] & 0x80;
^ ~~~~~~~~~~~~~~~~
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
79 warnings generated.
lib/kobject_uevent.c:435:4: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(env->envp[i], env->envp[i + 1],
^~~~~~~
lib/kobject_uevent.c:435:4: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(env->envp[i], env->envp[i + 1],
^~~~~~~
lib/kobject_uevent.c:665:8: warning: Call to function 'vsnprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'vsnprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len = vsnprintf(&env->buf[env->buflen],
^~~~~~~~~
lib/kobject_uevent.c:665:8: note: Call to function 'vsnprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'vsnprintf_s' in case of C11
len = vsnprintf(&env->buf[env->buflen],
^~~~~~~~~
Suppressed 77 warnings (77 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
19 warnings generated.
drivers/hwtracing/stm/policy.c:95:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
count = sprintf(page, "%u %u\n", policy_node->first_master,
^~~~~~~
drivers/hwtracing/stm/policy.c:95:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
count = sprintf(page, "%u %u\n", policy_node->first_master,
^~~~~~~
drivers/hwtracing/stm/policy.c:111:6: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(p, "%u %u", &first, &last) != 2)
^~~~~~
drivers/hwtracing/stm/policy.c:111:6: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(p, "%u %u", &first, &last) != 2)
^~~~~~
drivers/hwtracing/stm/policy.c:142:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
count = sprintf(page, "%u %u\n", policy_node->first_channel,
^~~~~~~
drivers/hwtracing/stm/policy.c:142:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
count = sprintf(page, "%u %u\n", policy_node->first_channel,
^~~~~~~
drivers/hwtracing/stm/policy.c:158:6: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(p, "%u %u", &first, &last) != 2)
^~~~~~
drivers/hwtracing/stm/policy.c:158:6: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(p, "%u %u", &first, &last) != 2)
^~~~~~
drivers/hwtracing/stm/policy.c:299:10: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
count = sprintf(page, "%s\n",
^~~~~~~
drivers/hwtracing/stm/policy.c:299:10: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
count = sprintf(page, "%s\n",
^~~~~~~
drivers/hwtracing/stm/policy.c:315:10: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
count = sprintf(page, "%s\n",
^~~~~~~
drivers/hwtracing/stm/policy.c:315:10: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
count = sprintf(page, "%s\n",
^~~~~~~
Suppressed 13 warnings (12 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
20 warnings generated.
>> drivers/iio/industrialio-trigger.c:53:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", trig->name);
^~~~~~~
drivers/iio/industrialio-trigger.c:53:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", trig->name);
^~~~~~~
drivers/iio/industrialio-trigger.c:380:10: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", indio_dev->trig->name);
^~~~~~~
drivers/iio/industrialio-trigger.c:380:10: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", indio_dev->trig->name);
^~~~~~~
Suppressed 18 warnings (18 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
22 warnings generated.
drivers/iio/magnetometer/rm3100-core.c:489:4: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(data->buffer + i * 4, data->buffer + i * 3, 3);
^~~~~~~
drivers/iio/magnetometer/rm3100-core.c:489:4: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(data->buffer + i * 4, data->buffer + i * 3, 3);
^~~~~~~
drivers/iio/magnetometer/rm3100-core.c:496:3: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(data->buffer + 4, data->buffer + 3, 3);
^~~~~~~
drivers/iio/magnetometer/rm3100-core.c:496:3: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(data->buffer + 4, data->buffer + 3, 3);
^~~~~~~
drivers/iio/magnetometer/rm3100-core.c:503:3: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(data->buffer + 4, data->buffer + 3, 3);
^~~~~~~
drivers/iio/magnetometer/rm3100-core.c:503:3: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(data->buffer + 4, data->buffer + 3, 3);
^~~~~~~
drivers/iio/magnetometer/rm3100-core.c:510:3: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(data->buffer + 4, data->buffer + 6, 3);
^~~~~~~
drivers/iio/magnetometer/rm3100-core.c:510:3: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(data->buffer + 4, data->buffer + 6, 3);
^~~~~~~
Suppressed 18 warnings (18 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
74 warnings generated.
kernel/sched/core.c:4658:16: warning: Value stored to 'preempt_disable_ip' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
unsigned long preempt_disable_ip = get_preempt_disable_ip(current);
^~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/sched/core.c:4658:16: note: Value stored to 'preempt_disable_ip' during its initialization is never read
unsigned long preempt_disable_ip = get_preempt_disable_ip(current);
^~~~~~~~~~~~~~~~~~ ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/sched/core.c:6475:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(attr, 0, sizeof(*attr));
^~~~~~
kernel/sched/core.c:6475:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(attr, 0, sizeof(*attr));
^~~~~~
kernel/sched/core.c:7954:3: warning: Value stored to 'ptr' is never read [clang-analyzer-deadcode.DeadStores]
ptr += nr_cpu_ids * sizeof(void **);
^
kernel/sched/core.c:7954:3: note: Value stored to 'ptr' is never read
kernel/sched/core.c:9239:6: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(buf, "%20s %llu", tok, periodp) < 1)
^~~~~~
kernel/sched/core.c:9239:6: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(buf, "%20s %llu", tok, periodp) < 1)
^~~~~~
kernel/sched/core.c:9244:6: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(tok, "%llu", quotap))
^~~~~~
kernel/sched/core.c:9244:6: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(tok, "%llu", quotap))
^~~~~~
Suppressed 69 warnings (61 in non-user code, 8 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
61 warnings generated.
Suppressed 61 warnings (61 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
61 warnings generated.
Suppressed 61 warnings (61 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
fs/xfs/libxfs/xfs_refcount_btree.c:64:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&args, 0, sizeof(args));
^~~~~~
fs/xfs/libxfs/xfs_refcount_btree.c:64:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&args, 0, sizeof(args));
^~~~~~
Suppressed 44 warnings (44 in non-user code).
--
^
kernel/bpf/verifier.c:11035:22: note: Assuming 'size' is < 'ctx_field_size'
is_narrower_load = size < ctx_field_size;
^~~~~~~~~~~~~~~~~~~~~
kernel/bpf/verifier.c:11038:7: note: 'is_narrower_load' is true
if (is_narrower_load) {
^~~~~~~~~~~~~~~~
kernel/bpf/verifier.c:11038:3: note: Taking true branch
if (is_narrower_load) {
^
kernel/bpf/verifier.c:11041:8: note: 'type' is not equal to BPF_WRITE
if (type == BPF_WRITE) {
^~~~
kernel/bpf/verifier.c:11041:4: note: Taking false branch
if (type == BPF_WRITE) {
^
kernel/bpf/verifier.c:11047:8: note: 'ctx_field_size' is not equal to 4
if (ctx_field_size == 4)
^~~~~~~~~~~~~~
kernel/bpf/verifier.c:11047:4: note: Taking false branch
if (ctx_field_size == 4)
^
kernel/bpf/verifier.c:11049:13: note: 'ctx_field_size' is not equal to 8
else if (ctx_field_size == 8)
^~~~~~~~~~~~~~
kernel/bpf/verifier.c:11049:9: note: Taking false branch
else if (ctx_field_size == 8)
^
kernel/bpf/verifier.c:11059:7: note: Assuming 'cnt' is not equal to 0
if (cnt == 0 || cnt >= ARRAY_SIZE(insn_buf) ||
^~~~~~~~
kernel/bpf/verifier.c:11059:7: note: Left side of '||' is false
kernel/bpf/verifier.c:11059:19: note: Assuming the condition is false
if (cnt == 0 || cnt >= ARRAY_SIZE(insn_buf) ||
^~~~~~~~~~~~~~~~~~~~~~~~~~~
kernel/bpf/verifier.c:11059:7: note: Left side of '||' is false
if (cnt == 0 || cnt >= ARRAY_SIZE(insn_buf) ||
^
kernel/bpf/verifier.c:11060:8: note: 'ctx_field_size' is not equal to 0
(ctx_field_size && !target_size)) {
^~~~~~~~~~~~~~
kernel/bpf/verifier.c:11060:8: note: Left side of '&&' is true
kernel/bpf/verifier.c:11060:26: note: Assuming 'target_size' is not equal to 0
(ctx_field_size && !target_size)) {
^~~~~~~~~~~~
kernel/bpf/verifier.c:11059:3: note: Taking false branch
if (cnt == 0 || cnt >= ARRAY_SIZE(insn_buf) ||
^
kernel/bpf/verifier.c:11065:7: note: 'is_narrower_load' is true
if (is_narrower_load && size < target_size) {
^~~~~~~~~~~~~~~~
kernel/bpf/verifier.c:11065:7: note: Left side of '&&' is true
kernel/bpf/verifier.c:11065:27: note: Assuming 'size' is < 'target_size'
if (is_narrower_load && size < target_size) {
^~~~~~~~~~~~~~~~~~
kernel/bpf/verifier.c:11065:3: note: Taking true branch
if (is_narrower_load && size < target_size) {
^
kernel/bpf/verifier.c:11068:8: note: Assuming 'shift' is 0
if (shift && cnt + 1 >= ARRAY_SIZE(insn_buf)) {
^~~~~
kernel/bpf/verifier.c:11068:14: note: Left side of '&&' is false
if (shift && cnt + 1 >= ARRAY_SIZE(insn_buf)) {
^
kernel/bpf/verifier.c:11072:8: note: 'ctx_field_size' is > 4
if (ctx_field_size <= 4) {
^~~~~~~~~~~~~~
kernel/bpf/verifier.c:11072:4: note: Taking false branch
if (ctx_field_size <= 4) {
^
kernel/bpf/verifier.c:11080:9: note: 'shift' is 0
if (shift)
^~~~~
kernel/bpf/verifier.c:11080:5: note: Taking false branch
if (shift)
^
kernel/bpf/verifier.c:11085:15: note: The result of the left shift is undefined due to shifting by '64', which is greater or equal to the width of type 'unsigned long long'
(1ULL << size * 8) - 1);
^
include/linux/filter.h:115:12: note: expanded from macro 'BPF_ALU64_IMM'
.imm = IMM })
^~~
kernel/bpf/verifier.c:11163:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(func[i]->insnsi, &prog->insnsi[subprog_start],
^~~~~~
kernel/bpf/verifier.c:11163:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(func[i]->insnsi, &prog->insnsi[subprog_start],
^~~~~~
kernel/bpf/verifier.c:12480:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(env->prog->aux->used_maps, env->used_maps,
^~~~~~
kernel/bpf/verifier.c:12480:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(env->prog->aux->used_maps, env->used_maps,
^~~~~~
Suppressed 65 warnings (65 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
13 warnings generated.
