* snprintf(err->loc, TRACING_LOG_LOC_MAX, "%s: error: ", loc);
@ 2022-06-01 19:26 kernel test robot
0 siblings, 0 replies; only message in thread
From: kernel test robot @ 2022-06-01 19:26 UTC (permalink / raw)
To: kbuild
[-- Attachment #1: Type: text/plain, Size: 32436 bytes --]
::::::
:::::: Manual check reason: "low confidence static check first_new_problem: snprintf(err->loc, TRACING_LOG_LOC_MAX, "%s: error: ", loc);"
::::::
CC: llvm(a)lists.linux.dev
CC: kbuild-all(a)lists.01.org
BCC: lkp(a)intel.com
CC: linux-kernel(a)vger.kernel.org
TO: Arnd Bergmann <arnd@arndb.de>
CC: Masahiro Yamada <masahiroy@kernel.org>
CC: Alex Shi <alexs@kernel.org>
CC: Nick Desaulniers <ndesaulniers@google.com>
CC: Miguel Ojeda <ojeda@kernel.org>
CC: Nathan Chancellor <nathan@kernel.org>
tree: https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git master
head: 700170bf6b4d773e328fa54ebb70ba444007c702
commit: e8c07082a810fbb9db303a2b66b66b8d7e588b53 Kbuild: move to -std=gnu11
date: 3 months ago
:::::: branch date: 19 hours ago
:::::: commit date: 3 months ago
config: x86_64-randconfig-c007-20220530 (https://download.01.org/0day-ci/archive/20220602/202206020341.VJfT8Qsk-lkp(a)intel.com/config)
compiler: clang version 15.0.0 (https://github.com/llvm/llvm-project 0776c48f9b7e69fa447bee57c7c0985caa856be9)
reproduce (this is a W=1 build):
wget https://raw.githubusercontent.com/intel/lkp-tests/master/sbin/make.cross -O ~/bin/make.cross
chmod +x ~/bin/make.cross
# https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e8c07082a810fbb9db303a2b66b66b8d7e588b53
git remote add linus https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
git fetch --no-tags linus master
git checkout e8c07082a810fbb9db303a2b66b66b8d7e588b53
# save the config file
COMPILER_INSTALL_PATH=$HOME/0day COMPILER=clang make.cross
If you fix the issue, kindly add following tag where applicable
Reported-by: kernel test robot <lkp@intel.com>
All errors (new ones prefixed by >>):
>> snprintf(err->loc, TRACING_LOG_LOC_MAX, "%s: error: ", loc);
^~~~~~~~
kernel/trace/trace.c:7828:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
>> snprintf(err->loc, TRACING_LOG_LOC_MAX, "%s: error: ", loc);
^~~~~~~~
kernel/trace/trace.c:7829:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(err->cmd, MAX_FILTER_STR_VAL,"\n" CMD_PREFIX "%s\n", cmd);
^~~~~~~~
kernel/trace/trace.c:7829:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(err->cmd, MAX_FILTER_STR_VAL,"\n" CMD_PREFIX "%s\n", cmd);
^~~~~~~~
kernel/trace/trace.c:8594:2: warning: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
snprintf(cpu_dir, 30, "cpu%ld", cpu);
^~~~~~~~
kernel/trace/trace.c:8594:2: note: Call to function 'snprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'snprintf_s' in case of C11
snprintf(cpu_dir, 30, "cpu%ld", cpu);
^~~~~~~~
kernel/trace/trace.c:8935:6: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
r = sprintf(buf, "%d\n", r);
^~~~~~~
kernel/trace/trace.c:8935:6: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
r = sprintf(buf, "%d\n", r);
^~~~~~~
kernel/trace/trace.c:8991:6: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
r = sprintf(buf, "%d\n", r);
^~~~~~~
kernel/trace/trace.c:8991:6: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
r = sprintf(buf, "%d\n", r);
^~~~~~~
Suppressed 41 warnings (41 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
33 warnings generated.
