All of lore.kernel.org
 help / color / mirror / Atom feed
* snprintf(err->loc, TRACING_LOG_LOC_MAX, "%s: error: ", loc);
@ 2022-06-01 19:26 kernel test robot
  0 siblings, 0 replies; only message in thread
From: kernel test robot @ 2022-06-01 19:26 UTC (permalink / raw)
  To: kbuild

[-- Attachment #1: Type: text/plain, Size: 32436 bytes --]

:::::: 
:::::: Manual check reason: "low confidence static check first_new_problem: snprintf(err->loc, TRACING_LOG_LOC_MAX, "%s: error: ", loc);"
:::::: 

CC: llvm(a)lists.linux.dev
CC: kbuild-all(a)lists.01.org
BCC: lkp(a)intel.com
CC: linux-kernel(a)vger.kernel.org
TO: Arnd Bergmann <arnd@arndb.de>
CC: Masahiro Yamada <masahiroy@kernel.org>
CC: Alex Shi <alexs@kernel.org>
CC: Nick Desaulniers <ndesaulniers@google.com>
CC: Miguel Ojeda <ojeda@kernel.org>
CC: Nathan Chancellor <nathan@kernel.org>

tree:   https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git master
head:   700170bf6b4d773e328fa54ebb70ba444007c702
commit: e8c07082a810fbb9db303a2b66b66b8d7e588b53 Kbuild: move to -std=gnu11
date:   3 months ago
:::::: branch date: 19 hours ago
:::::: commit date: 3 months ago
config: x86_64-randconfig-c007-20220530 (https://download.01.org/0day-ci/archive/20220602/202206020341.VJfT8Qsk-lkp(a)intel.com/config)
compiler: clang version 15.0.0 (https://github.com/llvm/llvm-project 0776c48f9b7e69fa447bee57c7c0985caa856be9)
reproduce (this is a W=1 build):
        wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross
        chmod +x ~/bin/make.cross
        # https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e8c07082a810fbb9db303a2b66b66b8d7e588b53
        git remote add linus https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
        git fetch --no-tags linus master
        git checkout e8c07082a810fbb9db303a2b66b66b8d7e588b53
        # save the config file
        COMPILER_INSTALL_PATH=$HOME/0day COMPILER=clang make.cross 

If you fix the issue, kindly add following tag where applicable
Reported-by: kernel test robot <lkp@intel.com>

All errors (new ones prefixed by >>):