Suppressed 13 warnings (10 in non-user code, 3 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
>> drivers/iio/industrialio-core.c:207:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", to_iio_const_attr(attr)->string);
^~~~~~~
drivers/iio/industrialio-core.c:207:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", to_iio_const_attr(attr)->string);
^~~~~~~
drivers/iio/industrialio-core.c:347:33: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
iio_dev_opaque->read_buf_len = snprintf(iio_dev_opaque->read_buf,
^~~~~~~~
drivers/iio/industrialio-core.c:347:33: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
iio_dev_opaque->read_buf_len = snprintf(iio_dev_opaque->read_buf,
^~~~~~~~
drivers/iio/industrialio-core.c:371:8: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = sscanf(buf, "%i %i", ®, &val);
^~~~~~
drivers/iio/industrialio-core.c:371:8: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
ret = sscanf(buf, "%i %i", ®, &val);
^~~~~~
drivers/iio/industrialio-core.c:499:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(buf, PAGE_SIZE, "%s\n", e->items[i]);
^~~~~~~~
drivers/iio/industrialio-core.c:499:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(buf, PAGE_SIZE, "%s\n", e->items[i]);
^~~~~~~~
drivers/iio/industrialio-core.c:550:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(buf, PAGE_SIZE, "%s, %s, %s; %s, %s, %s; %s, %s, %s\n",
^~~~~~~~
drivers/iio/industrialio-core.c:550:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(buf, PAGE_SIZE, "%s, %s, %s; %s, %s, %s; %s, %s, %s\n",
^~~~~~~~
drivers/iio/industrialio-core.c:669:15: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return len + sprintf(buf + len, "\n");
^~~~~~~
drivers/iio/industrialio-core.c:669:15: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return len + sprintf(buf + len, "\n");
^~~~~~~
drivers/iio/industrialio-core.c:746:8: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len = snprintf(buf, PAGE_SIZE, "[");
^~~~~~~~
drivers/iio/industrialio-core.c:746:8: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
len = snprintf(buf, PAGE_SIZE, "[");
^~~~~~~~
drivers/iio/industrialio-core.c:941:7: warning: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
if (sscanf(buf, "%c", &ch) != 1)
^~~~~~
drivers/iio/industrialio-core.c:941:7: note: Call to function 'sscanf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sscanf_s' in case of C11
if (sscanf(buf, "%c", &ch) != 1)
^~~~~~
drivers/iio/industrialio-core.c:1324:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(buf, PAGE_SIZE, "%s\n", indio_dev->name);
^~~~~~~~
drivers/iio/industrialio-core.c:1324:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(buf, PAGE_SIZE, "%s\n", indio_dev->name);
^~~~~~~~
drivers/iio/industrialio-core.c:1334:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(buf, PAGE_SIZE, "%s\n", indio_dev->label);
^~~~~~~~
drivers/iio/industrialio-core.c:1334:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(buf, PAGE_SIZE, "%s\n", indio_dev->label);
^~~~~~~~
drivers/iio/industrialio-core.c:1381:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf, name, sz);
^~~~~~
drivers/iio/industrialio-core.c:1381:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf, name, sz);
^~~~~~
drivers/iio/industrialio-core.c:1471:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(iio_dev_opaque->chan_attr_group.attrs,
^~~~~~
drivers/iio/industrialio-core.c:1471:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(iio_dev_opaque->chan_attr_group.attrs,
^~~~~~
Suppressed 33 warnings (33 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
38 warnings generated.
drivers/iio/proximity/as3935.c:53:8: warning: Excessive padding in 'struct as3935_state' (34 padding bytes, where 2 is optimal).
Optimal fields order:
buf,
spi,
scan,
trig,
noise_tripped,
tune_cap,
nflwdth_reg,
lock,
work,
consider reordering the fields or adding explicit padding members [clang-analyzer-optin.performance.Padding]
struct as3935_state {
~~~~~~~^~~~~~~~~~~~~~
drivers/iio/proximity/as3935.c:53:8: note: Excessive padding in 'struct as3935_state' (34 padding bytes, where 2 is optimal). Optimal fields order: buf, spi, scan, trig, noise_tripped, tune_cap, nflwdth_reg, lock, work, consider reordering the fields or adding explicit padding members
struct as3935_state {
~~~~~~~^~~~~~~~~~~~~~
drivers/iio/proximity/as3935.c:125:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", val);
^~~~~~~
drivers/iio/proximity/as3935.c:125:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", val);
^~~~~~~
drivers/iio/proximity/as3935.c:156:8: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
ret = sprintf(buf, "%d\n", !time_after(jiffies, st->noise_tripped + HZ));
^~~~~~~
--
^~~~~~
lib/reed_solomon/test_rslib.c:173:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(r, c, len * sizeof(*r));
^~~~~~
lib/reed_solomon/test_rslib.c:174:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(errlocs, 0, len * sizeof(*errlocs));
^~~~~~
lib/reed_solomon/test_rslib.c:174:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(errlocs, 0, len * sizeof(*errlocs));
^~~~~~
lib/reed_solomon/test_rslib.c:175:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(derrlocs, 0, nroots * sizeof(*derrlocs));
^~~~~~
lib/reed_solomon/test_rslib.c:175:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(derrlocs, 0, nroots * sizeof(*derrlocs));
^~~~~~
lib/reed_solomon/test_rslib.c:395:4: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(corr, 0, nroots * sizeof(*corr));
^~~~~~
lib/reed_solomon/test_rslib.c:395:4: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(corr, 0, nroots * sizeof(*corr));
^~~~~~
Suppressed 10 warnings (10 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
36 warnings generated.