arch/x86/events/intel/cstate.c:195:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
DEFINE_CSTATE_FORMAT_ATTR(core_event, event, "config:0-63");
^
arch/x86/events/intel/cstate.c:118:9: note: expanded from macro 'DEFINE_CSTATE_FORMAT_ATTR'
return sprintf(page, _format "\n"); \
^~~~~~~
arch/x86/events/intel/cstate.c:195:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
DEFINE_CSTATE_FORMAT_ATTR(core_event, event, "config:0-63");
^
arch/x86/events/intel/cstate.c:118:9: note: expanded from macro 'DEFINE_CSTATE_FORMAT_ATTR'
return sprintf(page, _format "\n"); \
^~~~~~~
arch/x86/events/intel/cstate.c:274:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
DEFINE_CSTATE_FORMAT_ATTR(pkg_event, event, "config:0-63");
^
arch/x86/events/intel/cstate.c:118:9: note: expanded from macro 'DEFINE_CSTATE_FORMAT_ATTR'
return sprintf(page, _format "\n"); \
^~~~~~~
arch/x86/events/intel/cstate.c:274:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
DEFINE_CSTATE_FORMAT_ATTR(pkg_event, event, "config:0-63");
^
arch/x86/events/intel/cstate.c:118:9: note: expanded from macro 'DEFINE_CSTATE_FORMAT_ATTR'
return sprintf(page, _format "\n"); \
^~~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
38 warnings generated.
arch/x86/events/zhaoxin/core.c:437:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
PMU_FORMAT_ATTR(event, "config:0-7");
^
include/linux/perf_event.h:1619:9: note: expanded from macro 'PMU_FORMAT_ATTR'
return sprintf(page, _format "\n"); \
^~~~~~~
arch/x86/events/zhaoxin/core.c:437:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
PMU_FORMAT_ATTR(event, "config:0-7");
^
include/linux/perf_event.h:1619:9: note: expanded from macro 'PMU_FORMAT_ATTR'
return sprintf(page, _format "\n"); \
^~~~~~~
arch/x86/events/zhaoxin/core.c:438:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
PMU_FORMAT_ATTR(umask, "config:8-15");
^
include/linux/perf_event.h:1619:9: note: expanded from macro 'PMU_FORMAT_ATTR'
return sprintf(page, _format "\n"); \
^~~~~~~
arch/x86/events/zhaoxin/core.c:438:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
PMU_FORMAT_ATTR(umask, "config:8-15");
^
include/linux/perf_event.h:1619:9: note: expanded from macro 'PMU_FORMAT_ATTR'
return sprintf(page, _format "\n"); \
^~~~~~~
arch/x86/events/zhaoxin/core.c:439:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
PMU_FORMAT_ATTR(edge, "config:18");
^
include/linux/perf_event.h:1619:9: note: expanded from macro 'PMU_FORMAT_ATTR'
return sprintf(page, _format "\n"); \
^~~~~~~
arch/x86/events/zhaoxin/core.c:439:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
PMU_FORMAT_ATTR(edge, "config:18");
^
include/linux/perf_event.h:1619:9: note: expanded from macro 'PMU_FORMAT_ATTR'
return sprintf(page, _format "\n"); \
^~~~~~~
arch/x86/events/zhaoxin/core.c:440:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
PMU_FORMAT_ATTR(inv, "config:23");
^
include/linux/perf_event.h:1619:9: note: expanded from macro 'PMU_FORMAT_ATTR'
return sprintf(page, _format "\n"); \
^~~~~~~
arch/x86/events/zhaoxin/core.c:440:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
PMU_FORMAT_ATTR(inv, "config:23");
^
include/linux/perf_event.h:1619:9: note: expanded from macro 'PMU_FORMAT_ATTR'
return sprintf(page, _format "\n"); \
^~~~~~~
arch/x86/events/zhaoxin/core.c:441:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
PMU_FORMAT_ATTR(cmask, "config:24-31");
^
include/linux/perf_event.h:1619:9: note: expanded from macro 'PMU_FORMAT_ATTR'
return sprintf(page, _format "\n"); \
^~~~~~~
arch/x86/events/zhaoxin/core.c:441:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
PMU_FORMAT_ATTR(cmask, "config:24-31");
^
include/linux/perf_event.h:1619:9: note: expanded from macro 'PMU_FORMAT_ATTR'
return sprintf(page, _format "\n"); \
^~~~~~~
arch/x86/events/zhaoxin/core.c:571:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(hw_cache_event_ids, zxd_hw_cache_event_ids,
^~~~~~
arch/x86/events/zhaoxin/core.c:571:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(hw_cache_event_ids, zxd_hw_cache_event_ids,
^~~~~~
arch/x86/events/zhaoxin/core.c:582:4: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(hw_cache_event_ids, zxe_hw_cache_event_ids,
^~~~~~
arch/x86/events/zhaoxin/core.c:582:4: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(hw_cache_event_ids, zxe_hw_cache_event_ids,
^~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
35 warnings generated.