>>         snprintf(err->loc, TRACING_LOG_LOC_MAX, "%s: error: ", loc);
           ^~~~~~~~
   kernel/trace/trace.c:7828:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
>>         snprintf(err->loc, TRACING_LOG_LOC_MAX, "%s: error: ", loc);
           ^~~~~~~~
   kernel/trace/trace.c:7829:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           snprintf(err->cmd, MAX_FILTER_STR_VAL,"\n" CMD_PREFIX "%s\n", cmd);
           ^~~~~~~~
   kernel/trace/trace.c:7829:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
           snprintf(err->cmd, MAX_FILTER_STR_VAL,"\n" CMD_PREFIX "%s\n", cmd);
           ^~~~~~~~
   kernel/trace/trace.c:8594:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           snprintf(cpu_dir, 30, "cpu%ld", cpu);
           ^~~~~~~~
   kernel/trace/trace.c:8594:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
           snprintf(cpu_dir, 30, "cpu%ld", cpu);
           ^~~~~~~~
   kernel/trace/trace.c:8935:6: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           r = sprintf(buf, "%d\n", r);
               ^~~~~~~
   kernel/trace/trace.c:8935:6: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           r = sprintf(buf, "%d\n", r);
               ^~~~~~~
   kernel/trace/trace.c:8991:6: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           r = sprintf(buf, "%d\n", r);
               ^~~~~~~
   kernel/trace/trace.c:8991:6: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
           r = sprintf(buf, "%d\n", r);
               ^~~~~~~
   Suppressed 41 warnings (41 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   33 warnings generated.
   arch/x86/events/intel/cstate.c:195:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
   DEFINE_CSTATE_FORMAT_ATTR(core_event, event, "config:0-63");
   ^
   arch/x86/events/intel/cstate.c:118:9: note: expanded from macro 'DEFINE_CSTATE_FORMAT_ATTR'
           return sprintf(page, _format "\n");                     \
                  ^~~~~~~
   arch/x86/events/intel/cstate.c:195:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
   DEFINE_CSTATE_FORMAT_ATTR(core_event, event, "config:0-63");
   ^
   arch/x86/events/intel/cstate.c:118:9: note: expanded from macro 'DEFINE_CSTATE_FORMAT_ATTR'
           return sprintf(page, _format "\n");                     \
                  ^~~~~~~
   arch/x86/events/intel/cstate.c:274:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
   DEFINE_CSTATE_FORMAT_ATTR(pkg_event, event, "config:0-63");
   ^
   arch/x86/events/intel/cstate.c:118:9: note: expanded from macro 'DEFINE_CSTATE_FORMAT_ATTR'
           return sprintf(page, _format "\n");                     \
                  ^~~~~~~
   arch/x86/events/intel/cstate.c:274:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
   DEFINE_CSTATE_FORMAT_ATTR(pkg_event, event, "config:0-63");
   ^
   arch/x86/events/intel/cstate.c:118:9: note: expanded from macro 'DEFINE_CSTATE_FORMAT_ATTR'
           return sprintf(page, _format "\n");                     \
                  ^~~~~~~
   Suppressed 31 warnings (31 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   38 warnings generated.
   arch/x86/events/zhaoxin/core.c:437:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
   PMU_FORMAT_ATTR(event,  "config:0-7");
   ^
   include/linux/perf_event.h:1619:9: note: expanded from macro 'PMU_FORMAT_ATTR'
           return sprintf(page, _format "\n");                             \
                  ^~~~~~~
   arch/x86/events/zhaoxin/core.c:437:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
   PMU_FORMAT_ATTR(event,  "config:0-7");
   ^
   include/linux/perf_event.h:1619:9: note: expanded from macro 'PMU_FORMAT_ATTR'
           return sprintf(page, _format "\n");                             \
                  ^~~~~~~
   arch/x86/events/zhaoxin/core.c:438:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
   PMU_FORMAT_ATTR(umask,  "config:8-15");
   ^
   include/linux/perf_event.h:1619:9: note: expanded from macro 'PMU_FORMAT_ATTR'
           return sprintf(page, _format "\n");                             \
                  ^~~~~~~
   arch/x86/events/zhaoxin/core.c:438:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
   PMU_FORMAT_ATTR(umask,  "config:8-15");
   ^
   include/linux/perf_event.h:1619:9: note: expanded from macro 'PMU_FORMAT_ATTR'
           return sprintf(page, _format "\n");                             \
                  ^~~~~~~
   arch/x86/events/zhaoxin/core.c:439:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
   PMU_FORMAT_ATTR(edge,   "config:18");
   ^
   include/linux/perf_event.h:1619:9: note: expanded from macro 'PMU_FORMAT_ATTR'
           return sprintf(page, _format "\n");                             \
                  ^~~~~~~
   arch/x86/events/zhaoxin/core.c:439:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
   PMU_FORMAT_ATTR(edge,   "config:18");
   ^
   include/linux/perf_event.h:1619:9: note: expanded from macro 'PMU_FORMAT_ATTR'
           return sprintf(page, _format "\n");                             \
                  ^~~~~~~
   arch/x86/events/zhaoxin/core.c:440:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
   PMU_FORMAT_ATTR(inv,    "config:23");
   ^
   include/linux/perf_event.h:1619:9: note: expanded from macro 'PMU_FORMAT_ATTR'
           return sprintf(page, _format "\n");                             \
                  ^~~~~~~
   arch/x86/events/zhaoxin/core.c:440:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