drivers/mmc/core/sd_ops.c:72:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&mrq, 0, sizeof(struct mmc_request));
^~~~~~
drivers/mmc/core/sd_ops.c:72:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&mrq, 0, sizeof(struct mmc_request));
^~~~~~
drivers/mmc/core/sd_ops.c:74:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(cmd->resp, 0, sizeof(cmd->resp));
^~~~~~
drivers/mmc/core/sd_ops.c:74:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(cmd->resp, 0, sizeof(cmd->resp));
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
drivers/mmc/core/sdio.c:30:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
MMC_DEV_ATTR(vendor, "0x%04x\n", card->cis.vendor);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sdio.c:30:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
MMC_DEV_ATTR(vendor, "0x%04x\n", card->cis.vendor);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sdio.c:31:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
MMC_DEV_ATTR(device, "0x%04x\n", card->cis.device);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sdio.c:31:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
MMC_DEV_ATTR(device, "0x%04x\n", card->cis.device);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sdio.c:32:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
MMC_DEV_ATTR(revision, "%u.%u\n", card->major_rev, card->minor_rev);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sdio.c:32:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
MMC_DEV_ATTR(revision, "%u.%u\n", card->major_rev, card->minor_rev);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sdio.c:33:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
MMC_DEV_ATTR(ocr, "0x%08x\n", card->ocr);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sdio.c:33:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
MMC_DEV_ATTR(ocr, "0x%08x\n", card->ocr);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sdio.c:34:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
MMC_DEV_ATTR(rca, "0x%04x\n", card->rca);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
drivers/mmc/core/sdio.c:34:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
MMC_DEV_ATTR(rca, "0x%04x\n", card->rca);
^
drivers/mmc/core/bus.h:20:9: note: expanded from macro 'MMC_DEV_ATTR'
return sprintf(buf, fmt, args); \
^~~~~~~
>> drivers/mmc/core/sdio.c:49:1: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sdio_info_attr(1);
^
drivers/mmc/core/sdio.c:45:9: note: expanded from macro 'sdio_info_attr'
return sprintf(buf, "%s\n", card->info[num-1]); \
^~~~~~~
drivers/mmc/core/sdio.c:49:1: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sdio_info_attr(1);
^
drivers/mmc/core/sdio.c:45:9: note: expanded from macro 'sdio_info_attr'
return sprintf(buf, "%s\n", card->info[num-1]); \
^~~~~~~
drivers/mmc/core/sdio.c:50:1: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sdio_info_attr(2);
^
drivers/mmc/core/sdio.c:45:9: note: expanded from macro 'sdio_info_attr'
return sprintf(buf, "%s\n", card->info[num-1]); \
^~~~~~~
drivers/mmc/core/sdio.c:50:1: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sdio_info_attr(2);
^
drivers/mmc/core/sdio.c:45:9: note: expanded from macro 'sdio_info_attr'
return sprintf(buf, "%s\n", card->info[num-1]); \
^~~~~~~
drivers/mmc/core/sdio.c:51:1: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sdio_info_attr(3);
^
drivers/mmc/core/sdio.c:45:9: note: expanded from macro 'sdio_info_attr'
return sprintf(buf, "%s\n", card->info[num-1]); \
^~~~~~~
drivers/mmc/core/sdio.c:51:1: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sdio_info_attr(3);
^
drivers/mmc/core/sdio.c:45:9: note: expanded from macro 'sdio_info_attr'
return sprintf(buf, "%s\n", card->info[num-1]); \
^~~~~~~
drivers/mmc/core/sdio.c:52:1: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
sdio_info_attr(4);
^
drivers/mmc/core/sdio.c:45:9: note: expanded from macro 'sdio_info_attr'
return sprintf(buf, "%s\n", card->info[num-1]); \
^~~~~~~
drivers/mmc/core/sdio.c:52:1: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
sdio_info_attr(4);
^
drivers/mmc/core/sdio.c:45:9: note: expanded from macro 'sdio_info_attr'
return sprintf(buf, "%s\n", card->info[num-1]); \
^~~~~~~
Suppressed 18 warnings (18 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
drivers/iio/dac/ad5686.c:60:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", !!(st->pwr_down_mask &
^~~~~~~
drivers/iio/dac/ad5686.c:60:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", !!(st->pwr_down_mask &
^~~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
drivers/clk/clk-max9485.c:199:9: warning: Access to field 'out' results in a dereference of a null pointer (loaded from variable 'prev') [clang-analyzer-core.NullDereference]
return prev->out;
^~~~
drivers/clk/clk-max9485.c:165:36: note: 'prev' initialized to a null pointer value
const struct max9485_rate *curr, *prev = NULL;
^~~~
drivers/clk/clk-max9485.c:167:29: note: Assuming field 'out' is equal to 0
for (curr = max9485_rates; curr->out != 0; curr++) {
^~~~~~~~~~~~~~
drivers/clk/clk-max9485.c:167:2: note: Loop condition is false. Execution continues on line 199
for (curr = max9485_rates; curr->out != 0; curr++) {
^
drivers/clk/clk-max9485.c:199:9: note: Access to field 'out' results in a dereference of a null pointer (loaded from variable 'prev')
return prev->out;
^~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
18 warnings generated.
Suppressed 18 warnings (18 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
56 warnings generated.
fs/ext4/inline.c:183:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buffer, (void *)(raw_inode->i_block), cp_len);
^~~~~~
fs/ext4/inline.c:183:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buffer, (void *)(raw_inode->i_block), cp_len);
^~~~~~
fs/ext4/inline.c:197:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buffer,
^~~~~~
fs/ext4/inline.c:197:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buffer,
^~~~~~
fs/ext4/inline.c:231:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy((void *)raw_inode->i_block + pos, buffer, cp_len);
^~~~~~
fs/ext4/inline.c:231:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy((void *)raw_inode->i_block + pos, buffer, cp_len);
^~~~~~
fs/ext4/inline.c:246:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy((void *)IFIRST(header) + le16_to_cpu(entry->e_value_offs) + pos,
--
^~~~~~
drivers/input/rmi4/rmi_f34v7.c:1379:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&f34->v7.phyaddr, 0x00, sizeof(f34->v7.phyaddr));
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
66 warnings generated.
kernel/bpf/ringbuf.c:457:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(rec, data, size);
^~~~~~
kernel/bpf/ringbuf.c:457:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(rec, data, size);
^~~~~~
Suppressed 65 warnings (65 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
39 warnings generated.
kernel/bpf/disasm.c:31:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(buff, len, "%+d", insn->imm);
^~~~~~~~
kernel/bpf/disasm.c:31:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(buff, len, "%+d", insn->imm);
^~~~~~~~
kernel/bpf/disasm.c:43:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(buff, len, "0x%llx", (unsigned long long)full_imm);
^~~~~~~~
kernel/bpf/disasm.c:43:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(buff, len, "0x%llx", (unsigned long long)full_imm);
^~~~~~~~
Suppressed 37 warnings (37 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
105 warnings generated.
kernel/bpf/btf.c:750:3: warning: Value stored to 'id' is never read [clang-analyzer-deadcode.DeadStores]
id = t->type;
^ ~~~~~~~
kernel/bpf/btf.c:750:3: note: Value stored to 'id' is never read
id = t->type;
^ ~~~~~~~
kernel/bpf/btf.c:777:25: warning: Value stored to 't' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
const struct btf_type *t = show->state.type;
^ ~~~~~~~~~~~~~~~~
kernel/bpf/btf.c:777:25: note: Value stored to 't' during its initialization is never read
const struct btf_type *t = show->state.type;
^ ~~~~~~~~~~~~~~~~
kernel/bpf/btf.c:904:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(show->state.name, sizeof(show->state.name), "%s",
^~~~~~~~
kernel/bpf/btf.c:904:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(show->state.name, sizeof(show->state.name), "%s",
^~~~~~~~
kernel/bpf/btf.c:907:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(show->state.name, sizeof(show->state.name),
^~~~~~~~
kernel/bpf/btf.c:907:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(show->state.name, sizeof(show->state.name),
^~~~~~~~
kernel/bpf/btf.c:1421:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(new_types, btf->types,
^~~~~~
kernel/bpf/btf.c:1421:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(new_types, btf->types,
^~~~~~
kernel/bpf/btf.c:2067:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(print_num, data, nr_copy_bytes);
^~~~~~
kernel/bpf/btf.c:2067:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(print_num, data, nr_copy_bytes);
^~~~~~
kernel/bpf/btf.c:4079:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&btf->hdr, btf->data, hdr_copy);
^~~~~~
kernel/bpf/btf.c:4079:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&btf->hdr, btf->data, hdr_copy);
^~~~~~
kernel/bpf/btf.c:5330:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&show->state, 0, sizeof(show->state));
^~~~~~
kernel/bpf/btf.c:5330:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&show->state, 0, sizeof(show->state));
^~~~~~
kernel/bpf/btf.c:5331:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&show->obj, 0, sizeof(show->obj));
^~~~~~
kernel/bpf/btf.c:5331:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&show->obj, 0, sizeof(show->obj));
^~~~~~
kernel/bpf/btf.c:5376:8: warning: Call to function 'vsnprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'vsnprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len = vsnprintf(show->target, ssnprintf->len_left, fmt, args);
^~~~~~~~~
kernel/bpf/btf.c:5376:8: note: Call to function 'vsnprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'vsnprintf_s' in case of C11
len = vsnprintf(show->target, ssnprintf->len_left, fmt, args);
^~~~~~~~~
kernel/bpf/btf.c:5507:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&info, 0, sizeof(info));
^~~~~~
kernel/bpf/btf.c:5507:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&info, 0, sizeof(info));
^~~~~~
Suppressed 94 warnings (93 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
>> drivers/i2c/i2c-dev.c:104:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", i2c_dev->adap->name);
^~~~~~~
drivers/i2c/i2c-dev.c:104:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", i2c_dev->adap->name);
^~~~~~~
drivers/i2c/i2c-dev.c:608:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(client->name, I2C_NAME_SIZE, "i2c-dev %d", adap->nr);
^~~~~~~~
drivers/i2c/i2c-dev.c:608:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(client->name, I2C_NAME_SIZE, "i2c-dev %d", adap->nr);
^~~~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
46 warnings generated.
drivers/misc/tsl2550.c:180:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", data->power_state);
^~~~~~~
drivers/misc/tsl2550.c:180:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", data->power_state);
^~~~~~~
drivers/misc/tsl2550.c:212:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", data->operating_mode);
^~~~~~~
drivers/misc/tsl2550.c:212:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", data->operating_mode);
^~~~~~~
drivers/misc/tsl2550.c:265:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", ret);
^~~~~~~
drivers/misc/tsl2550.c:265:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", ret);
^~~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
drivers/misc/hmc6352.c:84:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d.%d\n", ret/10, ret%10);
^~~~~~~
drivers/misc/hmc6352.c:84:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d.%d\n", ret/10, ret%10);
^~~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
13 warnings generated.
crypto/des_generic.c:33:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(dctx, 0, sizeof(*dctx));
^~~~~~
crypto/des_generic.c:33:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(dctx, 0, sizeof(*dctx));
^~~~~~
crypto/des_generic.c:65:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(dctx, 0, sizeof(*dctx));
^~~~~~
crypto/des_generic.c:65:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(dctx, 0, sizeof(*dctx));
^~~~~~
Suppressed 11 warnings (11 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
10 warnings generated.