arch/x86/events/amd/ibs.c:521:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
PMU_FORMAT_ATTR(rand_en, "config:57");
^
include/linux/perf_event.h:1619:9: note: expanded from macro 'PMU_FORMAT_ATTR'
return sprintf(page, _format "\n"); \
^~~~~~~
arch/x86/events/amd/ibs.c:521:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
PMU_FORMAT_ATTR(rand_en, "config:57");
^
include/linux/perf_event.h:1619:9: note: expanded from macro 'PMU_FORMAT_ATTR'
return sprintf(page, _format "\n"); \
^~~~~~~
arch/x86/events/amd/ibs.c:522:1: warning: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
PMU_FORMAT_ATTR(cnt_ctl, "config:19");
^
include/linux/perf_event.h:1619:9: note: expanded from macro 'PMU_FORMAT_ATTR'
return sprintf(page, _format "\n"); \
^~~~~~~
arch/x86/events/amd/ibs.c:522:1: note: Call to function 'sprintf' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'sprintf_s' in case of C11
PMU_FORMAT_ATTR(cnt_ctl, "config:19");
^
include/linux/perf_event.h:1619:9: note: expanded from macro 'PMU_FORMAT_ATTR'
return sprintf(page, _format "\n"); \
^~~~~~~
arch/x86/events/amd/ibs.c:744:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&perf_ibs->format_group, 0, sizeof(perf_ibs->format_group));
^~~~~~
arch/x86/events/amd/ibs.c:744:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&perf_ibs->format_group, 0, sizeof(perf_ibs->format_group));
^~~~~~
arch/x86/events/amd/ibs.c:748:3: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&perf_ibs->attr_groups, 0, sizeof(perf_ibs->attr_groups));
^~~~~~
arch/x86/events/amd/ibs.c:748:3: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&perf_ibs->attr_groups, 0, sizeof(perf_ibs->attr_groups));
^~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
15 warnings generated.
Suppressed 15 warnings (15 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
38 warnings generated.
Suppressed 38 warnings (38 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
27 warnings generated.
Suppressed 27 warnings (27 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
13 warnings generated.
Suppressed 13 warnings (13 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
16 warnings generated.
Suppressed 16 warnings (16 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
32 warnings generated.
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
33 warnings generated.
arch/x86/kernel/pci-iommu_table.c:37:10: warning: Dereference of null pointer (loaded from variable 'p') [clang-analyzer-core.NullDereference]
tmp = *p;
^~
arch/x86/kernel/pci-iommu_table.c:30:18: note: Assuming 'p' is < 'finish'
for (p = start; p < finish; p++) {
^~~~~~~~~~
arch/x86/kernel/pci-iommu_table.c:30:2: note: Loop condition is true. Entering loop body
for (p = start; p < finish; p++) {
^
arch/x86/kernel/pci-iommu_table.c:36:7: note: 'q' is <= 'p'
if (q > p) {
^
arch/x86/kernel/pci-iommu_table.c:36:3: note: Taking false branch
if (q > p) {
^
arch/x86/kernel/pci-iommu_table.c:30:30: note: Null pointer value stored to 'p'
for (p = start; p < finish; p++) {
^~~
arch/x86/kernel/pci-iommu_table.c:30:18: note: 'p' is < 'finish'
for (p = start; p < finish; p++) {
^
arch/x86/kernel/pci-iommu_table.c:30:2: note: Loop condition is true. Entering loop body
for (p = start; p < finish; p++) {
^
arch/x86/kernel/pci-iommu_table.c:36:7: note: Assuming 'q' is > 'p'
if (q > p) {
^~~~~
arch/x86/kernel/pci-iommu_table.c:36:3: note: Taking true branch
if (q > p) {
^
arch/x86/kernel/pci-iommu_table.c:37:10: note: Dereference of null pointer (loaded from variable 'p')
tmp = *p;
^~
arch/x86/kernel/pci-iommu_table.c:38:4: warning: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memmove(p, q, sizeof(*p));
^~~~~~~
arch/x86/kernel/pci-iommu_table.c:38:4: note: Call to function 'memmove' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memmove_s' in case of C11
memmove(p, q, sizeof(*p));
^~~~~~~
Suppressed 31 warnings (31 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
41 warnings generated.