   PMU_FORMAT_ATTR(inv,    "config:23");
   ^
   include/linux/perf_event.h:1619:9: note: expanded from macro 'PMU_FORMAT_ATTR'
           return sprintf(page, _format "\n");                             \
                  ^~~~~~~
   arch/x86/events/zhaoxin/core.c:441:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
   PMU_FORMAT_ATTR(cmask,  "config:24-31");
   ^
   include/linux/perf_event.h:1619:9: note: expanded from macro 'PMU_FORMAT_ATTR'
           return sprintf(page, _format "\n");                             \
                  ^~~~~~~
   arch/x86/events/zhaoxin/core.c:441:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
   PMU_FORMAT_ATTR(cmask,  "config:24-31");
   ^
   include/linux/perf_event.h:1619:9: note: expanded from macro 'PMU_FORMAT_ATTR'
           return sprintf(page, _format "\n");                             \
                  ^~~~~~~
   arch/x86/events/zhaoxin/core.c:571:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memcpy(hw_cache_event_ids, zxd_hw_cache_event_ids,
                           ^~~~~~
   arch/x86/events/zhaoxin/core.c:571:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                           memcpy(hw_cache_event_ids, zxd_hw_cache_event_ids,
                           ^~~~~~
   arch/x86/events/zhaoxin/core.c:582:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memcpy(hw_cache_event_ids, zxe_hw_cache_event_ids,
                           ^~~~~~
   arch/x86/events/zhaoxin/core.c:582:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                           memcpy(hw_cache_event_ids, zxe_hw_cache_event_ids,
                           ^~~~~~
   Suppressed 31 warnings (31 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   35 warnings generated.
   arch/x86/events/amd/ibs.c:521:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
   PMU_FORMAT_ATTR(rand_en,        "config:57");
   ^
   include/linux/perf_event.h:1619:9: note: expanded from macro 'PMU_FORMAT_ATTR'
           return sprintf(page, _format "\n");                             \
                  ^~~~~~~
   arch/x86/events/amd/ibs.c:521:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
   PMU_FORMAT_ATTR(rand_en,        "config:57");
   ^
   include/linux/perf_event.h:1619:9: note: expanded from macro 'PMU_FORMAT_ATTR'
           return sprintf(page, _format "\n");                             \
                  ^~~~~~~
   arch/x86/events/amd/ibs.c:522:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
   PMU_FORMAT_ATTR(cnt_ctl,        "config:19");
   ^
   include/linux/perf_event.h:1619:9: note: expanded from macro 'PMU_FORMAT_ATTR'
           return sprintf(page, _format "\n");                             \
                  ^~~~~~~
   arch/x86/events/amd/ibs.c:522:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
   PMU_FORMAT_ATTR(cnt_ctl,        "config:19");
   ^
   include/linux/perf_event.h:1619:9: note: expanded from macro 'PMU_FORMAT_ATTR'
           return sprintf(page, _format "\n");                             \
                  ^~~~~~~
   arch/x86/events/amd/ibs.c:744:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(&perf_ibs->format_group, 0, sizeof(perf_ibs->format_group));
                   ^~~~~~
   arch/x86/events/amd/ibs.c:744:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                   memset(&perf_ibs->format_group, 0, sizeof(perf_ibs->format_group));
                   ^~~~~~
   arch/x86/events/amd/ibs.c:748:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memset(&perf_ibs->attr_groups, 0, sizeof(perf_ibs->attr_groups));
                   ^~~~~~
   arch/x86/events/amd/ibs.c:748:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
                   memset(&perf_ibs->attr_groups, 0, sizeof(perf_ibs->attr_groups));
                   ^~~~~~
   Suppressed 31 warnings (31 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   15 warnings generated.
   Suppressed 15 warnings (15 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   38 warnings generated.
   Suppressed 38 warnings (38 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   27 warnings generated.
   Suppressed 27 warnings (27 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   13 warnings generated.
   Suppressed 13 warnings (13 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   16 warnings generated.
   Suppressed 16 warnings (16 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   32 warnings generated.
   Suppressed 32 warnings (32 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   33 warnings generated.
   arch/x86/kernel/pci-iommu_table.c:37:10: warning: Dereference of null pointer (loaded from variable 'p') [clang-analyzer-core.NullDereference]
                           tmp = *p;
                                 ^~
   arch/x86/kernel/pci-iommu_table.c:30:18: note: Assuming 'p' is < 'finish'
           for (p = start; p < finish; p++) {
                           ^~~~~~~~~~
   arch/x86/kernel/pci-iommu_table.c:30:2: note: Loop condition is true.  Entering loop body
           for (p = start; p < finish; p++) {
           ^
   arch/x86/kernel/pci-iommu_table.c:36:7: note: 'q' is <= 'p'
                   if (q > p) {
                       ^
   arch/x86/kernel/pci-iommu_table.c:36:3: note: Taking false branch
                   if (q > p) {
                   ^
   arch/x86/kernel/pci-iommu_table.c:30:30: note: Null pointer value stored to 'p'