Suppressed 10 warnings (10 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
10 warnings generated.
Suppressed 10 warnings (10 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
drivers/i2c/busses/i2c-rk3x.c:504:9: warning: Access to field 'flags' results in a dereference of a null pointer (loaded from field 'msg') [clang-analyzer-core.NullDereference]
if (!(i2c->msg->flags & I2C_M_IGNORE_NAK))
^
drivers/i2c/busses/i2c-rk3x.c:1140:9: note: Calling 'rk3x_i2c_xfer_common'
return rk3x_i2c_xfer_common(adap, msgs, num, true);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/i2c/busses/i2c-rk3x.c:1066:2: note: Loop condition is false. Exiting loop
spin_lock_irqsave(&i2c->lock, flags);
^
include/linux/spinlock.h:384:2: note: expanded from macro 'spin_lock_irqsave'
raw_spin_lock_irqsave(spinlock_check(lock), flags); \
^
include/linux/spinlock.h:274:3: note: expanded from macro 'raw_spin_lock_irqsave'
_raw_spin_lock_irqsave(lock, flags); \
^
include/linux/spinlock_api_up.h:68:45: note: expanded from macro '_raw_spin_lock_irqsave'
#define _raw_spin_lock_irqsave(lock, flags) __LOCK_IRQSAVE(lock, flags)
^
include/linux/spinlock_api_up.h:40:8: note: expanded from macro '__LOCK_IRQSAVE'
do { local_irq_save(flags); __LOCK(lock); } while (0)
^
include/linux/irqflags.h:225:36: note: expanded from macro 'local_irq_save'
#define local_irq_save(flags) do { raw_local_irq_save(flags); } while (0)
^
include/linux/irqflags.h:158:2: note: expanded from macro 'raw_local_irq_save'
do { \
^
drivers/i2c/busses/i2c-rk3x.c:1066:2: note: Loop condition is false. Exiting loop
spin_lock_irqsave(&i2c->lock, flags);
^
include/linux/spinlock.h:384:2: note: expanded from macro 'spin_lock_irqsave'
raw_spin_lock_irqsave(spinlock_check(lock), flags); \
^
include/linux/spinlock.h:274:3: note: expanded from macro 'raw_spin_lock_irqsave'
_raw_spin_lock_irqsave(lock, flags); \
--
^~~~~~~
drivers/nvme/host/core.c:3442:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%8ph\n", dev_to_ns_head(dev)->ids.eui64);
^~~~~~~
drivers/nvme/host/core.c:3449:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", dev_to_ns_head(dev)->ns_id);
^~~~~~~
drivers/nvme/host/core.c:3449:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", dev_to_ns_head(dev)->ns_id);
^~~~~~~
drivers/nvme/host/core.c:3519:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
nvme_show_str_function(model);
^
drivers/nvme/host/core.c:3514:16: note: expanded from macro 'nvme_show_str_function'
return sprintf(buf, "%.*s\n", \
^~~~~~~
drivers/nvme/host/core.c:3519:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
nvme_show_str_function(model);
^
drivers/nvme/host/core.c:3514:16: note: expanded from macro 'nvme_show_str_function'
return sprintf(buf, "%.*s\n", \
^~~~~~~
drivers/nvme/host/core.c:3520:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
nvme_show_str_function(serial);
^
drivers/nvme/host/core.c:3514:16: note: expanded from macro 'nvme_show_str_function'
return sprintf(buf, "%.*s\n", \
^~~~~~~
drivers/nvme/host/core.c:3520:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
nvme_show_str_function(serial);
^
drivers/nvme/host/core.c:3514:16: note: expanded from macro 'nvme_show_str_function'
return sprintf(buf, "%.*s\n", \
^~~~~~~
drivers/nvme/host/core.c:3521:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
nvme_show_str_function(firmware_rev);
^
drivers/nvme/host/core.c:3514:16: note: expanded from macro 'nvme_show_str_function'
return sprintf(buf, "%.*s\n", \
^~~~~~~
drivers/nvme/host/core.c:3521:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
nvme_show_str_function(firmware_rev);
^
drivers/nvme/host/core.c:3514:16: note: expanded from macro 'nvme_show_str_function'
return sprintf(buf, "%.*s\n", \
^~~~~~~
drivers/nvme/host/core.c:3532:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
nvme_show_int_function(cntlid);
^
drivers/nvme/host/core.c:3528:16: note: expanded from macro 'nvme_show_int_function'
return sprintf(buf, "%d\n", ctrl->field); \
^~~~~~~
drivers/nvme/host/core.c:3532:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
nvme_show_int_function(cntlid);
^
drivers/nvme/host/core.c:3528:16: note: expanded from macro 'nvme_show_int_function'
return sprintf(buf, "%d\n", ctrl->field); \
^~~~~~~
drivers/nvme/host/core.c:3533:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
nvme_show_int_function(numa_node);
^
drivers/nvme/host/core.c:3528:16: note: expanded from macro 'nvme_show_int_function'
return sprintf(buf, "%d\n", ctrl->field); \
^~~~~~~
drivers/nvme/host/core.c:3533:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
nvme_show_int_function(numa_node);
^
drivers/nvme/host/core.c:3528:16: note: expanded from macro 'nvme_show_int_function'
return sprintf(buf, "%d\n", ctrl->field); \
^~~~~~~
drivers/nvme/host/core.c:3534:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
nvme_show_int_function(queue_count);
^
drivers/nvme/host/core.c:3528:16: note: expanded from macro 'nvme_show_int_function'
return sprintf(buf, "%d\n", ctrl->field); \
^~~~~~~
drivers/nvme/host/core.c:3534:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
nvme_show_int_function(queue_count);
^
drivers/nvme/host/core.c:3528:16: note: expanded from macro 'nvme_show_int_function'
return sprintf(buf, "%d\n", ctrl->field); \
^~~~~~~
drivers/nvme/host/core.c:3535:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
nvme_show_int_function(sqsize);
^
drivers/nvme/host/core.c:3528:16: note: expanded from macro 'nvme_show_int_function'
return sprintf(buf, "%d\n", ctrl->field); \
^~~~~~~
drivers/nvme/host/core.c:3535:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
nvme_show_int_function(sqsize);
^
drivers/nvme/host/core.c:3528:16: note: expanded from macro 'nvme_show_int_function'
return sprintf(buf, "%d\n", ctrl->field); \
^~~~~~~
drivers/nvme/host/core.c:3555:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(buf, PAGE_SIZE, "%s\n", ctrl->ops->name);
^~~~~~~~
drivers/nvme/host/core.c:3555:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(buf, PAGE_SIZE, "%s\n", ctrl->ops->name);
^~~~~~~~
>> drivers/nvme/host/core.c:3576:10: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", state_name[ctrl->state]);
^~~~~~~
drivers/nvme/host/core.c:3576:10: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", state_name[ctrl->state]);
^~~~~~~
drivers/nvme/host/core.c:3578:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "unknown state\n");
^~~~~~~
drivers/nvme/host/core.c:3578:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "unknown state\n");
^~~~~~~
drivers/nvme/host/core.c:3589:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(buf, PAGE_SIZE, "%s\n", ctrl->subsys->subnqn);
^~~~~~~~
drivers/nvme/host/core.c:3589:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(buf, PAGE_SIZE, "%s\n", ctrl->subsys->subnqn);
^~~~~~~~
drivers/nvme/host/core.c:3599:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(buf, PAGE_SIZE, "%s\n", ctrl->opts->host->nqn);
^~~~~~~~
drivers/nvme/host/core.c:3599:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(buf, PAGE_SIZE, "%s\n", ctrl->opts->host->nqn);
^~~~~~~~
drivers/nvme/host/core.c:3609:9: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return snprintf(buf, PAGE_SIZE, "%pU\n", &ctrl->opts->host->id);
^~~~~~~~
drivers/nvme/host/core.c:3609:9: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
return snprintf(buf, PAGE_SIZE, "%pU\n", &ctrl->opts->host->id);
^~~~~~~~
drivers/nvme/host/core.c:3630:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "off\n");
^~~~~~~
drivers/nvme/host/core.c:3630:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "off\n");
^~~~~~~
drivers/nvme/host/core.c:3631:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n",
^~~~~~~
drivers/nvme/host/core.c:3631:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n",
^~~~~~~
drivers/nvme/host/core.c:3662:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "off\n");
^~~~~~~
drivers/nvme/host/core.c:3662:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "off\n");
^~~~~~~
drivers/nvme/host/core.c:3663:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", ctrl->opts->reconnect_delay);
^~~~~~~
drivers/nvme/host/core.c:3663:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", ctrl->opts->reconnect_delay);
^~~~~~~
drivers/nvme/host/core.c:3952:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(disk->disk_name, disk_name, DISK_NAME_LEN);
^~~~~~
drivers/nvme/host/core.c:3952:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(disk->disk_name, disk_name, DISK_NAME_LEN);
^~~~~~
drivers/nvme/host/core.c:4558:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&ctrl->ka_cmd, 0, sizeof(ctrl->ka_cmd));
^~~~~~
drivers/nvme/host/core.c:4558:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&ctrl->ka_cmd, 0, sizeof(ctrl->ka_cmd));
^~~~~~
Suppressed 63 warnings (63 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
drivers/input/mouse/elan_i2c_smbus.c:127:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(val, buf, ETP_CALIBRATE_MAX_LEN);
^~~~~~
drivers/input/mouse/elan_i2c_smbus.c:127:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(val, buf, ETP_CALIBRATE_MAX_LEN);
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
36 warnings generated.