fs/fuse/readdir.c:82:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(addr + offset, dirent, reclen);
^~~~~~
fs/fuse/readdir.c:82:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(addr + offset, dirent, reclen);
^~~~~~
fs/fuse/readdir.c:262:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(&inarg, 0, sizeof(inarg));
^~~~~~
fs/fuse/readdir.c:262:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(&inarg, 0, sizeof(inarg));
^~~~~~
Suppressed 39 warnings (39 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
33 warnings generated.
kernel/kexec.c:45:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(image->segment, segments, nr_segments * sizeof(*segments));
^~~~~~
kernel/kexec.c:45:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(image->segment, segments, nr_segments * sizeof(*segments));
^~~~~~
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
38 warnings generated.
kernel/kexec_file.c:919:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(sechdrs, (void *)pi->ehdr + pi->ehdr->e_shoff,
^~~~~~
kernel/kexec_file.c:919:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(sechdrs, (void *)pi->ehdr + pi->ehdr->e_shoff,
^~~~~~
kernel/kexec_file.c:953:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(dst, src, sechdrs[i].sh_size);
^~~~~~
kernel/kexec_file.c:953:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(dst, src, sechdrs[i].sh_size);
^~~~~~
kernel/kexec_file.c:1173:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy((void *)buf, sym_buf, size);
^~~~~~
kernel/kexec_file.c:1173:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy((void *)buf, sym_buf, size);
^~~~~~
kernel/kexec_file.c:1175:3: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy((void *)sym_buf, buf, size);
^~~~~~
kernel/kexec_file.c:1175:3: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy((void *)sym_buf, buf, size);
^~~~~~
kernel/kexec_file.c:1296:2: warning: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memcpy(ehdr->e_ident, ELFMAG, SELFMAG);
^~~~~~
kernel/kexec_file.c:1296:2: note: Call to function 'memcpy' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memcpy_s' in case of C11
memcpy(ehdr->e_ident, ELFMAG, SELFMAG);
^~~~~~
kernel/kexec_file.c:1301:2: warning: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11 [clang-analyzer-security.insecureAPI.DeprecatedOrUnsafeBufferHandling]
memset(ehdr->e_ident + EI_PAD, 0, EI_NIDENT - EI_PAD);
^~~~~~
kernel/kexec_file.c:1301:2: note: Call to function 'memset' is insecure as it does not provide security checks introduced in the C11 standard. Replace with analogous functions that support length arguments or provides boundary checks such as 'memset_s' in case of C11
memset(ehdr->e_ident + EI_PAD, 0, EI_NIDENT - EI_PAD);
^~~~~~
Suppressed 32 warnings (32 in non-user code).
Use -header-filter=.* to display errors from all non-system headers. Use -system-headers to display errors from system headers as well.
16 warnings generated.
arch/x86/crypto/blowfish_glue.c:159:10: warning: Although the value stored to 'nbytes' is used in the enclosing expression, the value is never actually read from 'nbytes' [clang-analyzer-deadcode.DeadStores]
while ((nbytes = walk.nbytes)) {
^ ~~~~~~~~~~~
arch/x86/crypto/blowfish_glue.c:159:10: note: Although the value stored to 'nbytes' is used in the enclosing expression, the value is never actually read from 'nbytes'
while ((nbytes = walk.nbytes)) {
^ ~~~~~~~~~~~
arch/x86/crypto/blowfish_glue.c:240:10: warning: Although the value stored to 'nbytes' is used in the enclosing expression, the value is never actually read from 'nbytes' [clang-analyzer-deadcode.DeadStores]
while ((nbytes = walk.nbytes)) {
..
--
0-DAY CI Kernel Test Service
https://01.org/lkp
^ permalink raw reply [flat|nested] only message in thread
only message in thread, other threads:[~2022-06-01 19:26 UTC | newest]
Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2022-06-01 19:26 snprintf(err->loc, TRACING_LOG_LOC_MAX, "%s: error: ", loc); kernel test robot
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.