           for (p = start; p < finish; p++) {
                                       ^~~
   arch/x86/kernel/pci-iommu_table.c:30:18: note: 'p' is < 'finish'
           for (p = start; p < finish; p++) {
                           ^
   arch/x86/kernel/pci-iommu_table.c:30:2: note: Loop condition is true.  Entering loop body
           for (p = start; p < finish; p++) {
           ^
   arch/x86/kernel/pci-iommu_table.c:36:7: note: Assuming 'q' is > 'p'
                   if (q > p) {
                       ^~~~~
   arch/x86/kernel/pci-iommu_table.c:36:3: note: Taking true branch
                   if (q > p) {
                   ^
   arch/x86/kernel/pci-iommu_table.c:37:10: note: Dereference of null pointer (loaded from variable 'p')
                           tmp = *p;
                                 ^~
   arch/x86/kernel/pci-iommu_table.c:38:4: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                           memmove(p, q, sizeof(*p));
                           ^~~~~~~
   arch/x86/kernel/pci-iommu_table.c:38:4: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
                           memmove(p, q, sizeof(*p));
                           ^~~~~~~
   Suppressed 31 warnings (31 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   41 warnings generated.
   fs/fuse/readdir.c:82:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(addr + offset, dirent, reclen);
           ^~~~~~
   fs/fuse/readdir.c:82:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(addr + offset, dirent, reclen);
           ^~~~~~
   fs/fuse/readdir.c:262:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(&inarg, 0, sizeof(inarg));
           ^~~~~~
   fs/fuse/readdir.c:262:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(&inarg, 0, sizeof(inarg));
           ^~~~~~
   Suppressed 39 warnings (39 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   33 warnings generated.
   kernel/kexec.c:45:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(image->segment, segments, nr_segments * sizeof(*segments));
           ^~~~~~
   kernel/kexec.c:45:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(image->segment, segments, nr_segments * sizeof(*segments));
           ^~~~~~
   Suppressed 32 warnings (32 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   38 warnings generated.
   kernel/kexec_file.c:919:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(sechdrs, (void *)pi->ehdr + pi->ehdr->e_shoff,
           ^~~~~~
   kernel/kexec_file.c:919:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(sechdrs, (void *)pi->ehdr + pi->ehdr->e_shoff,
           ^~~~~~
   kernel/kexec_file.c:953:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy(dst, src, sechdrs[i].sh_size);
                   ^~~~~~
   kernel/kexec_file.c:953:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy(dst, src, sechdrs[i].sh_size);
                   ^~~~~~
   kernel/kexec_file.c:1173:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy((void *)buf, sym_buf, size);
                   ^~~~~~
   kernel/kexec_file.c:1173:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy((void *)buf, sym_buf, size);
                   ^~~~~~
   kernel/kexec_file.c:1175:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
                   memcpy((void *)sym_buf, buf, size);
                   ^~~~~~
   kernel/kexec_file.c:1175:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
                   memcpy((void *)sym_buf, buf, size);
                   ^~~~~~
   kernel/kexec_file.c:1296:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memcpy(ehdr->e_ident, ELFMAG, SELFMAG);
           ^~~~~~
   kernel/kexec_file.c:1296:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
           memcpy(ehdr->e_ident, ELFMAG, SELFMAG);
           ^~~~~~
   kernel/kexec_file.c:1301:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
           memset(ehdr->e_ident + EI_PAD, 0, EI_NIDENT - EI_PAD);
           ^~~~~~
   kernel/kexec_file.c:1301:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
           memset(ehdr->e_ident + EI_PAD, 0, EI_NIDENT - EI_PAD);
           ^~~~~~
   Suppressed 32 warnings (32 in non-user code).
   Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
   16 warnings generated.
   arch/x86/crypto/blowfish_glue.c:159:10: warning: Although the value stored to 'nbytes' is used in the enclosing expression, the value is never actually read from 'nbytes' [clang-analyzer-deadcode.DeadStores]
           while ((nbytes = walk.nbytes)) {
                   ^        ~~~~~~~~~~~
   arch/x86/crypto/blowfish_glue.c:159:10: note: Although the value stored to 'nbytes' is used in the enclosing expression, the value is never actually read from 'nbytes'
           while ((nbytes = walk.nbytes)) {
                   ^        ~~~~~~~~~~~
   arch/x86/crypto/blowfish_glue.c:240:10: warning: Although the value stored to 'nbytes' is used in the enclosing expression, the value is never actually read from 'nbytes' [clang-analyzer-deadcode.DeadStores]
           while ((nbytes = walk.nbytes)) {
..

-- 
0-DAY CI Kernel Test Service
https://01.org/lkp

^ permalink raw reply	[flat|nested] only message in thread

only message in thread, other threads:[~2022-06-01 19:26 UTC | newest]

Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2022-06-01 19:26 snprintf(err->loc, TRACING_LOG_LOC_MAX, "%s: error: ", loc); kernel test robot

This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.