drivers/input/mouse/vsxxxaa.c:119:3: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(mouse->buf, mouse->buf + num, BUFLEN - num);
^~~~~~~
drivers/input/mouse/vsxxxaa.c:119:3: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(mouse->buf, mouse->buf + num, BUFLEN - num);
^~~~~~~
drivers/input/mouse/vsxxxaa.c:151:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(mouse->name, sizeof(mouse->name),
^~~~~~~~
drivers/input/mouse/vsxxxaa.c:151:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(mouse->name, sizeof(mouse->name),
^~~~~~~~
drivers/input/mouse/vsxxxaa.c:471:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(mouse->phys, sizeof(mouse->phys), "%s/input0", serio->phys);
^~~~~~~~
drivers/input/mouse/vsxxxaa.c:471:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(mouse->phys, sizeof(mouse->phys), "%s/input0", serio->phys);
^~~~~~~~
Suppressed 33 warnings (33 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
--
50 warnings generated.
drivers/media/dvb-frontends/cxd2820r_c.c:14:21: warning: Value stored to 'client' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct i2c_client *client = priv->client[0];
^~~~~~ ~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/cxd2820r_c.c:14:21: note: Value stored to 'client' during its initialization is never read
struct i2c_client *client = priv->client[0];
^~~~~~ ~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/cxd2820r_c.c:15:34: warning: Value stored to 'c' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct dtv_frontend_properties *c = &fe->dtv_property_cache;
^ ~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/cxd2820r_c.c:15:34: note: Value stored to 'c' during its initialization is never read
struct dtv_frontend_properties *c = &fe->dtv_property_cache;
^ ~~~~~~~~~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/cxd2820r_c.c:92:21: warning: Value stored to 'client' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct i2c_client *client = priv->client[0];
^~~~~~ ~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/cxd2820r_c.c:92:21: note: Value stored to 'client' during its initialization is never read
struct i2c_client *client = priv->client[0];
^~~~~~ ~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/cxd2820r_c.c:145:21: warning: Value stored to 'client' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct i2c_client *client = priv->client[0];
^~~~~~ ~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/cxd2820r_c.c:145:21: note: Value stored to 'client' during its initialization is never read
struct i2c_client *client = priv->client[0];
^~~~~~ ~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/cxd2820r_c.c:281:21: warning: Value stored to 'client' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct i2c_client *client = priv->client[0];
^~~~~~ ~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/cxd2820r_c.c:281:21: note: Value stored to 'client' during its initialization is never read
struct i2c_client *client = priv->client[0];
^~~~~~ ~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/cxd2820r_c.c:299:21: warning: Value stored to 'client' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct i2c_client *client = priv->client[0];
^~~~~~ ~~~~~~~~~~~~~~~
drivers/media/dvb-frontends/cxd2820r_c.c:299:21: note: Value stored to 'client' during its initialization is never read
struct i2c_client *client = priv->client[0];
^~~~~~ ~~~~~~~~~~~~~~~
Suppressed 44 warnings (43 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
drivers/iio/dac/ltc2632.c:138:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n",
^~~~~~~
drivers/iio/dac/ltc2632.c:138:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n",
^~~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
50 warnings generated.
drivers/media/i2c/cx25840/cx25840-ir.c:715:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(p, &ir_state->rx_params,
^~~~~~
drivers/media/i2c/cx25840/cx25840-ir.c:715:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(p, &ir_state->rx_params,
^~~~~~
drivers/media/i2c/cx25840/cx25840-ir.c:905:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(p, &ir_state->tx_params,
^~~~~~
drivers/media/i2c/cx25840/cx25840-ir.c:905:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(p, &ir_state->tx_params,
^~~~~~
Suppressed 48 warnings (44 in non-user code, 4 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
36 warnings generated.
drivers/iio/industrialio-event.c:298:10: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", val);
^~~~~~~
drivers/iio/industrialio-event.c:298:10: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", val);
^~~~~~~
drivers/iio/industrialio-event.c:520:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ev_int->group.attrs,
^~~~~~
drivers/iio/industrialio-event.c:520:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ev_int->group.attrs,
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
18 warnings generated.
Suppressed 18 warnings (18 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
49 warnings generated.
drivers/iio/industrialio-buffer.c:229:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u\n", to_iio_dev_attr(attr)->c->scan_index);
^~~~~~~
drivers/iio/industrialio-buffer.c:229:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u\n", to_iio_dev_attr(attr)->c->scan_index);
^~~~~~~
>> drivers/iio/industrialio-buffer.c:247:10: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s:%c%d/%dX%d>>%u\n",
^~~~~~~
drivers/iio/industrialio-buffer.c:247:10: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s:%c%d/%dX%d>>%u\n",
^~~~~~~
drivers/iio/industrialio-buffer.c:255:11: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s:%c%d/%d>>%u\n",
^~~~~~~
drivers/iio/industrialio-buffer.c:255:11: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s:%c%d/%d>>%u\n",
^~~~~~~
drivers/iio/industrialio-buffer.c:275:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", ret);
^~~~~~~
drivers/iio/industrialio-buffer.c:275:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", ret);
^~~~~~~
drivers/iio/industrialio-buffer.c:420:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", buffer->scan_timestamp);
^~~~~~~
drivers/iio/industrialio-buffer.c:420:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", buffer->scan_timestamp);
^~~~~~~
drivers/iio/industrialio-buffer.c:509:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", buffer->length);
^~~~~~~
drivers/iio/industrialio-buffer.c:509:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", buffer->length);
^~~~~~~
drivers/iio/industrialio-buffer.c:552:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", iio_buffer_is_active(buffer));
^~~~~~~
drivers/iio/industrialio-buffer.c:552:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", iio_buffer_is_active(buffer));
^~~~~~~
drivers/iio/industrialio-buffer.c:710:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(config, 0, sizeof(*config));
^~~~~~
drivers/iio/industrialio-buffer.c:710:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(config, 0, sizeof(*config));
^~~~~~
drivers/iio/industrialio-buffer.c:723:2: warning: Dereference of null pointer [clang-analyzer-core.NullDereference]
list_for_each_entry(buffer, &iio_dev_opaque->buffer_list, buffer_list) {
^
include/linux/list.h:656:13: note: expanded from macro 'list_for_each_entry'
pos = list_next_entry(pos, member))
^
include/linux/list.h:555:2: note: expanded from macro 'list_next_entry'
list_entry((pos)->member.next, typeof(*(pos)), member)
^
include/linux/list.h:511:2: note: expanded from macro 'list_entry'
container_of(ptr, type, member)
^
include/linux/kernel.h:854:25: note: expanded from macro 'container_of'
void *__mptr = (void *)(ptr); \
^
drivers/iio/industrialio-buffer.c:1168:8: note: Calling 'strtobool'
ret = strtobool(buf, &requested_state);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/string.h:189:9: note: Value assigned to 'requested_state', which participates in a condition later
return kstrtobool(s, res);
^~~~~~~~~~~~~~~~~~
drivers/iio/industrialio-buffer.c:1168:8: note: Returning from 'strtobool'
ret = strtobool(buf, &requested_state);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/iio/industrialio-buffer.c:1169:6: note: Assuming 'ret' is >= 0
if (ret < 0)
^~~~~~~
drivers/iio/industrialio-buffer.c:1169:2: note: Taking false branch
if (ret < 0)
^
drivers/iio/industrialio-buffer.c:1177:6: note: Assuming 'inlist' is not equal to 'requested_state'
if (inlist == requested_state)
^~~~~~~~~~~~~~~~~~~~~~~~~
drivers/iio/industrialio-buffer.c:1177:2: note: Taking false branch
if (inlist == requested_state)
^
drivers/iio/industrialio-buffer.c:1180:6: note: Assuming 'requested_state' is true
if (requested_state)
^~~~~~~~~~~~~~~
drivers/iio/industrialio-buffer.c:1180:2: note: Taking true branch
if (requested_state)
^
drivers/iio/industrialio-buffer.c:1181:9: note: Calling '__iio_update_buffers'
ret = __iio_update_buffers(indio_dev, buffer, NULL);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
drivers/iio/industrialio-buffer.c:1063:42: note: Left side of '&&' is false
struct iio_dev_opaque *iio_dev_opaque = to_iio_dev_opaque(indio_dev);
^
include/linux/iio/iio-opaque.h:34:2: note: expanded from macro 'to_iio_dev_opaque'
container_of(indio_dev, struct iio_dev_opaque, indio_dev)
^
include/linux/kernel.h:855:61: note: expanded from macro 'container_of'
BUILD_BUG_ON_MSG(!__same_type(*(ptr), ((type *)0)->member) && \
^
drivers/iio/industrialio-buffer.c:1063:42: note: Taking false branch
struct iio_dev_opaque *iio_dev_opaque = to_iio_dev_opaque(indio_dev);
^
include/linux/iio/iio-opaque.h:34:2: note: expanded from macro 'to_iio_dev_opaque'
container_of(indio_dev, struct iio_dev_opaque, indio_dev)
--
fs/btrfs/check-integrity.c:1340:6: note: Left side of '&&' is true
fs/btrfs/check-integrity.c:1340:27: note: 'did_alloc_block_link' is 1
if (limit_nesting > 0 && did_alloc_block_link) {
^~~~~~~~~~~~~~~~~~~~
fs/btrfs/check-integrity.c:1340:2: note: Taking true branch
if (limit_nesting > 0 && did_alloc_block_link) {
^
fs/btrfs/check-integrity.c:1341:9: note: Calling 'btrfsic_read_block'
ret = btrfsic_read_block(state, next_block_ctx);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/btrfs/check-integrity.c:1589:2: note: Taking false branch
BUG_ON(block_ctx->datav);
^
include/asm-generic/bug.h:63:32: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^
fs/btrfs/check-integrity.c:1589:2: note: Loop condition is false. Exiting loop
BUG_ON(block_ctx->datav);
^
include/asm-generic/bug.h:63:27: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^
fs/btrfs/check-integrity.c:1590:2: note: Taking false branch
BUG_ON(block_ctx->pagev);
^
include/asm-generic/bug.h:63:32: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^
fs/btrfs/check-integrity.c:1590:2: note: Loop condition is false. Exiting loop
BUG_ON(block_ctx->pagev);
^
include/asm-generic/bug.h:63:27: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^
fs/btrfs/check-integrity.c:1591:2: note: Taking false branch
BUG_ON(block_ctx->mem_to_free);
^
include/asm-generic/bug.h:63:32: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^
fs/btrfs/check-integrity.c:1591:2: note: Loop condition is false. Exiting loop
BUG_ON(block_ctx->mem_to_free);
^
include/asm-generic/bug.h:63:27: note: expanded from macro 'BUG_ON'
#define BUG_ON(condition) do { if (unlikely(condition)) BUG(); } while (0)
^
fs/btrfs/check-integrity.c:1592:7: note: Assuming the condition is false
if (!PAGE_ALIGNED(block_ctx->dev_bytenr)) {
^
include/linux/mm.h:228:28: note: expanded from macro 'PAGE_ALIGNED'
#define PAGE_ALIGNED(addr) IS_ALIGNED((unsigned long)(addr), PAGE_SIZE)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/kernel.h:38:28: note: expanded from macro 'IS_ALIGNED'
#define IS_ALIGNED(x, a) (((x) & ((typeof(x))(a) - 1)) == 0)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/btrfs/check-integrity.c:1592:2: note: Taking true branch
if (!PAGE_ALIGNED(block_ctx->dev_bytenr)) {
^
fs/btrfs/check-integrity.c:1595:3: note: Returning without writing to 'block_ctx->datav'
return -1;
^
fs/btrfs/check-integrity.c:1341:9: note: Returning from 'btrfsic_read_block'
ret = btrfsic_read_block(state, next_block_ctx);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/btrfs/check-integrity.c:1342:7: note: 'ret' is >= field 'len'
if (ret < (int)next_block_ctx->len) {
^~~
fs/btrfs/check-integrity.c:1342:3: note: Taking false branch
if (ret < (int)next_block_ctx->len) {
^
fs/btrfs/check-integrity.c:1356:2: note: Returning zero, which participates in a condition later
return 0;
^~~~~~~~
fs/btrfs/check-integrity.c:1123:16: note: Returning from 'btrfsic_create_link_to_next_block'
sf->error = btrfsic_create_link_to_next_block(
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/btrfs/check-integrity.c:1136:12: note: Field 'error' is 0
if (sf->error)
^
fs/btrfs/check-integrity.c:1136:4: note: Taking false branch
if (sf->error)
^
fs/btrfs/check-integrity.c:1139:8: note: NULL is not equal to field 'next_block'
if (NULL != sf->next_block) {
^
include/linux/stddef.h:8:14: note: expanded from macro 'NULL'
#define NULL ((void *)0)
^~~~~~~~~~~
fs/btrfs/check-integrity.c:1139:4: note: Taking true branch
if (NULL != sf->next_block) {
^
fs/btrfs/check-integrity.c:1142:9: note: Array access (via field 'datav') results in a null pointer dereference
sf->next_block_ctx.datav[0];
^ ~~~~~
fs/btrfs/check-integrity.c:1208:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dst, kaddr + pgoff, cur);
^~~~~~
fs/btrfs/check-integrity.c:1208:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dst, kaddr + pgoff, cur);
^~~~~~
>> fs/btrfs/check-integrity.c:2475:15: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
indent_add = sprintf(buf, "%c-%llu(%s/%llu/%u)",
^~~~~~~
fs/btrfs/check-integrity.c:2475:15: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
indent_add = sprintf(buf, "%c-%llu(%s/%llu/%u)",
^~~~~~~
fs/btrfs/check-integrity.c:2502:17: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
indent_add = sprintf(buf, " %d*--> ", l->ref_cnt);
^~~~~~~
fs/btrfs/check-integrity.c:2502:17: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
indent_add = sprintf(buf, " %d*--> ", l->ref_cnt);
^~~~~~~
fs/btrfs/check-integrity.c:2504:17: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
indent_add = sprintf(buf, " --> ");
^~~~~~~
fs/btrfs/check-integrity.c:2504:17: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
indent_add = sprintf(buf, " --> ");
^~~~~~~
include/linux/unaligned/packed_struct.h:25:2: warning: Undefined or garbage value returned to caller [clang-analyzer-core.uninitialized.UndefReturn]
return ptr->x;
^
fs/btrfs/check-integrity.c:2777:7: note: Assuming the condition is true
if (!PAGE_ALIGNED(fs_info->nodesize)) {
^
include/linux/mm.h:228:28: note: expanded from macro 'PAGE_ALIGNED'
#define PAGE_ALIGNED(addr) IS_ALIGNED((unsigned long)(addr), PAGE_SIZE)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/kernel.h:38:28: note: expanded from macro 'IS_ALIGNED'
#define IS_ALIGNED(x, a) (((x) & ((typeof(x))(a) - 1)) == 0)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/btrfs/check-integrity.c:2777:2: note: Taking false branch
if (!PAGE_ALIGNED(fs_info->nodesize)) {
^
fs/btrfs/check-integrity.c:2782:7: note: Assuming the condition is true
if (!PAGE_ALIGNED(fs_info->sectorsize)) {
^
include/linux/mm.h:228:28: note: expanded from macro 'PAGE_ALIGNED'
#define PAGE_ALIGNED(addr) IS_ALIGNED((unsigned long)(addr), PAGE_SIZE)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/kernel.h:38:28: note: expanded from macro 'IS_ALIGNED'
#define IS_ALIGNED(x, a) (((x) & ((typeof(x))(a) - 1)) == 0)
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
fs/btrfs/check-integrity.c:2782:2: note: Taking false branch
if (!PAGE_ALIGNED(fs_info->sectorsize)) {
^
fs/btrfs/check-integrity.c:2788:6: note: Assuming 'state' is non-null
if (!state)
^~~~~~
fs/btrfs/check-integrity.c:2788:2: note: Taking false branch
if (!state)
^
fs/btrfs/check-integrity.c:2791:6: note: Assuming 'btrfsic_is_initialized' is not equal to 0
if (!btrfsic_is_initialized) {
^~~~~~~~~~~~~~~~~~~~~~~
fs/btrfs/check-integrity.c:2791:2: note: Taking false branch
if (!btrfsic_is_initialized) {
^
fs/btrfs/check-integrity.c:2809:2: note: Left side of '&&' is false
list_for_each_entry(device, dev_head, dev_list) {
^
include/linux/list.h:654:13: note: expanded from macro 'list_for_each_entry'
for (pos = list_first_entry(head, typeof(*pos), member); \
^
include/linux/list.h:522:2: note: expanded from macro 'list_first_entry'
list_entry((ptr)->next, type, member)
^
include/linux/list.h:511:2: note: expanded from macro 'list_entry'
container_of(ptr, type, member)
^
include/linux/kernel.h:855:61: note: expanded from macro 'container_of'
BUILD_BUG_ON_MSG(!__same_type(*(ptr), ((type *)0)->member) && \
^
fs/btrfs/check-integrity.c:2809:2: note: Taking false branch
list_for_each_entry(device, dev_head, dev_list) {
^
include/linux/list.h:654:13: note: expanded from macro 'list_for_each_entry'
for (pos = list_first_entry(head, typeof(*pos), member); \
^
include/linux/list.h:522:2: note: expanded from macro 'list_first_entry'
list_entry((ptr)->next, type, member)
^
include/linux/list.h:511:2: note: expanded from macro 'list_entry'
container_of(ptr, type, member)
^
note: (skipping 2 expansions in backtrace; use -fmacro-backtrace-limit=0 to see all)
include/linux/compiler_types.h:315:2: note: expanded from macro 'compiletime_assert'
_compiletime_assert(condition, msg, __compiletime_assert_, __COUNTER__)
^
include/linux/compiler_types.h:303:2: note: expanded from macro '_compiletime_assert'
__compiletime_assert(condition, msg, prefix, suffix)
^
include/linux/compiler_types.h:295:3: note: expanded from macro '__compiletime_assert'
if (!(condition)) \
^
fs/btrfs/check-integrity.c:2809:2: note: Loop condition is false. Exiting loop
list_for_each_entry(device, dev_head, dev_list) {
^
include/linux/list.h:654:13: note: expanded from macro 'list_for_each_entry'
for (pos = list_first_entry(head, typeof(*pos), member); \
^
include/linux/list.h:522:2: note: expanded from macro 'list_first_entry'
--
^
fs/btrfs/disk-io.c:2076:3: note: Calling 'list_del'
list_del(&gang[0]->root_list);
^~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/linux/list.h:146:2: note: Calling '__list_del_entry'
__list_del_entry(entry);
^~~~~~~~~~~~~~~~~~~~~~~
include/linux/list.h:132:2: note: Taking false branch
if (!__list_del_entry_valid(entry))
^
include/linux/list.h:135:13: note: Use of memory after it is freed
__list_del(entry->prev, entry->next);
^~~~~~~~~~~
Suppressed 49 warnings (49 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
52 warnings generated.
drivers/hwmon/lm95234.c:215:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n",
^~~~~~~
drivers/hwmon/lm95234.c:215:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n",
^~~~~~~
drivers/hwmon/lm95234.c:229:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u", !!(data->status & mask));
^~~~~~~
drivers/hwmon/lm95234.c:229:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u", !!(data->status & mask));
^~~~~~~
drivers/hwmon/lm95234.c:242:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, data->sensor_type & mask ? "1\n" : "2\n");
^~~~~~~
drivers/hwmon/lm95234.c:242:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, data->sensor_type & mask ? "1\n" : "2\n");
^~~~~~~
drivers/hwmon/lm95234.c:286:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u", data->tcrit2[index] * 1000);
^~~~~~~
drivers/hwmon/lm95234.c:286:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u", data->tcrit2[index] * 1000);
^~~~~~~
drivers/hwmon/lm95234.c:325:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d",
^~~~~~~
drivers/hwmon/lm95234.c:325:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d",
^~~~~~~
drivers/hwmon/lm95234.c:335:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%u", data->tcrit1[index] * 1000);
^~~~~~~
drivers/hwmon/lm95234.c:335:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%u", data->tcrit1[index] * 1000);
^~~~~~~
drivers/hwmon/lm95234.c:374:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d",
^~~~~~~
drivers/hwmon/lm95234.c:374:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d",
^~~~~~~
drivers/hwmon/lm95234.c:415:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d", data->toffset[index] * 500);
^~~~~~~
drivers/hwmon/lm95234.c:415:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d", data->toffset[index] * 500);
^~~~~~~
drivers/hwmon/lm95234.c:453:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%lu\n",
^~~~~~~
drivers/hwmon/lm95234.c:453:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%lu\n",
^~~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
7 warnings generated.
lib/zlib_deflate/deftree.c:1056:5: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&s->pending_buf[s->pending], buf, len);
^~~~~~
lib/zlib_deflate/deftree.c:1056:5: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&s->pending_buf[s->pending], buf, len);
^~~~~~
Suppressed 6 warnings (6 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
10 warnings generated.
Suppressed 10 warnings (10 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
18 warnings generated.
Suppressed 18 warnings (18 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
34 warnings generated.
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
40 warnings generated.
drivers/accessibility/speakup/speakup_soft.c:157:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(buf, 0, sizeof(buf));
^~~~~~
drivers/accessibility/speakup/speakup_soft.c:157:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(buf, 0, sizeof(buf));
^~~~~~
>> drivers/accessibility/speakup/speakup_soft.c:163:14: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
cp = cp + sprintf(cp, var->u.n.synth_fmt,
^~~~~~~
drivers/accessibility/speakup/speakup_soft.c:163:14: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
cp = cp + sprintf(cp, var->u.n.synth_fmt,
^~~~~~~
drivers/accessibility/speakup/speakup_soft.c:167:2: warning: Value stored to 'cp' is never read [clang-analyzer-deadcode.DeadStores]
cp = cp + sprintf(cp, "\n");
^ ~~~~~~~~~~~~~~~~~~~~~~
drivers/accessibility/speakup/speakup_soft.c:167:2: note: Value stored to 'cp' is never read
cp = cp + sprintf(cp, "\n");
^ ~~~~~~~~~~~~~~~~~~~~~~
drivers/accessibility/speakup/speakup_soft.c:167:12: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
cp = cp + sprintf(cp, "\n");
^~~~~~~
drivers/accessibility/speakup/speakup_soft.c:167:12: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
cp = cp + sprintf(cp, "\n");
^~~~~~~
drivers/accessibility/speakup/speakup_soft.c:379:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&synth_device, 0, sizeof(synth_device));
^~~~~~
drivers/accessibility/speakup/speakup_soft.c:379:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&synth_device, 0, sizeof(synth_device));
^~~~~~
drivers/accessibility/speakup/speakup_soft.c:388:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&synthu_device, 0, sizeof(synthu_device));
^~~~~~
drivers/accessibility/speakup/speakup_soft.c:388:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&synthu_device, 0, sizeof(synthu_device));
^~~~~~
Suppressed 34 warnings (34 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
Suppressed 45 warnings (44 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
Suppressed 45 warnings (44 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
drivers/media/test-drivers/vimc/vimc-sensor.c:211:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(str, sizeof(str),
^~~~~~~~
drivers/media/test-drivers/vimc/vimc-sensor.c:211:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(str, sizeof(str),
^~~~~~~~
drivers/media/test-drivers/vimc/vimc-sensor.c:218:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(str, sizeof(str), "sensor size: %dx%d",
^~~~~~~~
drivers/media/test-drivers/vimc/vimc-sensor.c:218:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(str, sizeof(str), "sensor size: %dx%d",
^~~~~~~~
drivers/media/test-drivers/vimc/vimc-sensor.c:228:3: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(str, sizeof(str), "%02d:%02d:%02d:%03d",
^~~~~~~~
drivers/media/test-drivers/vimc/vimc-sensor.c:228:3: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(str, sizeof(str), "%02d:%02d:%02d:%03d",
^~~~~~~~
Suppressed 45 warnings (44 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
48 warnings generated.
drivers/media/dvb-frontends/tda10048.c:268:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(buf + 1, data, len);
^~~~~~
drivers/media/dvb-frontends/tda10048.c:268:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(buf + 1, data, len);
^~~~~~
drivers/media/dvb-frontends/tda10048.c:493:3: warning: Value stored to 'ret' is never read [clang-analyzer-deadcode.DeadStores]
ret = 0;
^ ~
drivers/media/dvb-frontends/tda10048.c:493:3: note: Value stored to 'ret' is never read
ret = 0;
^ ~
drivers/media/dvb-frontends/tda10048.c:1096:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&state->config, config, sizeof(*config));
^~~~~~
drivers/media/dvb-frontends/tda10048.c:1096:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&state->config, config, sizeof(*config));
^~~~~~
drivers/media/dvb-frontends/tda10048.c:1106:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&state->frontend.ops, &tda10048_ops,
^~~~~~
drivers/media/dvb-frontends/tda10048.c:1106:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&state->frontend.ops, &tda10048_ops,
^~~~~~
Suppressed 44 warnings (43 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
drivers/media/dvb-frontends/s5h1411.c:880:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&state->frontend.ops, &s5h1411_ops,
^~~~~~
drivers/media/dvb-frontends/s5h1411.c:880:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&state->frontend.ops, &s5h1411_ops,
^~~~~~
Suppressed 44 warnings (43 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
fs/fuse/inode.c:488:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&outarg, 0, sizeof(outarg));
^~~~~~
fs/fuse/inode.c:488:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&outarg, 0, sizeof(outarg));
--
^~~~~~
fs/btrfs/sysfs.c:1621:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&qgroup->kobj, 0, sizeof(*kobj));
^~~~~~
Suppressed 48 warnings (48 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
drivers/media/i2c/ir-kbd-i2c.c:861:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(ir->phys, sizeof(ir->phys), "%s/%s", dev_name(&adap->dev),
^~~~~~~~
drivers/media/i2c/ir-kbd-i2c.c:861:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(ir->phys, sizeof(ir->phys), "%s/%s", dev_name(&adap->dev),
^~~~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
Suppressed 45 warnings (44 in non-user code, 1 with check filters).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
drivers/iio/imu/inv_icm42600/inv_icm42600_accel.c:395:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(data, st->buffer, sizeof(data));
^~~~~~
drivers/iio/imu/inv_icm42600/inv_icm42600_accel.c:395:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(data, st->buffer, sizeof(data));
^~~~~~
drivers/iio/imu/inv_icm42600/inv_icm42600_accel.c:778:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&buffer, 0, sizeof(buffer));
^~~~~~
drivers/iio/imu/inv_icm42600/inv_icm42600_accel.c:778:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&buffer, 0, sizeof(buffer));
^~~~~~
drivers/iio/imu/inv_icm42600/inv_icm42600_accel.c:779:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&buffer.accel, accel, sizeof(buffer.accel));
^~~~~~
drivers/iio/imu/inv_icm42600/inv_icm42600_accel.c:779:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&buffer.accel, accel, sizeof(buffer.accel));
^~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
45 warnings generated.
drivers/iio/imu/inv_icm42600/inv_icm42600_buffer.c:256:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(st->buffer, &raw_wm, sizeof(raw_wm));
^~~~~~
drivers/iio/imu/inv_icm42600/inv_icm42600_buffer.c:256:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(st->buffer, &raw_wm, sizeof(raw_wm));
^~~~~~
Suppressed 44 warnings (44 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
36 warnings generated.
drivers/tty/serial/max310x.c:1040:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(rs485->padding, 0, sizeof(rs485->padding));
^~~~~~
drivers/tty/serial/max310x.c:1040:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(rs485->padding, 0, sizeof(rs485->padding));
^~~~~~
Suppressed 35 warnings (35 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
drivers/tty/serial/sccnxp.c:949:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(&s->pdata, pdata, sizeof(struct sccnxp_pdata));
^~~~~~
drivers/tty/serial/sccnxp.c:949:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(&s->pdata, pdata, sizeof(struct sccnxp_pdata));
^~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
drivers/hwmon/mcp3021.c:98:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%d\n", in_input);
^~~~~~~
drivers/hwmon/mcp3021.c:98:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%d\n", in_input);
^~~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
43 warnings generated.
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
drivers/gnss/sirf.c:191:17: warning: Value stored to 'dev' during its initialization is never read [clang-analyzer-deadcode.DeadStores]
struct device *dev = &data->serdev->dev;
^~~ ~~~~~~~~~~~~~~~~~~
drivers/gnss/sirf.c:191:17: note: Value stored to 'dev' during its initialization is never read
struct device *dev = &data->serdev->dev;
^~~ ~~~~~~~~~~~~~~~~~~
Suppressed 43 warnings (43 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
47 warnings generated.
>> drivers/counter/counter.c:55:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", e->items[index]);
^~~~~~~
drivers/counter/counter.c:55:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", e->items[index]);
^~~~~~~
drivers/counter/counter.c:94:10: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += sprintf(buf + len, "%s\n", e->items[i]);
^~~~~~~
drivers/counter/counter.c:94:10: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
len += sprintf(buf + len, "%s\n", e->items[i]);
^~~~~~~
drivers/counter/counter.c:118:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", e->items[index]);
^~~~~~~
drivers/counter/counter.c:118:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", e->items[index]);
^~~~~~~
drivers/counter/counter.c:157:10: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += sprintf(buf + len, "%s\n", e->items[i]);
^~~~~~~
drivers/counter/counter.c:157:10: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
len += sprintf(buf + len, "%s\n", e->items[i]);
^~~~~~~
drivers/counter/counter.c:180:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", e->items[index]);
^~~~~~~
drivers/counter/counter.c:180:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", e->items[index]);
^~~~~~~
drivers/counter/counter.c:217:10: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += sprintf(buf + len, "%s\n", e->items[i]);
^~~~~~~
drivers/counter/counter.c:217:10: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
len += sprintf(buf + len, "%s\n", e->items[i]);
^~~~~~~
drivers/counter/counter.c:311:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", counter_signal_value_str[val]);
^~~~~~~
drivers/counter/counter.c:311:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", counter_signal_value_str[val]);
^~~~~~~
drivers/counter/counter.c:324:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", comp->name);
^~~~~~~
drivers/counter/counter.c:324:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", comp->name);
^~~~~~~
drivers/counter/counter.c:563:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", counter_synapse_action_str[action]);
^~~~~~~
drivers/counter/counter.c:563:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", counter_synapse_action_str[action]);
^~~~~~~
drivers/counter/counter.c:615:10: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += sprintf(buf + len, "%s\n",
^~~~~~~
drivers/counter/counter.c:615:10: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
len += sprintf(buf + len, "%s\n",
^~~~~~~
drivers/counter/counter.c:722:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%lu\n", val);
^~~~~~~
drivers/counter/counter.c:722:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%lu\n", val);
^~~~~~~
drivers/counter/counter.c:776:9: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%s\n", counter_count_function_str[function]);
^~~~~~~
drivers/counter/counter.c:776:9: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%s\n", counter_count_function_str[function]);
^~~~~~~
drivers/counter/counter.c:900:10: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
len += sprintf(buf + len, "%s\n",
^~~~~~~
drivers/counter/counter.c:900:10: note: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
len += sprintf(buf + len, "%s\n",
^~~~~~~
drivers/counter/counter.c:1051:9: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
return sprintf(buf, "%zu\n", comp->size);
^~~~~~~
drivers/counter/counter.c:1051:9: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
return sprintf(buf, "%zu\n", comp->size);
^~~~~~~
Suppressed 33 warnings (33 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
44 warnings generated.
drivers/staging/iio/cdc/ad7746.c:91:8: warning: Excessive padding in 'struct ad7746_chip_info' (36 padding bytes, where 4 is optimal).
Optimal fields order:
data,
client,
lock,
config,
cap_setup,
vt_setup,
capdac_set,
capdac,
consider reordering the fields or adding explicit padding members [clang-analyzer-optin.performance.Padding]
struct ad7746_chip_info {
~~~~~~~^~~~~~~~~~~~~~~~~~
drivers/staging/iio/cdc/ad7746.c:91:8: note: Excessive padding in 'struct ad7746_chip_info' (36 padding bytes, where 4 is optimal). Optimal fields order: data, client, lock, config, cap_setup, vt_setup, capdac_set, capdac, consider reordering the fields or adding explicit padding members
vim +2190 block/genhd.c
77ea887e433ad8 Tejun Heo 2010-12-08 2172
77ea887e433ad8 Tejun Heo 2010-12-08 2173 /*
77ea887e433ad8 Tejun Heo 2010-12-08 2174 * A disk events enabled device has the following sysfs nodes under
77ea887e433ad8 Tejun Heo 2010-12-08 2175 * its /sys/block/X/ directory.
77ea887e433ad8 Tejun Heo 2010-12-08 2176 *
77ea887e433ad8 Tejun Heo 2010-12-08 2177 * events : list of all supported events
77ea887e433ad8 Tejun Heo 2010-12-08 2178 * events_async : list of events which can be detected w/o polling
673387a930059f Martin Wilck 2019-03-27 2179 * (always empty, only for backwards compatibility)
77ea887e433ad8 Tejun Heo 2010-12-08 2180 * events_poll_msecs : polling interval, 0: disable, -1: system default
77ea887e433ad8 Tejun Heo 2010-12-08 2181 */
77ea887e433ad8 Tejun Heo 2010-12-08 2182 static ssize_t __disk_events_show(unsigned int events, char *buf)
77ea887e433ad8 Tejun Heo 2010-12-08 2183 {
77ea887e433ad8 Tejun Heo 2010-12-08 2184 const char *delim = "";
77ea887e433ad8 Tejun Heo 2010-12-08 2185 ssize_t pos = 0;
77ea887e433ad8 Tejun Heo 2010-12-08 2186 int i;
77ea887e433ad8 Tejun Heo 2010-12-08 2187
77ea887e433ad8 Tejun Heo 2010-12-08 2188 for (i = 0; i < ARRAY_SIZE(disk_events_strs); i++)
77ea887e433ad8 Tejun Heo 2010-12-08 2189 if (events & (1 << i)) {
77ea887e433ad8 Tejun Heo 2010-12-08 @2190 pos += sprintf(buf + pos, "%s%s",
77ea887e433ad8 Tejun Heo 2010-12-08 2191 delim, disk_events_strs[i]);
77ea887e433ad8 Tejun Heo 2010-12-08 2192 delim = " ";
77ea887e433ad8 Tejun Heo 2010-12-08 2193 }
77ea887e433ad8 Tejun Heo 2010-12-08 2194 if (pos)
77ea887e433ad8 Tejun Heo 2010-12-08 2195 pos += sprintf(buf + pos, "\n");
77ea887e433ad8 Tejun Heo 2010-12-08 2196 return pos;
77ea887e433ad8 Tejun Heo 2010-12-08 2197 }
77ea887e433ad8 Tejun Heo 2010-12-08 2198
:::::: The code@line 2190 was first introduced by commit
:::::: 77ea887e433ad8389d416826936c110fa7910f80 implement in-kernel gendisk events handling
:::::: TO: Tejun Heo <tj@kernel.org>
:::::: CC: Jens Axboe <jaxboe@fusionio.com>
--
0-DAY CI Kernel Test Service
https://01.org/lkp
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2022-05-29 15:35 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2022-05-29 15:35 [chrome-os:chromeos-5.10 25/29] block/genhd.c:2190:11: warning: Call to function 'sprintf' is insecure as it does not provide bounding of the memory buffer or security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides bound kernel test robot
-- strict thread matches above, loose matches on Subject: below --
2022-05-27 3:30 kernel test robot
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.